Qijun Gu
Cited by
Cited by
Denial of service attacks
Q Gu, P Liu
Handbook of Computer Networks: Distributed Networks, Network Planning …, 2007
Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling
Q Gu, D R. Michanowicz, C Jia
Sensors 18 (12), 4363, 2018
A heuristic ant algorithm for solving QoS multicast routing problem
CH Chu, JH Gu, XD Hou, Q Gu
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
Transient clouds: Assignment and collaborative execution of tasks on mobile devices
T Penner, A Johnson, B Van Slyke, M Guirguis, Q Gu
2014 IEEE Global Communications Conference, 2801-2806, 2014
Towards self-propagate mal-packets in sensor networks
Q Gu, R Noorani
Proceedings of the first ACM conference on Wireless network security, 172-182, 2008
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency
S Abdulsalam, Z Zong, Q Gu, M Qiu
2015 Sixth International Green and Sustainable Computing Conference (IGSC), 1-8, 2015
Program energy efficiency: The impact of language, compiler and implementation choices
S Abdulsalam, D Lakomski, Q Gu, T Jin, Z Zong
International Green Computing Conference, 1-6, 2014
Analysis and exercises for engaging beginners in online {CTF} competitions for security education
TJ Burns, SC Rios, TK Jordan, Q Gu, T Underwood
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
KTR: An efficient key management scheme for secure data access control in wireless broadcast services
Q Gu, L Peng, L Wang-Chien, C Chao-Hsien
IEEE Transactions on Dependable and Secure Computing 6 (3), 188-201, 2008
Localized broadcast authentication in large sensor networks
J Drissi, Q Gu
International conference on Networking and Services (ICNS'06), 25-25, 2006
Marcher: A heterogeneous system supporting energy-aware high performance computing and big data analytics
Z Zong, R Ge, Q Gu
Big data research 8, 27-38, 2017
Defending against packet injection attacks unreliable ad hoc networks
Q Gu, P Liu, S Zhu, CH Chu
GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 3, 5 pp., 2005
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
Q Gu, C Ferguson, R Noorani
Computers & Security 30 (1), 13-27, 2011
A consumer UAV-based air quality monitoring system for smart cities
Q Gu, C Jia
2019 IEEE international conference on consumer electronics (ICCE), 1-6, 2019
Sink-anonymity mobility control in wireless sensor networks
Q Gu, X Chen, Z Jiang, J Wu
2009 IEEE International Conference on Wireless and Mobile Computing …, 2009
Defence against packet injection in ad hoc networks
Q Gu, P Liu, CH Chu, S Zhu
International Journal of Security and Networks 2 (1-2), 154-169, 2007
Tactical bandwidth exhaustion in ad hoc networks
Q Gu, P Liu, CH Chu
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
Secure mobile cloud computing and security issues
Q Gu, M Guirguis
High performance cloud auditing and applications, 65-90, 2013
Self-healing control flow protection in sensor applications
C Ferguson, Q Gu, H Shi
Proceedings of the second ACM conference on Wireless network security, 213-224, 2009
Can you help me run these code segments on your mobile device?
M Guirguis, R Ogden, Z Song, S Thapa, Q Gu
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
The system can't perform the operation now. Try again later.
Articles 1–20