Journal Publications
[JP-48] Rui Zou and Wenye Wang, “Downlink Decoding Based Accurate Measurement of LTE Spectrum Tenancy,” in IEEE Transactions on Mobile Computing, 2021. (Accepted) pdf
[JP-47] Teng Fei and Wenye Wang, “The Vulnerability and Enhancement of AKA Protocol for Mobile Authentication in LTE/5G Networks,” in Computer Networks, 2021. (Under Review) pdf
[JP-45] Jie Wang, Wenye Wang, Cliff Wang, Min Song, “Spectrum Activity Surveillance: Modeling and Analysis from Perspectives of Surveillance Coverage and Culprit Detection,” in IEEE Transactions on Mobile Computing, October 2020. pdf
[JP-43] Jie Wang, Wenye Wang and Cliff Wang, “Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon.,” in IEEE/ACM Transactions on Networking, VOL. 28, NO. 3,pp 972-985, June 2020. pdf
[JP-42] Jie Wang, Sigit Pambudi, Wenye Wang, and Min Song, “Resilience of IoT Systems Against Edge-induced Cascade-of-Failures: A Networking Perspective,” in IEEE Internet of Things Journal, pp. 6952-6963, August 2019. pdf
[JP-41] Mingkui Wei, Zhuo Lu, and Wenye Wang, “On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid,” in IEEE Systems Journal, pp. 1-10, September 2017. pdf
[JP-40] Mingkui Wei and Wenye Wang, “Data-centric threats and their impacts to real-time communications in smart grid,” in Journal of Computer Networks (Elsivier), pp. 174-188, July 2016. pdf
[JP-39] Zhuo Lu, Wenye Wang, and Cliff Wang, “On the Evolution and Impact of Mobile Botnets in Wireless Networks,” in IEEE Transactions on Mobile Computing, pp. 1-14, October 2015. pdf
[JP-38] Lei Sun, Wenye Wang, and Yujin Li, “The Impact of Network Size and Mobility on Information Delivery in Cognitive Radio Networks,” in IEEE Transactions on Mobile Computing, pp. 1-14, June 2015. pdf
[JP-37] Lei Sun, Wenye Wang, and Zhuo Lu, “On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures ,” in IEEE Transactions on Wireless Communications, Vol. 14, No. 6, pp. 3390-3401, June 2015. pdf
[JP-36] Zhuo Lu, Wenye Wang, and Cliff Wang, “Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming,” in IEEE Transactions on Dependable and Secure Communications (TDSC), Vol. 12, No. 1, pp. 31-44, January 2015. pdf
[JP-35] Zhuo Lu, Wenye Wang, and Cliff Wang, “Modeling, Evaluation and Detection of Jamming Attacks against Time-Critical Messages over Wireless in Smart Grid,” in IEEE Transactions on Mobile Computing, Vol. 13, No. 8, pp. 1746-1759, August 2014. pdf
[JP-34] Yujin Li and Wenye Wang, “Message Dissemination in Intermittently Connected D2D Communication Networks,” in IEEE Transactions on Wireless Communications, pp. 3978-3990, July 2014. pdf
[JP-33] Yi Xu and Wenye Wang, “Wireless in Smart Grid: Modeling and Analysis for Time Critical Communications,” in IEEE Transactions on Wireless Communications, Vol. 12, No. 7, pp. 3360-3371, July 2013. pdf
[JP-32] Yujin Li and Wenye Wang, “Inter-Node Mobility Correlation for Group Detection and Analysis in VANETs,” in IEEE Transactions on Vehicular Technology, Vol. 62, No. 9, pp 4590-4601, November 2013. pdf
[JP-31] Yi Xu and Wenye Wang, “Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks,” in IEEE Transactions on Mobile Computing, Vol. 12, No. 4, pp. 666-679, April 2013. pdf
[JP-30] Xiang Lu, Wenye Wang and Jianfeng Ma, “An Empirical Study of Communication Infrastructure towards the Smart Grid: Design, Implementation, and Evaluation,” in IEEE Transactions on Smart Grid, Vol. 4, No. 1, pp: 170-183, March 2013. pdf
[JP-29] Zhuo Lu and Wenye Wang, “Cyber Security in the Smart Grid: Survey and Challenges,” in Computer Networks, pp: 1-28, January 2013. pdf
[JP-28] Zhuo Lu, Wenye Wang, and Cliff Wang, “Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks,” in IEEE Transactions on Mobile Computing, Vol. 11, No. 8, pp. 1331-1344, August 2012. pdf
[JP-27] Xiang Lu, Wenye Wang and Jianfeng Ma, “Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems,” in International Journal of Distributed Sensor Networks, Vol (2012), Ariticle ID 175262, pp: 1-13, April 2012. pdf
[JP-22] Avesh K. Agarwal and Wenye Wang, “An Experimental Study of the Performance Impact of Path-based DoS Attacks in Wireless Mesh Networks,” in ACM-Springer Mobile Networks and Applications (MONET) Journal, Vol. 15, Issue 5, pp. 693-709, August 2010. pdf
[JP-21] Fei Xing and Wenye Wang, “On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures,” in IEEE Transactions on Dependable and Secure Computing, Vol. 7, No.3, pp. 284-299, July-September 2010. pdf
[JP-19] Yi Xu and Wenye Wang, “Topology Stability Analysis and its Application in Hierarchical Mobile Ad Hoc Networks,” in IEEE Transactions on Vehicular Technology, Vol.58, No. 3, pp 1546-1560, March 2009. pdf
[JP-09] Wenye Wang, Wei Liang, and Avesh K. Agarwal, “Integration of Authentication and Mobility Management in Third Generation and WLAN Data Networks,” in Wireless Communications and Mobile Computing (WCMC) – special issue on WLAN/3G Integration for Next-Generation Heterogeneous Mobile Data Networks, Volume 5, Issue 6, pp 665-678, September 2005. pdf bib
[JP-08] Wei Liang and Wenye Wang, “On Performance Analysis of Challenge/Responds Based Authentication in Wireless Local Area Networks,” in Computer Networks (Elsevier), Vol. 48, No. 2, pp 267-288, June 2005. pdf
[JP-06] Ian F. Akyildiz and Wenye Wang, “A Dynamic Location Management Scheme for Next Generation Multi-Tier PCS Systems,” in IEEE Transactions on Wireless Communications, , Vol. 1, No. 1, pp. 178-189, January 2002.
Conference Publications
[CP-122] Rui Zou, Wenye Wang and Huaiyu Dai, “Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell,” 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, Dec 2021. pdf
[CP-119] Rui Zou and Wenye Wang, “U-CIMAN: Uncover Spectrum and User Information in LTE Mobile Access Networks,” in Proc. of IEEE INFOCOM, July 2020. pdf
[CP-118] Rui Zou and Wenye Wang, “Change Detection Based Segmentation and Modeling of LTE Spectrum Tenancy,” in Proc. of IEEE GLOBECOM, December 2019. pdf
[CP-99] Jie Wang and Wenye Wang, “To Live or To Die: Encoutering Conflict Information Propagation over Simple Networks,” in Proc. of IEEE INFOCOM, April 2016. pdf
[CP-98] Mingkui Wei and Wenye Wang, “Safety Can Be Dangerous: Secure Communications Impair Smart Grid Stability Under Emergencies,” in Proc. of IEEE GLOBECOM, December 2015. pdf
[CP-97] Mingkui Wei, Xi Gong, and Wenye Wang, “Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization,” in Proc. of IEEE GLOBECOM, December 2015. pdf
[CP-96] Yujin Li, Lei Sun, and Wenye Wang, “Exploring Device-to-Device Communication for Mobile Cloud Computing,” in Proc. of IEEE ICC, June 2014. pdf
[CP-95] Sigit Aryo Pambudi and Wenye Wang, “Boundary Matters: Impact of Finite Boundary to Packet Delay Performance in Mobile Data Networks,” in Proc. of IEEE ICC, June 2014. pdf
[CP-94] Yujin Li and Wenye Wang, “Can Mobile Cloudlets Support Mobile Applications,” in Proc. of IEEE INFOCOM, April 2014. pdf
[CP-93] Mingkui Wei and Wenye Wang, “Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats,” in Proc. of IEEE INFOCOM, April 2014. pdf
[CP-92] Zhuo Lu, Wenye Wang, and Cliff Wang, “How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets,” in Proc. of IEEE INFOCOM, April 2014. pdf
[CP-91] Mingkui Wei and Wenye Wang, “Toward Distributed Intelligent: A Case Study of Peer to Peer Communication in Smart Grid,” in Proc. of IEEE GLOBECOM, December 2013. pdf
[CP-90] Lei Sun and Wenye Wang, “Understanding Topology Dynamics in Large-Scale Cognitive Radio Networks under Generic Failures,” in Proc. of IEEE GLOBECOM, December 2013. pdf
[CP-89] Yujin Li and Wenye Wang, “The Unheralded Power of Cloudlet Computing in the Vicinity of Mobile Devices,” in Proc. of IEEE GLOBECOM, December 2013. pdf
[CP-88] Xiang Lu, Wenye Wang, Jianfeng Ma, and Limin Sun, “Domino of the Smart Grid: An Empirical Study of System Behaviors in the Interdependent Network Architecture,” in Proc. of IEEE SmartGridComm, pp. 1-6, October 2013. pdf
[CP-87] Lei Sun and Wenye Wang, “Understanding Blackholes in Large-Scale Cognitive Radio Networks Under Generic Failures,” in Proc. of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), April 2013. pdf
[CP-86] Yujin Li and Wenye Wang, “Horizon on the Move: Geocast in Intermittently Connected Vehicular Ad Hoc Networks,” in Proc. of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM), April 2013. pdf
[CP-85] Yujin Li, Wenye Wang, and Alexandra Duel-Hallen, “The Latency of Gaining $\alpha$-Reliability for Message Dissemination in Vehicle-to-Vehicle Networks,” in Proc. of IEEE Global Communications Conference (GLOBECOM), December 2012. pdf
[CP-84] Lei Sun and Wenye Wang, “Understanding the Tempo-spatial Limits of Information Dissemination in Multi-channel Cognitive Radio Networks,” in Proc. of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM), April 2012. pdf
[CP-83] Lei Sun and Wenye Wang, “On Latency Distribution and Scaling: From Finite to Large Cognitive Radio Networks under General Mobility,” in Proc. of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM), April 2012. pdf
[CP-82] Zhuo Lu, Wenye Wang, and Cliff Wang, “Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming,” in Proc. of IEEE INFOCOM Mini-Conference, April 2012. pdf
[CP-73] Lei Sun and Wenye Wang, “On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks,” in Proc. of IEEE INFOCOM, Mini-Conference, April 2011. pdf
[CP-72] Yi Xu and Wenye Wang, “Information Delivery in Large Wireless Networks with Minimum Energy Expense,” in Proc. of IEEE INFOCOM, April 2011. pdf
[CP-71] Zhuo Lu and Wenye Wang, “From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic,” in Proc. of IEEE INFOCOM, April 2011. pdf
[CP-70] Yi Xu and Wenye Wang, “The Speed Bounds on Event Reporting in Mobile Sensor Networks with Energy Constraints,,” in Proc. of IEEE ICC, May 2011. pdf
[CP-69] Lei Sun and Wenye Wang, “On the Dissemination Latency of Cognitive Radio Networks Under General Node Mobility,” in Proc. of IEEE ICC, May 2011. pdf
[CP-68] Fei Xing and Wenye Wang, “On the User-centric Connection Availability of Mobile Wireless Networks,” in Proc. of IEEE ICC, May 2011. pdf
[CP-67] Lei Sun and Wenye Wang, “Topology-Incurred Delay for Information Dissemination in Large Multi-Channel Cognitive Radio Networks,” in Proc. of IEEE GLOBECOM, November 2011. pdf
[CP-66] Zhuo Lu, Wenye Wang, and Cliff Wang, “Review and Evaluation of Security Threats on the Communication Networks in the SmartGrid,” in Proc. of IEEE Milcom, October 2010. pdf
[CP-65] Shawqi Kharbash and Wenye Wang, “All-Terminal Network Reliability Optimization in Fading Environment via Cross Entropy Method,” in Proc. of IEEE ICC, May 2010. pdf
[CP-63] Yi Xu and Wenye Wang, “Phase Transition of Traffic Overloading Failures in Large Wireless Networks,” in Proc. of IEEE ICC, May 2010. pdf
[CP-62] Chi Yi and Wenye Wang, “On the Connectivity of Large-Scale Hybrid Wireless Networks,” in Proc. of IEEE ICC, May 2010. pdf
[CP-61] Lei Sun and Wenye Wang, “A Connectivity-Agile Sensing Algorithm for Cognitive Radio Networks,” in Proc. of IEEE ICC, May 2010. pdf
[CP-60] Chi Yi and Wenye Wang, “On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks,” in Proc. of IEEE INFOCOM, March 2010. pdf
[CP-59] Yi Xu and Wenye Wang,, “Characterizing the Spread of Correlated Failures in Large Wireless Networks,” in Proc. of IEEE INFOCOM, March 2010. pdf
[CP-58] Zhuo Lu and Wenye Wang, “On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-Based Wireless Networks,” in Proc. of IEEE INFOCOM, March 2010. pdf
[CP-57] Yi Xu and Wenye Wang, “Localized Scheduling for Practical and Optimal Capacity Utilization in Large Wireless Networks,” in Proc. of IEEE GLOBECOM, November 2009. pdf
[CP-56] Lei Sun and Wenye Wang, “On Study of Achievable Capacity with Hybrid Relay in Cognitive Radio Networks,” in Proc. of IEEE GLOBECOM, November 2009. pdf
[CP-55] Avesh K. Agarwal and Wenye Wang, “Performance Sensitivities of Wireless Mesh Networks Under Path-based DoS Attacks,” in Proc. of IEEE GLOBECOM, November 2009. pdf
[CP-44] Rachana Gupta, Mo-Yuen Chow, Avesh K. Agarwal, Wenye Wang, “Performance Assessment of Data and Time-Sensitive Wireless Distributed Networked-control-Systems in Presence of Information Securty,” Proc. of IEEE Miltary Communication Conference (Milcom’07), October 2007.
[CP-43] Rachana Gupta, Avesh K. Agarwal, Wenye Wang, Mo-Yuen Chow, “Information security with real-time operation: performance assessment for next generation wireless distributed networked-control-systems,” Proc. of 33rd Annual Conference IEEE Industrial Electronics Society, pp. 420-425, 2007.
[CP-39] Sherry Wang, Harold Zheng, and Wenye Wang, “Efficient Security Management in Ad Hoc Networks,” Proc. of IEEE GLOBECOM 2007, November 2007.
[CP-38] Rachana Gupta, Avesh K. Agarwal, Wenye Wang, Mo-Yuen Chow, “Characterization of data-sensitive wireless distributed networked-control-systems,” Proc. of the 2007 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, September 2007.
[CP-31] Ming Zhao and Wenye Wang, “A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks,” Proc. of IEEE GLOBECOM’06, (Best Student Paper Award- Communication Networks), November 2006. pdf
[CP-18] Wei Liang, Wenye Wang, “A Quantitative Study of Authentication and QoS in Wireless IP Networks,” Proc. of IEEE INFOCOM’05, March 2005. pdf
[CP-17] Wenye Wang, Xinbing Wang, and Arne Nilsson, “A New Admission Control Scheme under Energy and QoS Constraints for Wireless Networks,” Proc. of IEEE INFOCOM’05, March 2005. pdf
[CP-121] R. Zou, W. Wang, and H. Dai, “Opportunistic Spectrum Access: Does Maximizing Throughput Minimize File Transfer Time?,” WiOpt, Oct. 2021. pdf
[CP-120] Y. Huang, R. Jin, and H. Dai, “Differential Privacy and Prediction Uncertainty of Gossip Protocols in General Networks,” 2020 IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, Dec. 2020. pdf
[CP-119] Rui Zou and Wenye Wang, “U-CIMAN: Uncover Spectrum and User Information in LTE Mobile Access Networks,” in Proc. of IEEE INFOCOM, July 2020. pdf
[CP-118] Rui Zou and Wenye Wang, “Change Detection Based Segmentation and Modeling of LTE Spectrum Tenancy,” in Proc. of IEEE GLOBECOM, December 2019. pdf
[CP-117] Teng Fei and Wenye Wang, “LTE is Vulnerable: Implementing Identity Spoofing and Denial-of-Service Attacks in LTE Networks,” in Proc. of IEEE GLOBECOM, December 2019. pdf
[CP-116] Mingkui Wei, Jie Wang, Zhuo Lu, and Wenye Wang, “On Studying Information Dissemination in Social-Physical Interdependent Networks,” in Proc. of IEEE ICC, May 2019. pdf
[CP-115] Jie Wang, Wenye Wang, and Cliff Wang, “SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks,” in Proc. of IEEE INFOCOM, April 2019. pdf
[CP-114] Sigit Pambudi, Jie Wang, Wenye Wang, Min Song, and Xiaoyan Zhu, “The Aftermath of Broken Links: Resilience of IoT Systems from A Networking Perspective,” in Proc. of IEEE ICCCN, August 2018. pdf
[CP-113] Rui Zou and Wenye Wang, “A Flow Rule Timeout Assignment Algorithm for SDN-Assisted Network MIMO Systems,” in Proc. of IEEE ICC, May 2018. pdf
[CP-112] Sigit Pambudi, Wenye Wang, and Cliff Wang, “Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability,” in Proc. of IEEE INFOCOM, April 2018. pdf
[CP-111] Seyyedali Hosseinalipour, Jie Wang, Wenye Wang, and Huaiyu Dai, “Detection of Infections using Graph Signal Processing in Heterogeneous Networks,” in Proc. of IEEE GLOBECOM, December 2017. pdf
[CP-110] Sigit Pambudi, Wenye Wang, and Cliff Wang, “From Isolation Time to Node Resilience: Impact of Cascades in D2D-based Social Networks,” in Proc. of IEEE GLOBECOM, December 2017. pdf
[CP-109] Yali Wang, Wenye Wang, and Mei Song, “How Durable and Stable is A File Sharing on the Move in Cellular-assisted D2D Communications?,” in Proc. of IEEE GLOBECOM, December 2017. pdf
[CP-108] Jie Wang, Wenye Wang, and Cliff Wang, “Modeling and Strategy Design for Spectrum Monitoring over A Geographical Region,” in Proc. of IEEE GLOBECOM, December 2017. pdf
[CP-107] Mingkui Wei, Zhuo Lu, and Wenye Wang, “On Modeling and Understanding Vehicle Evacuation Attacks in VANETs,” in Proc. of IEEE ICC, June 2017. pdf
[CP-106] Sigit Pambudi, Wenye Wang, and Cliff Wang, “How Robust Is A D2D-Based Messaging Service?,” in Proc. of IEEE GLOBECOM, December 2016. pdf
[CP-105] Sigit Pambudi, Wenye Wang, and Cliff Wang, “On The Resilience of D2D-based Social Networking Service Against Random Failures,” in Proc. of IEEE GLOBECOM, December 2016. pdf
[CP-104] Yali Wang, Yujin Li, Wenye Wang, Mei Song, “A Locality-based Mobile Caching Policy for D2D-based Content Sharing Network,” in Proc. of IEEE GLOBECOM, December 2016. pdf
[CP-103] Jie Wang, Wenye Wang, and Cliff Wang, “Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics,” in Proc. of IEEE GLOBECOM, December 2016. pdf
[CP-102] Mingkui Wei and Wenye Wang, “Dominoes with Communications: On Characterizing the Progress of Cascading Failures in Smart Grid,” in Proc. of IEEE ICC, May 2016. pdf
[CP-101] Sigit Pambudi and Wenye Wang, “Modeling and Estimating the Structure of D2D-Based Mobile Social Networks,” in Proc. of IEEE ICC, May 2016. pdf
[CP-100] Jie Wang, Wenye Wang, and Cliff Wang, “How the Anti-Rumor Kills the Rumor: Conflicting Information Propagation in Networks,” in Proc. of IEEE ICC, May 2016. pdf
[CP-06] Ian F. Akyildiz, Wenye Wang, and Young-Jun Lee, “Location Management in 3G/4G Wireless Systems,” Proc. of SPIE – The Convergence of Information Technologies and Communications (ITCom) Conference, -, Denver, August 2001.
[CP-08] Wei Liang and Wenye Wang, “A Security Association Management Scheme for Efficient Authentication in Wireless Networks,” Proc. of World Wireless Congress 2004 (WWC04), pp. 691-696, May 2004.
[CP-05] Wenye Wang and Ian F. Akyildiz, “A Cost Efficient Signaling Protocol for Mobility Application Part (MAP) in IMT 2000 Systems,” Proc. of ACM/IEEE MobiCom’01, pp. 345-356, Rome, Italy, July 2001.
[CP-03] Wenye Wang, Ian F. Akyildiz, and Gordon L. St¨¹ber, “An Optimal Partition Algorithm for Minimization of Paging Costs,” Proc. of IEEE GLOBECOM 2000, Vol. 1, pp. 188-192, San Francisco, November 2000.Â
Book Chapters
[BC-6] Avesh K. Agarwal and Wenye Wang, “An Experimental Study on Security Protocols in WLANs,” in Y. Xiao, X. Shen, and D.-Z. Du, Wireless Network Security, Springer, ISBN: 0387280405, 2006.
[BC-5] Wenye Wang, Wei Liang, and Avesh K. Agarwal, “The Effects of Authentication Mechanisms on Quality of Service in Mobile Wireless Networks,” in Y. Zhang, H. Hu, and M. Fujise, Resource, Mobility and Security Management in Wireless Networks and Mobile Communications, Auerbach Publications, CRC Press, 2006.
[BC-4] Wenye Wang, Janise Y. McNair, and Jiang (Linda) Xie, “Location Management and Mobility Modeling in Wireless Systems,” in Mehdi Khosrow-Pour, Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Idea-Group, 2006.
[BC-3] Wenye Wang, Janise Y. McNair, and Jiang (Linda) Xie, “Authentication and Security Protocols for Ubiquitous Wireless Networks,” in Thanos A. Vasilakos and Witold Pedrycz, Ambient Intelligence,Wireless Networking, Ubiquitous Computing, Artech House, July 2005.
[BC-2] Wenye Wang, “Modeling and Management of Location and Mobility,” in D. Katsaros, A. Nanopoulos and Y. Manalopoulos, Wireless Information Highways, Chapter VI, Hershey, USA: IRM Press, 2005.
[BC-1] Wenye Wang, “Authentication for Inter-Domain Roaming in Wireless IP Networks,” in Panand Xiao, Design and Analysis of Wireless Networks, Vol. 2, NOVA Science Publisher, ISBN: 1-59454-186-8, Hardbound, 2004.
Thesis and Technical Reports
[PHD-jw-19] Jie Wang, “Modeling and Analysis of Mobile Data Dynamics in Heterogeneous Wireless Networks,” PhD Dissertation, Computer Engineering, October 2019.
[MS-xf-13] Xiaozhou Fang, “Neighbor Graph Based Proactive Caching for Seamless Handover in Content-Centric Network,” MS Thesis, Computer Engineering, October, 2013.
[PHD-sqq-13] Shawqi Q. Karbash, “Modeling and Analysis of Wireless Network Reliability,” PhD Dissertation, Computer Engineering, May, 2013.
[PHD-zl-13] Zhuo Lu, “Modeling and Evaluating the Impact of Denial-of-Service Attacks in Emerging Wireless and Mobile Applications,” PhD Dissertation, Computer Engineering, May, 2013.
[MS-mbs-13] Mohit B. Shah, “End to End Communication Architecture and Technology Performance Evaluation: Ethernet and WiFi for Substation Automation Networks,” MS Thesis, Computer Engineering, Mar, 2013.
[PhD-ls-12] Lei Sun, “Understanding the Performance and Topology of Multi-Hop Wireless Cognitive Radio Networks,” PhD Dissertation, Computer Engineering, April, 2013.
[PhD-yx-10] Yi Xu, “Understanding the Performance and Resilience of Large-Scale Multi-Hop Wireless Networks,” PhD Dissertation, Computer Engineering, April, 2010.
[MS-mk-09] Mohit Khanna, “Communication Challenges for the FREEDM System,” MS Thesis, Electrical Engineering, August, 2009.
[PhD-mz-09] Ming Zhao, “Design, Modeling, and Analysis of User Mobility and Its Impact on Multi-Hop Wireless Networks,” PhD Dissertation, Computer Engineering, April, 2009.
[PhD-aka-09] Avesh K. Agarwal, “Performance and Protection Management in Wireless Networks,” PhD Dissertation, Computer Science, April, 2009.
[PhD-fx-08] Fei Xing, “Modeling, Design, and Analysis on the Resilience of Large-scale Wireless Multi-hop Networks,” PhD Dissertation, Computer Engineering, November, 2008.
[PhD-nt-08] Nurcan Tezcan, “Energy-Efficient And Reliable Data Transfer in Wireless Sensor Networks,” PhD Dissertation, Computer Engineering, September, 2008.
[MS-hx-05] Heng Xia, “Effects of Medium Access Control on the Capacity of Mobile Ad Hoc Networks,” MS Thesis, Electrical Engineering, August, 2005.
[PhD-wl-05] Wei Liang, “Design and Analysis of Authentication Mechanisms in Single- and Multi-Hop Wireless Networks,” PhD Dissertation, Electrical Engineering, August, 2005.
[MS-jks-05] Jung Kee Song, “Performance Evaluation of Handoff between UMTS/802.11b based on Mobile IP and Stream Control Transmission Protocol,” MS Thesis, Computer Science, May, 2005.
[TR-01-05] Ming Zhao and Wenye Wang, “Semi-Markov Mobility Model for Mobile Wireless Networks,” Technical Report, TR01-NeTWIS-05, May, 2005.
[TR-03-04] Nurcan Tezcan and Wenye Wang, “ART:Asymmetric Reliable Transport Mechanism for Wireless Sensor Networks,” Technical Report, TR03-NeTWIS-04, December, 2004.
[TR-02-04] Avesh K. Agarwal and Jorinjit S. Gill, “An Experimental Study of Cross-Layer Wireless Security in Public Access Wireless Networks,” Technical Report, TR02-NeTWIS-04, May, 2004.
[TR-01-04] Wei Liang and Wenye Wang, “Authentication and Service Management in Heterogeneous Mobile Environments,” Technical Report, TR01-NeTWIS-04, May, 2004.
[TR-02-03] Cheolho Lee and Wenye Wang, “Dynamic End-to-End Call Admission Control for Multi-Layer QoS Constraints in Wireless Networks,” Technical Report, TR02-NeTWIS-03, May, 2003.
[TR-01-03] Suresh. V. Subramanian, “The Overview of MPLS & IP Multicasting,” Technical Report, TR01-NeTWIS-03, May, 2003.