Follow
Yong Sheng
Title
Cited by
Cited by
Year
Detecting 802.11 MAC layer spoofing using received signal strength
Y Sheng, K Tan, G Chen, D Kotz, A Campbell
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1768-1776, 2008
3662008
MAP: A scalable monitoring system for dependable 802.11 wireless networks
Y Sheng, G Chen, H Yin, K Tan, U Deshpande, B Vance, D Kotz, ...
IEEE Wireless Communications 15 (5), 10-18, 2008
562008
Process query systems for surveillance and awareness
V Berk, W Chung, V Crespi, G Cybenko, R Gray, D Hernando, G Jiang, ...
Proceedings of the 7th World Multiconference on Systemics, Cybernetics and …, 2003
292003
Distance measures for nonparametric weak process models
Y Sheng, GV Cybenko
2005 IEEE International Conference on Systems, Man and Cybernetics 1, 722-727, 2005
112005
Trackability analysis of multiple processes using multi-distributed agents
Y Sheng, GV Cybenko, V Crespi, G Jiang
International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005
82005
The theory of trackability and robustness for process detection
Y Sheng
Dartmouth College, 2006
42006
MAP: A scalable measurement infrastructure for securing 802.11 wireless networks
Y Sheng, K Tan, U Deshpande, B Vance, H Yin, C McDonald, ...
22008
An experimental comparison of hypothesis management approaches for process query systems
Y Sheng, DC Madory, GV Cybenko
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2005
22005
User interfaces for process modeling and detection systems
Y Sheng
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2004
22004
Trackability in complex situations and environments
V Crespi, Y Sheng, G Cybenko
Unattended Ground, Sea, and Air Sensor Technologies and Applications VIII …, 2006
12006
Trackability in complex situations and environments
V Crespi, Y Sheng, G Cybenko
Unattended Ground, Sea, and Air Sensor Technologies and Applications VIII …, 2006
12006
The system can't perform the operation now. Try again later.
Articles 1–11