Follow
Jing Yang Koh
Title
Cited by
Cited by
Year
Geo-spatial location spoofing detection for Internet of Things
JY Koh, I Nevat, D Leong, WC Wong
IEEE Internet of Things Journal 3 (6), 971-978, 2016
482016
Optimal privacy-preserving probabilistic routing for wireless networks
JY Koh, D Leong, GW Peters, I Nevat, WC Wong
IEEE Transactions on Information Forensics and Security 12 (9), 2105-2114, 2017
302017
Distributed event detection under byzantine attack in wireless sensor networks
P Zhang, JY Koh, S Lin, I Nevat
2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor …, 2014
252014
Rate limiting client puzzle schemes for denial-of-service mitigation
JY Koh, JTC Ming, D Niyato
2013 IEEE Wireless Communications and Networking Conference (WCNC), 1848-1853, 2013
162013
Privacy-aware incentive mechanism for mobile crowd sensing
JY Koh, GW Peters, D Leong, I Nevat, WC Wong
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
142017
Reliable privacy-preserving communications for wireless ad hoc networks
JY Koh, JCM Teo, D Leong, WC Wong
2015 IEEE International Conference on Communications (ICC), 6271-6276, 2015
112015
Probabilistic routing in wireless networks with privacy guarantees
JY Koh, GW Peters, I Nevat, D Leong
Computer Communications 151, 228-237, 2020
52020
Localizing wireless jamming attacks with minimal network resources
JY Koh, P Zhang
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017
42017
Mitigating Byzantine attacks in data fusion process for wireless sensor networks using witnesses
YK Jing, JCM Teo, WC Wong
2014 IEEE International Conference on Communication Systems, 263-267, 2014
42014
Privacy considerations in participatory data collection via spatial Stackelberg incentive mechanisms
JY Koh, GW Peters, I Nevat, D Leong
Methodology and Computing in Applied Probability 23 (3), 1097-1128, 2021
32021
Spatial Stackelberg incentive mechanism for privacy-aware mobile crowd sensing
JY Koh, G Peters, I Nevat, D Leong
Journal of Machine Learning Research 1, 1-48, 2000
32000
SECURITY AND PRIVACY IN WIRELESS
JY KOH
NATIONAL UNIVERSITY OF SINGAPORE, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–12