default search action
Qinghua Wang 0001
Person information
- affiliation: Kristianstad University College, Department of Design and Computer Science, Kristianstad, Sweden
- affiliation (former): Aalto University, Department of Communications and Networking, Espoo, Finland
Other persons with the same name
- Qinghua Wang — disambiguation page
- Qinghua Wang 0002 — National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Ibaraki, Japan (and 1 more)
- Qinghua Wang 0003 — University of Delaware, Center for Bioinformatics and Computational Biology, Newark, DE, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2010
- [b1]Qinghua Wang:
Traffic Analysis, Modeling and Their Applications in Energy-Constrained Wireless Sensor Networks: On Network Optimization and Anomaly Detection. Mid Sweden University, Sweden, 2010
Journal Articles
- 2023
- [j10]Qinghua Wang, Walid Abdelrahman:
High-Precision AI-Enabled Flood Prediction Integrating Local Sensor Data and 3rd Party Weather Forecast. Sensors 23(6): 3065 (2023) - 2021
- [j9]Qinghua Wang:
Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference. Comput. Secur. 103: 102175 (2021) - 2016
- [j8]Qinghua Wang, Hüseyin Yigitler, Riku Jäntti, Xin Huang:
Localizing Multiple Objects Using Radio Tomographic Imaging Technology. IEEE Trans. Veh. Technol. 65(5): 3641-3656 (2016) - 2013
- [j7]Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1): 30-38 (2013) - 2012
- [j6]Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham, Qinghua Wang, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. J. Networks 7(9): 1400-1406 (2012) - 2011
- [j5]Qinghua Wang, Ilangko Balasingham, Miaomiao Zhang, Xin Huang:
Improving RSS-Based Ranging in LOS-NLOS Scenario Using GMMs. IEEE Commun. Lett. 15(10): 1065-1067 (2011) - [j4]Qinghua Wang, Tingting Zhang, Ilangko Balasingham:
Characterizing the Traffic Load Distribution in Dense Wireless Sensor Networks. J. Networks 6(2): 173-180 (2011) - [j3]Qinghua Wang:
Packet traffic: a good data source for wireless sensor network modeling and anomaly detection. IEEE Netw. 25(3): 15-21 (2011) - 2010
- [j2]Qinghua Wang:
Traffic Analysis & Modeling in Wireless Sensor Networks and Their Applications on Network Optimization and Anomaly Detection. Netw. Protoc. Algorithms 2(1): 74-92 (2010) - 2009
- [j1]Qinghua Wang, Tingting Zhang:
Bottleneck zone analysis in energy-constrained wireless sensor networks. IEEE Commun. Lett. 13(6): 423-425 (2009)
Conference and Workshop Papers
- 2022
- [c15]Qinghua Wang:
Machine Learning Model Design for IoT-Based Flooding Forecast. CyberC 2022: 97-103 - 2021
- [c14]Qinghua Wang, Viktor Westlund, Jonas Johansson, Magnus Lindgren:
Smart Sewage Water Management and Data Forecast. SAIS 2021: 1-4 - 2019
- [c13]Åke Arvidsson, Karl-Johan Grinnemo, Eric Chen, Qinghua Wang, Anna Brunström:
Web Metrics for the Next Generation Performance Enhancing Proxies. SoftCOM 2019: 1-6 - 2018
- [c12]Qinghua Wang, Xin Huang, Dawit Mengistu:
Session Key Agreement for End-to-End Security in Time-Synchronized Networks. ICUFN 2018: 493-496 - 2017
- [c11]Qinghua Wang:
Using secret spreading codes to enhance physical layer security in wireless communication. ICC Workshops 2017: 447-450 - 2015
- [c10]Xin Huang, Paul Craig, Qinghua Wang:
Identity-Based Association Protocols for Wireless Personal Area Networks. CIT/IUCC/DASC/PICom 2015: 1819-1826 - 2011
- [c9]Xin Huang, Qinghua Wang, Chen Bangdao, Andrew Markham, Riku Jäntti, A. W. Roscoe:
Body sensor network key distribution using human interactive channels. ISABEL 2011: 143:1-143:5 - 2010
- [c8]Qinghua Wang, Tingting Zhang:
Fair Energy Allocation in Wireless Sensor Networks: Theory and Practice. GLOBECOM 2010: 1-6 - [c7]Qinghua Wang, Tingting Zhang:
Traffic Load Distribution in Large-scale and Dense Wireless Sensor Networks. WICON 2010: 1-8 - 2009
- [c6]Qinghua Wang, Tingting Zhang:
Characterizing the Traffic Load Distribution in Dense Sensor Networks. NTMS 2009: 1-4 - 2008
- [c5]Qinghua Wang, Tingting Zhang, Stefan Pettersson:
An Effort to Understand the Optimal Routing Performance in Wireless Sensor Network. AINA 2008: 279-286 - [c4]Qinghua Wang, Tingting Zhang:
Source traffic modeling in wireless sensor networks for target tracking. PE-WASUN 2008: 96-100 - [c3]Qinghua Wang, Tingting Zhang:
Sec-SNMP: Policy-based Security Management for Sensor Networks. SECRYPT 2008: 222-226 - 2007
- [c2]Qinghua Wang, Tingting Zhang:
Detecting Anomaly Node Behavior in Wireless Sensor Networks. AINA Workshops (1) 2007: 451-456 - [c1]Qinghua Wang, Tingting Zhang, Stefan Pettersson:
Bounding the Information Collection Performance of Wireless Sensor Network Routing. CNSR 2007: 55-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint