Long Cheng
Citado por
Citado por
Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions
L Cheng, F Liu, D Yao
WIREs Data Mining and Knowledge Discovery. Wiley., 2017
QoS aware geographic opportunistic routing in wireless sensor networks
L Cheng, J Niu, J Cao, SK Das, Y Gu
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1864-1875, 2014
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks
J Niu, L Cheng, Y Gu, L Shu, SK Das
IEEE Transaction on Industrial Informatics 10 (1), 784 - 794, 2013
Social-Loc: Improving indoor localization with social sensing
J Jun, Y Gu, L Cheng, B Lu, J Sun, T Zhu, J Niu
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013
Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
Y Luo, Y Xiao, L Cheng, G Peng, D Yao
ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021
WicLoc: An Indoor Localization System based on WiFi Fingerprints and Crowdsourcing
J Niu, B Wang, L Cheng, JJPC Rodrigues
IEEE International Conference on Communications (ICC), 2015
Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks
L Cheng, J Niu, C Luo, L Shu, L Kong, Z Zhao, Y Gu
Computer Networks 134, 2018
Pallas: Self-bootstrapping Fine-grained Passive Indoor Localization Using WiFi Monitors
C Luo, L Cheng, MC Chan, Y Gu, J Li, M Zhong
IEEE Transactions on Mobile Computing (TMC), 2016
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, DD Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
PSOTrack: A RFID-Based System for Random Moving Objects Tracking in Unconstrained Indoor Environment
J Li, G Feng, W Wei, C Luo, L Cheng, H Wang, H Song, Z Ming
IEEE Internet of Things Journal 5 (6), 4632-4641, 2018
Low-overhead wifi fingerprinting
J Jun, L He, Y Gu, W Jiang, G Kushwaha, A Vipin, L Cheng, C Liu, T Zhu
IEEE Transactions on Mobile Computing 17 (3), 590-603, 2017
Blockchain-Based Mobile Crowd Sensing in Industrial Systems
J Huang, L Kong, HN Dai, W Ding, L Cheng, G Chen, X Jin, P Zeng
IEEE Transactions on Industrial Informatics 16 (10), 6553-6563, 2020
ZiLoc: Energy Efficient WiFi Fingerprint-based Localization with Low-Power Radio
J Niu, B Lu, L Cheng, Y Gu, L Shu
WCNC, 2013
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
H Almohri, L Cheng, D Yao, H Alemzadeh
Second IEEE International Workshop on Security, Privacy, and Trustworthiness …, 2017
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
D Yao, X Shu, L Cheng, SJ Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9 (3), 1-173, 2017
Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks
L Cheng, J Niu, Y Gu, C Luo, T He
IEEE/ACM Transactions on Networking (ToN), 2016
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks
L Cheng, Y Gu, T He, J Niu
2013 Proceedings IEEE INFOCOM, 1393-1401, 2013
Compressive Sensing based Data Quality Improvement for Crowd-Sensing Applications
L Cheng, J Niu, L Kong, C Luo, Y Gu, W He, SK Das
Journal of Network and Computer Applications (JNCA), 2016
Measuring the effectiveness of privacy policies for voice assistant applications
S Liao, C Wilson, L Cheng, H Hu, H Deng
Annual Computer Security Applications Conference, 856-869, 2020
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms
L Cheng, C Wilson, S Liao, J Young, D Dong, H Hu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20