| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
J. Field Robotics
|
| 2017 | Misc | conf |
CISS
|
| 2016 | J | jnl |
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models.
Comput. Secur.
|
| 2015 | J | jnl |
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models.
CoRR
|
| 2014 | J | jnl |
J. Syst. Softw.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
Pervasive Mob. Comput.
|
| 2013 | C | conf |
ISC
|
| 2013 | J | jnl |
Wirel. Networks
|
| 2013 | A | conf |
IPDPS
|
| 2013 | — | conf |
ICDCS Workshops
|
| 2013 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2012 | B | conf |
MASS
|
| 2012 | — | conf |
ICC
|
| 2012 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2012 | J | jnl |
J. Syst. Softw.
|
| 2012 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2012 | Misc | conf |
ICDCN
|
| 2011 | A | conf |
DSN
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | J | jnl |
Ad Hoc Sens. Wirel. Networks
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2010 | A | conf |
ICDCS
|
| 2010 | A | conf |
DSN
|
| 2010 | A | conf |
DSN
|
| 2010 | J | jnl |
Wirel. Networks
|
| 2009 | A | conf |
IPDPS
|
| 2009 | — | conf |
PerCom Workshops
|
| 2009 | J | jnl |
Ad Hoc Networks
|
| 2009 | A | conf |
ICDCS
|
| 2009 | B | conf |
SECON
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | J | jnl |
ACM Trans. Sens. Networks
|
| 2008 | — | conf |
WISEC
|
| 2008 | A | conf |
ISSRE
|
| 2008 | C | conf |
SecureComm
|
| 2007 | C | conf |
IPCCC
|
| 2007 | B | conf |
DCOSS
|
| 2007 | J | jnl |
Comput. Commun.
|
| 2007 | B | conf |
ICNP
|
| 2007 | A | conf |
ICDCS
|
| 2007 | — | ch. |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
|
| 2007 | — | book |
|
| 2007 | B | conf |
Networking
|
| 2006 | — | ed. |
SASN
|
| 2005 | — | conf |
IPSN
|
| 2005 | — | ch. |
Handbook of Sensor Networks
|
| 2005 | A | conf |
ICDCS
|
| 2005 | B | conf |
ACNS
|
| 2005 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2005 | — | conf |
Workshop on Wireless Security
|
| 2005 | J | jnl |
ACM Trans. Sens. Networks
|
| 2005 | C | conf |
MobiQuitous
|
| 2004 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2003 | A* | conf |
NDSS
|
| 2003 | A* | conf |
CCS
|
| 2003 | A* | conf |
CCS
|
| 2003 | — | conf |
SASN
|