High-Impact Publications

The following lists papers published by Hume Center affiliated faculty with 250 or more citations. These represent the key areas of seminal research for which our faculty are most known. Topics include cognitive radio, cellular communications, wireless security, and cloud security.

PaperCitations
  1. FP An, JZ Bai, AB Balantekin, HR Band, D Beavis, W Beriguete, M Bishai, ..., Observation of electron-antineutrino disappearance at Daya Bay, Physical Review Letters 108 (17), 171803, 2012.
2234
  1. C Wang, Q Wang, K Ren, W Lou, Privacy-preserving public auditing for data storage security in cloud computing, Infocom, 2010 proceedings ieee, 1-9, 2010.
2066
  1. S Yu, C Wang, K Ren, W Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, Infocom, 2010 proceedings IEEE, 1-9, 2010.
1720
  1. , The utilization of e-government services: citizen trust, innovation and acceptance factors, Information systems journal 15 (1), 5-25, 2005.
1634
  1. E Waltz, J Llinas, Multisensor data fusion, Artech house, 1990.
1201
  1. F Belanger, JS Hiller, WJ Smith, Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, The journal of strategic Information Systems 11 (3), 245-270, 2002.
1114
  1. A Patcha, JM Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer networks 51 (12), 3448-3470, 2007.
1100
  1. Q Wang, C Wang, J Li, K Ren, W Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, Computer Security–ESORICS 2009, 355-370, 2009.
1091
  1. RB Ertel, P Cardieri, KW Sowerby, TS Rappaport, JH Reed, Overview of spatial channel models for antenna array communication systems, IEEE personal communications 5 (1), 10-22, 1998.
1020
  1. N Cao, C Wang, M Li, K Ren, W Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on parallel and distributed systems 25 (1), 222-233, 2014.
986
  1. C Wang, SSM Chow, Q Wang, K Ren, W Lou, Privacy-preserving public auditing for secure cloud storage, IEEE transactions on computers 62 (2), 362-375, 2013.
947
  1. Q Wang, C Wang, K Ren, W Lou, J Li, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011.
921
  1. J Li, Q Wang, C Wang, N Cao, K Ren, W Lou, Fuzzy keyword search over encrypted data in cloud computing, INFOCOM, 2010 Proceedings IEEE, 1-5, 2010.
794
  1. TS Rappaport, JH Reed, BD Woerner, Position location using wireless communications on highways of the future, IEEE communications Magazine 34 (10), 33-41, 1996.
778
  1. , Trust and risk in e-government adoption, The Journal of Strategic Information Systems 17 (2), 165-176, 2008.
769
  1. S Haykin, DJ Thomson, JH Reed, Spectrum sensing for cognitive radio, Proceedings of the IEEE 97 (5), 849-877, 2009.
710
  1. S Yu, C Wang, K Ren, W Lou, Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and…, 2010.
696
  1. W Saad, Z Han, M Debbah, A Hjorungnes, T Basar, Coalitional game theory for communication networks, Signal Processing Magazine, IEEE 26 (5), 77-97, 2009.
685
  1. C Wang, Q Wang, K Ren, N Cao, W Lou, Toward secure and dependable storage services in cloud computing, IEEE transactions on Services Computing 5 (2), 220-232, 2012.
682
  1. M Li, S Yu, Y Zheng, K Ren, W Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2013.
648
  1. JH Reed, Software radio: a modern approach to radio engineering, Prentice Hall Professional, 2002.
641
  1. C Wang, N Cao, J Li, K Ren, W Lou, Secure ranked keyword search over encrypted cloud data, Distributed Computing Systems (ICDCS), 2010 IEEE 30th International…, 2010.
635
  1. R Chen, JM Park, JH Reed, Defense against primary user emulation attacks in cognitive radio networks, IEEE Journal on selected areas in communications 26 (1), 2008.
618
  1. , Game theory in wireless and communication networks: theory, models, and applications, Cambridge Univ Pr, 2011.
585
  1. P Huber, Determination of antineutrino spectra from nuclear reactors, Physical Review C 84 (2), 024617, 2011.
585
  1. TC Clancy, N Kiyavash, DJ Lin, Secure smartcard-based fingerprint authentication, Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and…, 2003.
575
  1. , Privacy in the digital age: a review of information privacy research in information systems, MIS quarterly 35 (4), 1017-1042, 2011.
548
  1. JH Reed, KJ Krizman, BD Woerner, TS Rappaport, An overview of the challenges and progress in meeting the E-911 requirement for location service, IEEE Communications Magazine 36 (4), 30-37, 1998.
542
  1. R Chen, JM Park, K Bian, Robust distributed spectrum sensing in cognitive radio networks, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 1876-1884, 2008.
531
  1. , Privacy strategies for electronic government, E-government 200, 162-198, 2001.
526
  1. PM Athanas, HF Silverman, Processor reconfiguration through instruction-set metamorphosis, Computer 26 (3), 11-18, 1993.
511
  1. V Srivastava, JO Neel, AB MacKenzie, R Menon, LA DaSilva, JE Hicks, ..., Using game theory to analyze wireless ad hoc networks., IEEE Communications Surveys and Tutorials 7 (1-4), 46-56, 2005.
506
  1. P Huber, M Lindner, W Winter, Simulation of long-baseline neutrino oscillation experiments with GLoBES:(General Long Baseline Experiment Simulator), Computer Physics Communications 167 (3), 195-202, 2005.
484
  1. C Graziosi, G Pantaleo, KR Gantt, JP Fortin, JF Demarest, OJ Cohen, ..., Lack of evidence for the dichotomy of TH1 and TH2 predominance in HIV-infected individuals, Science 265 (5169), 248-253, 1994.
478
  1. ND Tripathi, JH Reed, HF VanLandinoham, Handoff in cellular systems, IEEE personal communications 5 (6), 26-37, 1998.
448
  1. TS Rappaport, A Annamalai, RM Buehrer, WH Tranter, Wireless communications: past events and a future perspective, IEEE Communications Magazine 40 (5), 148-161, 2002.
447
  1. W Saad, Z Han, HV Poor, T Basar, Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications, IEEE Signal Processing Magazine 29 (5), 86-105, 2012.
444
  1. C Wang, K Ren, W Lou, J Li, Toward publicly auditable secure cloud data storage services, IEEE network 24 (4), 2010.
438
  1. FP An, Q An, JZ Bai, AB Balantekin, HR Band, W Beriguete, M Bishai, ..., Improved measurement of electron antineutrino disappearance at Daya Bay, Chinese Physics C 37 (1), 011001, 2013.
436
  1. A Fehske, J Gaeddert, JH Reed, A new approach to signal classification using spectral correlation and neural networks, New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005…, 2005.
434
  1. M Li, W Lou, K Ren, Data security and privacy in wireless body area networks, IEEE Wireless communications 17 (1), 2010.
432
  1. KG Vamvoudakis, FL Lewis, Online actor–critic algorithm to solve the continuous-time infinite horizon optimal control problem, Automatica 46 (5), 878-888, 2010.
431
  1. J Reed, Introduction to ultra wideband communication systems, an, Prentice Hall Press, 2005.
430
  1. J Llinas, C Bowman, C Rogova, A Steinberg, E Waltz, F White, Revisiting the JDL data fusion model II, US Navy Technical Report, 2004.
429
  1. F Stern, RV Wilson, HW Coleman, EG Paterson, Comprehensive approach to verification and validation of CFD simulations-Part 1: methodology and procedures, Transactions-American Society of Mechanical Engineers Journal of Fluids…, 2001.
428
  1. CB Dietrich, K Dietze, JR Nealy, WL Stutzman, Spatial, polarization, and pattern diversity for wireless handheld terminals, IEEE transactions on antennas and propagation 49 (9), 1271-1281, 2001.
427
  1. , Double Chooz, A Search for the Neutrino Mixing Angle $\theta $13, .
420
  1. M Li, S Yu, K Ren, W Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings., SecureComm 10, 89-106, 2010.
417
  1. P Huber, J Kopp, M Lindner, M Rolinec, W Winter, New features in the simulation of neutrino oscillation experiments with GLoBES 3.0:(General Long Baseline Experiment Simulator), Computer Physics Communications 177 (5), 432-438, 2007.
412
  1. Y Zhang, W Liu, W Lou, Y Fang, Location-based compromise-tolerant security mechanisms for wireless sensor networks, IEEE Journal on selected areas in communications 24 (2), 247-260, 2006.
405
  1. K Kim, IA Akbar, KK Bae, JS Um, CM Spooner, JH Reed, Cyclostationary approaches to signal detection and classification in cognitive radio, New frontiers in dynamic spectrum access networks, 2007. DySPAN 2007. 2nd…, 2007.
398
  1. SK Stanley, MA Ostrowski, JS Justement, K Gantt, S Hedayati, M Mannix, ..., Effect of immunization with a common recall antigen on viral expression in patients infected with human immunodeficiency virus type 1, New England Journal of Medicine 334 (19), 1222-1229, 1996.
377
  1. C North, Toward measuring visualization insight, IEEE computer graphics and applications 26 (3), 6-9, 2006.
376
  1. C Wang, N Cao, K Ren, W Lou, Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012.
369
  1. M Li, S Yu, N Cao, W Lou, Authorized private keyword search over encrypted data in cloud computing, Distributed Computing Systems (ICDCS), 2011 31st International Conference on…, 2011.
368
  1. R Chen, JM Park, YT Hou, JH Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Communications Magazine 46 (4), 2008.
360
  1. HCA Van Tilborg, S Jajodia, Encyclopedia of cryptography and security, Springer Science & Business Media, 2014.
358
  1. P Huber, M Lindner, W Winter, Superbeams vs. neutrino factories, Nuclear Physics B 645 (1), 3-48, 2002.
350
  1. RB Ertel, JH Reed, Angle and time of arrival statistics for circular and elliptical scattering models, IEEE Journal on selected areas in communications 17 (11), 1829-1840, 1999.
333
  1. J Li, X Chen, M Li, J Li, PPC Lee, W Lou, Secure deduplication with efficient and reliable convergent key management, IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2014.
331
  1. R Zekavat, RM Buehrer, Handbook of position location: Theory, practice and advances, John Wiley & Sons, 2011.
325
  1. TC Clancy, N Goergen, Security in cognitive radio networks: Threats and mitigation, Cognitive Radio Oriented Wireless Networks and Communications, 2008…, 2008.
321
  1. C North, B Shneiderman, Snap-together visualization: a user interface for coordinating visualizations via relational schemata, Proceedings of the working conference on Advanced visual interfaces, 128-135, 2000.
318
  1. FP An, AB Balantekin, HR Band, W Beriguete, M Bishai, S Blyth, ..., Spectral measurement of electron antineutrino oscillation amplitude and frequency at Daya Bay, Physical review letters 112 (6), 061801, 2014.
318
  1. B Le, TW Rondeau, JH Reed, CW Bostian, Analog-to-digital converters, IEEE Signal Processing Magazine 22 (6), 69-77, 2005.
315
  1. R Pasko, P Schaumont, V Derudder, S Vernalde, D Durackova, A new algorithm for elimination of common subexpressions, IEEE Transactions on Computer-Aided Design of Integrated Circuits and…, 1999.
310
  1. A Mishra, MH Shin, NL Petroni, TC Clancy, WA Arbaugh, Proactive key distribution using neighbor graphs, IEEE Wireless communications 11 (1), 26-36, 2004.
304
  1. E Waltz, Information warfare principals and operations, Artech house, 1998.
304
  1. , A Conjoint Analysis of Online Consumer Satisfaction1, Journal of Electronic Commerce Research 6 (2), 95, 2005.
300
  1. Y Zhang, W Liu, W Lou, Anonymous communications in mobile ad hoc networks, INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and…, 2005.
299
  1. P Saraiya, C North, K Duca, An insight-based methodology for evaluating bioinformatics visualizations, IEEE transactions on visualization and computer graphics 11 (4), 443-456, 2005.
298
  1. R Chen, JM Park, Ensuring trustworthy spectrum sensing in cognitive radio networks, Networking Technologies for Software Defined Radio Networks, 2006. SDR'06.1…, 2006.
296
  1. JD Laster, JH Reed, Interference rejection in digital wireless communications, IEEE signal processing magazine 14 (3), 37-62, 1997.
266
  1. N Shirazi, A Walters, P Athanas, Quantitative analysis of floating point arithmetic on FPGA based custom computing machines, FPGAs for Custom Computing Machines, 1995. Proceedings. IEEE Symposium on…, 1995.
266
  1. P Petrus, JH Reed, TS Rappaport, Geometrical-based statistical macrocell channel model for mobile environments, IEEE Transactions on Communications 50 (3), 495-502, 2002.
257
  1. I Verbauwhede, P Schaumont, H Kuo, Design and performance testing of a 2.29-GB/s Rijndael processor, IEEE Journal of Solid-State Circuits 38 (3), 569-572, 2003.
256
  1. E Tilevich, Y Smaragdakis, J-orchestra: Automatic java application partitioning, European conference on object-oriented programming, 178-204, 2002.
255
  1. C Clancy, J Hecker, E Stuntebeck, T O'Shea, Applications of machine learning to cognitive radio networks, IEEE Wireless Communications 14 (4), 2007.
252