Follow
Ai Chunyu
Ai Chunyu
Verified email at uscupstate.edu
Title
Cited by
Cited by
Year
Applying big data based deep learning system to intrusion detection
W Zhong, N Yu, C Ai
Big Data Mining and Analytics 3 (3), 181-195, 2020
1452020
Transforming complete coverage algorithms to partial coverage algorithms for wireless sensor networks
Y Li, C Vu, C Ai, G Chen, Y Zhao
IEEE Transactions on Parallel and Distributed Systems 22 (4), 695-703, 2010
902010
On the construction of k-connected m-dominating sets in wireless networks
Y Li, Y Wu, C Ai, R Beyah
Journal of combinatorial optimization 23, 118-139, 2012
842012
Sensor scheduling for p-percent coverage in wireless sensor networks
Y Li, C Ai, Z Cai, R Beyah
Cluster Computing 14, 27-40, 2011
662011
Delay-bounded and energy-efficient composite event monitoring in heterogeneous wireless sensor networks
Y Li, C Ai, C Vu, Y Pan, R Beyah
IEEE Transactions on Parallel and Distributed Systems 21 (9), 1373-1385, 2009
432009
Privacy protection on sliding window of data streams
W Wang, J Li, C Ai, Y Li
2007 International Conference on Collaborative Computing: Networking …, 2007
432007
Processing area queries in wireless sensor networks
C Ai, L Guo, Z Cai, Y Li
2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 1-8, 2009
422009
Data estimation in sensor networks using physical and statistical methodologies
Y Li, C Ai, WP Deshmukh, Y Wu
2008 The 28th International Conference on Distributed Computing Systems, 538-545, 2008
422008
Real time clustering of sensory data in wireless sensor networks
L Guo, C Ai, X Wang, Z Cai, Y Li
2009 IEEE 28th International Performance Computing and Communications …, 2009
362009
An urban area-oriented traffic information query strategy in VANETs
X Wang, L Guo, C Ai, J Li, Z Cai
Wireless Algorithms, Systems, and Applications: 8th International Conference …, 2013
302013
Time constraint influence maximization algorithm in the age of big data
M Han, Z Duan, C Ai, FW Lybarger, Y Li, AG Bourgeois
International Journal of Computational Science and Engineering 15 (3-4), 165-175, 2017
212017
Differentially private k-anonymity: Achieving query privacy in location-based services
J Wang, Z Cai, C Ai, D Yang, H Gao, X Cheng
2016 International Conference on Identification, Information and Knowledge …, 2016
192016
An efficient social event invitation framework based on historical data of smart devices
C Ai, M Han, J Wang, M Yan
2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016
192016
p-Percent Coverage in Wireless Sensor Networks
Y Wu, C Ai, S Gao, Y Li
Wireless Algorithms, Systems, and Applications: Third International …, 2008
192008
Data aggregation scheduling in probabilistic wireless networks with cognitive radio capability
M Yan, M Han, C Ai, Z Cai, Y Li
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
172016
Near-complete privacy protection: Cognitive optimal strategy in location-based services
M Han, J Wang, M Yan, C Ai, Z Duan, Z Hong
Procedia Computer Science 129, 298-304, 2018
152018
Dsf-a distributed security framework for heterogeneous wireless sensor networks
H Saxena, C Ai, M Valero, Y Li, R Beyah
2010-MILCOM 2010 Military Communications Conference, 1836-1843, 2010
122010
A novel clustering topology control for reliable multi-hop routing in wireless sensor networks
R Du, C Ai, L Guo, J Chen, J Liu, J He, Y Li
J. Commun. 5 (9), 654-664, 2010
122010
Authentic delay bounded event detection in heterogeneous wireless sensor networks
C Ai, H Hou, Y Li, R Beyah
Ad Hoc Networks 7 (3), 599-613, 2009
122009
In-network historical data storage and query processing based on distributed indexing techniques in wireless sensor networks
C Ai, R Du, M Zhang, Y Li
Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20