default search action
Xiaole Bai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j20]Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu, Dong Xuan:
A mobile phone-based physical-social location proof system for mobile social network service. Secur. Commun. Networks 9(13): 1890-1904 (2016) - 2015
- [j19]Xiaoxia Bian, Pei Wang, Zuoming Yu, Xiaole Bai, Bin Chen:
Characterizations of coverings for upper approximation operators being closure operators. Inf. Sci. 314: 41-54 (2015) - 2014
- [j18]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. IEEE Trans. Computers 63(6): 1422-1433 (2014) - [j17]Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia:
Connected Coverage in Wireless Networks with Directional Antennas. ACM Trans. Sens. Networks 10(3): 51:1-51:28 (2014) - [j16]Jin Teng, Boying Zhang, Xiaole Bai, Zhimin Yang, Dong Xuan:
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks. IEEE Trans. Parallel Distributed Syst. 25(11): 2909-2919 (2014) - 2013
- [j15]Zuoming Yu, Xiaole Bai, Ziqiu Yun:
A study of rough sets based on 1-neighborhood systems. Inf. Sci. 248: 103-113 (2013) - 2012
- [j14]Shushan Zhao, Akshai K. Aggarwal, Richard A. Frost, Xiaole Bai:
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks. IEEE Commun. Surv. Tutorials 14(2): 380-400 (2012) - [j13]Xun Ge, Xiaole Bai, Ziqiu Yun:
Topological characterizations of covering for special covering-based upper approximation operators. Inf. Sci. 204: 70-81 (2012) - [j12]Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia, Wei Zhao:
Pattern mutation in wireless sensor deployment. IEEE/ACM Trans. Netw. 20(6): 1964-1977 (2012) - [c25]Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan:
JSGuard: Shellcode Detection in JavaScript. SecureComm 2012: 112-130 - [c24]Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai:
MPSL: A Mobile Phone-Based Physical-Social Location Verification System. WASA 2012: 488-499 - 2011
- [j11]Changqing Xu, Xiaole Bai, Lei Ding, Jin Teng, Sriram Chellappan, Dong Xuan:
Directed Coverage in Wireless Sensor Networks: Concept and Quality. Ad Hoc Sens. Wirel. Networks 11(3-4): 173-197 (2011) - [j10]Ziqiu Yun, Xun Ge, Xiaole Bai:
Axiomatization and conditions for neighborhoods in a covering to form a partition. Inf. Sci. 181(9): 1735-1740 (2011) - [j9]Wenjun Gu, Sriram Chellappan, Xiaole Bai, Honggang Wang:
Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(4): 1370-1381 (2011) - [j8]Wenjun Gu, Neelanjana Dutta, Sriram Chellappan, Xiaole Bai:
Providing End-to-End Secure Communications in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 8(3): 205-218 (2011) - [c23]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. ICDCS 2011: 909-918 - [c22]Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia:
Connected coverage in wireless networks with directional antennas. INFOCOM 2011: 2264-2272 - [c21]Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, Dong Xuan:
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution. PerCom 2011: 93-101 - 2010
- [j7]Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia:
Constructing low-connectivity and full-coverage three dimensional sensor networks. IEEE J. Sel. Areas Commun. 28(7): 984-993 (2010) - [j6]Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen, Dong Xuan:
Mobile phone-based pervasive fall detection. Pers. Ubiquitous Comput. 14(7): 633-643 (2010) - [j5]Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(3): 435-448 (2010) - [j4]Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks. IEEE/ACM Trans. Netw. 18(3): 934-947 (2010) - [c20]Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan:
Malicious Shellcode Detection with Virtual Memory Snapshots. INFOCOM 2010: 974-982 - [c19]Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia, Wei Zhao:
Pattern Mutation in Wireless Sensor Deployment. INFOCOM 2010: 2480-2488 - [c18]Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen, Dong Xuan:
PerFallD: A pervasive fall detection system using mobile phones. PerCom Workshops 2010: 292-297 - [c17]Jiangpeng Dai, Jin Teng, Xiaole Bai, Zhaohui Shen, Dong Xuan:
Mobile phone based drunk driving detection. PervasiveHealth 2010: 1-8
2000 – 2009
- 2009
- [c16]Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia:
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks. INFOCOM 2009: 388-396 - [c15]Xiaole Bai, Lei Ding, Jin Teng, Changqing Xu, Dong Xuan:
Directed Coverage in Wireless Sensor Networks: Concept and Quality. MASS 2009: 476-485 - [c14]Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, Dong Xuan:
DiffUser: Differentiated User Access Control on Smartphone. MASS 2009: 1012-1017 - [c13]Xiaole Bai, Chuanlin Zhang, Dong Xuan, Jin Teng, Weijia Jia:
Low-connectivity and full-coverage three dimensional wireless sensor networks. MobiHoc 2009: 145-154 - [c12]Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan:
Link-layer protection in 802.11i WLANS with dummy authentication. WISEC 2009: 131-138 - 2008
- [c11]Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma:
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. ACSAC 2008: 433-442 - [c10]Lei Ding, Xiaole Bai:
Adaptive Laplacian eigenfunctions as bases for regression analysis. ICPR 2008: 1-4 - [c9]Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. INFOCOM 2008: 296-300 - [c8]Xiaole Bai, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai, Weijia Jia:
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. MobiHoc 2008: 401-410 - 2007
- [j3]Sriram Chellappan, Wenjun Gu, Xiaole Bai, Dong Xuan, Bin Ma, Kaizhong Zhang:
Deploying Wireless Sensor Networks under Limited Mobility Constraints. IEEE Trans. Mob. Comput. 6(10): 1142-1157 (2007) - [j2]Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan, Changqing Xu:
Mobility Limited Flip-Based Sensor Networks Deployment. IEEE Trans. Parallel Distributed Syst. 18(2): 199-211 (2007) - [j1]Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan, Weijia Jia:
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(12): 1784-1796 (2007) - 2006
- [c7]Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan:
Network Decoupling for Secure Communications in Wireless Sensor Networks. IWQoS 2006: 189-198 - [c6]Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai:
Deploying wireless sensors to achieve both coverage and connectivity. MobiHoc 2006: 131-142 - [c5]Thang Nam Le, Wei Yu, Xiaole Bai, Dong Xuan:
A dynamic geographic hash table for data-centric storage in sensor networks. WCNC 2006: 2168-2174 - 2005
- [c4]Xiaole Bai, Marcin Matuszewski, Shuping Liu, Raimo Kantola:
A Novel Multi-path Routing Protocol. ICCNMC 2005: 732-741 - [c3]Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan:
Sensor networks deployment using flip-based sensors. MASS 2005 - 2004
- [c2]Xiaole Bai, Shuping Liu, Peng Zhang, Raimo Kantola:
ICN: Interest-Based Clustering Network. Peer-to-Peer Computing 2004: 219-226 - 2003
- [c1]Wenpeng Zhou, Peng Zhang, Xiaole Bai, Raimo Kantola:
A QoS Based Routing Algorithm for Multi-class Optimization in DiffServ Networks. HSNMC 2003: 136-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint