IMDGuard: Securing implantable medical devices with the external wearable guardian F Xu, Z Qin, CC Tan, B Wang, Q Li 2011 Proceedings IEEE INFOCOM, 1862-1870, 2011 | 321 | 2011 |
Secure and serverless RFID authentication and search protocols CC Tan, B Sheng, Q Li IEEE Transactions on Wireless Communications 7 (4), 1400-1407, 2008 | 231 | 2008 |
Body sensor network security: an identity-based cryptography approach CC Tan, H Wang, S Zhong, Q Li Proceedings of the first ACM conference on Wireless network security, 148-153, 2008 | 206 | 2008 |
Counting RFID tags efficiently and anonymously H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 190 | 2010 |
A timing-based scheme for rogue AP detection H Han, B Sheng, CC Tan, Q Li, S Lu IEEE Transactions on parallel and distributed Systems 22 (11), 1912-1925, 2011 | 185 | 2011 |
IBE-Lite: A lightweight identity-based cryptography for body sensor networks CC Tan, H Wang, S Zhong, Q Li IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009 | 185 | 2009 |
How to monitor for missing RFID tags CC Tan, B Sheng, Q Li 2008 The 28th International Conference on Distributed Computing Systems, 295-302, 2008 | 180 | 2008 |
Sybildefender: Defend against sybil attacks in large social networks W Wei, F Xu, CC Tan, Q Li 2012 proceedings ieee infocom, 1951-1959, 2012 | 178 | 2012 |
Snoogle: A search engine for pervasive environments H Wang, CC Tan, Q Li IEEE Transactions on Parallel and Distributed Systems 21 (8), 1188-1202, 2009 | 157 | 2009 |
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control H Wang, B Sheng, CC Tan, Q Li 2008 The 28th International Conference on Distributed Computing Systems, 11-18, 2008 | 151 | 2008 |
Online multi-object tracking with instance-aware tracker and dynamic model refreshment P Chu, H Fan, CC Tan, H Ling 2019 IEEE winter conference on applications of computer vision (WACV), 161-170, 2019 | 141 | 2019 |
Efficient tag identification in mobile RFID systems L Xie, B Sheng, CC Tan, H Han, Q Li, D Chen 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 133 | 2010 |
Severless search and authentication protocols for RFID CC Tan, B Sheng, Q Li Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 132 | 2007 |
Finding popular categories for RFID tags B Sheng, CC Tan, Q Li, W Mao Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 121 | 2008 |
Designing a practical access point association protocol F Xu, CC Tan, Q Li, G Yan, J Wu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 106 | 2010 |
A measurement based rogue ap detection scheme H Han, B Sheng, CC Tan, Q Li, S Lu IEEE INFOCOM 2009, 1593-1601, 2009 | 96 | 2009 |
SybilDefender: A defense mechanism for sybil attacks in large social networks W Wei, F Xu, CC Tan, Q Li IEEE transactions on parallel and distributed systems 24 (12), 2492-2502, 2013 | 81 | 2013 |
Microsearch: A search engine for embedded devices used in pervasive computing CC Tan, B Sheng, H Wang, Q Li ACM Transactions on Embedded Computing Systems (TECS) 9 (4), 1-29, 2010 | 81 | 2010 |
Efficient information retrieval for ranked queries in cost-effective cloud environments Q Liu, CC Tan, J Wu, G Wang 2012 Proceedings IEEE INFOCOM, 2581-2585, 2012 | 77 | 2012 |
Efficient techniques for monitoring missing RFID tags CC Tan, B Sheng, Q Li IEEE Transactions on Wireless Communications 9 (6), 1882-1889, 2010 | 73 | 2010 |