Yanyan Zhuang
Cited by
Cited by
Time and location-critical emergency message dissemination for vehicular ad-hoc networks
Y Zhuang, J Pan, Y Luo, L Cai
IEEE Journal on Selected Areas in Communications 29 (1), 187-196, 2010
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots
D Oliveira, M Rosenthal, N Morin, KC Yeh, J Cappos, Y Zhuang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Minimizing energy consumption with probabilistic distance models in wireless sensor networks
Y Zhuang, J Pan, L Cai
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Evaluating on-demand data collection with mobile elements in wireless sensor networks
L He, Y Zhuang, J Pan, J Xu
2010 IEEE 72nd Vehicular Technology Conference-Fall, 1-5, 2010
Understanding misunderstandings in source code
D Gopstein, J Iannacone, Y Yan, L DeLong, Y Zhuang, MKC Yeh, ...
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
On the uplink MAC performance of a drive-thru Internet
Y Zhuang, J Pan, V Viswanathan, L Cai
IEEE Transactions on Vehicular Technology 61 (4), 1925-1935, 2012
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang, J Cappos
2015 IEEE Sensors Applications Symposium (SAS), 1-6, 2015
A geometric probability model for capacity analysis and interference estimation in wireless mobile cellular systems
Y Zhuang, Y Luo, L Cai, J Pan
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
A probabilistic model for message propagation in two-dimensional vehicular ad-hoc networks
Y Zhuang, J Pan, L Cai
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
Energy-optimal grid-based clustering in wireless microsensor networks
Y Zhuang, J Pan, G Wu
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
NetCheck: Network Diagnoses from Blackbox Traces
Y Zhuang, E Gessiou, S Portzer, F Fund, M Muhammad, I Beschastnikh, ...
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
Future Internet bandwidth trends: An investigation on current and future disruptive technologies
Y Zhuang, J Cappos, TS Rappaport, R McGeer
Secure Systems Lab, Dept. Comput. Sci. Eng., Polytech. Inst. New York Univ …, 2013
Random distances associated with hexagons
Y Zhuang, J Pan
arXiv preprint arXiv:1106.2200, 2011
Detecting and comparing brain activity in short program comprehension using EEG
MKC Yeh, D Gopstein, Y Yan, Y Zhuang
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
Accelerating software engineering research adoption with analysis bots
I Beschastnikh, MF Lungu, Y Zhuang
2017 IEEE/ACM 39th International Conference on Software Engineering: New …, 2017
Blursense: Dynamic fine-grained access control for smartphone privacy
J Cappos, L Wang, R Weiss, Y Yang, Y Zhuang
2014 IEEE Sensors Applications Symposium (SAS), 329-332, 2014
Random distances associated with rhombuses
Y Zhuang, J Pan
arXiv preprint arXiv:1106.1257, 2011
A Dual Lockstep Processor System-on-a-Chip for Fast Error Recovery in Safety-Critical Applications
M Sim, Y Zhuang
The 46th Annual Conference of the IEEE Industrial Electronics Society (IECON), 2020
Tradeoffs in cross platform solutions for mobile assistive technology
Y Zhuang, J Baldwin, L Antunna, YO Yazir, S Ganti, Y Coady
2013 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2013
Vulnerabilities as blind spots in developer's heuristic-based decision-making processes
J Cappos, Y Zhuang, D Oliveira, M Rosenthal, KC Yeh
Proceedings of the 2014 new security paradigms workshop, 53-62, 2014
The system can't perform the operation now. Try again later.
Articles 1–20