Wenye Wang Wang, J., Wang, W., Wang, C., & Song, M. (2022). Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection. IEEE TRANSACTIONS ON MOBILE COMPUTING, 5. https://doi.org/10.1109/TMC.2020.3032434 Zou, R., Wang, W., & Dai, H. (2021). Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM46510.2021.9685339 Jalooli, A., Song, M., & Wang, W. (2019). Message coverage maximization in infrastructure-based urban vehicular networks. VEHICULAR COMMUNICATIONS, 16, 1–14. https://doi.org/10.1016/j.vehcom.2019.02.001 Wang, J., Pambudi, S., Wang, W., & Song, M. (2019). Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective. IEEE INTERNET OF THINGS JOURNAL, 6(4), 6952–6963. https://doi.org/10.1109/JIOT.2019.2913140 Wei, M., Lu, Z., & Wang, W. (2018). On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid. IEEE SYSTEMS JOURNAL, 12(4), 3404–3413. https://doi.org/10.1109/JSYST.2017.2763462 Hosseinalipour, S., Wang, J., Dai, H., & Wang, W. (2017). Detection of infections using graph signal processing in heterogeneous networks. Globecom 2017 - 2017 ieee global communications conference. https://doi.org/10.1109/glocom.2017.8254487 Pambudi, S. A., Wang, W., & Wang, C. (2017). From isolation time to node resilience: Impact of cascades in D2D-based social networks. Globecom 2017 - 2017 ieee global communications conference. https://doi.org/10.1109/glocom.2017.8255073 Wang, Y. L., Wang, W., & Song, M. (2017). How durable and stable is file sharing on the move in cellular-assisted D2D communications? Globecom 2017 - 2017 ieee global communications conference. https://doi.org/10.1109/glocom.2017.8254603 Wang, J., Wang, W., & Wang, C. (2017). Modeling and strategy design for spectrum monitoring over a geographical region. Globecom 2017 - 2017 ieee global communications conference. https://doi.org/10.1109/glocom.2017.8254113 Wei, M. K., Lu, Z., & Wang, W. (2017). On modeling and understanding vehicle evacuation attacks in VANETs. 2017 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2017.7996463 Wang, Y. L., Li, Y. J., Wang, W., & Song, M. (2016). A locality-based mobile caching policy for D2D-based content sharing network. 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7841510 Wei, M. K., & Wang, W. (2016). Data-centric threats and their impacts to real-time communications in smart grid. Computer Networks (Amsterdam, Netherlands : 1999), 104, 174–188. https://doi.org/10.1016/j.comnet.2016.05.003 Wang, J., Wang, W., & Wang, C. (2016). Divide and conquer: Leveraging topology in control of epidemic information dynamics. 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7841747 Wei, M. K., Lu, Z., & Wang, W. (2016). Dominoes with communications: On characterizing the progress of cascading failures in smart grid. 2016 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2016.7511048 Pambudi, S. A., Wang, W., & Wang, C. (2016). How robust Is a D2D-based messaging service? 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7841877 Wang, J., Wang, W., & Wang, C. (2016). How the anti-rumor kills the rumor: Conflicting information propagation in networks. 2016 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2016.7511492 Pambudi, S. A., Wang, W., & Wang, C. (2016). Modeling and estimating the structure of D2D-based mobile social networks. 2016 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2016.7511491 Lu, Z., Wang, W., & Wang, C. (2016). On the evolution and impact of mobile botnets in wireless networks. IEEE Transactions on Mobile Computing, 15(9), 2304–2316. https://doi.org/10.1109/tmc.2015.2492545 Sun, L., Wang, W., & Li, Y. J. (2016). The impact of network size and mobility on information delivery in cognitive radio networks. IEEE Transactions on Mobile Computing, 15(1), 217–231. https://doi.org/10.1109/tmc.2015.2398420 Wang, J., & Wang, W. (2016). To live or to die: Encountering conflict information dissemination over simple networks. IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications. https://doi.org/10.1109/infocom.2016.7524603 Lu, Z., Wang, W., & Wang, C. (2015). Camouflage traffic: Minimizing message delay for smart grid applications under jamming. IEEE Transactions on Dependable and Secure Computing, 12(1), 31–44. https://doi.org/10.1109/tdsc.2014.2316795 Wei, M. K., Gong, X., & Wang, W. (2015). Claim what you need: A text-mining approach on android permission request authorization. 2015 IEEE Global Communications Conference (GLOBECOM). https://doi.org/10.1109/glocom.2015.7417472 Zhu, X. Y., Chen, Z. B., & Wang, W. (2015). G2G: Privacy-preserving group matching for proximity-based mobile social networks. 2015 IEEE/CIC International Conference on Communications in China (ICCC). https://doi.org/10.1109/iccchina.2015.7448721 Sun, L., Wang, W., & Lu, Z. (2015). On topology and resilience of large-scale cognitive radio networks under generic failures. IEEE Transactions on Wireless Communications, 14(6), 3390–3401. https://doi.org/10.1109/twc.2015.2404919 Wei, M. K., & Wang, W. (2015). Safety can be dangerous: Secure communications impair smart grid stability under emergencies. 2015 IEEE Global Communications Conference (GLOBECOM). https://doi.org/10.1109/glocom.2015.7417012 Wei, M. K., & Wang, W. (2014). Greenbench: A benchmark for observing power grid vulnerability under data-centric threats. 2014 proceedings ieee infocom, 2625–2633. https://doi.org/10.1109/infocom.2014.6848210 Lu, Z., Wang, W., & Wang, C. (2014). How can botnets cause storms? Understanding the evolution and impact of mobile botnets. 2014 proceedings ieee infocom, 1501–1509. https://doi.org/10.1109/infocom.2014.6848085 Li, Y. J., & Wang, W. (2014). Message dissemination in intermittently connected D2D communication networks. IEEE Transactions on Wireless Communications, 13(7), 3978–3990. https://doi.org/10.1109/twc.2014.2317703 Lu, Z., Wang, W., & Wang, C. (2014). Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Transactions on Mobile Computing, 13(8), 1746–1759. https://doi.org/10.1109/tmc.2013.146 Li, X., Lin, X. D., Wang, W., & Mitton, N. (2014). PPNA special issue on "the green, reliability and security of machine-to-machine communications". Peer-to-Peer Networking and Applications, 7(3), 213–214. https://doi.org/10.1007/s12083-013-0237-z Lu, X., Wang, W., & Ma, J. F. (2013). An empirical study of communication infrastructures towards the smart grid: Design, implementation, and evaluation. IEEE Transactions on Smart Grid, 4(1), 170–183. https://doi.org/10.1109/tsg.2012.2225453 Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks (Amsterdam, Netherlands : 1999), 57(5), 1344–1371. https://doi.org/10.1016/j.comnet.2012.12.017 Li, Y. J., Zhao, M., & Wang, W. (2013). Internode mobility correlation for group detection and analysis in VANETs. IEEE Transactions on Vehicular Technology, 62(9), 4590–4601. https://doi.org/10.1109/tvt.2013.2264689 Xu, Y., & Wang, W. (2013). Scheduling partition for order optimal capacity in large-scale wireless networks. IEEE Transactions on Mobile Computing, 12(4), 666–679. https://doi.org/10.1109/tmc.2012.113 Sun, L., & Wang, W. (2013). Understanding blackholes in large-scale cognitive radio networks under generic failures. 2013 proceedings ieee infocom, 728–736. https://doi.org/10.1109/infcom.2013.6566859 Xu, Y., & Wang, W. (2013). Wireless mesh network in smart grid: Modeling and analysis for time critical communications. IEEE Transactions on Wireless Communications, 12(7), 3360–3371. https://doi.org/10.1109/twc.2013.061713.121545 Wang, F., Lu, X., Wang, W., & Huang, A. (2012). Development of distributed grid intelligence platform for solid state transformer. 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), 481–485. https://doi.org/10.1109/smartgridcomm.2012.6486031 Mehta, N., Duel-Hallen, A., & Wang, W. (2012). Enabling adaptive rate and relay selection for 802.11 mobile ad hoc networks. 2012 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2012.6363785 Li, Y. J., & Wang, W. (2012). Geo-dissemination in vehicular ad hoc networks. 2012 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2012.6364456 Lu, Z., Wang, W., & Wang, C. (2012). Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. 2012 Proceedings IEEE infocom, 3066–3070. https://doi.org/10.1109/infcom.2012.6195760 Sun, L., & Wang, W. (2012). On latency distribution and scaling: From finite to large cognitive radio networks under general mobility. 2012 Proceedings IEEE infocom, 1287–1295. https://doi.org/10.1109/infcom.2012.6195491 Sun, L., & Wang, W. (2012). On the connectivity of large multi-channel cognitive radio networks. 2012 ieee international conference on communications (icc), 1854–1858. https://doi.org/10.1109/icc.2012.6363893 Li, Y. J., Wang, W., & Duel-Hallen, A. (2012). The latency of gaining alpha-reliability for message dissemination in vehicle-to-vehicle networks. 2012 ieee global communications conference (globecom), 5550–5555. https://doi.org/10.1109/glocom.2012.6504004 Sun, L., & Wang, W. (2012). Understanding the tempo-spatial limits of information dissemination in multi-channel cognitive radio networks. 2012 Proceedings IEEE infocom, 1278–1286. https://doi.org/10.1109/infcom.2012.6195489 Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks (Amsterdam, Netherlands : 1999), 55(15), 3604–3629. https://doi.org/10.1016/j.comnet.2011.07.010 Lu, Z., Wang, W., & Wang, C. (2011). From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. 2011 proceedings ieee infocom, 1871–1879. https://doi.org/10.1109/infcom.2011.5934989 Xu, Y., & Wang, W. (2011). Information delivery in large wireless networks with minimum energy expense. 2011 proceedings ieee infocom, 1584–1592. https://doi.org/10.1109/infcom.2011.5934950 Li, Y. J., Zhao, M., & Wang, W. (2011). Intermittently connected vehicle-to-vehicle networks: Detection and analysis. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6134395 Lu, X., Lu, Z., Wang, W., & Ma, J. F. (2011). On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6134406 Zheng, H. Y., & Wang, W. (2011). On the access time in mobile hybrid networks. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6133498 Xu, Y., & Wang, W. (2011). The limit of information propagation speed in large-scale multihop wireless networks. IEEE/ACM Transactions on Networking, 19(1), 209–222. https://doi.org/10.1109/tnet.2010.2057444 Xing, F., & Wang, W. (2011). Toward robust multi-hop data forwarding in large scale wireless networks. Computer Networks (Amsterdam, Netherlands : 1999), 55(11), 2608–2621. https://doi.org/10.1016/j.comnet.2011.04.014 Sun, L., & Wang, W. (2011). on distribution and limits of information dissemination latency and speed in mobile cognitive radio networks. 2011 proceedings ieee infocom, 246–250. https://doi.org/10.1109/infcom.2011.5935069 Kharbash, S., & Wang, W. (2010). All-terminal network reliability optimization in fading environment via cross entropy method. 2010 ieee international conference on communications - ICC 2010. https://doi.org/10.1109/icc.2010.5501918 Xu, Y., & Wang, W. (2010). Characterizing the spread of correlated failures in large wireless networks. 2010 proceedings ieee infocom. https://doi.org/10.1109/infcom.2010.5462009 Lu, Z., Wang, W., & Wang, C. (2010). On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks. 2010 proceedings ieee infocom. https://doi.org/10.1109/infcom.2010.5462002 Yi, C., & Wang, W. (2010). On the connectivity analysis over large-scale hybrid wireless networks. 2010 proceedings ieee infocom. https://doi.org/10.1109/infcom.2010.5462106 Xing, F., & Wang, W. (2010). On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE Transactions on Dependable and Secure Computing, 7(3), 284–299. https://doi.org/10.1109/tdsc.2008.71 Lu, Z., Lu, X. A., Wang, W., & Wang, C. (2010). Review and evaluation of security threats on the communication networks in the smart grid. Military communications conference, 2010 (milcom 2010), 1830–1835. https://doi.org/10.1109/milcom.2010.5679551 Sun, L., & Wang, W. (2010). Topology-incurred delay for information dissemination in large multi-channel cognitive radio networks. 2010 ieee global telecommunications conference globecom 2010. https://doi.org/10.1109/glocom.2010.5683925 Zhao, M., & Wang, W. (2009). A unified mobility model for analysis and simulation of mobile wireless networks. Wireless Networks, 15(3), 365–389. https://doi.org/10.1007/s11276-007-0055-4 Agarwal, A. K., & Wang, W. (2009). An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks. Mobile Networks and Applications, 15(5), 693–709. https://doi.org/10.1007/s11036-009-0204-3 Wang, W., & Devetsikiotis, M. (2009). Special Issue on Advances in Broadband Wireless Networks. Mobile Networks and Applications, 14(4), 365–367. https://doi.org/10.1007/s11036-009-0159-4 Xu, Y., & Wang, W. (2009). Topology stability analysis and its application in hierarchical mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58(3), 1546–1560. https://doi.org/10.1109/TVT.2008.928006 Xu, Y., & Wang, W. (2008). Finding the fastest path in wireless networks. 2008 ieee international conference on communications, proceedings, vols 1-13, 3188–3192. https://doi.org/10.1109/icc.2008.600 Xing, F., & Wang, W. (2008). On the devolution of large-scale sensor networks in the presence of random failures. 2008 ieee international conference on communications, proceedings, vols 1-13, 2304–2308. https://doi.org/10.1109/icc.2008.439 Tezcan, N., & Wang, W. (2008). Self-orienting wireless multimedia sensor networks for maximizing multimedia coverage. 2008 ieee international conference on communications, proceedings, vols 1-13, 2206–2210. https://doi.org/10.1109/icc.2008.421 Tezcan, N., & Wang, W. (2008). Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints. Computer Networks (Amsterdam, Netherlands : 1999), 52(13), 2558–2567. https://doi.org/10.1016/j.comnet.2008.05.014 Wang, X. B., Eun, D. Y., & Wang, W. (2007). A dynamic TCP-Aware call admission control scheme. for generic next generation packet-switched wireless networks. IEEE Transactions on Wireless Communications, 6(9), 3344–3352. https://doi.org/10.1109/TWC.2007.06064 Agarwal, A. K., & Wang, W. (2007). An Experimental Study on Security Protocols in WLANs. In X. S. Yang Xiao & D.-Z. Du (Eds.), Wireless network security. https://doi.org/10.1007/978-0-387-33112-6_12 Xing, F., & Wang, W. (2007). On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks. In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1–12). https://doi.org/10.1007/978-3-540-72606-7_1 Agarwal, A. K., & Wang, W. (2007). On the impact of quality of protection in wireless local area networks with IP mobility. Mobile Networks and Applications, 12(1), 93–110. https://doi.org/10.1007/s11036-006-0009-6 Wang, W., & Xue, G. L. (2006). A cost-minimization algorithm for fast location tracking in mobile wireless networks. Computer Networks (Amsterdam, Netherlands : 1999), 50(15), 2713–2726. https://doi.org/10.1016/j.comnet.2005.09.035 Zhao, M., & Wang, W. (2006). A novel semi-Markov smooth mobility model for mobile ad hoc networks. Globecom 2006 - 2006 ieee global telecommunications conference. https://doi.org/10.1109/glocom.2006.940 Song, L. K., & Wang, W. (2006). A simulation study of IP-based vertical handoff in wireless convergent networks. Wireless Communications & Mobile Computing, 6(5), 629–650. https://doi.org/10.1002/wcm.415 Wang, W., Wang, X. B., & Nilsson, A. A. (2006). Energy-efficient bandwidth allocation in wireless networks: Algorithms, analysis, and simulations. IEEE Transactions on Wireless Communications, 5(5), 1103–1114. https://doi.org/10.1109/TWC.2006.05018 Xing, F., & Wang, W. (2006). Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes. 2006 ieee international conference on communications, vols 1-12, 1879–1884. https://doi.org/10.1109/icc.2006.254994 Tezcan, N., & Wang, W. (2006). effective energy conservation in wireless sensor networks. 2006 ieee international conference on communications, vols 1-12, 3359–3364. https://doi.org/10.1109/icc.2006.255235 McNair, J., Tugcu, T., Wang, W., & Xie, J. L. (2005). An survey of cross-layer performance enhancements for Mobile IP networks. Computer Networks (Amsterdam, Netherlands : 1999), 49(2), 119–146. https://doi.org/10.1016/j.comnet.2005.06.001 Wang, W., Liang, W., & Agarwal, A. K. (2005). Integration of authentication and mobility management in third generation and WLAN data networks. Wireless Communications & Mobile Computing, 5(6), 665–678. https://doi.org/10.1002/wcm.335 Liang, W., & Wang, W. (2005). On performance analysis of challenge/response based authentication in wireless networks. Computer Networks (Amsterdam, Netherlands : 1999), 48(2), 267–288. https://doi.org/10.1016/j.comnet.2004.10.016 Akyildiz, I. R., & Wang, W. (2004). The predictive user mobility profile framework for wireless multimedia networks. IEEE/ACM Transactions on Networking, 12(6), 1021–1035. https://doi.org/10.1109/tnet.2004.838604 Wang, W. Y., & Zhao, M. Joint effects of radio channels and node mobility on link dynamics in wireless networks. 27th ieee conference on computer communications (infocom), vols 1-5, 1606–1614. Agarwal, A. K., & Wang, W. Y. Measuring performance impact of security protocols in wireless local area networks. 2nd International Conference on Broadband Networks (Broadnets 2005), 625-. Li, Y. J., & Wang, W. Y. Modeling and analysis of single-hop mobile cloudlet. Advances in Mobile Cloud Computing Systems, 231–256. Pambudi, S. A., Wang, W. Y., & Wang, C. On the resilience of D2D-based social networking service against random failures. 2016 ieee global communications conference (globecom). Xu, Y., & Wang, W. Y. The speed of information propagation in large wireless networks. 27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 403–411.