Wei-Shinn Ku
Wei-Shinn Ku
Professor of Computer Science and Software Engineering, Auburn University
Verified email at - Homepage
Cited by
Cited by
Collaborative detection of DDoS attacks over multiple network domains
Y Chen, K Hwang, WS Ku
IEEE Transactions on parallel and distributed systems 18 (12), 1649-1662, 2007
Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects
MA Alcorn, Q Li, Z Gong, C Wang, L Mai, WS Ku, A Nguyen
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Adversarial and Clean Data Are Not Twins
Z Gong, W Wang, WS Ku
arXiv preprint arXiv:1704.04960, 2017
Malicious node detection in wireless sensor networks using weighted trust evaluation
IM Atakli, H Hu, Y Chen, WS Ku, Z Su
Proceedings of the 2008 Spring simulation multiconference, 836-843, 2008
Leveraging spatio-temporal redundancy for RFID data cleansing
H Chen, WS Ku, H Wang, MT Sun
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
The multi-rule partial sequenced route query
H Chen, WS Ku, MT Sun, R Zimmermann
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances …, 2008
Spatial query integrity with voronoi neighbors
L Hu, W Ku, S Bakiras, C Shahabi
IEEE Transactions on Knowledge and Data Engineering 25 (4), 863-876, 2013
Malicious Node Detection in Wireless Sensor Networks
Y Chen, H Chen, WS Ku
Security in RFID and Sensor Networks, 361, 2010
Adversarial texts with gradient methods
Z Gong, W Wang, B Li, D Song, WS Ku
arXiv preprint arXiv:1801.07175, 2018
Efficient evaluation of k-range nearest neighbor queries in road networks
J Bao, CY Chow, MF Mokbel, WS Ku
2010 Eleventh international conference on mobile data Management, 115-124, 2010
Location-based spatial query processing with data sharing in wireless broadcast environments
WS Ku, R Zimmermann, H Wang
IEEE Transactions on mobile computing 7 (6), 778-791, 2008
Distributed continuous range query processing on moving objects
H Wang, R Zimmermann, WS Ku
International Conference on Database and Expert Systems Applications, 655-665, 2006
Query integrity assurance of location-based services accessing outsourced spatial databases
WS Ku, L Hu, C Shahabi, H Wang
Advances in Spatial and Temporal Databases: 11th International Symposium …, 2009
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
J Feng, Y Chen, WS Ku, P Liu
2010 39th International Conference on Parallel Processing Workshops, 251-258, 2010
Privacy protected query processing on spatial networks
WS Ku, R Zimmermann, WC Peng, S Shroff
2007 IEEE 23rd International Conference on Data Engineering Workshop, 215-220, 2007
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
J Feng, Y Chen, D Summerville, WS Ku, Z Su
2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011
Privacy protected spatial query processing for advanced location based services
WS Ku, Y Chen, R Zimmermann
Wireless personal communications 51, 53-65, 2009
A cloaking algorithm based on spatial networks for location privacy
PY Li, WC Peng, TW Wang, WS Ku, J Xu, JA Hamilton Jr
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2008
Efficient parallel skyline evaluation using MapReduce
J Zhang, X Jiang, WS Ku, X Qin
IEEE Transactions on Parallel and Distributed Systems 27 (7), 1996-2009, 2015
The partial sequenced route query with traveling rules in road networks
H Chen, WS Ku, MT Sun, R Zimmermann
GeoInformatica 15, 541-569, 2011
The system can't perform the operation now. Try again later.
Articles 1–20