


default search action
Qijun Gu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Sudharsan Vaidhun
, Tianning She, Qijun Gu, Sajal K. Das
, Kecheng Yang
, Zhishan Guo
:
Precise Mixed-Criticality Scheduling on Varying-Speed Multiprocessors. IEEE Trans. Computers 72(1): 43-54 (2023) - 2021
- [c34]Sheng Ji, Qijun Gu, Ye Yuan, Peng Zhao, Tao Fang, Hong Huo, Xin Niu:
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Image Feature Extraction. ICVIP 2021: 134-141 - [c33]Tianning She, Zhishan Guo
, Qijun Gu, Kecheng Yang:
Reserving Processors by Precise Scheduling of Mixed-Criticality Tasks. RTCSA 2021: 103-108 - [c32]Tianning She, Sudharsan Vaidhun, Qijun Gu, Sajal K. Das, Zhishan Guo
, Kecheng Yang:
Precise Scheduling of Mixed-Criticality Tasks on Varying-Speed Multiprocessors. RTNS 2021: 134-143 - 2020
- [j15]Zachary P. Languell, Qijun Gu:
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications. J. Comput. Sci. Technol. 35(4): 825-842 (2020)
2010 – 2019
- 2019
- [c31]Qijun Gu, Chunrong Jia
:
A Consumer UAV-based Air Quality Monitoring System for Smart Cities. ICCE 2019: 1-6 - [c30]Zachary P. Languell, Qijun Gu:
Securing ADS-B with Multi-Point Distance-Bounding for UAV Collision Avoidance. MASS 2019: 145-153 - 2018
- [j14]Mina Guirguis
, Qijun Gu, Terry Penner, Lavanya Tammineni, Thomas Langford, Agustin Rivera-Longoria, Alison Johnson, Brandon Van Slyke:
Assignment and collaborative execution of tasks on transient clouds. Ann. des Télécommunications 73(3-4): 251-261 (2018) - [j13]Qijun Gu, Drew R. Michanowicz, Chunrong Jia
:
Developing a Modular Unmanned Aerial Vehicle (UAV) Platform for Air Pollution Profiling. Sensors 18(12): 4363 (2018) - 2017
- [j12]Ziliang Zong, Rong Ge, Qijun Gu:
Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics. Big Data Res. 8: 27-38 (2017) - [c29]Tanner J. Burns, Samuel C. Rios, Thomas K. Jordan, Qijun Gu, Trevor Underwood:
Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education. ASE @ USENIX Security Symposium 2017 - 2016
- [j11]Sobit Bahadur Thapa, Qijun Gu:
Collaborative task execution with originator data security for weak devices. Int. J. Sens. Networks 21(2): 67-81 (2016) - 2015
- [j10]David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng, Meng Yu:
Exploiting and defending trust models in cooperative spectrum sensing. EURASIP J. Wirel. Commun. Netw. 2015: 4 (2015) - [j9]David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu
:
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing. J. Internet Serv. Inf. Secur. 5(2): 4-23 (2015) - [c28]Sarah Abdulsalam, Ziliang Zong, Qijun Gu, Meikang Qiu:
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency. IGSC 2015: 1-8 - 2014
- [c27]Terry Penner, Alison Johnson, Brandon Van Slyke, Mina Guirguis, Qijun Gu:
Transient clouds: Assignment and collaborative execution of tasks on mobile devices. GLOBECOM 2014: 2801-2806 - [c26]Sarah Abdulsalam, Donna Lakomski, Qijun Gu, Tongdan Jin, Ziliang Zong:
Program energy efficiency: The impact of language, compiler and implementation choices. IGCC 2014: 1-6 - [c25]Joal Wood, Ziliang Zong, Qijun Gu, Rong Ge:
Energy and Power Characterization of Parallel Programs Running on Intel Xeon Phi. ICPP Workshops 2014: 265-272 - [c24]Terry Penner, Alison Johnson, Brandon Van Slyke, Mina Guirguis, Qijun Gu:
Demo: Transient clouds. MobiCASE 2014: 153-154 - [c23]David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng:
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing. WASA 2014: 660-671 - 2013
- [c22]Clinton Walker, Qijun Gu, Terry Penner:
Computation integrity in mobile cloud: Running probabilistically checkable proof on Android. CollaborateCom 2013: 599-602 - [c21]Thomas Langford, Qijun Gu, Agustin Rivera-Longoria, Mina Guirguis:
Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs. MASS 2013: 342-350 - [c20]Sobit Bahadur Thapa, Qijun Gu:
Originator Data Security for Collaborative Task Execution among Weak Devices. MASS 2013: 421-422 - 2012
- [c19]Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu:
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. ESORICS 2012: 289-306 - [c18]Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. TrustCom 2012: 793-800 - 2011
- [j8]Qijun Gu, Christopher Ferguson, Rizwan Noorani:
A study of self-propagating mal-packets in sensor networks: Attacks and defenses. Comput. Secur. 30(1): 13-27 (2011) - [j7]Xiao Chen, Qijun Gu, Zhen Jiang, Jie Wu:
Fast mobility control protocols with sink location protection in wireless sensor networks. Int. J. Internet Protoc. Technol. 6(1/2): 3-17 (2011) - [j6]Christopher Ferguson, Qijun Gu:
Self-Healing Control Flow Protection in Sensor Applications. IEEE Trans. Dependable Secur. Comput. 8(4): 602-616 (2011) - [c17]Mina Guirguis, Robert Ogden, Zhaochen Song, Sobit Bahadur Thapa, Qijun Gu:
Can You Help Me Run These Code Segments on Your Mobile Device? GLOBECOM 2011: 1-5 - [c16]Qijun Gu, Meng Yu
, Wanyu Zang, Peng Liu:
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. ICC 2011: 1-6 - [r3]Qijun Gu:
Intrusion Detection in Ad Hoc Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 620-623 - [r2]Qijun Gu:
Packet-Dropping Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 899-902 - [r1]Qijun Gu:
Secure Routing Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1130-1134 - 2010
- [j5]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. Secur. Commun. Networks 3(4): 334-354 (2010) - [c15]Heywoong Kim, Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++. SpringSim 2010: 101 - [c14]Qijun Gu:
Efficient code diversification for network reprogramming in sensor networks. WISEC 2010: 145-150 - [e1]Qijun Gu, Wanyu Zang, Meng Yu:
Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 42, Springer 2010, ISBN 978-3-642-11525-7 [contents]
2000 – 2009
- 2009
- [j4]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu
:
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. IEEE Trans. Dependable Secur. Comput. 6(3): 188-201 (2009) - [c13]Wanyu Zang, Qijun Gu, Meng Yu
, Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253 - [c12]Qijun Gu, Xiao Chen, Zhen Jiang, Jie Wu:
Sink-Anonymity Mobility Control in Wireless Sensor Networks. WiMob 2009: 36-41 - [c11]Christopher Ferguson, Qijun Gu, Hongchi Shi:
Self-healing control flow protection in sensor applications. WISEC 2009: 213-224 - 2008
- [c10]Qijun Gu, Xiao Chen:
Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks. ISPAN 2008: 159-164 - [c9]Qijun Gu, Rizwan Noorani:
Towards self-propagate mal-packets in sensor networks. WISEC 2008: 172-182 - 2007
- [j3]Qijun Gu, Peng Liu, Chao-Hsien Chu
:
Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 5(5): 613-625 (2007) - [j2]Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks. Int. J. Secur. Networks 2(1/2): 154-169 (2007) - [c8]Qijun Gu:
Analysis of Software Vulnerability in Sensor Nodes. Security and Management 2007: 330-336 - [c7]Qijun Gu, Jawad Drissi:
Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. ICNS 2007: 81 - [c6]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: A proactive worm containment solution for enterprise networks. SecureComm 2007: 433-442 - 2006
- [c5]Qijun Gu, Kun Bai, Hai Wang, Peng Liu, Chao-Hsien Chu
:
Modeling of pollution in p2p file sharing systems. CCNC 2006: 1033-1037 - [c4]Jawad Drissi, Qijun Gu:
Localized Broadcast Authentication in Large Sensor Networks. ICNS 2006: 25 - 2005
- [c3]Qijun Gu, Peng Liu, Sencun Zhu, Chao-Hsien Chu
:
Defending against packet injection attacks unreliable ad hoc networks. GLOBECOM 2005: 5 - [c2]Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu
:
KTR: an Efficient Key Management Scheme For Air Access Control. MobiQuitous 2005: 499-501 - 2002
- [j1]Qijun Gu, Danita S. Hill:
Designing a Wireless Network. Parallel Distributed Comput. Pract. 5(2) (2002) - [c1]Chao-Hsien Chu
, Junhua Gu, Xiangdan Hou, Qijun Gu:
A heuristic ant algorithm for solving QoS multicast routing problem. IEEE Congress on Evolutionary Computation 2002: 1630-1635
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint