Qijun Gu
Cited by
Cited by
A heuristic ant algorithm for solving QoS multicast routing problem
CH Chu, JH Gu, XD Hou, Q Gu
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
Denial of service attacks
Q Gu, P Liu
Handbook of Computer Networks: Distributed Networks, Network Planning …, 2007
Transient clouds: Assignment and collaborative execution of tasks on mobile devices
T Penner, A Johnson, B Van Slyke, M Guirguis, Q Gu
2014 IEEE Global Communications Conference, 2801-2806, 2014
Towards self-propagate mal-packets in sensor networks
Q Gu, R Noorani
Proceedings of the first ACM conference on Wireless network security, 172-182, 2008
Localized broadcast authentication in large sensor networks
J Drissi, Q Gu
International conference on Networking and Services (ICNS'06), 25-25, 2006
KTR: An efficient key management scheme for secure data access control in wireless broadcast services
Q Gu, L Peng, L Wang-Chien, C Chao-Hsien
IEEE Transactions on Dependable and Secure Computing 6 (3), 188-201, 2008
Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling
Q Gu, D R Michanowicz, C Jia
Sensors 18 (12), 4363, 2018
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency
S Abdulsalam, Z Zong, Q Gu, M Qiu
2015 Sixth International Green and Sustainable Computing Conference (IGSC), 1-8, 2015
Marcher: A heterogeneous system supporting energy-aware high performance computing and big data analytics
Z Zong, R Ge, Q Gu
Big data research 8, 27-38, 2017
Program energy efficiency: The impact of language, compiler and implementation choices
S Abdulsalam, D Lakomski, Q Gu, T Jin, Z Zong
International Green Computing Conference, 1-6, 2014
Defending against packet injection attacks unreliable ad hoc networks
Q Gu, P Liu, S Zhu, CH Chu
GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 3, 5 pp., 2005
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
Q Gu, C Ferguson, R Noorani
Computers & Security 30 (1), 13-27, 2011
Tactical bandwidth exhaustion in ad hoc networks
Q Gu, P Liu, CH Chu
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
Defence against packet injection in ad hoc networks
Q Gu, P Liu, CH Chu, S Zhu
International Journal of Security and Networks 2 (1-2), 154-169, 2007
Can you help me run these code segments on your mobile device?
M Guirguis, R Ogden, Z Song, S Thapa, Q Gu
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
Self-healing control flow protection in sensor applications
C Ferguson, Q Gu
IEEE Transactions on Dependable and Secure Computing 8 (4), 602-616, 2011
Sink-anonymity mobility control in wireless sensor networks
Q Gu, X Chen, Z Jiang, J Wu
2009 IEEE International Conference on Wireless and Mobile Computing …, 2009
Analysis and Exercises for Engaging Beginners in Online {CTF} Competitions for Security Education
TJ Burns, SC Rios, TK Jordan, Q Gu, T Underwood
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
Analysis of area-congestion-based DDoS attacks in ad hoc networks
Q Gu, P Liu, CH Chu
Ad Hoc Networks 5 (5), 613-625, 2007
Collaborative computing on-demand: Harnessing mobile devices in executing on-the-fly jobs
T Langford, Q Gu, A Rivera-Longoria, M Guirguis
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20