BibTeX records: Jing Yang Koh

download as .bib file

@article{DBLP:journals/comcom/KohPNL20,
  author       = {Jing Yang Koh and
                  Gareth W. Peters and
                  Ido Nevat and
                  Derek Leong},
  title        = {Probabilistic routing in wireless networks with privacy guarantees},
  journal      = {Comput. Commun.},
  volume       = {151},
  pages        = {228--237},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2019.12.045},
  doi          = {10.1016/J.COMCOM.2019.12.045},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KohPNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KohLPNW17,
  author       = {Jing Yang Koh and
                  Derek Leong and
                  Gareth W. Peters and
                  Ido Nevat and
                  Wai{-}Choong Wong},
  title        = {Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2105--2114},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2698424},
  doi          = {10.1109/TIFS.2017.2698424},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KohLPNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KohPLNW17,
  author       = {Jing Yang Koh and
                  Gareth W. Peters and
                  Derek Leong and
                  Ido Nevat and
                  Wai{-}Choong Wong},
  title        = {Privacy-aware incentive mechanism for mobile crowd sensing},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7997418},
  doi          = {10.1109/ICC.2017.7997418},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KohPLNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/KohZ17,
  author       = {Jing Yang Koh and
                  Pengfei Zhang},
  editor       = {Guojun Wang and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Localizing Wireless Jamming Attacks with Minimal Network Resources},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
                  12-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {322--334},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72395-2\_30},
  doi          = {10.1007/978-3-319-72395-2\_30},
  timestamp    = {Tue, 03 Mar 2020 16:31:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/KohZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KohNLW16,
  author       = {Jing Yang Koh and
                  Ido Nevat and
                  Derek Leong and
                  Wai{-}Choong Wong},
  title        = {Geo-Spatial Location Spoofing Detection for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {3},
  number       = {6},
  pages        = {971--978},
  year         = {2016},
  url          = {https://doi.org/10.1109/JIOT.2016.2535165},
  doi          = {10.1109/JIOT.2016.2535165},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KohNLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KohNLW16,
  author       = {Jing Yang Koh and
                  Ido Nevat and
                  Derek Leong and
                  Wai{-}Choong Wong},
  title        = {Geo-spatial Location Spoofing Detection for Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1602.05335},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.05335},
  eprinttype    = {arXiv},
  eprint       = {1602.05335},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KohNLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KohTLW15,
  author       = {Jing Yang Koh and
                  Joseph Chee Ming Teo and
                  Derek Leong and
                  Wai{-}Choong Wong},
  title        = {Reliable privacy-preserving communications for wireless ad hoc networks},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {6271--6276},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249323},
  doi          = {10.1109/ICC.2015.7249323},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KohTLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccoms/KohTW14,
  author       = {Jing Yang Koh and
                  Joseph Chee Ming Teo and
                  Wai{-}Choong Wong},
  title        = {Mitigating byzantine attacks in data fusion process for wireless sensor
                  networks using witnesses},
  booktitle    = {{IEEE} International Conference on Communication Systems, {ICCS} 2014,
                  Macau, China, November 19-21, 2014},
  pages        = {263--267},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCS.2014.7024806},
  doi          = {10.1109/ICCS.2014.7024806},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccoms/KohTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issnip/ZhangKLN14,
  author       = {Pengfei Zhang and
                  Jing Yang Koh and
                  Shaowei Lin and
                  Ido Nevat},
  title        = {Distributed event detection under Byzantine attack in wireless sensor
                  networks},
  booktitle    = {2014 {IEEE} Ninth International Conference on Intelligent Sensors,
                  Sensor Networks and Information Processing (ISSNIP), Singapore, April
                  21-24, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSNIP.2014.6827609},
  doi          = {10.1109/ISSNIP.2014.6827609},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issnip/ZhangKLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/KohTN13,
  author       = {Jing Yang Koh and
                  Joseph Chee Ming Teo and
                  Dusit Niyato},
  title        = {Rate limiting client puzzle schemes for denial-of-service mitigation},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {1848--1853},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6554845},
  doi          = {10.1109/WCNC.2013.6554845},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/KohTN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics