Yingshu Li
Yingshu Li
在 gsu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Energy-efficient target coverage in wireless sensor networks
M Cardei, MT Thai, Y Li, W Wu
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
12222005
Distributed data aggregation scheduling in wireless sensor networks
B Yu, J Li, Y Li
IEEE INFOCOM 2009, 2159-2167, 2009
3202009
Collective data-sanitization for preventing sensitive information inference attacks in social networks
Z Cai, Z He, X Guan, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016
2662016
Minimum connected dominating sets and maximal independent sets in unit disk graphs
W Wu, H Du, X Jia, Y Li, SCH Huang
Theoretical Computer Science 352 (1-3), 1-7, 2006
2592006
Nearly constant approximation for data aggregation scheduling in wireless sensor networks
SCH Huang, PJ Wan, CT Vu, Y Li, F Yao
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
2562007
Wireless sensor networks and applications
Y Li, MT Thai
Springer Science & Business Media, 2008
251*2008
A greedy approximation for minimum connected dominating sets
L Ruan, H Du, X Jia, W Wu, Y Li, KI Ko
Theoretical Computer Science 329 (1-3), 325-330, 2004
2322004
On greedy construction of connected dominating sets in wireless networks
Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du
Wireless Communications and Mobile Computing 5 (8), 927-932, 2005
2222005
Sparse target counting and localization in sensor networks based on compressive sensing
B Zhang, X Cheng, N Zhang, Y Cui, Y Li, Q Liang
2011 Proceedings IEEE INFOCOM, 2255-2263, 2011
2142011
Constructing minimum connected dominating sets with bounded diameters in wireless networks
D Kim, Y Wu, Y Li, F Zou, DZ Du
IEEE Transactions on Parallel and Distributed Systems 20 (2), 147-157, 2008
2082008
Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems
N Xiong, AV Vasilakos, LT Yang, L Song, Y Pan, R Kannan, Y Li
IEEE Journal on Selected Areas in Communications 27 (4), 495-509, 2009
1812009
Cost-efficient strategies for restraining rumor spreading in mobile social networks
Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li
IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016
1792016
Using crowdsourced data in location-based social networks to explore influence maximization
JLZ Cai, M Yan, Y Li
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
1452016
Steiner trees in industry
Springer Science & Business Media, 2013
130*2013
Follow but no track: Privacy preserved profile publishing in cyber-physical social systems
X Zheng, Z Cai, J Yu, C Wang, Y Li
IEEE Internet of Things Journal 4 (6), 1868-1878, 2017
1202017
Deep learning based inference of private information using embedded sensors in smart devices
Y Liang, Z Cai, J Yu, Q Han, Y Li
IEEE Network 32 (4), 8-14, 2018
1182018
Construction algorithms for k-connected m-dominating sets in wireless sensor networks
Y Wu, Y Li
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
1102008
Maximum lifetime of sensor networks with adjustable sensing range
A Dhawan, CT Vu, A Zelikovsky, Y Li, SK Prasad
Seventh ACIS International Conference on Software Engineering, Artificial …, 2006
1092006
Localized construction of connected dominating set in wireless networks
YLS Zhu, MTDZ Du
Proceedings of US National Science Foundation International Workshop …, 2004
1092004
Constructing k-connected m-dominating sets in wireless sensor networks
Y Wu, F Wang, MT Thai, Y Li
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
1082007
系统目前无法执行此操作,请稍后再试。
文章 1–20