default search action
Helen Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j21]Min Li, Helen Tang, Ahmed Refaey Hussein, Xianbin Wang:
A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community. IEEE Open J. Commun. Soc. 1: 282-292 (2020) - 2019
- [j20]Mehdi Sookhak, Helen Tang, Ying He, F. Richard Yu:
Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges. IEEE Commun. Surv. Tutorials 21(2): 1718-1743 (2019) - [j19]Junfeng Xie, Helen Tang, Tao Huang, F. Richard Yu, Renchao Xie, Jiang Liu, Yunjie Liu:
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv. Tutorials 21(3): 2794-2830 (2019) - 2017
- [j18]Fiona Jiazi Liu, Xianbin Wang, Helen Tang:
Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying. Wirel. Commun. Mob. Comput. 2017 (2017) - 2015
- [j17]Fiona Jiazi Liu, Ahmed Refaey, Xianbin Wang, Helen Tang:
Reliability enhancement for CIR-based physical layer authentication. Secur. Commun. Networks 8(4): 661-671 (2015) - 2014
- [j16]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, Peter C. Mason:
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning. IEEE Trans. Veh. Technol. 63(9): 4647-4658 (2014) - [j15]Yanwei Wang, F. Richard Yu, Helen Tang, Minyi Huang:
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks. IEEE Trans. Wirel. Commun. 13(3): 1616-1627 (2014) - [j14]Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, Ioannis Lambadaris, Helen Tang:
Trust establishment in cooperative wireless relaying networks. Wirel. Commun. Mob. Comput. 14(15): 1450-1470 (2014) - 2013
- [j13]F. Richard Yu, Helen Tang, Shengrong Bu, Du Zheng:
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2013: 188 (2013) - 2012
- [j12]Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason, Azzedine Boukerche:
Joint authentication and quality of service provisioning in cooperative communication networks. Comput. Commun. 35(5): 597-607 (2012) - [j11]Helen Tang, F. Richard Yu, Minyi Huang, Zhiqiang Li:
Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks. IET Commun. 6(8): 974-983 (2012) - [j10]Alireza Attar, Helen Tang, Athanasios V. Vasilakos, F. Richard Yu, Victor C. M. Leung:
A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions. Proc. IEEE 100(12): 3172-3186 (2012) - [j9]Hassan Halabian, Reyhaneh Changiz, F. Richard Yu, Ioannis Lambadaris, Helen Tang:
Optimal reliable relay selection in multiuser cooperative relaying networks. Wirel. Networks 18(6): 591-603 (2012) - 2011
- [j8]Shengrong Bu, F. Richard Yu, Peter X. Liu, Peter C. Mason, Helen Tang:
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(3): 1025-1036 (2011) - [j7]Shengrong Bu, F. Richard Yu, Xiaoping P. Liu, Helen Tang:
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks. IEEE Trans. Wirel. Commun. 10(9): 3064-3073 (2011) - 2010
- [j6]F. Richard Yu, Minyi Huang, Helen Tang:
Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios. IEEE Netw. 24(3): 26-30 (2010) - [j5]F. Richard Yu, Helen Tang, Peter C. Mason, Fei Wang:
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 7(4): 258-267 (2010) - [j4]F. Richard Yu, Helen Tang:
Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks. Wirel. Networks 16(8): 2169-2178 (2010) - 2009
- [j3]Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang:
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wirel. Commun. 8(2): 806-815 (2009) - [j2]Victor C. M. Leung, Jie Zhang, F. Richard Yu, Henry C. B. Chan, Helen Tang:
Enhancing interoperability in heterogeneous mobile wireless networks for disaster response. IEEE Trans. Wirel. Commun. 8(5): 2424-2433 (2009) - 2008
- [j1]F. Richard Yu, Helen Tang, Victor C. M. Leung, Jie Liu, Chung-Horng Lung:
Biometric-based user authentication in mobile ad hoc networks. Secur. Commun. Networks 1(1): 5-16 (2008)
Conference and Workshop Papers
- 2019
- [c28]Min Li, Helen Tang, Xianbin Wang:
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks. ICC Workshops 2019: 1-6 - 2018
- [c27]Mehdi Sookhak, Helen Tang, F. Richard Yu:
Security and Privacy of Smart Cities: Issues and Challenge. HPCC/SmartCity/DSS 2018: 1350-1357 - [c26]Dajun Zhang, F. Richard Yu, Ruizhe Yang, Helen Tang:
A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks. DIVANet@MSWiM 2018: 1-7 - 2016
- [c25]Mehdi Sookhak, F. Richard Yu, Helen Tang:
Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing. ADHOCNETS 2016: 306-315 - [c24]J. David Brown, William Pase, Chris McKenzie, Mazda Salmanian, Helen Tang:
A Prototype Implementation of Continuous Authentication for Tactical Applications. ADHOCNETS 2016: 342-353 - [c23]Zhexiong Wei, F. Richard Yu, Helen Tang, Chengehao Liang, Qiao Yan:
Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing. CNS 2016: 450-456 - [c22]Hao Li, Xianbin Wang, Helen Tang:
Compensation of imperfect channel reciprocity through MMSE prediction for physical-layer confidentiality enhancement. ICMCIS 2016: 1-6 - 2015
- [c21]Zhexiong Wei, Helen Tang, F. Richard Yu:
A trust based framework for both spectrum sensing and data transmission in CR-MANETs. ICC Workshops 2015: 562-567 - [c20]Behzad Kasiri, Ioannis Lambadaris, Fei Richard Yu, Helen Tang:
Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs. ICC 2015: 7316-7321 - [c19]Ronggong Song, J. David Brown, Helen Tang, Mazda Salmanian:
Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks. ICMCIS 2015: 1-8 - [c18]Mazda Salmanian, J. David Brown, Susan Watson, Ronggong Song, Helen Tang, Darcy Simmelink:
An architecture for secure interoperability between coalition tactical MANETs. MILCOM 2015: 37-42 - [c17]Ronggong Song, J. David Brown, Peter C. Mason, Mazda Salmanian, Helen Tang:
HMS: Holistic MPR selection and network connectivity for tactical edge networks. MILCOM 2015: 726-731 - 2014
- [c16]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, Peter C. Mason:
Trust establishment with data fusion for secure routing in MANETs. ICC 2014: 671-676 - [c15]Zhexiong Wei, Helen Tang, F. Richard Yu, Peter C. Mason:
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks. MILCOM 2014: 171-177 - 2013
- [c14]Ronggong Song, Helen Tang, Peter C. Mason, Zhexiong Wei:
Cross-Layer Security Management Framework for Mobile Tactical Networks. MILCOM 2013: 220-225 - 2012
- [c13]Ronggong Song, Helen Tang:
LAA: Link-layer anonymous access for tactical MANETs. MILCOM 2012: 1-7 - [c12]Du Zheng, Helen Tang, F. Richard Yu:
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications. MILCOM 2012: 1-6 - 2011
- [c11]Shengrong Bu, F. Richard Yu, Peter X. Liu, Helen Tang:
A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks. ICC 2011: 1-5 - [c10]Xianbin Wang, Fiona Jiazi Liu, Dian Fan, Helen Tang, Peter C. Mason:
Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System. ICC 2011: 1-5 - [c9]Fiona Jiazi Liu, Xianbin Wang, Helen Tang:
Robust physical layer authentication using inherent properties of channel impulse response. MILCOM 2011: 538-542 - 2010
- [c8]Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, Ioannis Lambadaris, Helen Tang:
Trust Management in Wireless Mobile Networks with Cooperative Communications. EUC 2010: 498-503 - [c7]Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason:
Combined Authentication and Quality of Service in Cooperative Communication Networks. EUC 2010: 566-571 - 2009
- [c6]Fei Richard Yu, Helen Tang, Fei Wang, Victor C. M. Leung:
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. CSE (2) 2009: 787-794 - 2008
- [c5]Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang:
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks. ICC 2008: 1515-1519 - [c4]Helen Tang, Mazda Salmanian:
Lightweight Integrated Authentication for Tactical MANETs. ICYCS 2008: 2266-2271 - 2007
- [c3]F. Richard Yu, Helen Tang, Victor C. M. Leung:
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures. IPCCC 2007: 570-575 - [c2]Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang:
Optimal Biometric-Based Continuous Authentication in Mobile Ad Hoc Networks. WiMob 2007: 76 - 2006
- [c1]Helen Tang, Ioannis Lambadaris, Hamid Mehrvar:
Performance evaluation of VSQ: a fair MAC scheme for packet ring networks. CAMAD 2006: 107-114
Informal and Other Publications
- 2016
- [i2]Zhexiong Wei, F. Richard Yu, Helen Tang, Chengchao Liang, Qiao Yan:
Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios. CoRR abs/1611.06905 (2016) - 2011
- [i1]F. Richard Yu, Helen Tang, Minyi Huang, Peter C. Mason, Zhiqiang Li:
Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios. CoRR abs/1104.5539 (2011)
Coauthor Index
aka: Fei Richard Yu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint