Wei-Shinn Ku
Wei-Shinn Ku
Professor of Computer Science and Software Engineering, Auburn University
Verified email at auburn.edu - Homepage
Title
Cited by
Cited by
Year
Collaborative detection of DDoS attacks over multiple network domains
Y Chen, K Hwang, WS Ku
IEEE Transactions on Parallel and Distributed Systems 18 (12), 1649-1662, 2007
3092007
Malicious node detection in wireless sensor networks using weighted trust evaluation
IM Atakli, H Hu, Y Chen, WS Ku, Z Su
Proceedings of the 2008 Spring simulation multiconference, 836-843, 2008
1702008
Adversarial and clean data are not twins
Z Gong, W Wang, WS Ku
arXiv preprint arXiv:1704.04960, 2017
1312017
Leveraging spatio-temporal redundancy for RFID data cleansing
H Chen, WS Ku, H Wang, MT Sun
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
1142010
The multi-rule partial sequenced route query
H Chen, WS Ku, MT Sun, R Zimmermann
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances …, 2008
952008
Spatial query integrity with voronoi neighbors
L Hu, W Ku, S Bakiras, C Shahabi
IEEE Transactions on Knowledge and Data Engineering 25 (4), 863-876, 2013
872013
Malicious Node Detection in Wireless Sensor Networks
Y Chen, H Chen, WS Ku
Security in RFID and Sensor Networks, 361, 2010
80*2010
Location-based spatial query processing with data sharing in wireless broadcast environments
WS Ku, R Zimmermann, H Wang
IEEE Transactions on mobile computing 7 (6), 778-791, 2008
752008
Efficient evaluation of k-range nearest neighbor queries in road networks
J Bao, CY Chow, MF Mokbel, WS Ku
2010 Eleventh International Conference on Mobile Data Management, 115-124, 2010
712010
Distributed continuous range query processing on moving objects
H Wang, R Zimmermann, WS Ku
International Conference on Database and Expert Systems Applications, 655-665, 2006
652006
Query integrity assurance of location-based services accessing outsourced spatial databases
WS Ku, L Hu, C Shahabi, H Wang
International Symposium on Spatial and Temporal Databases, 80-97, 2009
632009
Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects
MA Alcorn, Q Li, Z Gong, C Wang, L Mai, WS Ku, A Nguyen
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
622019
Privacy protected query processing on spatial networks
WS Ku, R Zimmermann, WC Peng, S Shroff
2007 IEEE 23rd International Conference on Data Engineering Workshop, 215-220, 2007
572007
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
J Feng, Y Chen, WS Ku, P Liu
2010 39th International Conference on Parallel Processing Workshops, 251-258, 2010
532010
Automatically and accurately conflating raster maps with orthoimagery
CC Chen, CA Knoblock, C Shahabi
GeoInformatica 12 (3), 377-410, 2008
502008
Privacy protected spatial query processing for advanced location based services
WS Ku, Y Chen, R Zimmermann
Wireless personal communications 51 (1), 53-65, 2009
482009
A cloaking algorithm based on spatial networks for location privacy
PY Li, WC Peng, TW Wang, WS Ku, J Xu, JA Hamilton Jr
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2008
482008
Adaptive nearest neighbor queries in travel time networks
WS Ku, R Zimmermann, H Wang, CN Wan
Proceedings of the 13th annual ACM international workshop on Geographic …, 2005
472005
The partial sequenced route query with traveling rules in road networks
H Chen, WS Ku, MT Sun, R Zimmermann
GeoInformatica 15 (3), 541-569, 2011
442011
Authentication of k Nearest Neighbor Query on Road Networks
Y Jing, L Hu, W Ku, C Shahabi
IEEE Transactions on Knowledge and Data Engineering 26 (6), 1494-1506, 2014
422014
The system can't perform the operation now. Try again later.
Articles 1–20