Wireless sensor networks-an introduction Q Wang, I Balasingham Wireless sensor networks: application-centric design, 1-14, 2010 | 158 | 2010 |
Source traffic modeling in wireless sensor networks for target tracking Q Wang, T Zhang Proceedings of the 5th ACM symposium on Performance evaluation of wireless …, 2008 | 58 | 2008 |
Localizing multiple objects using radio tomographic imaging technology Q Wang, H Yiğitler, R Jäntti, X Huang IEEE Transactions on Vehicular Technology 65 (5), 3641-3656, 2015 | 54 | 2015 |
Traffic Analysis & Modeling in Wireless Sensor Networks and Their Applications on Network Optimization and Anomaly Detection. Q Wang Netw. Protoc. Algorithms 2 (1), 74-92, 2010 | 54 | 2010 |
Bottleneck zone analysis in energy-constrained wireless sensor networks Q Wang, T Zhang IEEE communications letters 13 (6), 423-425, 2009 | 47 | 2009 |
Improving RSS-based ranging in LOS-NLOS scenario using GMMs Q Wang, I Balasingham, M Zhang, X Huang IEEE Communications Letters 15 (10), 1065-1067, 2011 | 40 | 2011 |
Human interactive secure key and identity exchange protocols in body sensor networks X Huang, B Chen, A Markham, Q Wang, Z Yan, AW Roscoe IET Information Security 7 (1), 30-38, 2013 | 24 | 2013 |
Human interactive secure ID management in body sensor networks X Huang, X Ma, B Chen, A Markham, Q Wang, AW Roscoe Journal of Networks 7 (9), 1400, 2012 | 24 | 2012 |
Packet traffic: a good data source for wireless sensor network modeling and anomaly detection Q Wang IEEE Network 25 (3), 15-21, 2011 | 21 | 2011 |
Traffic analysis, modeling and their applications in energy-constrained wireless sensor networks: On network optimization and anomaly detection Q Wang Tryckeriet Mittuniversitetet, 2010 | 19 | 2010 |
Detecting anomaly node behavior in wireless sensor networks Q Wang, T Zhang 21st International Conference on Advanced Information Networking and …, 2007 | 16 | 2007 |
Body sensor network key distribution using human interactive channels X Huang, Q Wang, C Bangdao, A Markham, R Jäntti, AW Roscoe Proceedings of the 4th International Symposium on Applied Sciences in …, 2011 | 15 | 2011 |
An effort to understand the optimal routing performance in wireless sensor network Q Wang, T Zhang, S Pettersson 22nd International Conference on Advanced Information Networking and …, 2008 | 12 | 2008 |
Bounding the information collection performance of wireless sensor network routing Q Wang, T Zhang, S Pettersson Fifth Annual Conference on Communication Networks and Services Research …, 2007 | 12 | 2007 |
Wireless Sensor Networks-An Introduction, ch. 1 Q Wang, I Balasingham Tech, 2010 | 8 | 2010 |
Sec-SNMP: Policy-based Security Management for Sensor Networks. Q Wang, T Zhang SECRYPT, 222-226, 2008 | 8 | 2008 |
Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference Q Wang Computers & Security 103 (102175), 2021 | 7 | 2021 |
Traffic load distribution in large-scale and dense wireless sensor networks Q Wang, T Zhang 2010 The 5th Annual ICST Wireless Internet Conference (WICON), 1-8, 2010 | 7 | 2010 |
Using secret spreading codes to enhance physical layer security in wireless communication Q Wang 2017 IEEE international conference on communications workshops (ICC …, 2017 | 6 | 2017 |
High-Precision AI-Enabled Flood Prediction Integrating Local Sensor Data and 3rd Party Weather Forecast Q Wang, W Abdelrahman Sensors 23 (6), 3065, 2023 | 5 | 2023 |