default search action
Sammy Chan
Person information
- affiliation: City University of Hong Kong
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j166]Zhendong Wang, Lili Huang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan:
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization. Ad Hoc Networks 152: 103308 (2024) - [j165]Zhendong Wang, Donghui Dai, Zhiyuan Zeng, Daojing He, Sammy Chan:
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems. Clust. Comput. 27(8): 10671-10715 (2024) - [j164]Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo:
A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. IEEE Internet Things J. 11(2): 2236-2243 (2024) - [j163]Daojing He, Ke Ding, Sammy Chan, Mohsen Guizani:
Unknown Threats Detection Methods of Smart Contracts. IEEE Internet Things J. 11(3): 4430-4441 (2024) - [j162]Daojing He, Hongjie Gu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
A Comprehensive Detection Method for the Lateral Movement Stage of APT Attacks. IEEE Internet Things J. 11(5): 8440-8447 (2024) - [j161]Li Liu, Zhaohui Zheng, Shengchao Zhu, Sammy Chan, Changmao Wu:
Virtual-Mobile-Agent-Assisted Boundary Tracking for Continuous Objects in Underwater Acoustic Sensor Networks. IEEE Internet Things J. 11(5): 9171-9183 (2024) - [j160]Daojing He, Zhiyong Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Special Characters Usage and Its Effect on Password Security. IEEE Internet Things J. 11(11): 19440-19453 (2024) - [j159]Runmeng Du, Daojing He, Zikang Ding, Miao Wang, Sammy Chan, Xuru Li:
GSASG: Global Sparsification With Adaptive Aggregated Stochastic Gradients for Communication-Efficient Federated Learning. IEEE Internet Things J. 11(17): 28253-28266 (2024) - [j158]Zhendong Wang, Weibing Zeng, Shuxin Yang, Daojing He, Sammy Chan:
UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks. IEEE Internet Things J. 11(17): 29001-29019 (2024) - [j157]Guangfu Wu, Haiping Wang, Xin Lai, Mengmeng Wang, Daojing He, Sammy Chan:
A comprehensive survey of smart contract security: State of the art and research directions. J. Netw. Comput. Appl. 226: 103882 (2024) - [j156]Shuaishuai Tan, Daojing He, Sammy Chan, Mohsen Guizani:
FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows. IEEE Netw. 38(4): 268-274 (2024) - [j155]Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu:
Improving byzantine fault tolerance based on stake evaluation and consistent hashing. Peer Peer Netw. Appl. 17(4): 1963-1975 (2024) - [j154]Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan:
A hierarchical hybrid intrusion detection model for industrial internet of things. Peer Peer Netw. Appl. 17(5): 3385-3407 (2024) - [j153]Chi Ho Lau, Fan Yan, Sammy Chan:
On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies. IEEE Trans. Consumer Electron. 70(1): 389-400 (2024) - [j152]Zikang Ding, Daojing He, Qi Qiao, Xuru Li, Yun Gao, Sammy Chan, Kim-Kwang Raymond Choo:
A Lightweight and Secure Communication Protocol for the IoT Environment. IEEE Trans. Dependable Secur. Comput. 21(3): 1050-1067 (2024) - [j151]Shuaishuai Tan, Shui Yu, Wenyin Liu, Daojing He, Sammy Chan:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. IEEE Trans. Dependable Secur. Comput. 21(3): 1210-1223 (2024) - [j150]Daojing He, Xin Lv, Xueqian Xu, Sammy Chan, Kim-Kwang Raymond Choo:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. IEEE Trans. Inf. Forensics Secur. 19: 4741-4751 (2024) - 2023
- [j149]Zhendong Wang, Jingfei Li, Zhenyu Xu, Shuxin Yang, Daojing He, Sammy Chan:
Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection. Int. J. Intell. Syst. 2023: 1-33 (2023) - [j148]Daojing He, Xiaohu Yu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Fuzzy Hashing on Firmwares Images: A Comparative Analysis. IEEE Internet Comput. 27(2): 45-50 (2023) - [j147]Daojing He, Ziming Zhao, Sammy Chan, Mohsen Guizani:
A Novel Authentication Protocol for IoT-Enabled Devices. IEEE Internet Things J. 10(1): 867-876 (2023) - [j146]Daojing He, Rui Wu, Xinji Li, Sammy Chan, Mohsen Guizani:
Detection of Vulnerabilities of Blockchain Smart Contracts. IEEE Internet Things J. 10(14): 12178-12185 (2023) - [j145]Shuaishuai Tan, Wenyin Liu, Qingkuan Dong, Sammy Chan, Shui Yu, Xiaoxiong Zhong, Daojing He:
Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly. IEEE Internet Things J. 10(23): 21000-21012 (2023) - [j144]Daojing He, Jiayu Dai, Hongjie Gu, Shanshan Zhu, Sammy Chan, Jingyong Su, Mohsen Guizani:
A Malicious Domains Detection Method Based on File Sandbox Traffic. IEEE Netw. 37(6): 182-188 (2023) - [j143]Chi Ho Lau, Kai-Hau Yeung, Fan Yan, Sammy Chan:
Blockchain-based authentication and secure communication in IoT networks. Secur. Priv. 6(6) (2023) - [j142]Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. IEEE Trans. Dependable Secur. Comput. 20(2): 1088-1103 (2023) - [j141]Daojing He, Yanchang Cai, Shanshan Zhu, Ziming Zhao, Sammy Chan, Mohsen Guizani:
A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT. IEEE Trans. Wirel. Commun. 22(11): 7862-7872 (2023) - [c41]Chi Ho Lau, Fan Yan, Sammy Chan:
Effectiveness of Authentication Schemes in the Internet of Things Networks with Different Structural Topologies. IWCMC 2023: 1118-1123 - 2022
- [j140]Zhendong Wang, Zeyu Li, Daojing He, Sammy Chan:
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning. Expert Syst. Appl. 206: 117671 (2022) - [j139]Daojing He, Runmeng Du, Shanshan Zhu, Min Zhang, Kaitai Liang, Sammy Chan:
Secure Logistic Regression for Vertical Federated Learning. IEEE Internet Comput. 26(2): 61-68 (2022) - [j138]Daojing He, Xiaohu Yu, Tinghui Li, Sammy Chan, Mohsen Guizani:
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices. IEEE Internet Things J. 9(17): 16438-16445 (2022) - [j137]Daojing He, Xintong Lu, Xuru Li, Sammy Chan, Mohsen Guizani:
Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme. IEEE Internet Things J. 9(19): 19238-19245 (2022) - [j136]Daojing He, Jiayu Dai, Xiaoxia Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Adversarial Attacks for Intrusion Detection Based on Bus Traffic. IEEE Netw. 36(4): 203-209 (2022) - [j135]Daojing He, Xin Lv, Xueqian Xu, Shui Yu, Dawei Li, Sammy Chan, Mohsen Guizani:
An Effective Double-Layer Detection System Against Social Engineering Attacks. IEEE Netw. 36(6): 92-98 (2022) - 2021
- [j134]Guangjie Han, Muhammad Imran, Danda B. Rawat, Sammy Chan, Fatos Xhafa:
IEEE Access Special Section Editorial: Emerging Trends, Issues, and Challenges in Underwater Acoustic Sensor Networks. IEEE Access 9: 5862-5869 (2021) - [j133]Hankun Liu, Daojing He, Sammy Chan:
Fraudulent News Headline Detection with Attention Mechanism. Comput. Intell. Neurosci. 2021: 6679661:1-6679661:7 (2021) - [j132]Zhendong Wang, Yaodi Liu, Daojing He, Sammy Chan:
Intrusion detection methods based on integrated deep learning model. Comput. Secur. 103: 102177 (2021) - [j131]Guisong Yang, Ling Hou, Xingyu He, Daojing He, Sammy Chan, Mohsen Guizani:
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing. IEEE Internet Things J. 8(4): 2483-2493 (2021) - [j130]Daojing He, Beibei Zhou, Hang Yu, Yao Cheng, Sammy Chan, Min Zhang, Nadra Guizani:
Group-based Password Characteristics Analysis. IEEE Netw. 35(1): 311-317 (2021) - [j129]Daojing He, Guang Yang, Hongyi Li, Sammy Chan, Yao Cheng, Nadra Guizani:
An Effective Countermeasure Against UAV Swarm Attack. IEEE Netw. 35(1): 380-385 (2021) - [j128]Daojing He, Yun Gao, Xiaoxia Liu, Sammy Chan, Yao Cheng, Xiaowen Liu, Baokang Zhao, Nadra Guizani:
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems. IEEE Netw. 35(4): 234-240 (2021) - [j127]Daojing He, Hang Yu, Beibei Zhou, Shanshan Zhu, Min Zhang, Sammy Chan, Mohsen Guizani:
How Does Social Behavior Affect Your Password? IEEE Netw. 35(5): 284-289 (2021) - [j126]Zhendong Wang, Zhenyu Xu, Daojing He, Sammy Chan:
Deep logarithmic neural network for Internet intrusion detection. Soft Comput. 25(15): 10129-10152 (2021) - [c40]Yan Song, Binbin Wang, Xiaohu Yu, Tinghui Li, Shanshan Zhu, Daojing He, Guisong Yang, Sammy Chan:
Review of Firmware Homology Detection: a System Aspect. DSC 2021: 556-563 - [c39]Litong Sun, Runmeng Du, Daojing He, Shanshan Zhu, Rui Wang, Sammy Chan:
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning. HPCC/DSS/SmartCity/DependSys 2021: 487-494 - [c38]Menghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao:
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments. ISCC 2021: 1-7 - 2020
- [j125]Guangfu Wu, Yijie Lv, Daojing He, Jiguang He, Huan Zhou, Sammy Chan:
Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory. IEEE Access 8: 26764-26772 (2020) - [j124]Gangyong Jia, Yujie Zhu, Guangjie Han, Sammy Chan, Lei Shu:
STC: an intelligent trash can system based on both NB-IoT and edge computing for smart cities. Enterp. Inf. Syst. 14(9-10): 1422-1438 (2020) - [j123]Hao Wang, Guangjie Han, Chunsheng Zhu, Sammy Chan, Wenbo Zhang:
TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities. Future Gener. Comput. Syst. 107: 965-974 (2020) - [j122]Guisong Yang, Ling Hou, Hao Cheng, Xingyu He, Daojing He, Sammy Chan:
Computation offloading time optimisation via Q-learning in opportunistic edge computing. IET Commun. 14(21): 3898-3906 (2020) - [j121]Jun Li, Xingyu He, Dan Zhao, Guisong Yang, Daojing He, Sammy Chan:
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks. IET Networks 9(6): 372-377 (2020) - [j120]Guangjie Han, Haofei Guan, Zeren Zhou, Zhifan Li, Sammy Chan, Wenbo Zhang:
CTRA: A complex terrain region-avoidance charging algorithm in Smart World. J. Netw. Comput. Appl. 151 (2020) - [j119]Daojing He, Qi Qiao, Jiahao Gao, Sammy Chan, Kangfeng Zheng, Nadra Guizani:
Simulation Design for Security Testing of Integrated Electronic Systems. IEEE Netw. 34(1): 159-165 (2020) - [j118]Daojing He, Xiaoxia Liu, Jiajia Zheng, Sammy Chan, Sencun Zhu, Weidong Min, Nadra Guizani:
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems. IEEE Netw. 34(4): 173-179 (2020) - [j117]Daojing He, Beibei Zhou, Xiao Yang, Sammy Chan, Yao Cheng, Nadra Guizani:
Group Password Strength Meter Based on Attention Mechanism. IEEE Netw. 34(4): 196-202 (2020) - [j116]Daojing He, Menghan Pan, Kai Hong, Yao Cheng, Sammy Chan, Xiaowen Liu, Nadra Guizani:
Fake Review Detection Based on PU Learning and Behavior Density. IEEE Netw. 34(4): 298-303 (2020) - [j115]Daojing He, Zhi Deng, Yuxing Zhang, Sammy Chan, Yao Cheng, Nadra Guizani:
Smart Contract Vulnerability Analysis and Security Audit. IEEE Netw. 34(5): 276-282 (2020) - [j114]Daojing He, Yuxing Zhang, Tinghui Li, Sammy Chan, Yao Cheng, Nadra Guizani:
Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras. IEEE Netw. 34(5): 315-321 (2020) - [j113]Daojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, Nadra Guizani:
Security Analysis of Cryptocurrency Wallets in Android-Based Applications. IEEE Netw. 34(6): 114-119 (2020) - [c37]Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, Yao Cheng:
Android-based Cryptocurrency Wallets: Attacks and Countermeasures. Blockchain 2020: 9-16 - [c36]Qi Qiao, Daojing He, Yun Gao, Sencun Zhu, Jiahao Gao, Sammy Chan:
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems. SECON 2020: 1-9 - [c35]Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan:
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems. SRDS 2020: 205-214
2010 – 2019
- 2019
- [j112]Zhendong Wang, Huamao Xie, Daojing He, Sammy Chan:
Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms. IEEE Access 7: 180590-180608 (2019) - [j111]Gangyong Jia, Guangjie Han, Jiaxin Du, Sammy Chan:
A Maximum Cache Value Policy in Hybrid Memory-Based Edge Computing for Mobile Devices. IEEE Internet Things J. 6(3): 4401-4410 (2019) - [j110]Li Liu, Sammy Chan, Guangjie Han, Mohsen Guizani, Masaki Bandai:
Performance Modeling of Representative Load Sharing Schemes for Clustered Servers in Multiaccess Edge Computing. IEEE Internet Things J. 6(3): 4880-4888 (2019) - [j109]Daojing He, Hong Liu, Sammy Chan, Mohsen Guizani:
How to Govern the Non-Cooperative Amateur Drones? IEEE Netw. 33(3): 184-189 (2019) - [j108]Guangjie Han, Xuan Yang, Li Liu, Sammy Chan, Wenbo Zhang:
A Coverage-Aware Hierarchical Charging Algorithm in Wireless Rechargeable Sensor Networks. IEEE Netw. 33(4): 201-207 (2019) - [j107]Gangyong Jia, Guangjie Han, Jiaxin Du, Sammy Chan:
PMS: Intelligent Pollution Monitoring System Based on the Industrial Internet of Things for a Healthier City. IEEE Netw. 33(5): 34-40 (2019) - [j106]Daojing He, Qi Qiao, Yun Gao, Jiajia Zheng, Sammy Chan, Jinxiang Li, Nadra Guizani:
Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems. IEEE Netw. 33(6): 64-69 (2019) - [j105]Guangjie Han, Haofei Guan, Jiawei Wu, Sammy Chan, Lei Shu, Wenbo Zhang:
An Uneven Cluster-Based Mobile Charging Algorithm for Wireless Rechargeable Sensor Networks. IEEE Syst. J. 13(4): 3747-3758 (2019) - [j104]Hao Wang, Guangjie Han, Wenbo Zhang, Mohsen Guizani, Sammy Chan:
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 68(6): 5917-5927 (2019) - 2018
- [j103]Guangjie Han, Li Liu, Wenbo Zhang, Sammy Chan:
A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities. IEEE Commun. Mag. 56(1): 92-98 (2018) - [j102]Daojing He, Sammy Chan, Yinrong Qiao, Nadra Guizani:
Imminent Communication Security for Smart Communities. IEEE Commun. Mag. 56(1): 99-103 (2018) - [j101]Li Liu, Guangjie Han, Sammy Chan, Mohsen Guizani:
An SNR-Assured Anti-Jamming Routing Protocol for Reliable Communication in Industrial Wireless Sensor Networks. IEEE Commun. Mag. 56(2): 23-29 (2018) - [j100]Guangjie Han, Mohsen Guizani, Jaime Lloret, Sammy Chan, Liangtian Wan, Wael Guibène:
Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 2. IEEE Commun. Mag. 56(2): 76-77 (2018) - [j99]Guangjie Han, Mohsen Guizani, Jaime Lloret, Sammy Chan, Liangtian Wan, Wael Guibène:
Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 3. IEEE Commun. Mag. 56(3): 126-127 (2018) - [j98]Daojing He, Ran Ye, Sammy Chan, Mohsen Guizani, Yanping Xu:
Privacy in the Internet of Things for Smart Healthcare. IEEE Commun. Mag. 56(4): 38-44 (2018) - [j97]Daojing He, Yinrong Qiao, Sammy Chan, Nadra Guizani:
Flight Security and Safety of Drones in Airborne Fog Computing Systems. IEEE Commun. Mag. 56(5): 66-71 (2018) - [j96]Daojing He, Sammy Chan, Mohsen Guizani:
Security in the Internet of Things Supported by Mobile Edge Computing. IEEE Commun. Mag. 56(8): 56-61 (2018) - [j95]Guangjie Han, Hao Wang, Jinfang Jiang, Wenbo Zhang, Sammy Chan:
CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT. IEEE Commun. Mag. 56(9): 42-47 (2018) - [j94]Guangjie Han, Lina Zhou, Hao Wang, Wenbo Zhang, Sammy Chan:
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Gener. Comput. Syst. 82: 689-697 (2018) - [j93]Daojing He, Sammy Chan, Mohsen Guizani:
Privacy-friendly and efficient secure communication framework for V2G networks. IET Commun. 12(3): 304-309 (2018) - [j92]Daojing He, Xuru Li, Sammy Chan, Jiahao Gao, Mohsen Guizani:
Security Analysis of a Space-Based Wireless Network. IEEE Netw. 33(1): 36-43 (2018) - [j91]Gangyong Jia, Guangjie Han, Jinfang Jiang, Sammy Chan, Yuxin Liu:
Dynamic cloud resource management for efficient media applications in mobile computing environments. Pers. Ubiquitous Comput. 22(3): 561-573 (2018) - [j90]Guangjie Han, Hao Wang, Mohsen Guizani, Sammy Chan, Wenbo Zhang:
KCLP: A k-Means Cluster-Based Location Privacy Protection Scheme in WSNs for IoT. IEEE Wirel. Commun. 25(6): 84-90 (2018) - 2017
- [j89]Guangjie Han, Li Liu, Sammy Chan, Ruiyun Yu, Yu Yang:
HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint. IEEE Commun. Mag. 55(3): 93-99 (2017) - [j88]Jinfang Jiang, Guangjie Han, Chunsheng Zhu, Sammy Chan, Joel J. P. C. Rodrigues:
A Trust Cloud Model for Underwater Wireless Sensor Networks. IEEE Commun. Mag. 55(3): 110-116 (2017) - [j87]Daojing He, Sammy Chan, Mohsen Guizani:
Drone-Assisted Public Safety Networks: The Security Aspect. IEEE Commun. Mag. 55(8): 218-223 (2017) - [j86]Guangjie Han, Mohsen Guizani, Jaime Lloret, Sammy Chan, Liangtian Wan, Wael Guibène:
Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities. IEEE Commun. Mag. 55(12): 16-17 (2017) - [j85]Shengda Tang, Liansheng Tan, Sammy Chan:
On blocking time in multi-class optical burst switching nodes. Int. J. Commun. Syst. 30(6) (2017) - [j84]Daojing He, Sammy Chan, Xiejun Ni, Mohsen Guizani:
Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation. IEEE Internet Things J. 4(6): 1890-1898 (2017) - [j83]Daojing He, Sammy Chan, Mohsen Guizani:
Win-Win Security Approaches for Smart Grid Communications Networks. IEEE Netw. 31(6): 122-128 (2017) - [j82]Jinfang Jiang, Guangjie Han, Lei Shu, Sammy Chan, Kun Wang:
A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks. IEEE Trans. Ind. Informatics 13(1): 342-350 (2017) - [j81]Daojing He, Sammy Chan, Mohsen Guizani:
Communication Security of Unmanned Aerial Vehicles. IEEE Wirel. Commun. 24(4): 134-139 (2017) - [j80]Aohan Li, Guangjie Han, Joel J. P. C. Rodrigues, Sammy Chan:
Channel Hopping Protocols for Dynamic Spectrum Management in 5G Technology. IEEE Wirel. Commun. 24(5): 102-109 (2017) - [j79]Daojing He, Sammy Chan, Mohsen Guizani:
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring. IEEE Wirel. Commun. 24(6): 98-103 (2017) - [c34]Sammy Chan:
A MAC Protocol for Full Duplex Cellular Networks. ANT/SEIT 2017: 140-147 - 2016
- [j78]Daojing He, Sammy Chan, Mohsen Guizani:
Securing software defined wireless networks. IEEE Commun. Mag. 54(1): 20-25 (2016) - [j77]Guangjie Han, Mohsen Guizani, Jaime Lloret, Hongyi Wu, Sammy Chan, Ammar Rayes:
Recent advances in green industrial networking [Guest Editorial]. IEEE Commun. Mag. 54(10): 14-15 (2016) - [j76]Guangjie Han, Lei Shu, Sammy Chan, Jiankun Hu:
Security and privacy in Internet of things: methods, architectures, and solutions. Secur. Commun. Networks 9(15): 2641-2642 (2016) - [j75]Liangtian Wan, Guangjie Han, Lei Shu, Sammy Chan, Naixing Feng:
PD Source Diagnosis and Localization in Industrial High-Voltage Insulation System via Multimodal Joint Sparse Representation. IEEE Trans. Ind. Electron. 63(4): 2506-2516 (2016) - [j74]Liangtian Wan, Guangjie Han, Lei Shu, Sammy Chan, Tong Zhu:
The Application of DOA Estimation Approach in Patient Tracking Systems with High Patient Density. IEEE Trans. Ind. Informatics 12(6): 2353-2364 (2016) - [j73]Daojing He, Sammy Chan, Mohsen Guizani:
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks. IEEE Trans. Veh. Technol. 65(3): 1605-1614 (2016) - [j72]Mingrui Zou, Sammy Chan, Hai Le Vu, Li Ping:
Throughput Improvement of 802.11 Networks Via Randomization of Transmission Power Levels. IEEE Trans. Veh. Technol. 65(4): 2703-2714 (2016) - [c33]Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad:
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. ACNS 2016: 212-227 - [c32]Hao Wang, Guangjie Han, Chunsheng Zhu, Sammy Chan:
PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks. RFIDSec 2016: 17-29 - 2015
- [j71]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part 1 [Guest Editorial]. IEEE Commun. Mag. 53(4): 18-19 (2015) - [j70]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part II [Guest Editorial]. IEEE Commun. Mag. 53(8): 40-41 (2015) - [j69]Daojing He, Sammy Chan, Mohsen Guizani:
Privacy and incentive mechanisms in people-centric sensing networks. IEEE Commun. Mag. 53(10): 200-206 (2015) - [j68]Haifeng Zhou, Liansheng Tan, Fei Ge, Sammy Chan:
Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model. Int. J. Commun. Syst. 28(10): 1709-1728 (2015) - [j67]Daojing He, Sammy Chan, Mohsen Guizani:
Handover authentication for mobile networks: security and efficiency aspects. IEEE Netw. 29(3): 96-103 (2015) - [j66]Daojing He, Sammy Chan, Mohsen Guizani, Haomiao Yang, Boyang Zhou:
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 1129-1139 (2015) - [j65]Daojing He, Sammy Chan, Mohsen Guizani:
Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 14(1): 389-398 (2015) - [j64]Daojing He, Sammy Chan, Mohsen Guizani:
User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1): 28-34 (2015) - [j63]Daojing He, Sammy Chan, Mohsen Guizani:
Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22(1): 138-144 (2015) - [c31]Depeng Chen, Daojing He, Sammy Chan:
Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks. ICICS 2015: 421-435 - 2014
- [j62]Daojing He, Sammy Chan, Yan Zhang, Chunming Wu, Bing Wang:
How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway? IEEE Intell. Syst. 29(5): 14-21 (2014) - [j61]Gang Peng, Sammy Chan, Xueyuan Su:
An efficient reputation-based system for wireless ad hoc networks. Int. J. Auton. Adapt. Commun. Syst. 7(3): 196-210 (2014) - [j60]Fan Li, Jinsheng Sun, Moshe Zukerman, Zhengfei Liu, Qin Xu, Sammy Chan, Guanrong Chen, King-Tim Ko:
A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes. J. Netw. Comput. Appl. 41: 274-299 (2014) - [j59]Daojing He, Sammy Chan, Yan Zhang, Mohsen Guizani, Chun Chen, Jiajun Bu:
An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Netw. 28(1): 10-16 (2014) - [j58]Daojing He, Sammy Chan, Shaohua Tang:
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE J. Biomed. Health Informatics 18(1): 316-326 (2014) - [j57]Daojing He, Sammy Chan, Yan Zhang, Haomiao Yang:
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks. IEEE J. Biomed. Health Informatics 18(2): 440-448 (2014) - [j56]Xueyuan Su, Gang Peng, Sammy Chan:
Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks. IEEE Trans. Parallel Distributed Syst. 25(10): 2638-2647 (2014) - [j55]Daojing He, Sammy Chan, Mohsen Guizani:
Small data dissemination for wireless sensor networks: The security aspect. IEEE Wirel. Commun. 21(3): 110-116 (2014) - [j54]Sammy Chan, Hai Le Vu, Jianqing Liu:
Performance analysis and optimization of best-effort service in IEEE 802.16 networks. Wirel. Commun. Mob. Comput. 14(2): 254-268 (2014) - [c30]Jianqing Liu, Sammy Chan, Xueyuan Su, Hai Le Vu:
Performance Analysis of Contention Based Services with Bulk Transmission in IEEE 802.16 OFDMA Networks. VTC Spring 2014: 1-4 - 2013
- [j53]Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang:
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Commun. Mag. 51(2): 142-150 (2013) - [j52]Daojing He, Chun Chen, Maode Ma, Sammy Chan, Jiajun Bu:
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. Int. J. Commun. Syst. 26(4): 495-504 (2013) - [j51]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Strong roaming authentication technique for wireless and mobile networks. Int. J. Commun. Syst. 26(8): 1028-1037 (2013) - [j50]Chongbin Xu, Li Ping, Peng Wang, Sammy Chan, Xiaokang Lin:
Decentralized Power Control for Random Access with Successive Interference Cancellation. IEEE J. Sel. Areas Commun. 31(11): 2387-2396 (2013) - [j49]Daojing He, Jiajun Bu, Sammy Chan, Chun Chen:
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks. IEEE Trans. Computers 62(3): 616-622 (2013) - [j48]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Laurence T. Yang:
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Trans. Ind. Electron. 60(11): 5348-5354 (2013) - [j47]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Pingxin Zhang:
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks. IEEE J. Biomed. Health Informatics 17(3): 664-674 (2013) - [j46]Daojing He, Sammy Chan, Shaohua Tang, Mohsen Guizani:
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(9): 4638-4646 (2013) - 2012
- [j45]Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang, Mohsen Guizani:
Secure service provision in smart grid communications. IEEE Commun. Mag. 50(8): 53-61 (2012) - [j44]Jinsheng Sun, Sammy Chan, Moshe Zukerman:
IAPI: An intelligent adaptive PI active queue management scheme. Comput. Commun. 35(18): 2281-2293 (2012) - [j43]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks. IEEE Commun. Lett. 16(8): 1270-1273 (2012) - [j42]Daojing He, Sammy Chan, Chun Chen, Jiajun Bu:
Secure and efficient dynamic program update in wireless sensor networks. Secur. Commun. Networks 5(7): 823-830 (2012) - [j41]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Trans. Ind. Electron. 59(11): 4155-4163 (2012) - [j40]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Athanasios V. Vasilakos:
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 16(4): 623-632 (2012) - [j39]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Athanasios V. Vasilakos:
A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 16(6): 1164-1175 (2012) - [j38]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions. IEEE Trans. Wirel. Commun. 11(1): 48-53 (2012) - [j37]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 11(5): 1946-1956 (2012) - [j36]Jianqing Liu, Sammy Chan, Hai Le Vu:
Performance Modeling of Broadcast Polling in IEEE 802.16 Networks with Finite-Buffered Subscriber Stations. IEEE Trans. Wirel. Commun. 11(12): 4514-4523 (2012) - [c29]Chongbin Xu, Peng Wang, Sammy Chan, Li Ping:
Decentralized power control for random access with iterative multi-user detection. ISTC 2012: 11-15 - 2011
- [j35]Fei Ge, Sammy Chan, Lachlan L. H. Andrew, Fan Li, Liansheng Tan, Moshe Zukerman:
Performance effects of two-way FAST TCP. Comput. Networks 55(13): 2976-2984 (2011) - [j34]Chun Chen, Daojing He, Sammy Chan, Jiajun Bu, Yi Gao, Rong Fan:
Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3): 347-362 (2011) - [j33]Daojing He, Jiajun Bu, Sammy Chan, Chun Chen, Mingjian Yin:
Privacy-Preserving Universal Authentication Protocol for Wireless Communications. IEEE Trans. Wirel. Commun. 10(2): 431-436 (2011) - [j32]Daojing He, Jiajun Bu, Sencun Zhu, Sammy Chan, Chun Chen:
Distributed Access Control with Privacy Support in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 10(10): 3472-3481 (2011) - [j31]Daojing He, Caixia Chi, Sammy Chan, Chun Chen, Jiajun Bu, Mingjian Yin:
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks. Wirel. Pers. Commun. 59(2): 361-373 (2011) - [j30]Daojing He, Sammy Chan, Chun Chen, Jiajun Bu, Rong Fan:
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 61(2): 465-476 (2011) - [c28]Xueyuan Su, Gang Peng, Sammy Chan:
FORBID: Cope with Byzantine Behaviors in Wireless Multi-Path Routing and Forwarding. GLOBECOM 2011: 1-6 - [c27]Xueyuan Su, Sammy Chan:
High-Throughput Routing with Superposition Coding and Successive Interference Cancellation. ICC 2011: 1-6 - [c26]Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan, Chun Chen:
Distributed privacy-preserving access control in a single-owner multi-user sensor network. INFOCOM 2011: 331-335 - [c25]Jianqing Liu, Sammy Chan, Hai Le Vu:
Performance modelling of broadcast polling protocol in unsaturated IEEE 802.16 networks. LCN 2011: 179-182 - [c24]Mingrui Zou, Sammy Chan, Hai Le Vu, Chongbin Xu, Li Ping:
Optimal throughput for 802.11 DCF with multiple packet reception. LCN 2011: 597-603 - 2010
- [j29]Daojing He, Yi Gao, Sammy Chan, Chun Chen, Jiajun Bu:
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 10(4): 361-371 (2010) - [j28]Xueyuan Su, Sammy Chan, Jonathan H. Manton:
Bandwidth allocation in wireless ad hoc networks: Challenges and prospects. IEEE Commun. Mag. 48(1): 80-85 (2010) - [j27]Yan Wang, Moshe Zukerman, Ron Addie, Sammy Chan, Richard J. Harris:
A priority-based processor sharing model for TDM passive optical networks. IEEE J. Sel. Areas Commun. 28(6): 863-874 (2010) - [j26]Hai Le Vu, Sammy Chan, Lachlan L. H. Andrew:
Performance Analysis of Best-Effort Service in Saturated IEEE 802.16 Networks. IEEE Trans. Veh. Technol. 59(1): 460-472 (2010) - [c23]Daojing He, Sammy Chan:
A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network. NBiS 2010: 305-312
2000 – 2009
- 2009
- [j25]Xueyuan Su, Sammy Chan, Gang Peng:
Auction in multi-path multi-hop routing. IEEE Commun. Lett. 13(2): 154-156 (2009) - [j24]Liansheng Tan, Peng Yang, Sammy Chan:
Error-aware and energy-efficient routing approach in MANETs. Int. J. Commun. Syst. 22(1): 37-51 (2009) - [c22]Xueyuan Su, Sammy Chan, Gang Peng:
Generalized Second Price Auction in Multi-Path Routing with Selfish Nodes. GLOBECOM 2009: 1-6 - 2008
- [j23]Jun Guo, Eric Wing Ming Wong, Sammy Chan, Peter G. Taylor, Moshe Zukerman, Kit-Sang Tang:
Combination Load Balancing for Video-on-Demand Systems. IEEE Trans. Circuits Syst. Video Technol. 18(7): 937-948 (2008) - [j22]Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric W. M. Wong, Peter G. Taylor, Moshe Zukerman:
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System. IEEE Trans. Knowl. Data Eng. 20(6): 836-850 (2008) - [j21]Jun Guo, Eric Wing Ming Wong, Sammy Chan, Peter G. Taylor, Moshe Zukerman, Kit-Sang Tang:
Performance Analysis of Resource Selection Schemes for a Large Scale Video-on-Demand System. IEEE Trans. Multim. 10(1): 153-159 (2008) - [c21]Yan Wang, Sammy Chan, Moshe Zukerman, Richard J. Harris:
Priority-Based fair Scheduling for Multimedia WiMAX Uplink Traffic. ICC 2008: 301-305 - [c20]Qian Huang, King-Tim Ko, Sammy Chan, Villy Bæk Iversen:
Loss performance evaluation in heterogeneous hierarchical networks. Mobility Conference 2008: 16 - [c19]Hai Le Vu, Sammy Chan:
Delay Model for Saturated IEEE 802.16 Networks. NTMS 2008: 1-5 - [c18]Hai Le Vu, Sammy Chan:
Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism. NTMS 2008: 1-5 - 2007
- [j20]Jinsheng Sun, Sammy Chan, King-Tim Ko, Guanrong Chen, Moshe Zukerman:
Instability effects of two-way traffic in a TCP/AQM system. Comput. Commun. 30(10): 2172-2179 (2007) - [j19]Qian Huang, Sammy Chan, Li Ping, King-Tim Ko:
Performance of Hybrid ARQ Using Trellis-Coded Modulation Over Rayleigh Fading Channel. IEEE Trans. Veh. Technol. 56(5): 2784-2790 (2007) - [j18]Qian Huang, Sammy Chan, Li Ping, Moshe Zukerman:
Improving Wireless TCP Throughput by a Novel TCM-Based Hybrid ARQ. IEEE Trans. Wirel. Commun. 6(7): 2476-2485 (2007) - [c17]Xueyuan Su, Sammy Chan, King Sun Chan:
RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks. ICC 2007: 4759-4766 - [c16]Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, Peng Wang:
A QoS Architecture for IDMA-Based Multi-Service Wireless Networks. ICC 2007: 5070-5075 - [c15]Liansheng Tan, Peng Yang, Sammy Chan:
An Error-aware and Energy Efficient Routing Protocol in MANETs. ICCCN 2007: 724-729 - 2006
- [j17]Liansheng Tan, Xiaomei Zhang, Lachlan L. H. Andrew, Sammy Chan, Moshe Zukerman:
Price-based max-min fair rate allocation in wireless multi-hop networks. IEEE Commun. Lett. 10(1): 31-33 (2006) - [j16]Lachlan L. H. Andrew, Stephen V. Hanly, Sammy Chan, Tony Cui:
Adaptive Deterministic Packet Marking. IEEE Commun. Lett. 10(11): 790-792 (2006) - [j15]King Sun Chan, Sammy Chan, King-Tim Ko:
A data link control protocol for broadband wireless networks with adaptive coding rate. Int. J. Commun. Syst. 19(8): 845-860 (2006) - [c14]Xueyuan Su, Sammy Chan:
Max-min Fair Rate Allocation in Multi-hop Wireless Ad Hoc Networks. MASS 2006: 513-516 - 2005
- [j14]Lachlan L. H. Andrew, Tony Cui, Jinsheng Sun, Moshe Zukerman, King-Tim Ko, Sammy Chan:
Buffer sizing for nonhomogeneous TCP sources. IEEE Commun. Lett. 9(6): 567-569 (2005) - [j13]Qian Huang, Sammy Chan, Li Ping, King-Tim Ko, Moshe Zukerman:
A hybrid ARQ scheme based on CT-TCM codes. IEEE Commun. Lett. 9(7): 664-666 (2005) - [c13]Eric W. M. Wong, Michael Y. M. Chiu, Moshe Zukerman, Zvi Rosberg, Sammy Chan, Andrew Zalesky:
A novel method for modeling and analysis of distributed video on demand systems. ICC 2005: 88-92 - 2004
- [j12]Qian Huang, Sammy Chan, King-Tim Ko, Moshe Zukerman:
An enhanced handoff control scheme for multimedia traffic in cellular networks. IEEE Commun. Lett. 8(3): 195-197 (2004) - [j11]Wallace Kit-Sang Tang, Eric Wing Ming Wong, Sammy Chan, King-Tim Ko:
Optimal video placement scheme for batching VOD services. IEEE Trans. Broadcast. 50(1): 16-25 (2004) - [c12]Yi Li, King-Tim Ko, Guanrong Chen, Jinsheng Sun, Sammy Chan:
Designing a stable and effective PD-control AQM. ICARCV 2004: 579-584 - [c11]Jun Guo, Peter G. Taylor, Eric Wing Ming Wong, Sammy Chan, Moshe Zukerman, Kit-Sang Tang:
Performance benchmarks for an interactive video-on-demand system. ICC 2004: 2189-2193 - [c10]Jinsheng Sun, Moshe Zukerman, King-Tim Ko, Guanrong Chen, Sammy Chan:
Effect of Large Buffers on TCP Queueing Behavior. INFOCOM 2004: 751-761 - 2003
- [j10]Jinsheng Sun, King-Tim Ko, Guanrong Chen, Sammy Chan, Moshe Zukerman:
PD-RED: to improve the performance of RED. IEEE Commun. Lett. 7(8): 406-408 (2003) - [c9]Jinsheng Sun, Guanrong Chen, King-Tim Ko, Sammy Chan, Moshe Zukerman:
PD-controller: a new active queue management scheme. GLOBECOM 2003: 3103-3107 - [c8]Jun Guo, Peter G. Taylor, Moshe Zukerman, Sammy Chan, Kit-Sang Tang, Eric W. M. Wong:
On the efficient use of video-on-demand storage facility. ICME 2003: 329-332 - 2002
- [j9]Sammy Chan, Moshe Zukerman:
Is max-min fairness achievable in the presence of insubordinate users? IEEE Commun. Lett. 6(3): 120-122 (2002) - [j8]Sammy Chan, Moshe Zukerman, Eric W. M. Wong, King-Tim Ko, Edmund Yeung, Bartek P. Wydrowski:
A congestion control framework for available bit rate service in ATM networks. Int. J. Commun. Syst. 15(4): 341-357 (2002) - [j7]King Sun Chan, Sammy Chan, King-Tim Ko:
Fault tolerance in Clos-Knockout multicast ATM switch. Int. J. Commun. Syst. 15(9): 783-798 (2002) - [c7]Qian Huang, Hui-Min Chen, King-Tim Ko, Sammy Chan, King Sun Chan:
Call Admission Control for 3G CDMA Networks with Differentiated QoS. NETWORKING 2002: 636-647 - 2001
- [j6]Kit-Sang Tang, King-Tim Ko, Sammy Chan, Eric W. M. Wong:
Optimal file placement in VOD system using genetic algorithm. IEEE Trans. Ind. Electron. 48(5): 891-897 (2001) - 2000
- [j5]King Sun Chan, Sammy Chan, King-Tim Ko, Kwan Lawrence Yeung, Eric W. M. Wong:
A refined model for performance analysis of output-buffered Banyan networks. Telecommun. Syst. 13(2-4): 393-411 (2000) - [j4]King Sun Chan, Sammy Chan, King-Tim Ko, Kwan L. Yeung, Eric W. M. Wong:
An efficient handoff management scheme for mobile wireless ATM networks. IEEE Trans. Veh. Technol. 49(3): 799-816 (2000) - [c6]Sammy Chan, Moshe Zukerman:
A New Max-Min Fairness Definition to Neutralize Malicious Users. ICC (3) 2000: 1310-1314
1990 – 1999
- 1998
- [j3]King Sun Chan, Sammy Chan, Kwan L. Yeung:
Design of wide-sense nonblocking multicast ATM switches. IEEE Commun. Lett. 2(5): 146-148 (1998) - [c5]Li Ping, Sammy Chan, Kwan L. Yeung:
Iterative decoding of multi-dimensional concatenated single parity check codes. ICC 1998: 131-135 - [c4]Li Ping, Sammy Chan:
Iterative decoding of concatenated Hadamard codes. ICC 1998: 136-140 - [c3]Sammy Chan, Moshe Zukerman, Eric W. M. Wong, King-Tim Ko, Edmund Yeung:
Achieving fair and high packet-level throughput in ABR service. ICC 1998: 635-639 - 1997
- [j2]Sammy Chan, Eric W. M. Wong, King-Tim Ko:
Fair packet discarding for controlling ABR traffic in ATM networks. IEEE Trans. Commun. 45(8): 913-916 (1997) - [c2]Li Ping, Sammy Chan, Kwan Lawrence Yeung:
Max-Log-MAP Filtering Algorithm for Decoding Product F24 Code. ICC (3) 1997: 1468-1472 - 1993
- [j1]Moshe Zukerman, Sammy Chan:
Fairness in ATM Networks. Comput. Networks ISDN Syst. 26(1): 109-117 (1993) - 1992
- [c1]Moshe Zukerman, Sammy Chan:
Fairness in Broadband ISDN. INFOCOM 1992: 2241-2250
Coauthor Index
aka: Eric W. M. Wong
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint