@article{wang_wang_wang_song_2022, title={Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection}, volume={5}, DOI={10.1109/TMC.2020.3032434}, journal={IEEE TRANSACTIONS ON MOBILE COMPUTING}, author={Wang, Jie and Wang, Wenye and Wang, Cliff and Song, Min}, year={2022}, month={May} } @article{zou_wang_dai_2021, title={Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell}, DOI={10.1109/GLOBECOM46510.2021.9685339}, journal={2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, author={Zou, Rui and Wang, Wenye and Dai, Huaiyu}, year={2021} } @article{jalooli_song_wang_2019, title={Message coverage maximization in infrastructure-based urban vehicular networks}, volume={16}, ISBN={2214-2096}, DOI={10.1016/j.vehcom.2019.02.001}, journal={VEHICULAR COMMUNICATIONS}, author={Jalooli, Ali and Song, Min and Wang, Wenye}, year={2019}, month={Apr}, pages={1–14} } @article{wang_pambudi_wang_song_2019, title={Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective}, volume={6}, ISBN={2327-4662}, DOI={10.1109/JIOT.2019.2913140}, number={4}, journal={IEEE INTERNET OF THINGS JOURNAL}, author={Wang, Jie and Pambudi, Sigit and Wang, Wenye and Song, Min}, year={2019}, month={Aug}, pages={6952–6963} } @article{wei_lu_wang_2018, title={On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid}, volume={12}, DOI={10.1109/JSYST.2017.2763462}, number={4}, journal={IEEE SYSTEMS JOURNAL}, author={Wei, Mingkui and Lu, Zhuo and Wang, Wenye}, year={2018}, pages={3404–3413} } @inproceedings{hosseinalipour_wang_dai_wang_2017, title={Detection of infections using graph signal processing in heterogeneous networks}, DOI={10.1109/glocom.2017.8254487}, booktitle={Globecom 2017 - 2017 ieee global communications conference}, author={Hosseinalipour, S. and Wang, Jie and Dai, Huaiyu and Wang, Wenye}, year={2017} } @inproceedings{pambudi_wang_wang_2017, title={From isolation time to node resilience: Impact of cascades in D2D-based social networks}, DOI={10.1109/glocom.2017.8255073}, booktitle={Globecom 2017 - 2017 ieee global communications conference}, author={Pambudi, S. A. and Wang, Wenye and Wang, C.}, year={2017} } @inproceedings{wang_wang_song_2017, title={How durable and stable is file sharing on the move in cellular-assisted D2D communications?}, DOI={10.1109/glocom.2017.8254603}, booktitle={Globecom 2017 - 2017 ieee global communications conference}, author={Wang, Y. L. and Wang, Wenye and Song, M.}, year={2017} } @inproceedings{wang_wang_wang_2017, title={Modeling and strategy design for spectrum monitoring over a geographical region}, DOI={10.1109/glocom.2017.8254113}, booktitle={Globecom 2017 - 2017 ieee global communications conference}, author={Wang, Jie and Wang, Wenye and Wang, C.}, year={2017} } @inproceedings{wei_lu_wang_2017, title={On modeling and understanding vehicle evacuation attacks in VANETs}, DOI={10.1109/icc.2017.7996463}, booktitle={2017 ieee international conference on communications (icc)}, author={Wei, M. K. and Lu, Z. and Wang, Wenye}, year={2017} } @inproceedings{wang_li_wang_song_2016, title={A locality-based mobile caching policy for D2D-based content sharing network}, DOI={10.1109/glocom.2016.7841510}, booktitle={2016 ieee global communications conference (globecom)}, author={Wang, Y. L. and Li, Y. J. and Wang, Wenye and Song, M.}, year={2016} } @article{wei_wang_2016, title={Data-centric threats and their impacts to real-time communications in smart grid}, volume={104}, DOI={10.1016/j.comnet.2016.05.003}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Wei, M. K. and Wang, Wenye}, year={2016}, pages={174–188} } @inproceedings{wang_wang_wang_2016, title={Divide and conquer: Leveraging topology in control of epidemic information dynamics}, DOI={10.1109/glocom.2016.7841747}, booktitle={2016 ieee global communications conference (globecom)}, author={Wang, Jie and Wang, Wenye and Wang, C.}, year={2016} } @inproceedings{wei_lu_wang_2016, title={Dominoes with communications: On characterizing the progress of cascading failures in smart grid}, DOI={10.1109/icc.2016.7511048}, booktitle={2016 ieee international conference on communications (icc)}, author={Wei, M. K. and Lu, Z. and Wang, Wenye}, year={2016} } @inproceedings{pambudi_wang_wang_2016, title={How robust Is a D2D-based messaging service?}, DOI={10.1109/glocom.2016.7841877}, booktitle={2016 ieee global communications conference (globecom)}, author={Pambudi, S. A. and Wang, Wenye and Wang, C.}, year={2016} } @inproceedings{wang_wang_wang_2016, title={How the anti-rumor kills the rumor: Conflicting information propagation in networks}, DOI={10.1109/icc.2016.7511492}, booktitle={2016 ieee international conference on communications (icc)}, author={Wang, Jie and Wang, Wenye and Wang, C.}, year={2016} } @inproceedings{pambudi_wang_wang_2016, title={Modeling and estimating the structure of D2D-based mobile social networks}, DOI={10.1109/icc.2016.7511491}, booktitle={2016 ieee international conference on communications (icc)}, author={Pambudi, S. A. and Wang, Wenye and Wang, C.}, year={2016} } @article{lu_wang_wang_2016, title={On the evolution and impact of mobile botnets in wireless networks}, volume={15}, DOI={10.1109/tmc.2015.2492545}, number={9}, journal={IEEE Transactions on Mobile Computing}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2016}, pages={2304–2316} } @article{sun_wang_li_2016, title={The impact of network size and mobility on information delivery in cognitive radio networks}, volume={15}, DOI={10.1109/tmc.2015.2398420}, number={1}, journal={IEEE Transactions on Mobile Computing}, author={Sun, L. and Wang, Wenye and Li, Y. J.}, year={2016}, pages={217–231} } @inproceedings{wang_wang_2016, title={To live or to die: Encountering conflict information dissemination over simple networks}, DOI={10.1109/infocom.2016.7524603}, booktitle={IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications}, author={Wang, Jie and Wang, Wenye}, year={2016} } @article{lu_wang_wang_2015, title={Camouflage traffic: Minimizing message delay for smart grid applications under jamming}, volume={12}, DOI={10.1109/tdsc.2014.2316795}, number={1}, journal={IEEE Transactions on Dependable and Secure Computing}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2015}, pages={31–44} } @inproceedings{wei_gong_wang_2015, title={Claim what you need: A text-mining approach on android permission request authorization}, DOI={10.1109/glocom.2015.7417472}, booktitle={2015 IEEE Global Communications Conference (GLOBECOM)}, author={Wei, M. K. and Gong, X. and Wang, Wenye}, year={2015} } @inproceedings{zhu_chen_wang_2015, title={G2G: Privacy-preserving group matching for proximity-based mobile social networks}, DOI={10.1109/iccchina.2015.7448721}, booktitle={2015 IEEE/CIC International Conference on Communications in China (ICCC)}, author={Zhu, X. Y. and Chen, Z. B. and Wang, Wenye}, year={2015} } @article{sun_wang_lu_2015, title={On topology and resilience of large-scale cognitive radio networks under generic failures}, volume={14}, DOI={10.1109/twc.2015.2404919}, number={6}, journal={IEEE Transactions on Wireless Communications}, author={Sun, L. and Wang, Wenye and Lu, Z.}, year={2015}, pages={3390–3401} } @inproceedings{wei_wang_2015, title={Safety can be dangerous: Secure communications impair smart grid stability under emergencies}, DOI={10.1109/glocom.2015.7417012}, booktitle={2015 IEEE Global Communications Conference (GLOBECOM)}, author={Wei, M. K. and Wang, Wenye}, year={2015} } @inproceedings{wei_wang_2014, title={Greenbench: A benchmark for observing power grid vulnerability under data-centric threats}, DOI={10.1109/infocom.2014.6848210}, booktitle={2014 proceedings ieee infocom}, author={Wei, M. K. and Wang, Wenye}, year={2014}, pages={2625–2633} } @inproceedings{lu_wang_wang_2014, title={How can botnets cause storms? Understanding the evolution and impact of mobile botnets}, DOI={10.1109/infocom.2014.6848085}, booktitle={2014 proceedings ieee infocom}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2014}, pages={1501–1509} } @article{li_wang_2014, title={Message dissemination in intermittently connected D2D communication networks}, volume={13}, DOI={10.1109/twc.2014.2317703}, number={7}, journal={IEEE Transactions on Wireless Communications}, author={Li, Y. J. and Wang, Wenye}, year={2014}, pages={3978–3990} } @article{lu_wang_wang_2014, title={Modeling, evaluation and detection of jamming attacks in time-critical wireless applications}, volume={13}, DOI={10.1109/tmc.2013.146}, number={8}, journal={IEEE Transactions on Mobile Computing}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2014}, pages={1746–1759} } @article{li_lin_wang_mitton_2014, title={PPNA special issue on "the green, reliability and security of machine-to-machine communications"}, volume={7}, DOI={10.1007/s12083-013-0237-z}, number={3}, journal={Peer-to-Peer Networking and Applications}, author={Li, X. and Lin, X. D. and Wang, Wenye and Mitton, N.}, year={2014}, pages={213–214} } @article{lu_wang_ma_2013, title={An empirical study of communication infrastructures towards the smart grid: Design, implementation, and evaluation}, volume={4}, DOI={10.1109/tsg.2012.2225453}, number={1}, journal={IEEE Transactions on Smart Grid}, author={Lu, X. and Wang, Wenye and Ma, J. F.}, year={2013}, pages={170–183} } @article{wang_lu_2013, title={Cyber security in the Smart Grid: Survey and challenges}, volume={57}, DOI={10.1016/j.comnet.2012.12.017}, number={5}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Wang, Wenye and Lu, Z.}, year={2013}, pages={1344–1371} } @article{li_zhao_wang_2013, title={Internode mobility correlation for group detection and analysis in VANETs}, volume={62}, DOI={10.1109/tvt.2013.2264689}, number={9}, journal={IEEE Transactions on Vehicular Technology}, author={Li, Y. J. and Zhao, M. and Wang, Wenye}, year={2013}, pages={4590–4601} } @article{xu_wang_2013, title={Scheduling partition for order optimal capacity in large-scale wireless networks}, volume={12}, DOI={10.1109/tmc.2012.113}, number={4}, journal={IEEE Transactions on Mobile Computing}, author={Xu, Y. and Wang, Wenye}, year={2013}, pages={666–679} } @inproceedings{sun_wang_2013, title={Understanding blackholes in large-scale cognitive radio networks under generic failures}, DOI={10.1109/infcom.2013.6566859}, booktitle={2013 proceedings ieee infocom}, author={Sun, L. and Wang, Wenye}, year={2013}, pages={728–736} } @article{xu_wang_2013, title={Wireless mesh network in smart grid: Modeling and analysis for time critical communications}, volume={12}, DOI={10.1109/twc.2013.061713.121545}, number={7}, journal={IEEE Transactions on Wireless Communications}, author={Xu, Y. and Wang, Wenye}, year={2013}, pages={3360–3371} } @inproceedings{wang_lu_wang_huang_2012, title={Development of distributed grid intelligence platform for solid state transformer}, DOI={10.1109/smartgridcomm.2012.6486031}, booktitle={2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)}, author={Wang, F. and Lu, X. and Wang, Wenye and Huang, A.}, year={2012}, pages={481–485} } @inproceedings{mehta_duel-hallen_wang_2012, title={Enabling adaptive rate and relay selection for 802.11 mobile ad hoc networks}, DOI={10.1109/icc.2012.6363785}, booktitle={2012 ieee international conference on communications (icc)}, author={Mehta, N. and Duel-Hallen, A. and Wang, Wenye}, year={2012} } @inproceedings{li_wang_2012, title={Geo-dissemination in vehicular ad hoc networks}, DOI={10.1109/icc.2012.6364456}, booktitle={2012 ieee international conference on communications (icc)}, author={Li, Y. J. and Wang, Wenye}, year={2012} } @inproceedings{lu_wang_wang_2012, title={Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming}, DOI={10.1109/infcom.2012.6195760}, booktitle={2012 Proceedings IEEE infocom}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2012}, pages={3066–3070} } @inproceedings{sun_wang_2012, title={On latency distribution and scaling: From finite to large cognitive radio networks under general mobility}, DOI={10.1109/infcom.2012.6195491}, booktitle={2012 Proceedings IEEE infocom}, author={Sun, L. and Wang, Wenye}, year={2012}, pages={1287–1295} } @inproceedings{sun_wang_2012, title={On the connectivity of large multi-channel cognitive radio networks}, DOI={10.1109/icc.2012.6363893}, booktitle={2012 ieee international conference on communications (icc)}, author={Sun, L. and Wang, Wenye}, year={2012}, pages={1854–1858} } @inproceedings{li_wang_duel-hallen_2012, title={The latency of gaining alpha-reliability for message dissemination in vehicle-to-vehicle networks}, DOI={10.1109/glocom.2012.6504004}, booktitle={2012 ieee global communications conference (globecom)}, author={Li, Y. J. and Wang, Wenye and Duel-Hallen, A.}, year={2012}, pages={5550–5555} } @inproceedings{sun_wang_2012, title={Understanding the tempo-spatial limits of information dissemination in multi-channel cognitive radio networks}, DOI={10.1109/infcom.2012.6195489}, booktitle={2012 Proceedings IEEE infocom}, author={Sun, L. and Wang, Wenye}, year={2012}, pages={1278–1286} } @article{wang_xu_khanna_2011, title={A survey on the communication architectures in smart grid}, volume={55}, DOI={10.1016/j.comnet.2011.07.010}, number={15}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Wang, Wenye and Xu, Y. and Khanna, M.}, year={2011}, pages={3604–3629} } @inproceedings{lu_wang_wang_2011, title={From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic}, DOI={10.1109/infcom.2011.5934989}, booktitle={2011 proceedings ieee infocom}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2011}, pages={1871–1879} } @inproceedings{xu_wang_2011, title={Information delivery in large wireless networks with minimum energy expense}, DOI={10.1109/infcom.2011.5934950}, booktitle={2011 proceedings ieee infocom}, author={Xu, Y. and Wang, Wenye}, year={2011}, pages={1584–1592} } @inproceedings{li_zhao_wang_2011, title={Intermittently connected vehicle-to-vehicle networks: Detection and analysis}, DOI={10.1109/glocom.2011.6134395}, booktitle={2011 ieee global telecommunications conference (globecom 2011)}, author={Li, Y. J. and Zhao, M. and Wang, Wenye}, year={2011} } @inproceedings{lu_lu_wang_ma_2011, title={On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP}, DOI={10.1109/glocom.2011.6134406}, booktitle={2011 ieee global telecommunications conference (globecom 2011)}, author={Lu, X. and Lu, Z. and Wang, Wenye and Ma, J. F.}, year={2011} } @inproceedings{zheng_wang_2011, title={On the access time in mobile hybrid networks}, DOI={10.1109/glocom.2011.6133498}, booktitle={2011 ieee global telecommunications conference (globecom 2011)}, author={Zheng, H. Y. and Wang, Wenye}, year={2011} } @article{xu_wang_2011, title={The limit of information propagation speed in large-scale multihop wireless networks}, volume={19}, DOI={10.1109/tnet.2010.2057444}, number={1}, journal={IEEE/ACM Transactions on Networking}, author={Xu, Y. and Wang, Wenye}, year={2011}, pages={209–222} } @article{xing_wang_2011, title={Toward robust multi-hop data forwarding in large scale wireless networks}, volume={55}, DOI={10.1016/j.comnet.2011.04.014}, number={11}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Xing, F. and Wang, Wenye}, year={2011}, pages={2608–2621} } @inproceedings{sun_wang_2011, title={on distribution and limits of information dissemination latency and speed in mobile cognitive radio networks}, DOI={10.1109/infcom.2011.5935069}, booktitle={2011 proceedings ieee infocom}, author={Sun, L. and Wang, Wenye}, year={2011}, pages={246–250} } @inproceedings{kharbash_wang_2010, title={All-terminal network reliability optimization in fading environment via cross entropy method}, DOI={10.1109/icc.2010.5501918}, booktitle={2010 ieee international conference on communications - ICC 2010}, author={Kharbash, S. and Wang, Wenye}, year={2010} } @inproceedings{xu_wang_2010, title={Characterizing the spread of correlated failures in large wireless networks}, DOI={10.1109/infcom.2010.5462009}, booktitle={2010 proceedings ieee infocom}, author={Xu, Y. and Wang, Wenye}, year={2010} } @inproceedings{lu_wang_wang_2010, title={On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks}, DOI={10.1109/infcom.2010.5462002}, booktitle={2010 proceedings ieee infocom}, author={Lu, Z. and Wang, Wenye and Wang, C.}, year={2010} } @inproceedings{yi_wang_2010, title={On the connectivity analysis over large-scale hybrid wireless networks}, DOI={10.1109/infcom.2010.5462106}, booktitle={2010 proceedings ieee infocom}, author={Yi, C. and Wang, Wenye}, year={2010} } @article{xing_wang_2010, title={On the survivability of wireless ad hoc networks with node misbehaviors and failures}, volume={7}, DOI={10.1109/tdsc.2008.71}, number={3}, journal={IEEE Transactions on Dependable and Secure Computing}, author={Xing, F. and Wang, Wenye}, year={2010}, pages={284–299} } @inproceedings{lu_lu_wang_wang_2010, title={Review and evaluation of security threats on the communication networks in the smart grid}, DOI={10.1109/milcom.2010.5679551}, booktitle={Military communications conference, 2010 (milcom 2010)}, author={Lu, Z. and Lu, X. A. and Wang, Wenye and Wang, C.}, year={2010}, pages={1830–1835} } @inproceedings{sun_wang_2010, title={Topology-incurred delay for information dissemination in large multi-channel cognitive radio networks}, DOI={10.1109/glocom.2010.5683925}, booktitle={2010 ieee global telecommunications conference globecom 2010}, author={Sun, L. and Wang, Wenye}, year={2010} } @article{zhao_wang_2009, title={A unified mobility model for analysis and simulation of mobile wireless networks}, volume={15}, DOI={10.1007/s11276-007-0055-4}, number={3}, journal={Wireless Networks}, author={Zhao, M. and Wang, Wenye}, year={2009}, pages={365–389} } @article{agarwal_wang_2009, title={An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks}, volume={15}, ISSN={1383-469X 1572-8153}, url={http://dx.doi.org/10.1007/s11036-009-0204-3}, DOI={10.1007/s11036-009-0204-3}, number={5}, journal={Mobile Networks and Applications}, publisher={Springer Science and Business Media LLC}, author={Agarwal, Avesh K. and Wang, Wenye}, year={2009}, month={Aug}, pages={693–709} } @article{wang_devetsikiotis_2009, title={Special Issue on Advances in Broadband Wireless Networks}, volume={14}, DOI={10.1007/s11036-009-0159-4}, number={4}, journal={Mobile Networks and Applications}, author={Wang, Wenye and Devetsikiotis, M.}, year={2009}, pages={365–367} } @article{xu_wang_2009, title={Topology stability analysis and its application in hierarchical mobile ad hoc networks}, volume={58}, DOI={10.1109/TVT.2008.928006}, number={3}, journal={IEEE Transactions on Vehicular Technology}, author={Xu, Y. and Wang, Wenye}, year={2009}, pages={1546–1560} } @inproceedings{xu_wang_2008, title={Finding the fastest path in wireless networks}, DOI={10.1109/icc.2008.600}, booktitle={2008 ieee international conference on communications, proceedings, vols 1-13}, author={Xu, Y. and Wang, Wenye}, year={2008}, pages={3188–3192} } @inproceedings{xing_wang_2008, title={On the devolution of large-scale sensor networks in the presence of random failures}, DOI={10.1109/icc.2008.439}, booktitle={2008 ieee international conference on communications, proceedings, vols 1-13}, author={Xing, F. and Wang, Wenye}, year={2008}, pages={2304–2308} } @inproceedings{tezcan_wang_2008, title={Self-orienting wireless multimedia sensor networks for maximizing multimedia coverage}, DOI={10.1109/icc.2008.421}, booktitle={2008 ieee international conference on communications, proceedings, vols 1-13}, author={Tezcan, N. and Wang, Wenye}, year={2008}, pages={2206–2210} } @article{tezcan_wang_2008, title={Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints}, volume={52}, DOI={10.1016/j.comnet.2008.05.014}, number={13}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Tezcan, N. and Wang, Wenye}, year={2008}, pages={2558–2567} } @article{wang_eun_wang_2007, title={A dynamic TCP-Aware call admission control scheme. for generic next generation packet-switched wireless networks}, volume={6}, DOI={10.1109/TWC.2007.06064}, number={9}, journal={IEEE Transactions on Wireless Communications}, author={Wang, X. B. and Eun, D. Y. and Wang, Wenye}, year={2007}, pages={3344–3352} } @inbook{agarwal_wang_2007, title={An Experimental Study on Security Protocols in WLANs}, ISBN={9780387280400}, DOI={10.1007/978-0-387-33112-6_12}, booktitle={Wireless network security}, publisher={New York: Springer}, author={Agarwal, Avesh K. and Wang, Wenye}, editor={Yang Xiao, Xuemin Shen and Du, Ding-ZhuEditors}, year={2007} } @inbook{xing_wang_2007, title={On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks}, ISBN={9783540726050 9783540726067}, ISSN={0302-9743 1611-3349}, url={http://dx.doi.org/10.1007/978-3-540-72606-7_1}, DOI={10.1007/978-3-540-72606-7_1}, booktitle={NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet}, publisher={Springer Berlin Heidelberg}, author={Xing, Fei and Wang, Wenye}, year={2007}, pages={1–12} } @article{agarwal_wang_2007, title={On the impact of quality of protection in wireless local area networks with IP mobility}, volume={12}, DOI={10.1007/s11036-006-0009-6}, number={1}, journal={Mobile Networks and Applications}, author={Agarwal, A. K. and Wang, Wenye}, year={2007}, pages={93–110} } @article{wang_xue_2006, title={A cost-minimization algorithm for fast location tracking in mobile wireless networks}, volume={50}, DOI={10.1016/j.comnet.2005.09.035}, number={15}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Wang, Wenye and Xue, G. L.}, year={2006}, pages={2713–2726} } @inproceedings{zhao_wang_2006, title={A novel semi-Markov smooth mobility model for mobile ad hoc networks.}, DOI={10.1109/glocom.2006.940}, booktitle={Globecom 2006 - 2006 ieee global telecommunications conference}, author={Zhao, M. and Wang, Wenye}, year={2006} } @article{song_wang_2006, title={A simulation study of IP-based vertical handoff in wireless convergent networks}, volume={6}, DOI={10.1002/wcm.415}, number={5}, journal={Wireless Communications & Mobile Computing}, author={Song, L. K. and Wang, Wenye}, year={2006}, pages={629–650} } @article{wang_wang_nilsson_2006, title={Energy-efficient bandwidth allocation in wireless networks: Algorithms, analysis, and simulations}, volume={5}, DOI={10.1109/TWC.2006.05018}, number={5}, journal={IEEE Transactions on Wireless Communications}, author={Wang, Wenye and Wang, X. B. and Nilsson, A. A.}, year={2006}, pages={1103–1114} } @inproceedings{xing_wang_2006, title={Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes}, DOI={10.1109/icc.2006.254994}, booktitle={2006 ieee international conference on communications, vols 1-12}, author={Xing, F. and Wang, Wenye}, year={2006}, pages={1879–1884} } @inproceedings{tezcan_wang_2006, title={effective energy conservation in wireless sensor networks}, DOI={10.1109/icc.2006.255235}, booktitle={2006 ieee international conference on communications, vols 1-12}, author={Tezcan, N. and Wang, Wenye}, year={2006}, pages={3359–3364} } @article{mcnair_tugcu_wang_xie_2005, title={An survey of cross-layer performance enhancements for Mobile IP networks}, volume={49}, DOI={10.1016/j.comnet.2005.06.001}, number={2}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={McNair, J. and Tugcu, T. and Wang, Wenye and Xie, J. L.}, year={2005}, pages={119–146} } @article{wang_liang_agarwal_2005, title={Integration of authentication and mobility management in third generation and WLAN data networks}, volume={5}, DOI={10.1002/wcm.335}, number={6}, journal={Wireless Communications & Mobile Computing}, author={Wang, Wenye and Liang, W. and Agarwal, A. K.}, year={2005}, pages={665–678} } @article{liang_wang_2005, title={On performance analysis of challenge/response based authentication in wireless networks}, volume={48}, DOI={10.1016/j.comnet.2004.10.016}, number={2}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Liang, W. and Wang, Wenye}, year={2005}, pages={267–288} } @article{akyildiz_wang_2004, title={The predictive user mobility profile framework for wireless multimedia networks}, volume={12}, DOI={10.1109/tnet.2004.838604}, number={6}, journal={IEEE/ACM Transactions on Networking}, author={Akyildiz, I. R. and Wang, Wenye}, year={2004}, pages={1021–1035} } @inproceedings{wang_zhao, title={Joint effects of radio channels and node mobility on link dynamics in wireless networks}, booktitle={27th ieee conference on computer communications (infocom), vols 1-5}, author={Wang, W. Y. and Zhao, M.}, pages={1606–1614} } @inproceedings{agarwal_wang, title={Measuring performance impact of security protocols in wireless local area networks}, booktitle={2nd International Conference on Broadband Networks (Broadnets 2005)}, author={Agarwal, A. K. and Wang, W. Y.}, pages={625-} } @article{li_wang, title={Modeling and analysis of single-hop mobile cloudlet}, journal={Advances in Mobile Cloud Computing Systems}, author={Li, Y. J. and Wang, W. Y.}, pages={231–256} } @inproceedings{pambudi_wang_wang, title={On the resilience of D2D-based social networking service against random failures}, booktitle={2016 ieee global communications conference (globecom)}, author={Pambudi, S. A. and Wang, W. Y. and Wang, C.} } @inproceedings{xu_wang, title={The speed of information propagation in large wireless networks}, booktitle={27th IEEE Conference on Computer Communications (Infocom), vols 1-5}, author={Xu, Y. and Wang, W. Y.}, pages={403–411} }