| 2008 |
21 | | Zhen Cao,
Jiejun Kong,
Mario Gerla,
Dapeng Wu:
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact.
ITSL 2008: 23-28 |
20 | | Yunjung Yi,
Jiejun Kong,
Mario Gerla,
Joon-Sang Park:
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast.
Computer Communications 31(15): 3672-3682 (2008) |
19 | | Weichao Wang,
Jiejun Kong,
Bharat K. Bhargava,
Mario Gerla:
Visualisation of wormholes in underwater sensor networks: a distributed approach.
IJSN 3(1): 10-23 (2008) |
| 2007 |
18 | | Jiejun Kong,
Xiaoyan Hong,
Dapeng Wu,
Mario Gerla:
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
BIBE 2007: 914-921 |
17 | | Uichin Lee,
Jiejun Kong,
Mario Gerla,
Joon-Sang Park,
Eugenio Magistretti:
Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods.
Ad Hoc Networks 5(6): 943-958 (2007) |
16 | | Jiejun Kong,
Xiaoyan Hong,
Mario Gerla:
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 6(8): 888-902 (2007) |
| 2006 |
15 | | Uichin Lee,
Jiejun Kong,
Joon-Sang Park,
Eugenio Magistretti,
Mario Gerla:
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods.
ISCC 2006: 609-615 |
14 | | Jiejun Kong,
Xiaoyan Hong,
Mario Gerla:
Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Workshop on Wireless Security 2006: 55-64 |
13 | | Jun-Hong Cui,
Jiejun Kong,
Mario Gerla,
Shengli Zhou:
The challenges of building mobile underwater wireless networks for aquatic applications.
IEEE Network 20(3): 12-18 (2006) |
12 | | Xiaoyan Hong,
Jiejun Kong,
Mario Gerla:
Mobility changes anonymity: new passive threats in mobile ad hoc networks.
Wireless Communications and Mobile Computing 6: 281-293 (2006) |
| 2005 |
11 | | Jiejun Kong,
Xiaoyan Hong,
M. Y. Sanadidi,
Mario Gerla:
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing.
ISCC 2005: 57-62 |
10 | | Jiejun Kong,
Xiaoyan Hong,
Yunjung Yi,
Joon-Sang Park,
Jun Liu,
Mario Gerla:
A secure ad-hoc routing approach using localized self-healing communities.
MobiHoc 2005: 254-265 |
9 | | Jiejun Kong,
Dapeng Wu,
Xiaoyan Hong,
Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
SASN 2005: 97-106 |
8 | | Jiejun Kong,
Zhengrong Ji,
Weichao Wang,
Mario Gerla,
Rajive Bagrodia,
Bharat K. Bhargava:
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Workshop on Wireless Security 2005: 87-96 |
| 2004 |
7 | | Haiyun Luo,
Jiejun Kong,
Petros Zerfos,
Songwu Lu,
Lixia Zhang:
URSA: ubiquitous and robust access control for mobile ad hoc networks.
IEEE/ACM Trans. Netw. 12(6): 1049-1063 (2004) |
| 2003 |
6 | | Cindy Xinmin Chen,
Jiejun Kong,
Carlo Zaniolo:
Design and Implementation of a Temporal Extension of SQL.
ICDE 2003: 689-691 |
5 | | Jiejun Kong,
Xiaoyan Hong:
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
MobiHoc 2003: 291-302 |
4 | | Jiejun Kong,
Shirshanka Das,
Edward Tsai,
Mario Gerla:
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains.
Workshop on Wireless Security 2003: 51-60 |
| 2002 |
3 | | Haiyun Luo,
Petros Zerfos,
Jiejun Kong,
Songwu Lu,
Lixia Zhang:
Self-securing ad hoc wireless networks.
ISCC 2002: 567-574 |
2 | | Jiejun Kong,
Haiyun Luo,
Kaixin Xu,
Daniel Lihui Gu,
Mario Gerla,
Songwu Lu:
Adaptive security for multilevel ad hoc networks.
Wireless Communications and Mobile Computing 2(5): 533-547 (2002) |
| 2001 |
1 | | Jiejun Kong,
Petros Zerfos,
Haiyun Luo,
Songwu Lu,
Lixia Zhang:
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.
ICNP 2001: 251-260 |