default search action
Cong Pu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Image Bhattarai, Cong Pu, Kim-Kwang Raymond Choo, Dragan Korac:
A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones. IEEE Internet Things J. 11(11): 19790-19803 (2024) - [j20]Ben Fu, Dandan Shan, Cong Pu, Lehang Guo, Huixiong Xu, Chang Peng:
A Systematic Investigation of Thermal Effects of High-Intensity Focused Ultrasound Therapy for Ultrasound Neuromodulation. IEEE Trans. Instrum. Meas. 73: 1-12 (2024) - [j19]Cong Pu, Clare Warner, Kim-Kwang Raymond Choo, Sunho Lim, Imtiaz Ahmed:
liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems. IEEE Trans. Veh. Technol. 73(4): 5849-5860 (2024) - [j18]Majumder Haider, Imtiaz Ahmed, Ahmed Rubaai, Cong Pu, Danda B. Rawat:
GAN-Based Channel Estimation for IRS-Aided Communication Systems. IEEE Trans. Veh. Technol. 73(4): 6012-6017 (2024) - [c36]Image Bhattarai, Cong Pu, Kim-Kwang Raymond Choo:
A Lightweight Aggregate Authentication Protocol for Internet of Drones. CCNC 2024: 143-151 - [c35]Cong Pu, Kim-Kwang Raymond Choo, Image Bhattarai:
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks. CCNC 2024: 931-936 - [c34]Majumder Haider, Imtiaz Ahmed, Md. Zoheb Hassan, Mohammad Matin, Cong Pu:
Data-Driven Channel Acquisition with Pilot Decontamination in IRS-Aided Communication Systems. ICC Workshops 2024: 177-182 - 2023
- [c33]Cong Pu:
Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones. DSC 2023: 1-8 - [c32]Cong Pu:
A Featherweight Authentication and Key Agreement Scheme for Internet of Drones Applications. PIMRC 2023: 1-6 - [c31]Cong Pu, Imtiaz Ahmed, Sumit Chakravarty:
Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things Systems. TPS-ISA 2023: 101-110 - [c30]Imtiaz Ahmed, Md. Zoheb Hassan, Ahmed Rubaai, Kamrul Hasan, Cong Pu, Jeffrey H. Reed:
Deep Learning Assisted Channel Estimation for Cell-Free Distributed MIMO Networks. WiMob 2023: 344-349 - 2022
- [j17]Cong Pu, Kim-Kwang Raymond Choo:
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function. Comput. Secur. 113: 102541 (2022) - [j16]Cong Pu, Andrew Wall, Kim-Kwang Raymond Choo, Imtiaz Ahmed, Sunho Lim:
A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment. IEEE Internet Things J. 9(12): 9918-9933 (2022) - [j15]Cong Pu, Haleigh Zerkle, Andrew Wall, Sunho Lim, Kim-Kwang Raymond Choo, Imtiaz Ahmed:
A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks. IEEE Internet Things J. 9(21): 21136-21146 (2022) - [j14]Hema Naga Sai Sudha Jagarlapudi, Sunho Lim, Jinseok Chae, Gyu Sang Choi, Cong Pu:
Drone Helps Privacy: Sky Caching Assisted $k$-Anonymity in Spatial Querying. IEEE Syst. J. 16(4): 6360-6370 (2022) - [j13]Imtiaz Ahmed, Su Yan, Danda B. Rawat, Cong Pu:
Dynamic Resource Allocation for IRS Assisted Energy Harvesting Systems With Statistical Delay Constraint. IEEE Trans. Veh. Technol. 71(2): 2158-2163 (2022) - [j12]Samhith Reddy Chinthi-Reddy, Sunho Lim, Gyu Sang Choi, Jinseok Chae, Cong Pu:
DarkSky: Privacy-preserving target tracking strategies using a flying drone. Veh. Commun. 35: 100459 (2022) - [c29]Cong Pu:
A Reinforcement Learning Based Service Scheduling Algorithm for Internet of Drones. ICC Workshops 2022: 999-1004 - [c28]Cong Pu, Andrew Wall, Imtiaz Ahmed, Kim-Kwang Raymond Choo:
SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones. MDM 2022: 83-92 - [c27]Neelanjana Subin Ferdous, Imtiaz Ahmed, Umma Hany, Lutfa Akter, Ramesh Annavajjala, Cong Pu:
Low Complexity Resource Allocation for Multiuser Uplink Communication Systems. TSP 2022: 169-173 - [c26]Cong Pu, Pingping Zhu:
Mitigating Routing Misbehavior in the Internet of Drones Environment. VTC Spring 2022: 1-6 - 2021
- [j11]Cong Pu, Imtiaz Ahmed, Evan J. Allen, Kim-Kwang Raymond Choo:
A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation. IEEE Access 9: 162614-162632 (2021) - [j10]Cong Pu:
Pro NDN : MCDM-Based Interest Forwarding and Cooperative Data Caching for Named Data Networking. J. Comput. Networks Commun. 2021: 6640511:1-6640511:16 (2021) - [j9]Cong Pu, Logan Carpenter:
Psched: A Priority-Based Service Scheduling Scheme for the Internet of Drones. IEEE Syst. J. 15(3): 4230-4239 (2021) - [c25]Cong Pu, Pingping Zhu:
Defending against Flooding Attacks in the Internet of Drones Environment. GLOBECOM 2021: 1-6 - [c24]Cong Pu:
A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks. WTS 2021: 1-6 - 2020
- [j8]Cong Pu:
Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 7(6): 4937-4949 (2020) - [j7]Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu, Manki Min:
MQry: Elastic Validity Region for Querying Mobile Point-of-Interests in Infrastructure-Less Networks. IEEE Syst. J. 14(2): 1852-1861 (2020) - [c23]Yucheng Li, Cong Pu:
Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack. CSE 2020: 92-97 - [c22]Cong Pu, Jacqueline Brown, Logan Carpenter:
A Theil Index-Based Countermeasure Against Advanced Vampire Attack in Internet of Things. HPSR 2020: 1-6 - [c21]Cong Pu, Yucheng Li:
Lightweight Authentication Protocol for Unmanned Aerial Vehicles Using Physical Unclonable Function and Chaotic System. LANMAN 2020: 1-6
2010 – 2019
- 2019
- [j6]Cong Pu, Sunho Lim, Jinseok Chae, Byungkwan Jung:
Active detection in mitigating routing misbehavior for MANETs. Wirel. Networks 25(4): 1669-1683 (2019) - [c20]Cong Pu:
Energy Depletion Attack Against Routing Protocol in the Internet of Things. CCNC 2019: 1-4 - [c19]Cong Pu, Xitong Zhou:
RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue. CCWC 2019: 832-837 - [c18]Cong Pu:
Spam DIS Attack Against Routing Protocol in the Internet of Things. ICNC 2019: 73-77 - [c17]Cong Pu, Bryan Groves:
Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses. ICDIS 2019: 14-21 - [c16]Cong Pu, Nathaniel Payne, Jacqueline Brown:
Self-Adjusting Share-Based Countermeasure to Interest Flooding Attack in Named Data Networking. iThings/GreenCom/CPSCom/SmartData 2019: 142-147 - [c15]Bryan Groves, Cong Pu:
A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things. MILCOM 2019: 1-6 - [c14]Cong Pu:
Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks. MILCOM 2019: 490-495 - [c13]Cong Pu, Logan Carpenter:
Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things. NCA 2019: 1-4 - [c12]Cong Pu, Logan Carpenter:
To Route or To Ferry: A Hybrid Packet Forwarding Algorithm in Flying Ad Hoc Networks. NCA 2019: 1-8 - 2018
- [b1]Cong Pu:
A holistic approach to the exploitation of energy harvesting motivated networks: Protocols and countermeasures to DoS attacks. Texas Tech University, Lubbock, USA, 2018 - [j5]Cong Pu:
Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks. IEEE Access 6: 68472-68486 (2018) - [j4]Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu:
VRSense: Validity region sensitive query processing strategies for static and mobile point-of-interests in MANETs. Comput. Commun. 116: 132-146 (2018) - [j3]Cong Pu, Sunho Lim, Byungkwan Jung, Jinseok Chae:
EYES: Mitigating forwarding misbehavior in energy harvesting motivated networks. Comput. Commun. 124: 17-30 (2018) - [j2]Cong Pu, Xitong Zhou:
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses. Sensors 18(10): 3236 (2018) - [j1]Cong Pu, Sunho Lim:
A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation. IEEE Syst. J. 12(1): 834-842 (2018) - [c11]Cong Pu, Salam Hajjar:
Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks. CCNC 2018: 1-6 - [c10]Cong Pu:
Mitigating DAO inconsistency attack in RPL-based low power and lossy networks. CCWC 2018: 570-574 - [c9]Cong Pu:
Link-Quality and Traffic-Load Aware Routing for UAV Ad Hoc Networks. CIC 2018: 71-79 - [c8]Tianyi Song, Cong Pu:
Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks. CSCloud/EdgeCom 2018: 12-17 - [c7]Cong Pu, Xitong Zhou, Sunho Lim:
Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks. LCN 2018: 251-254 - [c6]Cong Pu:
Evacuation Assisting Strategies in Vehicular Ad Hoc Networks. UEMCON 2018: 836-841 - [c5]Yigitcan Celik, Cong Pu:
A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism. WASA 2018: 14-26 - 2017
- [c4]Cong Pu, Sunho Lim, Byungkwan Jung, Manki Min:
Mitigating stealthy collision attack in energy harvesting motivated networks. MILCOM 2017: 539-544 - 2016
- [c3]Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu:
Validity region sensitive query processing strategies in mobile ad hoc networks. MILCOM 2016: 1022-1027 - 2015
- [c2]Cong Pu, Sunho Lim:
Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks. MILCOM 2015: 903-908 - 2014
- [c1]Cong Pu, Tejaswi Gade, Sunho Lim, Manki Min, Wei Wang:
Lightweight Forwarding Protocols in Energy Harvesting Wireless Sensor Networks. MILCOM 2014: 1053-1059
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint