Selected Publications


Prof. Thomas Hou's Google Scholar Profile

Prof. Wenjing Lou's Google Scholar Profile


2015

Refereed journal papers:

  • X. Yuan, C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, “Toward Transparent Coexistence for Multi-hop Secondary Cognitive Radio Networks,” IEEE Journal on Selected Areas in Communications, 2015. (PDF)
    • Refereed conference papers:

      • Q. Yan, Y. Zheng, T. Jiang, W. Lou, and Y.T. Hou, "PeerClean: Unveiling peer-to-peer Botnets through dynamic group behavior analysis, " IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF) 
      • B. Wang, W. Song, W. Lou, and Y.T. Hou, "Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee,"  IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF) 
      • W. Sun, X. Liu, W. Lou, Y.T. Hou, and H. Li, "Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data," IEEE INFOCOM 2015, Hong Kong, China, April 2015 (Acceptance ratio = 316/1640 = 19%) (PDF) 

      2014

      Book:

      • Y.T Hou, Y. Shi, and H.D. Sherali, Applied Optimization Methods for Wireless Networks, Cambridge University Press, ISBN-13: 978-1107018808, April 2014.
        • Book chapter:

          • W. Sun, W. Lou, Y.T. Hou, and H. Li, "Privacy-preserving keyword search over encrypted data in cloud computing", in Secure Cloud Computing, edited by S. Jajodia et al., Springer, 2014. (PDF)
          • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H.D. Sherali and H. Zhou, "Rechargeable sensor networks with magnetic resonant coupling", in Rechargeable Sensor Networks: Technology, Theory and Application, Chapter 2, pp. 31–68, edited by Jiming Chen, Shibo He, and Youxian Sun, World Scientific Publishing, 2014. ISBN: 978-981-4525-45-9 (hardcover); ISBN: 978-981-4525-47-3 (ebook). (PDF)

          Refereed magazine papers:

          • H. Zeng, Y. Shi, Y.T. Hou, Rongbo Zhu, and W. Lou, “A Novel MIMO DoF Model for Multi-hop Networks”, IEEE Network, vol. 28, issue 5, pp. 81–85, Sept./Oct. 2014. (PDF)
            • Refereed journal papers:

              • Q. Yan, M. Li, F. Chen, T. Jiang, W. Lou, Y.T. Hou, C.-T. Lu, “SpecMonitor: Towards efficient passive traffic monitoring for cognitive radio networks”, IEEE Transactions on Wireless Communications (TWC)
              • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, S. Kompella, “Joint Optimization of Session Grouping and Relay Node Selection for Network-Coded Cooperative Communications”, IEEE Transactions on Mobile Computing, vol. 13, no. 9, pp. 2028–2041, September 2014. (PDF)
              • Y. Shi, J. Liu, C. Jiang, C. Gao, and Y.T. Hou, “A DoF-based link layer model for multi-hop MIMO networks”, IEEE Transactions on Mobile Computing, vol. 13, no. 7, pp. 1395–1408, July 2014. (PDF)
              • J. Li, Y.K. Li, X. Chen, P. P.C. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Transactions on Parallel and Distributed Systems (TPDS). (PDF)
              • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," IEEE Transactions on Parallel and Distributed Systems (TPDS). (PDF)
              • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S. Midkiff, "Multi-node Wireless Energy Charging in Sensor Networks," IEEE/ACM Transactions on Networking. (PDF)
              • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Transactions on Parallel and Distributed Systems (TPDS).(PDF)
              • J. Li, J. Li, C. Jia, X. Chen, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Transactions on Computers (TC). (PDF)
              • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, issue 1, pp. 222-233, Jan 2014. (PDF)

              Refereed conference papers:

              • X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S. F. Midkiff, and S. Kompella, "Achieving transparent coexistence in a multi-hop secondary network through distributed computation," in Proc. IEEE International Performance Computing and Communications Conference (IPCCC 2014), December 5–7, 2014, Austin, TX. (PDF)
              • H. Zeng, Y.T. Hou, Y. Shi, W. Lou, S. Kompella, S. F. Midkiff, "SHARK-IA: An interference alignment algorithm for multi-hop underwater acoustic networks with large propagation delays," in Proc. ACM International Conference on Underwater Networks and Systems (ACM WuWNet'14), Nov. 12–14, 2014, Rome, Italy. (PDF) (BEST STUDENT PAPER AWARD)
              • N. Zhang, W. Lou, X. Jiang, and Y.T. Hou, "Enabling trusted data-intensive execution in cloud computing," 2nd IEEE Conference on Communications and Network Security (IEEE CNS 2014), Oct 29-31, 2014, San Francisco, CA. (PDF)
              • X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates", 19th European Symposium on Research in Computer Security (ESORICS 2014), Sep 7-11, 2014, Wroclaw, Poland. (PDF)
              • L. Liu, X. Chen, and W. Lou, "A secure three-party computational protocol for triangle area," 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Wollongong, Australia, July 7-9, 2014. (BEST STUDENT PAPER AWARD)
              • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, X. Yuan, R. Zhu, and J. Cao, "Increasing user throughput in cellular networks with interference alignment," in Proc. IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2014), June 30–July 3, 2014, Singapore. (PDF)
              • H. Nie, X. Chen, J. Li, J. Liu, and W. Lou, “Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming,” The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.
              • B. Wang, S. Yu, W. Lou, and Y.T. Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)
              • W. Sun, S. Yu, W. Lou, Y.T. Hou, and H. Li, “Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)
              • Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y.T. Hou, “MIMO-based Jamming Resilient Communication in Wireless Networks,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)
              • Y. Hou, M. Li, X. Yuan, Y.T. Hou, and W. Lou, “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks,” IEEE INFOCOM 2014, Toronto, Canada, April 2014 (Acceptance ratio = 320/1645 = 19%) (PDF)

              2013

              Refereed magazine papers:

              • M. Li, S. Yu, K. Ren, W. Lou, and Y.T. Hou, “Toward privacy-assured and searchable cloud data storage services,” IEEE Networks, vol. 27, issue 4, pp. 55-62, July/August 2013. (PDF)
              • L. Xie, Y. Shi, Y.T. Hou, and W. Lou, “Wireless Power Transfer and Applications to Sensor Networks,” IEEE Wireless Communications, vol. 20, issue 4, pp.140-145, August 2013. (PDF)

              Refereed journal papers:

              • L. Xiao, Q. Yan, W. Lou, G. Chen, and Y.T. Hou, " Proximity-based security techniques for mobile users in wireless networks," IEEE Transactions on Information Forensics & Security (TIFS), vol. 8, No. 12, pp.2089-2100, Dec 2013.(PDF)
              • C. Jiang, Y. Shi, Y.T. Hou, S. Kompella, and S.F. Midkiff, "Bicriteria optimization in multi-hop wireless networks: Characterizing the throughput-energy envelope," IEEE Transactions on Mobile Computing (TMC), vol. 12, no. 9, pp. 1866-1878, Sept. 2013. (PDF)
              • Y. Shi, Y.T. Hou, J. Liu, and S. Kompella, "Bridging the gap between protocol and physical models for wireless networks," IEEE Transactions on Mobile Computing (TMC), vol, 12, issue 7, pp. 1404-1416, July 2013. (PDF)
              • M. Li, S. Yu, N. Cao, and W. Lou, “Privacy-preserving distributed profile matching in proximity-based mobile social networks,” IEEE Transactions on Wireless Communications (TWC), vol. 12, issue 5, pp. 2024-2033, May 2013. (PDF)
              • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, and H. Sherali, "Throughput maximization for multi-hop wireless networks with network-wide energy constraint," IEEE Transactions on Wireless Communications (TWC), vol. 12, issue 3, pp. 1255-1267, March 2013. (PDF)
              • M. Li, S. Yu, J. Guttman, W. Lou and K. Ren, "Secure ad-hoc trust initialization and key management in wireless body area networks," to appear in ACM Transactions on Sensor Networks (ToSN), vol.9, issue 2, March 2013. (PDF)
              • C. Wang, S. Chow, Q. Wang, K. Ren, W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computing (TC), vol.62, no.2, pp.362-375, Feb. 2013. (PDF)
              • M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption”,  IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 24, no.1, pp. 131-143, Jan. 2013. (PDF)

              Refereed conference papers:

              • X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, "UPS: A united cooperative paradigm for primary and secondary networks," The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), October 14-16, Hangzhou, Zhejiang, P.R.C. (PDF)
              • X. Qin, X. Yuan, Y. Shi, Y.T. Hou, W. Lou, S.F. Midkiff, "On throughput maximization in a multi-hop MIMO ad hoc networks," The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), October 14-16, Hangzhou, Zhejiang, P.R.C. (PDF)
              • J. Li, X. Chen, J. Li, C, Jia, J. Ma, and W. Lou, "Fine-grained access control system based on outsourced attribute-based encryption", 18th European Symposium on Research in Computer Security ( ESORICS 2013 ), Sep 9-13, 2013, Egham, U.K. (Acceptance rate = 43/242 = 18%) (PDF)
              • L. Xie, Y. Shi, Y.T. Hou, W. Lou, and H.D. Sherali, "On traveling path and related problems for a mobile station in a rechargeable sensor network," in ACM MobiHoc 2013, Bangalore, India, July 29 - August 1, 2013 (Acceptance ratio = 24/234 = 10%) (PDF)
              • X. Yuan, C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, "Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks," IEEE SECON 2013,  New Orleans, LA, USA, June 24-27, 2013. (PDF)
              • L. Xiao, Q. Yan, W. Lou, Y.T. Hou, “Proximity-based security using ambient radio signals”, IEEE International Conference on Communications (ICC 2013), Budapest, Hungary, June 9-13, 2013 (PDF)
              • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking”, 8th ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013), Hangzhou, China, May 7-10, 2013 (Acceptance ratio = 35/216 = 16%) (PDF) (Distinguished Paper Award)
              • Q. Yan, M. Li, F. Chen, T. Jiang, W. Lou, Y.T. Hou, C.-T. Lu, “Non-parametric passive traffic monitoring in cognitive radio networks”, IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)
              • L. Shi, S. Yu, W. Lou, and Y.T. Hou, “SybilShield: An agent-aided social network-based sybil defense among multiple communities”, IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)
              • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S.F. Midkiff, "Bundling mobile base station and wireless energy transfer: modeling and optimization," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)
              • H. Zeng, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "On interference alignment for multi-hop MIMO networks," IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)
              • H. Zeng, Y. Shi, Y.T. Hou, and W. Lou, "An efficient DoF scheduling algorithm for multi-hop MIMO networks,” IEEE INFOCOM 2013, Turin, Italy, April 2013 (Acceptance ratio = 280/1613 = 17%) (PDF)

              2012

              Book chapter:

              • Y. Shi, Y.T. Hou, and H.D. Sherali, "On throughput maximization problem for UWB-based sensor networks via reformulation-linearization technique," in Handbook of Optimization in Complex Networks: Communication and Social Networks, Chapter 8, pp. 219-240, edited by M.T. Thai and P.M. Pardalos, Springer, 2012. ISBN 978-1-4614-0856-7.(PDF)
              • Shucheng Yu, W. Lou, and Kui Ren "Data Security in Cloud Computing", in Handbook on Securing Cyber-Physical Critical Infrastructure, Chapter 15, pp. 389-410, edited by S.K. Das, K. Kant, and N. Zhang, Morgan Kaufmann/Elsevier, 2012. ISBN 978-0124158153.(PDF)

              Refereed journal papers:

              • L. Xie, Y. Shi, Y.T. Hou, and H.D. Sherali, "Making sensor networks immortal: An energy renewable approach with wireless energy transfer," IEEE/ACM Transactions on Networking (ToN), vol. 20, issue 6, pp.1748-1761, December 2012 (PDF)
              • Z. Yang, M. Li, and W. Lou, "CodePlay: Live multimedia streaming in VANETs using symbol-level network coding," IEEE Transactions on Wireless Communications, vol.11, no.8, pp.3006-3013, August 2012. (PDF)
              • T. Jiang, H. Zeng, Q. Yan, W. Lou, Y. T. Hou, "On the limitation of embedding cryptographic signature for primary transmitter authentication," IEEE Wireless Communications Letters vol.1, no.4, pp.324-327, August 2012. (PDF)
              • Y. Shi and Y.T. Hou, "Some fundamental results on base station movement problem for wireless sensor networks," to appear in IEEE/ACM Transactions on Networking, vol.20, no.4, pp.1054-1067, Aug. 2012. (PDF)
              • C. Wang, N. Cao, K. Ren, W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Transactions on Parallel and Distributed Systems, vol.23, no.8, pp.1467-1479, Aug. 2012. (PDF)
              • S. Sharma, Y. Shi, J. Liu, Y.T. Hou, S. Kompella, and S.F. Midkiff, "Network coding in cooperative communications: Friend or foe?" IEEE Transactions on Mobile Computing vol.11, no.7, pp.1073-1085, July 2012. (PDF)
              • C. Wang, Q. Wang, K. Ren, and W. Lou, "Towards secure and dependable storage services in cloud computing," IEEE Transactions on Service Computing (TSC), vol.5, no.2, pp.220-232, April-June 2012. (PDF)
              • Q. Yan, M. Li. Z. Yang, W. Lou and H. Zhai, "Throughput analysis of cooperative mobile content distribution in vehicular networks using symbol level network coding," IEEE Journal on Selected Areas in Communications, vol.30, no.2, pp.484-492, February 2012. (PDF)
              • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, S. Kompella, and S.F. Midkiff, "Joint flow routing and relay node assignment in cooperative multi-hop networks," IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 254-262, February 2012. (PDF)

              Refereed conference papers:

              • N. Zhang, M. Li, W. Lou, and Y.T. Hou, “MUSHI: Toward Multiple Level Security Cloud with Strong Hard-ware Level Isolation,” IEEE/AFCEA Military Communications Conference (MILCOM), October29–November 1, 2012, Orlando, FL. (PDF)
              • Y. Zheng, M. Li, W. Lou, and Y.T. Hou, "SHARP: Private proximity test and secure handshake with cheat-proof location tags", 17th European Symposium on Research in Computer Security (ESORICS 2012), Sep 10-14, 2012, Pisa, Italy. (Acceptance rate = 50/248 = 20%) (PDF)
              • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations", 17th European Symposium on Research in Computer Security (ESORICS 2012), Sep 10-14, 2012, Pisa, Italy. (Acceptance rate = 50/248 = 20%) (PDF)
              • L. Xie, Y. Shi, Y.T. Hou, W. Lou, H. Sherali, and S.F. Midkiff, "On renewable sensor networks with wireless energy transfer: The multi-node case," IEEE SECON 2012, June 18-21, 2012, Seoul, Korea. (PDF)
              • Ming Li, Shucheng Yu, W. Lou, Y. T. Hou, “Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities”, Third International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012), in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012. (PDF)
              • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "Toward Simple Criteria to Establish Capacity Scaling Laws for Wireless Networks," IEEE INFOCOM 2012, pp. 774-782, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)
              • C. Jiang, Y. Shi, Y.T. Hou, W. Lou, S. Kompella, and S.F. Midkiff, "Squeezing the Most Out of Interference: An Optimization Framework for Joint Interference Exploitation and Avoidance," IEEE INFOCOM 2012, pp. 424-432, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)
              • C. Jiang, Y. Shi, Y.T. Hou, and W. Lou, "Cherish Every Joule: Maximizing Throughput with An Eye on Network-wide Energy Consumption," IEEE INFOCOM 2012, pp. 1934-1941, March 25-30, 2012, Orlando, FL, USA. (Acceptance ratio = 278/1547 = 18%) (PDF)
              • Q, Yan, M. Li, T. Jiang, W. Lou, and Y.T. Hou, "Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks," IEEE INFOCOM 2012, Orlando, FL, March 2012 (Acceptance ratio = 278/1547 = 18%) (PDF)
              • N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, "LT Codes-based Secure and Reliable Cloud Storage Service," IEEE INFOCOM 2012, Orlando, FL, March 2012 (Acceptance ratio = 278/1547 = 18%) (PDF)

                2011

                Book:

                Refereed journal papers:

                • Zhenyu Yang, Shucheng Yu, W. Lou and Cong Liu, "P2: Privacy-preserving communication and precise reward architecture for V2G networks in Smart Grid," IEEE Transactions on Smart Grid, pp.697-706, vol. 2, no. 4, Dec 2011.(PDF)
                • C. Gao, Y. Shi, Y.T. Hou, and S. Kompella, "On the throughput of MIMO-empowered multi-hop cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1505-1519, November 2011. (PDF)
                • Q. Wang, K. Ren, S. Yu, and W. Lou, "Dependable and secure sensor data storage with dynamic integrity assurance," ACM Transactions on Senor Networks (ToSN), vol. 8, issue 1, August 2011. (PDF)
                • M. Li, K. Zeng and W. Lou, "Opportunistic broadcast of event-driven warning messages in vehicular ad Hoc networks with lossy links," Computer Networks, pp. 2443-2464, vol. 55, issue 10, July 2011. (PDF)
                • Z. Yang, M. Li, and W. Lou, "R-Code: Network coding based reliable broadcast in wireless mesh networks," Ad Hoc Networks, pp. 788-798, vol. 9, issue 5, July 2011. (PDF)
                • Y. Shi, Y.T. Hou, S. Kompella, H.D. Sherali, "Maximizing capacity in multi-hop cognitive radio networks under the SINR model," IEEE Transactions on Mobile Computing, vol 10, no. 7, pp. 954-967, July 2011. (PDF)

                • S. Sharma, Y. Shi, Y.T. Hou, and S. Kompella, "An optimal algorithm for relay node assignment in cooperative ad hoc networks," IEEE/ACM Transactions on Networking, vol. 19, no. 3, pp. 879-892, June 2011. (PDF)

                • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, pp.847-859, vol. 22, no. 5, May 2011. (PDF)
                • C. Jiang, Y. Shi, Y.T. Hou, and S. Kompella, "On the asymptotic capacity of multi-hop MIMO ad hoc networks," IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1032-1037, April 2011. (PDF)

                • C. Gao, Y. Shi, Y.T. Hou, H.D. Sherali, and H. Zhou, "Multicast communications in multi-hop cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 784-793, April 2011. (PDF)

                • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, pp. 673-686, vol. 22, no. 4, April 2011. (PDF)
                • M. Li, Z. Yang, W. Lou, "CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,'' IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, pp. 223-235, Vol. 29, No. 1, January 2011. (PDF)

                Refereed conference papers:

                • S. Sharma, Y. Shi, Y.T.Hou, and S.F.Midkiff, "Optimal grouping and matching for network-coded cooperative communications," IEEE/AFCEA Military Communications Conference (MILCOM), pp. 722-728, November 7-10, 2011, Baltimore, MD. (PDF)
                • Y. Shi, C. Jiang, Y.T. Hou, and S. Kompella, "On capacity scaling law of cognitive radio networks (Invited Paper)," International Conference on Computer Communications and Networks (ICCCN 2011), 8 pages, July 31-August 4, 2011, Maui, Hawaii. Available online at IEEE Xplore. DOI: 10.1109/ICCCN. 2011.6006062. (PDF)
                • N. Cao, Z. Yang, C. Wang, K. Ren and W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing," The 31th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, June 20-24, 2011. (PDF)
                • M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," The 30th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, June 20-24, 2011. (PDF)
                • S. Sharma, Y. Shi, Y.T. Hou, and S. Kompella, "Achievable rate analysis in network-coded cooperative communications with multiple relay nodes," IEEE ICC 2011 - Wireless Networking Symposium, 5 pages, June 5-9, 2011, Kyoto, Japan. (PDF)
                • N. Zhang, M. Li, and W. Lou, "'Distributed data mining with differential privacy," IEEE ICC 2011, Kyoto, Japan, June 2011 (PDF)
                • M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks," IEEE INFOCOM 2011, Shanghai, China, April 2011 (Acceptance ratio = 291/1823 = 16%) (PDF))
                • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, and S. Kompella, "Optimizing network-coded cooperative communications via joint session grouping and relay node selection," IEEE INFOCOM 2011, pp. 1898-1906, April 10-15, 2011, Shanghai, China. (PDF)

                • C. Jiang, Y. Shi, Y.T. Hou, and S. Kompella, "On optimal throughput-energy curve for multi-hop wireless networks," IEEE INFOCOM 2011, pp. 1341-1349, April 10-15, 2011, Shanghai, China. (PDF)

                • Y. Shi, L. Xie, Y.T. Hou, and H.D. Sherali, "On renewable sensor networks with wireless energy transfer," IEEE INFOCOM 2011, pp. 1350-1358, April 10-15, 2011, Shanghai, China. (PDF)

                • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE INFOCOM 2011, Shanghai, China, April 2011 (Acceptance ratio = 291/1823 = 16%) (PDF)
                • Y. Shi, J. Liu, C. Jiang, C. Gao, and Y.T. Hou, "An optimal link layer model multi-hop MIMO networks," IEEE INFOCOM 2011, pp. 1916-1924, April 10-15, 2011, Shanghai, China. (Best Paper Award Runner-Up). (PDF)


                2010

                Book:

                Book Chapter:

                • A.M. Wyglinski, M. Nekovee, and Y.T. Hou, "When radio meets software," in Cognitive Radio Communications and Networks, Chapter 1, pp. 1-12, edited by Alexander M.Wyglinski, Maziar Nekovee, and Y. Thomas Hou, Elsevier Inc., 2010. ISBN: 978-0-12-374715-0.(PDF)
                • Y. Shi and Y.T. Hou, "Cross-layer optimization for multi-hop cognitive radio networks," in Cognitive Radio Communications and Networks, Chapter 12, pp. 335-363, edited by Alexander M. Wyglinski, Maziar Nekovee, and Y. Thomas Hou, Elsevier Inc., 2010. ISBN: 978-0-12-374715-0.(PDF)
                • Ming Li, W. Lou, and Kui Ren, "Secure device pairing," in Encyclopedia of Cryptography and Security (2nd ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010 (PDF)
                • Shucheng Yu, W. Lou, and Kui Ren, "Privacy-preserving user authentication in wireless access networks," in Encyclopedia of Cryptography and Security (2nd ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010 (PDF)

                Refereed magazine paper:

                • C. Wang, K. Ren, W. Lou and J. Li, "Towards publicly auditable secure cloud data storage services," IEEE Networks Magazine special issue on Future Internet: New Applications and Emerging Services, vol. 24, issue 4, July/August 2010. (PDF)
                • M. Li, W. Lou and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Communications Magazine special issue on Wireless Technologies for E-healthcare, vol. 17, no. 1, February 2010. (PDF)

                Refereed journal papers:

                • K. Zeng, Z. Yang, and W. Lou, "Opportunistic routing in multi-radio multi-channel multi-hop wireless networks," IEEE Transactions on Wireless Communications, vol. 9, issue 11, November 2010. (PDF)
                • Y. Shi, Y.T. Hou, H. Zhou, and S.F. Midkiff, "Distributed cross-layer optimization for cognitive radio networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 4058-4069, October 2010. (PDF)

                • D. Hu, S. Mao, Y.T. Hou, and J.H. Reed, "Scalable video multicast in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 28, no. 3, pp. 434-444, April 2010. (PDF)

                • S. Yu, K. Ren, and W. Lou, "Attribute-based on-demand multicast group setup with receiver anonymity", Computer Networks, vol.54, issue 3, February 2010. (PDF)
                • K. Ren, S. Yu, W. Lou, and Y. Zhang, "PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, February 2010. (PDF)

                Refereed conference papers:

                • Z. Yang, M. Li, W. Lou, "CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,'' The 18th IEEE International Conference on Network Protocols (ICNP 2010), Kyoto, Japan, Oct. 5-8, 2010 (acceptance rate = 31/170 = 18%). (PDF)
                • M.Li, S. Yu, K. Ren and W. Lou. "Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings", 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, Sep 7-9, 2010 (acceptance rate = 28/112=25%). (PDF)
                • C. Wang, N. Cao, J. Li, K. Ren and W. Lou, "Secure ranked keyword search over encrypted cloud data," The 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21-25, 2010 (acceptance rate = 84/585 = 14%) (PDF)
                • N. Cao, Q. Wang, K. Ren, and W. Lou, "Distributed storage coding for flexible and efficient data dissemination and retrieval in wireless sensor networks", International Conference on Communications (ICC 2010), Cape Town, South Africa, May 2010. (PDF)
                • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010 (Acceptance ratio = 25/166 = 15%) (PDF)
                • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)
                • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)
                • J. Liu, Y. Shi, and Y.T. Hou, "A tractable and accurate cross-layer model for multi-hop MIMO ad hoc networks," IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)

                • S. Sharma, Y. Shi, J. Liu, Y.T. Hou, "Is network coding always good for cooperative communications?" IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)

                • S. Sharma, Y. Shi, Y.T. Hou, H.D. Sherali, and S. Kompella, "Cooperative communications in multi-hop wireless networks: Joint flow routing and relay node assignment," IEEE INFOCOM 2010, March 15-19, 2010, San Diego, CA, USA. (PDF)

                • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," IEEE INFOCOM 2010 mini-conference, San Diego, CA, March 2010 (PDF)
                • M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," IEEE INFOCOM 2010, San Diego, CA, March 2010 (Acceptance ratio = 276/1575 = 17.5%) (PDF)
                • K. Zeng, Z. Yang, and W. Lou, "Opportunistic routing in multi-radio multi-channel multi-hop wireless networks," IEEE INFOCOM 2010 mini-conference, San Diego, CA, March 2010 (PDF)

                2009

                Book Chapter:

                • Y. Shi and Y.T. Hou, "Analytical models for multi-hop cognitive radio networks," in Cognitive Radio Networks, Chapter 15, pp. 383-406, edited by Yang Xiao and Fei Hu, Auerbach Publications, CRC Press, Boca Raton, FL, 2009. ISBN-13: 978-1-4200-6420-9. (PDF)

                Refereed magazine paper:

                • W. Lou and K. Ren, "Security, privacy, and accountability in wireless access networks," IEEE Wireless Communications Magazine, vol. 16, issue 4, August 2009 (PDF)

                Refereed journal papers:

                • Y. Shi, and Y.T. Hou, "Optimal base station placement in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 5, no. 4, November 2009. (PDF)

                • K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 8, October 2009 (PDF)
                • Y. Shi, Y.T. Hou, and H. Zhou, "Per-node based optimal power control for multi-hop cognitive radio networks," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5290-5299, October 2009.(PDF)

                • K. Zeng, Z. Yang, and W. Lou, "Location-aided opportunistic forwarding in multirate and multihop wireless networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 6, July 2009 (PDF)
                • K. Ren, W. Lou, B. Zhu, and S. Jajodia, "Secure and efficient multicast in wireless sensor networks allowing ad-hoc group formation", IEEE Transactions on Vehicular Technology, vol. 58, no. 4, May 2009 (PDF)
                • W. Lou, W. Liu, Y. Zhang, and Y. Fang, "Improving network security by multipath routing in mobile ad hoc networks", Wireless Networks, vol. 15, issue 3, March 2009 (available online) (PDF)
                • A.B. MacKenzie, J.H. Reed, P. Athanas, C.W. Bostian, R.M. Buehrer, L.A. DaSilva, S.W. Ellingson, Y.T. Hou, M. Hsiao, J.-M. Park, C. Patterson, S. Raman, C.R.C.M. da Silva, "Cognitive radio and networking research at Virginia Tech," Proceedings of the IEEE, vol. 97, no. 4, pp. 660–688, April 2009.(PDF)
                • S. Kompella, S. Mao, Y.T. Hou, and H.D. Sherali, "On path selection and rate allocation for concurrent video sessions in ad hoc networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 212-224, February 2009. (PDF)
                • K. Zeng, K. Ren, W. Lou, and P. J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply", Wireless Networks, vol. 15, issue 1, January 2009 (PDF)
                • Y. Shi, Y.T. Hou, and A. Efrat, "Algorithm design for a class of base station location problems in sensor networks," ACM/Springer Wireless Networks (WINET), vol. 15, no. 1, pp. 21-38, January 2009. (PDF)

                • S.M. Hur, S. Mao, Y.T. Hou, K. Nam, and J.H. Reed, "Exploiting location information for concurrent transmissions in multi-hop wireless networks," IEEE Transactions on Vehicular Technology. vol. 58, no. 1, pp. 314– 323, January 2009.(PDF)
                • Kai Zeng, Kui Ren, W. Lou, and Patrick J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply", ACM/Springer Wireless Networks (WINET), vol. 15, issue 1, January 2009.(PDF)

                Refereed conference papers:

                • Z. Yang, M. Li. and W. Lou, "R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links," IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, November 30 - December 4, 2009 (PDF)
                • J. Liu, Y.T. Hou, and H.D. Sherali, "Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels," in Proc. Conference on Information Sciences and Systems (CISS 2009), pp. 606–611, Baltimore, MD, March 18–20, 2009.(PDF)
                • Q. Wang, K. Ren, C. Wang, and W. Lou, "Efficient fine-grained data access control in wireless sensor networks," IEEE Military Communication Conference (MILCOM 2009), Boston, MA, USA, October 18-21, 2009 (PDF)
                • M. Li, W. Lou, and K. Zeng, "OppCast: Opportunistic broadcast of warning messages in VANETs with unreliable links," The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009), Macau SAR, China, October 12-15, 2009 (acceptance ratio = 62/245 = 25%) (PDF)
                • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public auditability and data dynamics for storage security in cloud computing," 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, September 21-25, 2009 (Acceptance ratio = 42/220 = 19%) (PDF)
                • S. Yu, K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in KP-ABE enabled broadcast systems," The 5th International ICST Conference on Security and Privacy in Communication Networks (Securecomm 2009), Athens, Greece, September 14-18, 2009 (Acceptance ratio = 20/76 = 26.3%) (PDF)
                • Z. Yang, M. Li. and W. Lou, "A network coding approach to reliable broadcast in wireless mesh networks," International Conference on Wireless Algorithms, Systems, and Applications (WASA 2009), Boston, MA, USA, August 16-18, 2009. (PDF)
                • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing", 17th IEEE International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, July 13-15, 2009 (PDF) (Presentation Slides)
                • Z. Yang, K. Zeng, and W. Lou, "FSA: A fast coordination scheme for opportunistic routing", International Conference on Communications (ICC 2009), Dresden, Germany, June 2009. (PDF)
                • S. Yu, K. Ren, and W. Lou, "Accountable attribute-based broadcast," IEEE Symposium on Security and Privacy ( S&P 2009), Oakland, CA, May 17-20, 2009 (poster) (PDF)
                • J. Liu, Y.T. Hou, Y. Shi, and H.D. Sherali, "On performance optimization for multi-carrier MIMO ad hoc networks," in ACM Mobihoc, pp. 43-54, New Orleans, Louisiana, May 18-21, 2009. (PDF)

                • Y. Shi, Y.T. Hou, Jia Liu, and S. Kompella, "How to correctly use the protocol interference model for multihop wireless networks," in ACM Mobihoc, pp. 239-248, New Orleans, Louisiana, May 18-21, 2009. (PDF)

                • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009 (282/1435 = 20%) (PDF)
                • Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance," IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009 (282/1435 = 20%) (PDF)

                2008

              Book:

              • K. Ren, W. Lou, Communication Security in Wireless Sensor Networks, VDM Verlag Dr. Muller, Germany, ISBN: 978-3-8364-3668-7, 2008

              Book Chapter:

              • S. Mao, Y.T. Hou, H.D. Sherali, and S.F. Midkiff, "Routing for video communications over wireless ad hoc networks," in Broadband Mobile Multimedia: Techniques and Applications, Chapter 5, pp. 157-192, edited by Y. Zhang, S. Mao, L.T. Yang and T.M. Chen, CRC Press, New York, NY, June 2008. ISBN-10: 1420051849; ISBN-13: 978-1-4200-5184-1. (PDF)
              • Kui Ren, W. Lou, Yanchao Zhang, "Multi-user broadcast authentication in wireless sensor networks", in Encyclopedia on Ad Hoc and Ubiquitous Computing, D. Agrawal Ed., World Scientific, 2008.(PDF)

              Refereed magazine papers:

              • S. Mao, Y.T. Hou and M.-Y. Wu, "Exploiting edge capabilities for wireless sensor networking," IEEE Wireless Communications, vol. 15, issue 4, pp. 67–73, August 2008.(PDF)
              • R. Chen, J.-P. Park, Y.T. Hou, and J. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50–55, April 2008.(PDF)
              • S. Mao, Y.T. Hou, H.D. Sherali, and S.F. Midkiff, "Multimedia-centric routing for multiple description video in wireless mesh networks," IEEE Network Magazine, vol. 22, no. 1, pp. 19–24, January/February 2008.(PDF)

              Refereed journal papers:

              • K. Zeng, W. Lou, and H. Zhai, "Capacity of opportunistic routing in multirate and multihop wireless networks," IEEE Transactions on Wireless Communications, vol. 7, no. 12, December 2008. (PDF)
              • W. Guo, X. Huang, W. Lou, and C. Liang, "On relay node placement and assignment for two-tiered wireless networks", Mobile Networks and Applications (MONET) special issue on "Advances in wireless mesh networks", (2008) 13:186-197. (PDF)
              • Y. Shi and Y.T. Hou, "On the capacity of UWB-based wireless sensor networks," Elsevier Computer Networks, vol. 52, issue 14, pp. 2797–2804, October 2008.(PDF)
              • Y.T. Hou, A.M Wyglinski, M. Nekovee, H. Zhang, R. Chandramouli, and F. Martin, "Guest editorial: Special issue on cognitive radio oriented wireless networks and communications," Springer Mobile Networks and Applications (MONET), vol. 13, no. 5, pp. 411–415, October 2008.(PDF)
              • J. Liu, Y.T. Hou, and Y. Shi, and H.D. Sherali, "Cross-layer optimization for MIMO-based wireless ad hoc networks: Routing, power allocation, and bandwidth allocation," IEEE Journal on Selected Areas in Communications, vol. 26, no. 6, pp. 913-926, August 2008. (PDF)

              • Y. Shi, Y.T. Hou, and H.D. Sherali, "Cross-layer optimization for data rate utility problem in UWB-based ad hoc networks," IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 764-777, June 2008. (PDF)

              • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks", IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008 (PDF)
              • Y.T. Hou, Y. Shi, and H.D. Sherali, "Rate allocation and network lifetime problems for wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 16, no. 2, pp. 321-334, April 2008. (PDF)

              • J. Liu, Y.T. Hou, Y. Shi, H.D. Sherali, and S. Kompella, "On the capacity of multiuser MIMO networks with interference," IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 488-494, February 2008. (PDF)

              • K. Ren, K. Zeng, and W. Lou, "Secure and fault-tolerant event boundary detection in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 7, no. 1, January 2008. (PDF)
              • Y.T. Hou, Y. Shi, and H.D. Sherali, "Spectrum sharing for multi-hop networking with cognitive radios," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 146-155, January 2008. (PDF)

              Refereed conference papers:

              • J. Liu and Y.T. Hou, "On the performance of MIMO-based ad hoc networks under imperfect CSI," in Proc. IEEE Military Communications Conference (MILCOM), pp. 3244–3250, San Diego, CA, November 16–19, 2008.(PDF)
              • Y. Shi, Y.T. Hou, and S. Kompella, "A cross-layer approach to multi-hop networking with cognitive radios," in Proc. IEEE Military Communications Conference (MILCOM), pp. 3723–3729, San Diego, CA, November 17–19, 2008.(PDF)
              • K. Zeng, S. Yu, K. Ren, W. Lou, and Y. Zhang, "Towards Secure Link Quality Measurement in Multihop Wireless Networks", IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, November 30-December 4, 2008. (PDF)
              • S. Yu, K. Ren, and W. Lou, "Attribute-Based Content Distribution with Hidden Policy", The 4th Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 19, 2008, in conjunction with ICNP 2008. (PDF)
              • S. Yu, K. Ren, and W. Lou, "Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity", The 4th International Conference on Security and Privacy in Communication Networks ( SecureComm 2008), Istanbul, Turkey, September 22-25. (short paper) (PDF)
              • Wei Ren, Kui Ren, W. Lou, and Yanchao Zhang, "Efficient User Revocation for Privacy-aware PKI", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, July 28-31.(PDF)
              • Ming Li and W. Lou, "Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, July 28-31. (invited paper)(PDF)
              • K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks," The 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008 (acceptance rate < 16%) (PDF)
              • Wei Ren, Kui Ren, and W. Lou, "Optimized User Revocation for Group Signature Based Privacy-aware PKI", The First International Workshop on Wireless Security and Privacy (WiSP'08), in conjunction with ICDCS 2008.(PDF)
              • Y. Shi, S. Sharma, and Y.T. Hou, "Optimal relay assignment for cooperative communications," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 26-30, 2008, Hong Kong, China. (PDF)
              • J. Liu, Y.T. Hou, H.D. Sherali, "On the maximum weighted sum-rate of MIMO Gaussian broadcast channels," in Proc. IEEE International Conference on Communications (ICC), pp. 3664–3668, May 19–23, 2008, Beijing, China.(PDF)
              • J. Liu, and Y.T. Hou, and H.D. Sherali, "Routing and power allocation optimization for MIMO-based ad hoc networks with dirty paper coding," in Proc. IEEE International Conference on Communications (ICC) - Wireless Networking Symposium, May 19-23, 2008, Beijing, China. (Best Paper Award) (PDF)

              • Zhiguo Wan, Kui Ren, W. Lou, and Bart Preneel,  "Anonymous ID-based group key agreement for wireless networks", IEEE Wireless Communications and Networking Conference (WCNC’2008), Las Vegas, Mar-Apr 2008 (PDF)
              • Y. Shi, and Y.T. Hou, "Theoretical results on base station movement problem for sensor network," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (Best Paper Award) (PDF)

              • Y. Shi, and Y.T. Hou, "A distributed optimization algorithm for multi-hop cognitive radio networks," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (PDF)

              • J. Liu, and Y.T. Hou, "Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast Channels," IEEE INFOCOM 2008, April 13-18, 2008, Phoenix, AZ, USA. (PDF)

              • K. Zeng, W. Lou, and H. Zhai, "On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks," IEEE INFOCOM 2008, Phoenix, AZ, April 15-17, 2008 (acceptance rate = 21%). (PDF)

              Earlier Publications