Follow
Jiejun Kong
Jiejun Kong
Turing Network Test L.L.C.
Verified email at turingnetworktest.com - Homepage
Title
Cited by
Cited by
Year
Providing robust and ubiquitous security support for mobile ad-hoc networks
J Kong, Z Petros, H Luo, S Lu, L Zhang
Proceedings Ninth International Conference on Network Protocols. ICNP 2001 …, 2001
12422001
Providing robust and ubiquitous security support for mobile ad hoc networks
J Kong, P Zerfos, H Luo, S Lu, L Zhang
Proceeding of The 9th International Conference on Network Protocols, 2001
12422001
The challenges of building mobile underwater wireless networks for aquatic applications
JH Cui, J Kong, M Gerla, S Zhou
Ieee Network 20 (3), 12-18, 2006
10362006
ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
J Kong, X Hong
Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003
7032003
Self-securing ad hoc wireless networks.
H Luo, P Zerfos, J Kong, S Lu, L Zhang
ISCC 2, 548-555, 2002
5932002
URSA: ubiquitous and robust access control for mobile ad hoc networks
H Luo, J Kong, P Zerfos, S Lu, L Zhang
IEEE/ACM transactions on networking 12 (6), 1049-1063, 2004
4332004
Adaptive security for multilevel ad hoc networks
J Kong, H Luo, K Xu, DL Gu, M Gerla, S Lu
Wireless Communications and Mobile Computing 2 (5), 533-547, 2002
2652002
Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications
J Kong, J Cui, D Wu, M Gerla
MILCOM 2005-2005 IEEE Military Communications Conference, 1535-1541, 2005
2542005
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
J Kong, X Hong, M Gerla
IEEE transactions on mobile computing 6 (8), 888-902, 2007
1602007
Analysis of aloha protocols for underwater acoustic sensor networks
LFM Vieira, J Kong, U Lee, M Gerla
Extended abstract from WUWNet 6, 2006
1262006
Visualisation of wormholes in underwater sensor networks: a distributed approach
W Wang, J Kong, B Bhargava, M Gerla
International Journal of Security and Networks 3 (1), 10-23, 2008
982008
A mobile delay-tolerant approach to long-term energy-efficient underwater sensor networking
E Magistretti, J Kong, U Lee, M Gerla, P Bellavista, A Corradi
2007 IEEE wireless communications and networking conference, 2866-2871, 2007
962007
A secure ad-hoc routing approach using localized self-healing communities
J Kong, X Hong, Y Yi, JS Park, J Liu, M Gerla
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
912005
A new set of passive routing attacks in mobile ad hoc networks
J Kong, X Hong, M Gerla
IEEE Military Communications Conference, 2003. MILCOM 2003. 2, 796-801, 2003
872003
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava
Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005
852005
Effective probabilistic approach protecting sensor traffic
X Hong, P Wang, J Kong, Q Zheng
MILCOM 2005-2005 IEEE Military Communications Conference, 169-175, 2005
702005
Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods
U Lee, J Kong, M Gerla, JS Park, E Magistretti
Ad Hoc Networks 5 (6), 943-958, 2007
652007
Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks
Z Cao, J Kong, U Lee, M Gerla, Z Chen
IEEE INFOCOM Workshops 2008, 1-6, 2008
562008
Mobility changes anonymity: mobile ad hoc networks need efficient anonymous routing
J Kong, X Hong, MY Sanadidi, M Gerla
10th IEEE Symposium on Computers and Communications (ISCC'05), 57-62, 2005
452005
Random flow network modeling and simulations for DDoS attack mitigation
J Kong, M Mirza, J Shu, C Yoedhana, M Gerla, S Lu
IEEE International Conference on Communications, 2003. ICC'03. 1, 487-491, 2003
442003
The system can't perform the operation now. Try again later.
Articles 1–20