Xiao, Y., Shen, X., & Du, D. (2006). A survey on attacks and countermeasures in mobile ad hoc networks Wireless/Mobile/Network/Security, 1-38.
Reference author: X Shen
First name
X
Last name
Shen
Fang, Y., Shen, X., & Chen, S. (2006). Special Section on Cross-Layer Design for Mobile Ad Hoc Networks and Wireless Sensor Networks IEEE Transactions on Vehicular Technology, 55, 729-732.
Wang, L., Cai, L., Liu, X., & Shen, X. (2006). AIMD Congestion Control: Stability, TCP-friendliness, Delay Performance Citeseer.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Key management schemes for wireless sensor networks Security in Sensor Networks, 113-143.
Xu, J., Shen, X., Mark, J., & Cai, J. (2007). Mobile location estimation in CDMA cellular networks by using fuzzy logic Wireless Communications and Mobile Computing, 7, 285-298.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Security in sensor networks Auerbach Publications.
Wang, L., Cai, L., Liu, X., & Shen, X. (2007). Boundedness of AIMD/RED Systems with Time Delays Tech. Rep.
Lin, X.- dong, Sun, X.- ting, Ho, P.-H., & Shen, X. (2007). GSIS: Secure vehicular communications with privacy preserving IEEE Trans. Vehicular Technology, 56, 3442-3456.
Zhang, H., Liu, X., Shen, X., & Liu, J. (2012). A family of novel chaotic and hyperchaotic attractors from delay differential equation Dynam. Cont. Dis. Ser. B, 19, 411-430.
Zheng, Z., He, S., Cai, L., & Shen, X. (2012). Constrained green base station deployment with resource allocation in wireless networks In Handbook on Green Information and Communication Systems. Wiley.
- Currently on page 1 1
- Next page