default search action
Hongmei Deng 0001
Person information
- affiliation: Intelligent Automation Inc, Rockville, USA
Other persons with the same name
- Hongmei Deng — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c14]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time Experimentation of Deep Learning-based RF Signal Classifier on FPGA. DySPAN 2019: 1-2 - [c13]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. MILCOM 2019: 1-6 - [i1]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. CoRR abs/1910.05765 (2019) - 2017
- [c12]Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. RAID 2017: 3-25 - 2016
- [c11]Soumendra Nanda, Charles Tao, Victor Firoiu, Hui Zeng, Gahng-Seop Ahn, Julia Deng:
Cross-layer TCP adaptation in DISCO for tactical edge networks. MILCOM 2016: 958-963 - 2015
- [c10]Lei Ding, Onur Savas, Gahng-Seop Ahn, Hongmei Deng:
Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks. GLOBECOM Workshops 2015: 1-6 - [c9]Guang Jin, Julia Deng, Tung Nguyen, Pan Gao, Mark T. Wooster, Shoukat H. Qari:
Efficient Cloud-Based Real-Time Geo-Information Delivery for Mobile Users. MDM (1) 2015: 251-254 - 2014
- [j14]Kyung Joon Kwak, Yalin Evren Sagduyu, Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Julia Deng, Jason H. Li:
Airborne network evaluation: challenges and high fidelity emulation solution. IEEE Commun. Mag. 52(10): 30-36 (2014) - [j13]Bo Fu, Yang Xiao, Hongmei Julia Deng, Hui Zeng:
A Survey of Cross-Layer Designs in Wireless Networks. IEEE Commun. Surv. Tutorials 16(1): 110-126 (2014) - [j12]Onur Savas, Yalin Evren Sagduyu, Julia Deng, Jason H. Li:
Tactical big data analytics: challenges, use cases, and solutions. SIGMETRICS Perform. Evaluation Rev. 41(4): 86-89 (2014) - [c8]Onur Savas, Gahng-Seop Ahn, Julia Deng:
Securing cognitive radio networks against belief manipulation attacks via trust management. CTS 2014: 158-165 - [p1]Yi Cheng, Julia Deng, Jason H. Li, Scott A. DeLoach, Anoop Singhal, Xinming Ou:
Metrics of Security. Cyber Defense and Situational Awareness 2014: 263-295 - 2013
- [j11]Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos, Hongmei Deng:
Cipher feedback mode under go-back-N and selective-reject protocols in error channels. Secur. Commun. Networks 6(8): 942-954 (2013) - [j10]Xiannuan Liang, Yang Xiao, Jingyuan Zhang, Hongmei Deng, Athanasios V. Vasilakos:
Stochastic event capturing with a single mobile robot in rectangular perimeters. Telecommun. Syst. 52(4): 2519-2532 (2013) - [c7]Onur Savas, Guang Jin, Hongmei Julia Deng:
Trust management in cloud-integrated Wireless Sensor Networks. CTS 2013: 334-341 - [c6]Hui Zeng, Hongmei Julia Deng, Ke Meng, Song Luo, Xiang Yu, Apurva N. Mody, Matthew Sherman, Jude Muller, Zhenxing Wang:
From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks. MILCOM 2013: 1663-1668 - 2012
- [j9]Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang, Hongmei Deng:
A survey of security visualization for computer network logs. Secur. Commun. Networks 5(4): 404-421 (2012) - [j8]Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, Hongmei Deng:
A survey of cyber crimes. Secur. Commun. Networks 5(4): 422-437 (2012) - [j7]Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2): 184-197 (2012) - 2011
- [j6]Yang Xiao, Daisuke Takahashi, Jing Liu, Hongmei Deng, Jingyuan Zhang:
Wireless telemedicine and m-health: technologies, applications and research issues. Int. J. Sens. Networks 10(4): 202-236 (2011) - [j5]Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:
SensorTrust: A resilient trust model for wireless sensing systems. Pervasive Mob. Comput. 7(4): 509-522 (2011) - [j4]Yang Xiao, Yan Zhang, Michael Nolen, Hongmei Deng, Jingyuan Zhang:
A Cross-Layer Approach for Prioritized Frame Transmissions of MPEG-4 Over the IEEE 802.11 and IEEE 802.11e Wireless Local Area Networks. IEEE Syst. J. 5(4): 474-485 (2011) - [j3]Alina Olteanu, Yang Xiao, Fei Hu, Bo Sun, Hongmei Deng:
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID. Wirel. Commun. Mob. Comput. 11(2): 254-266 (2011) - [j2]Yang Xiao, Hongmei Julia Deng, Youxian Sun, Jiming Chen:
Wireless monitoring and control. Wirel. Commun. Mob. Comput. 11(8): 991-993 (2011) - 2010
- [c5]Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks. EWSN 2010: 65-80
2000 – 2009
- 2009
- [j1]Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng, Jingyuan Zhang:
Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [c4]Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:
SensorTrust: a resilient trust model for WSNs. SenSys 2009: 411-412 - 2007
- [c3]Hongmei Deng, Roger Xu:
Model Selection for Anomaly Detection in Wireless Ad Hoc Networks. CIDM 2007: 540-546 - 2006
- [c2]Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes:
Agent-based Distributed Intrusion Detection Methodology for MANETs. Security and Management 2006: 200-206 - [c1]Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee:
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint