A survey of cyber crimes Y Zhang, Y Xiao, K Ghaboosi, J Zhang, H Deng Security and Communication Networks 5 (4), 422-437, 2012 | 94 | 2012 |
Coverage, connectivity, and deployment in wireless sensor networks Y Wang, Y Zhang, J Liu, R Bhandari Recent development in wireless sensor and ad-hoc networks, 25-44, 2015 | 70 | 2015 |
A survey of security visualization for computer network logs Y Zhang, Y Xiao, M Chen, J Zhang, H Deng Security and Communication Networks 5 (4), 404-421, 2012 | 49 | 2012 |
Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks Y Xiao, Y Zhang, JH Gibson, GG Xie, H Chen Cluster Computing 14, 65-80, 2011 | 38 | 2011 |
Divide‐and conquer‐based surveillance framework using robots, sensor nodes, and RFID tags Y Xiao, Y Zhang Wireless Communications and Mobile Computing 11 (7), 964-979, 2011 | 33 | 2011 |
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Y Xiao, Y Zhang, M Peng, H Chen, X Du, B Sun, K Wu Computer Networks 53 (14), 2458-2475, 2009 | 30 | 2009 |
Surveillance and tracking system with collaboration of robots, sensor nodes, and RFID tags Y Xiao, Y Zhang 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 28 | 2009 |
Primate social systems, scent-marking and their applications in mobile and static sensor networks Y Zhang, Y Xiao, KL Bales International Journal of Sensor Networks 5 (4), 210-222, 2009 | 28 | 2009 |
Primate-inspired communication methods for mobile and static sensors and RFID tags Y Xiao, Y Zhang, X Liang ACM Transactions on Autonomous and Adaptive Systems (TAAS) 6 (4), 1-37, 2011 | 27 | 2011 |
LPViT: a transformer based model for PCB image classification and defect detection K An, Y Zhang IEEE Access 10, 42542-42553, 2022 | 23 | 2022 |
A critical line based boundary surveillance strategy in wireless sensor networks Y Xiao, Y Zhang Telecommunication Systems 52, 423-434, 2013 | 23 | 2013 |
Primate-inspired scent marking for mobile and static sensors and RFID tags Y Zhang, Y Xiao 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 18 | 2009 |
Generating routes for autonomous driving in vehicle-to-infrastructure communications J Yang, T Chen, B Payne, P Guo, Y Zhang, J Guo Digital Communications and Networks 6 (4), 444-451, 2020 | 16 | 2020 |
A patrolling scheme in wireless sensor and robot networks Y Zhang, Y Xiao Proceedings of the IEEE Conference on Computer Communications Workshops …, 2011 | 14 | 2011 |
Performance analysis of p-persistent aloha for multi-hop underwater acoustic sensor networks Y Xiao, Y Zhang, JH Gibson, GG Xie 2009 International Conference on Embedded Software and Systems, 305-311, 2009 | 14 | 2009 |
Datlmedqa: A data augmentation and transfer learning based solution for medical question answering S Zhou, Y Zhang Applied Sciences 11 (23), 11251, 2021 | 12 | 2021 |
Bio-inspired patrolling scheme design in wireless and mobile sensor and robot networks Y Zhang, Y Xiao, Y Wang, P Mosca Wireless Personal Communications 92, 1303-1332, 2017 | 11 | 2017 |
Medium access control layer for underwater sensor networks Y Zhang, Y Xiao, M Chen, P Bahri, M Kamboj Underwater Acoustic Sensor Networks, 179-250, 2009 | 11 | 2009 |
Intrusion objects with shapes under randomized scheduling algorithm in sensor networks Y Xiao, H Chen, Y Zhang, X Du, B Sun, K Wu 2008 The 28th International Conference on Distributed Computing Systems …, 2008 | 10 | 2008 |
Partial sensing coverage in 3d wireless lattice sensor networks Y Wang, W Chu, Z Xiao, Y Zhang 2014 IEEE International Conference on Communications (ICC), 24-29, 2014 | 8 | 2014 |