Follow
Kewei Sha
Title
Cited by
Cited by
Year
A survey of edge computing-based designs for IoT security
K Sha, TA Yang, W Wei, S Davari
Digital Communications and Networks 6 (2), 195-202, 2020
2982020
On security challenges and open issues in Internet of Things
K Sha, W Wei, TA Yang, Z Wang, W Shi
Future generation computer systems 83, 326-337, 2018
2942018
Using wireless sensor networks for fire rescue applications: Requirements and challenges
K Sha, W Shi, O Watkins
2006 IEEE International Conference on Electro/Information Technology, 239-244, 2006
2282006
Multipath routing techniques in wireless sensor networks: A survey
K Sha, J Gehlot, R Greve
Wireless personal communications 70, 807-829, 2013
2162013
Modeling the lifetime of wireless sensor networks
K Sha, W Shi
Sensor Letters 3 (2), 126-135, 2005
1502005
Enforcing privacy using symmetric random key-set in vehicular networks
Y Xi, K Sha, W Shi, L Schwiebert, T Zhang
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07 …, 2007
1322007
Adaptive privacy-preserving authentication in vehicular networks
K Sha, Y Xi, W Shi, L Schwiebert, T Zhang
2006 First International Conference on Communications and Networking in …, 2006
1122006
A secure and efficient framework to read isolated smart grid devices
K Sha, N Alatrash, Z Wang
IEEE Transactions on Smart Grid 8 (6), 2519-2531, 2016
942016
On sweep coverage with minimum mobile sensors
J Du, Y Li, H Liu, K Sha
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
662010
EdgeSec: Design of an edge layer security service to enhance IoT security
K Sha, R Errabelly, W Wei, TA Yang, Z Wang
2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 81-88, 2017
632017
WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs
K Sha, J Du, W Shi
International Journal of Sensor Networks 1 (3-4), 156-168, 2006
572006
SPA: A smart phone assisted chronic illness self-management system with participatory sensing
K Sha, G Zhan, W Shi, M Lumley, C Wiholm, B Arnetz
Proceedings of the 2nd International Workshop on Systems and Networking …, 2008
522008
An overview of access control mechanisms for internet of things
M Alramadhan, K Sha
2017 26th International Conference on Computer Communication and Networks …, 2017
502017
Security in internet of things: Opportunities and challenges
W Wei, AT Yang, W Shi, K Sha
2016 International Conference on Identification, Information and Knowledge …, 2016
442016
Consistency-driven data quality management of networked sensor systems
K Sha, W Shi
Journal of parallel and Distributed Computing 68 (9), 1207-1221, 2008
412008
Data quality challenges in cyber-physical systems
K Sha, S Zeadally
Journal of Data and Information Quality (JDIQ) 6 (2-3), 1-4, 2015
392015
mVideo: Edge computing based mobile video processing systems
H Sun, Y Yu, K Sha, B Lou
Ieee Access 8, 11615-11623, 2019
342019
Probabilistic adaptive anonymous authentication in vehicular networks
Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang
Journal of Computer Science and Technology 23, 916-928, 2008
342008
: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs
K Sha, S Wang, W Shi
IEEE Transactions on Vehicular Technology 59 (3), 1183-1190, 2010
332010
Is the nice cybersecurity workforce framework (ncwf) effective for a workforce comprising of interdisciplinary majors?
J Jacob, W Wei, K Sha, S Davari, TA Yang
Proceedings of the 16th International Conference on Scientific Computing …, 2018
282018
The system can't perform the operation now. Try again later.
Articles 1–20