Denial of service attacks Q Gu, P Liu Handbook of Computer Networks: Distributed Networks, Network Planning …, 2007 | 133 | 2007 |
Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling Q Gu, D R. Michanowicz, C Jia Sensors 18 (12), 4363, 2018 | 102 | 2018 |
A heuristic ant algorithm for solving QoS multicast routing problem CH Chu, JH Gu, XD Hou, Q Gu Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002 | 98 | 2002 |
Transient clouds: Assignment and collaborative execution of tasks on mobile devices T Penner, A Johnson, B Van Slyke, M Guirguis, Q Gu 2014 IEEE Global Communications Conference, 2801-2806, 2014 | 71 | 2014 |
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency S Abdulsalam, Z Zong, Q Gu, M Qiu 2015 Sixth International Green and Sustainable Computing Conference (IGSC), 1-8, 2015 | 54 | 2015 |
Towards self-propagate mal-packets in sensor networks Q Gu, R Noorani Proceedings of the first ACM conference on Wireless network security, 172-182, 2008 | 54 | 2008 |
Program energy efficiency: The impact of language, compiler and implementation choices S Abdulsalam, D Lakomski, Q Gu, T Jin, Z Zong International Green Computing Conference, 1-6, 2014 | 53 | 2014 |
Analysis and exercises for engaging beginners in online {CTF} competitions for security education TJ Burns, SC Rios, TK Jordan, Q Gu, T Underwood 2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017 | 45 | 2017 |
KTR: An efficient key management scheme for secure data access control in wireless broadcast services Q Gu, L Peng, L Wang-Chien, C Chao-Hsien IEEE Transactions on Dependable and Secure Computing 6 (3), 188-201, 2008 | 44 | 2008 |
Localized broadcast authentication in large sensor networks J Drissi, Q Gu International conference on Networking and Services (ICNS'06), 25-25, 2006 | 40 | 2006 |
Marcher: A heterogeneous system supporting energy-aware high performance computing and big data analytics Z Zong, R Ge, Q Gu Big data research 8, 27-38, 2017 | 38 | 2017 |
Defending against packet injection attacks unreliable ad hoc networks Q Gu, P Liu, S Zhu, CH Chu GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 3, 5 pp., 2005 | 26 | 2005 |
A study of self-propagating mal-packets in sensor networks: Attacks and defenses Q Gu, C Ferguson, R Noorani Computers & Security 30 (1), 13-27, 2011 | 24 | 2011 |
A consumer UAV-based air quality monitoring system for smart cities Q Gu, C Jia 2019 IEEE international conference on consumer electronics (ICCE), 1-6, 2019 | 22 | 2019 |
Sink-anonymity mobility control in wireless sensor networks Q Gu, X Chen, Z Jiang, J Wu 2009 IEEE International Conference on Wireless and Mobile Computing …, 2009 | 19 | 2009 |
Defence against packet injection in ad hoc networks Q Gu, P Liu, CH Chu, S Zhu International Journal of Security and Networks 2 (1-2), 154-169, 2007 | 18 | 2007 |
Tactical bandwidth exhaustion in ad hoc networks Q Gu, P Liu, CH Chu Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 18 | 2004 |
Secure mobile cloud computing and security issues Q Gu, M Guirguis High performance cloud auditing and applications, 65-90, 2013 | 17 | 2013 |
Self-healing control flow protection in sensor applications C Ferguson, Q Gu, H Shi Proceedings of the second ACM conference on Wireless network security, 213-224, 2009 | 17 | 2009 |
Analysis of area-congestion-based DDoS attacks in ad hoc networks Q Gu, P Liu, CH Chu Ad Hoc Networks 5 (5), 613-625, 2007 | 17 | 2007 |