Performance evaluation of constructed wetlands in a tropical region YP Katsenovich, A Hummel-Batista, AJ Ravinet, JF Miller Ecological Engineering 35 (10), 1529-1537, 2009 | 81 | 2009 |
Modulation and error correction in the underwater acoustic communication channel Y Labrador, M Karimi, D Pan, J Miller International Journal of Computer Science and Network Security 9 (7), 123-130, 2009 | 69 | 2009 |
Design, development and deployment of a hybrid renewable energy powered mobile medical clinic with automated modular control system A Higier, A Arbide, A Awaad, J Eiroa, J Miller, N Munroe, A Ravinet, ... Renewable energy 50, 847-857, 2013 | 34 | 2013 |
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory CA Kamhoua, N Pissinou, J Miller, SK Makki 2010 IEEE Globecom Workshops, 1957-1962, 2010 | 27 | 2010 |
An Approach to Cooperative Satellite Communications in 4G Mobile Systems. Y Labrador, M Karimi, D Pan, J Miller J. Commun. 4 (10), 815-826, 2009 | 19 | 2009 |
A Review of Security Threats, Solutions and Trust Management in VANETs. BG Premasudha, V Ravi Ram, J Miller, R Suma International journal of Next-Generation computing 7 (1), 2016 | 13 | 2016 |
Context-aware data cleaning for mobile wireless sensor networks: A diversified trust approach CS Alemán, N Pissinou, S Alemany, K Boroojeni, J Miller, Z Ding 2018 International Conference on Computing, Networking and Communications …, 2018 | 7 | 2018 |
Approach to detect non-adversarial overlapping collusion in crowdsourcing GA Kamhoua, N Pissinou, SS Iyengar, J Beltran, J Miller, CA Kamhoua, ... 2017 IEEE 36th International Performance Computing and Communications …, 2017 | 6 | 2017 |
Reregistration eligibility decision for ethofumesate D Edwards, N Zinn, R Prieto, TJ Wyatt, L Brown, A Al-Mudallal, J Morales, ... Environmental Protection Agency document, 2005 | 6 | 2005 |
Klap for real-world protection of location privacy AR Shahid, N Pissinou, SS Iyengar, J Miller, Z Ding, T Lemus 2018 IEEE World Congress on Services (SERVICES), 17-18, 2018 | 5 | 2018 |
COMB: A Hybrid Method for Cross-validated Feature Selection. GS Thejas, D Jimenez, SS Iyengar, J Miller, NR Sunitha, P Badrinath ACM Southeast Regional Conference, 100-106, 2020 | 4 | 2020 |
A novel communication architecture and control system for telebot: A multi-modal telepresence robot for disabled officers S Sundarapandian, S Ferris-Francis, H Michko, C Charters, J Miller, ... International Journal of Next-Generation Computing 7 (3), 2016 | 4 | 2016 |
Query-aware user privacy protection for LBS over query-feature-based attacks M Guo, KG Boroojeni, N Pissinou, K Makki, J Miller, S Iyengar 2018 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2018 | 3 | 2018 |
Reviving a lost species: The case of the floreana galapagos giant tortoise chelonoidis elephantopus J Miller, MC Quinzin, N Poulakakis, JP Gibbs, LB Beheregaray, ... bioRxiv, 2017 | 1 | 2017 |
Forensic Analysis of Social Media Android Apps via Timelines A Ogundiran, H Chi, J Yan, J Miller Future of Information and Communication Conference, 544-559, 2024 | | 2024 |
Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network J Miller, L Egharevba, Y Hariprasad, KKJ Latesh, NK Chaudhary International Conference on Information Security, Privacy and Digital …, 2022 | | 2022 |
Research, Education and Workforce Training for Engagement in the Cyber-learning Environment L Bobadilla, B Carbunar, SS Iyengar, M Robinson, J Miller, D Pan, ... | | 2018 |
Stochastic Motion Planning for the Telebot Y Elorza, S Sundarapandian, J Miller INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING 8 (1), 99-107, 2017 | | 2017 |
Stochastic Motion Planning for the Telebot. S Sundarapandian, J Miller, Y Elorza Int. J. Next Gener. Comput. 8 (1), 2017 | | 2017 |
Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies SS Iyengar, J Miller, ... | | 2016 |