Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jing Yang Koh
@article{DBLP:journals/comcom/KohPNL20, author = {Jing Yang Koh and Gareth W. Peters and Ido Nevat and Derek Leong}, title = {Probabilistic routing in wireless networks with privacy guarantees}, journal = {Comput. Commun.}, volume = {151}, pages = {228--237}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2019.12.045}, doi = {10.1016/J.COMCOM.2019.12.045}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KohPNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KohLPNW17, author = {Jing Yang Koh and Derek Leong and Gareth W. Peters and Ido Nevat and Wai{-}Choong Wong}, title = {Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2105--2114}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2698424}, doi = {10.1109/TIFS.2017.2698424}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KohLPNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KohPLNW17, author = {Jing Yang Koh and Gareth W. Peters and Derek Leong and Ido Nevat and Wai{-}Choong Wong}, title = {Privacy-aware incentive mechanism for mobile crowd sensing}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997418}, doi = {10.1109/ICC.2017.7997418}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KohPLNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/KohZ17, author = {Jing Yang Koh and Pengfei Zhang}, editor = {Guojun Wang and Mohammed Atiquzzaman and Zheng Yan and Kim{-}Kwang Raymond Choo}, title = {Localizing Wireless Jamming Attacks with Minimal Network Resources}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {322--334}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72395-2\_30}, doi = {10.1007/978-3-319-72395-2\_30}, timestamp = {Tue, 03 Mar 2020 16:31:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/KohZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KohNLW16, author = {Jing Yang Koh and Ido Nevat and Derek Leong and Wai{-}Choong Wong}, title = {Geo-Spatial Location Spoofing Detection for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {3}, number = {6}, pages = {971--978}, year = {2016}, url = {https://doi.org/10.1109/JIOT.2016.2535165}, doi = {10.1109/JIOT.2016.2535165}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KohNLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KohNLW16, author = {Jing Yang Koh and Ido Nevat and Derek Leong and Wai{-}Choong Wong}, title = {Geo-spatial Location Spoofing Detection for Internet of Things}, journal = {CoRR}, volume = {abs/1602.05335}, year = {2016}, url = {http://arxiv.org/abs/1602.05335}, eprinttype = {arXiv}, eprint = {1602.05335}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KohNLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KohTLW15, author = {Jing Yang Koh and Joseph Chee Ming Teo and Derek Leong and Wai{-}Choong Wong}, title = {Reliable privacy-preserving communications for wireless ad hoc networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {6271--6276}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249323}, doi = {10.1109/ICC.2015.7249323}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KohTLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccoms/KohTW14, author = {Jing Yang Koh and Joseph Chee Ming Teo and Wai{-}Choong Wong}, title = {Mitigating byzantine attacks in data fusion process for wireless sensor networks using witnesses}, booktitle = {{IEEE} International Conference on Communication Systems, {ICCS} 2014, Macau, China, November 19-21, 2014}, pages = {263--267}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCS.2014.7024806}, doi = {10.1109/ICCS.2014.7024806}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/iccoms/KohTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issnip/ZhangKLN14, author = {Pengfei Zhang and Jing Yang Koh and Shaowei Lin and Ido Nevat}, title = {Distributed event detection under Byzantine attack in wireless sensor networks}, booktitle = {2014 {IEEE} Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, April 21-24, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSNIP.2014.6827609}, doi = {10.1109/ISSNIP.2014.6827609}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issnip/ZhangKLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/KohTN13, author = {Jing Yang Koh and Joseph Chee Ming Teo and Dusit Niyato}, title = {Rate limiting client puzzle schemes for denial-of-service mitigation}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {1848--1853}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6554845}, doi = {10.1109/WCNC.2013.6554845}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/KohTN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.