Wei-Shinn Ku - Publications

Affiliations: 
Auburn University, Auburn, AL, United States 
Area:
Computer Science

36 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Li W, Chen H, Ku W, Qin X. Turbo-GTS: A Fast Framework of Optimizing Task Throughput for Large-Scale Mobile Crowdsourcing Acm Transactions On Spatial Algorithms and Systems. 6: 1-29. DOI: 10.1145/3363450  0.427
2019 Sakai K, Sun M, Ku W, Wu J, Lai TH. Secure Data Communications in Wireless Networks Using Multi-Path Avoidance Routing Ieee Transactions On Wireless Communications. 18: 4753-4767. DOI: 10.1109/Twc.2019.2928801  0.396
2019 Sakai K, Sun M, Ku W, Wu J. On Anonymous Routing in Delay Tolerant Networks Ieee Transactions On Mobile Computing. 18: 2926-2940. DOI: 10.1109/Tmc.2018.2886349  0.406
2019 Sakai K, Sun M, Ku W, Lu H, Lai TH. Data Verification in Integrated RFID Systems Ieee Systems Journal. 13: 1969-1980. DOI: 10.1109/Jsyst.2018.2865571  0.375
2019 Zhang J, Harn P, Ku W, Sun M, Qin X, Lu H, Jiang X. An overlapping Voronoi diagram-based system for multi-criteria optimal location queries Geoinformatica. 23: 105-161. DOI: 10.1007/S10707-018-00338-7  0.393
2017 Teng S, Ku W, Chuang K. Toward mining user movement behaviors in indoor environments Sigspatial Special. 9: 19-27. DOI: 10.1145/3151123.3151127  0.369
2017 Teng S, Ku W, Chuang K. Toward Mining Stop-by Behaviors in Indoor Space Acm Transactions On Spatial Algorithms and Systems. 3: 7. DOI: 10.1145/3106736  0.393
2017 Wang W, Ku W. Dynamic indoor navigation with bayesian filters Sigspatial Special. 8: 9-10. DOI: 10.1145/3100243.3100249  0.344
2017 Sakai K, Sun M, Ku W, Wu J, Alanazi FS. Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks Ieee Transactions On Mobile Computing. 16: 3473-3487. DOI: 10.1109/Tmc.2017.2690634  0.389
2017 Chen H, Ku W, Wang H, Tang L, Sun M. Scaling Up Markov Logic Probabilistic Inference for Social Graphs Ieee Transactions On Knowledge and Data Engineering. 29: 433-445. DOI: 10.1109/Tkde.2016.2625251  0.499
2016 Zhang J, Jiang X, Ku WS, Qin X. Efficient parallel skyline evaluation using MapReduce Ieee Transactions On Parallel and Distributed Systems. 27: 1996-2009. DOI: 10.1109/Tpds.2015.2472016  0.335
2016 Sun M, Sakai K, Ku W, Lai TH, Vasilakos AV. Private and Secure Tag Access for Large-Scale RFID Systems Ieee Transactions On Dependable and Secure Computing. 13: 657-671. DOI: 10.1109/Tdsc.2015.2427833  0.388
2016 Sakai K, Sun MT, Ku WS, Lai TH. A novel coding scheme for secure communications in distributed RFID systems Ieee Transactions On Computers. 65: 409-421. DOI: 10.1109/Tc.2015.2423671  0.339
2016 Tang L, Chen H, Ku WS, Sun MT. Exploiting location-aware social networks for efficient spatial query processing Geoinformatica. 1-23. DOI: 10.1007/S10707-016-0271-0  0.548
2015 Zhang J, Jiang X, Qin X, Ku WS, Alghamdi MI. Frog: A framework for context-based file systems Acm Transactions On Storage. 11. DOI: 10.1145/2720022  0.343
2015 Sakai K, Sun MT, Ku WS, Lai TH, Vasilakos AV. A Framework for the Optimal k-Coverage Deployment Patterns of Wireless Sensors Ieee Sensors Journal. 15: 7273-7283. DOI: 10.1109/Jsen.2015.2474711  0.323
2014 Jing Y, Hu L, Ku WS, Shahabi C. Authentication of k nearest neighbor query on road networks Ieee Transactions On Knowledge and Data Engineering. 26: 1494-1506. DOI: 10.1109/Tkde.2013.174  0.456
2013 Sakai K, Ku WS, Sun MT, Zimmermann R. Privacy preserving continuous multimedia streaming in MANETs Acm Transactions On Multimedia Computing, Communications and Applications. 9. DOI: 10.1145/2501643.2501645  0.404
2013 Ku WS, Chen H, Wang H, Sun MT. A bayesian inference-based framework for RFID data cleansing Ieee Transactions On Knowledge and Data Engineering. 25: 2177-2191. DOI: 10.1109/Tkde.2012.116  0.505
2013 Hu L, Ku WS, Bakiras S, Shahabi C. Spatial query integrity with voronoi neighbors Ieee Transactions On Knowledge and Data Engineering. 25: 863-876. DOI: 10.1109/Tkde.2011.267  0.446
2013 Sakai K, Ku WS, Zimmermann R, Sun MT. Dynamic bit encoding for privacy protection against correlation attacks in RFID backward channel Ieee Transactions On Computers. 62: 112-123. DOI: 10.1109/Tc.2011.248  0.34
2013 Ku WS, Chen H, Wang CJ, Liu CM. Geo-store: A framework for supporting semantics-enabled location-based services Ieee Internet Computing. 17: 35-43. DOI: 10.1109/Mic.2012.21  0.52
2013 Ku WS, Hu L, Shahabi C, Wang H. A query integrity assurance scheme for accessing outsourced spatial databases Geoinformatica. 17: 97-124. DOI: 10.1007/S10707-012-0156-9  0.424
2012 Wang CJ, Ku WS. Anonymous sensory data collection approach for mobile participatory sensing Proceedings - 2012 Ieee 28th International Conference On Data Engineering Workshops, Icdew 2012. 220-227. DOI: 10.1109/ICDEW.2012.78  0.325
2011 Ku W, Sakai K, Sun M. The optimal k-covering tag deployment for RFID-based localization Journal of Network and Computer Applications. 34: 914-924. DOI: 10.1016/J.Jnca.2010.04.012  0.324
2010 Hsueh Y, Zimmermann R, Ku W. Efficient Location Updates for Continuous Queries over Moving Objects Journal of Computer Science and Technology. 25: 415-430. DOI: 10.1007/S11390-010-9334-0  0.422
2010 Chen H, Ku W, Sun M, Zimmermann R. The partial sequenced route query with traveling rules in road networks Geoinformatica. 15: 541-569. DOI: 10.1007/S10707-010-0115-2  0.534
2009 Hu H, Chen Y, Ku WS, Su Z, Chen CHJ. Weighted trust evaluation-based malicious node detection for wireless sensor networks International Journal of Information and Computer Security. 3: 132. DOI: 10.1504/Ijics.2009.028810  0.346
2008 Ku W, Zimmermann R, Wang H. Location-Based Spatial Query Processing with Data Sharing in Wireless Broadcast Environments Ieee Transactions On Mobile Computing. 7: 778-791. DOI: 10.1109/Tmc.2007.70791  0.431
2008 Ku WS, Zimmermann R. Nearest neighbor queries with peer-to-peer data sharing in mobile environments Pervasive and Mobile Computing. 4: 775-788. DOI: 10.1016/J.Pmcj.2008.08.001  0.418
2008 Ku W, Chen Y, Zimmermann R. Privacy Protected Spatial Query Processing for Advanced Location Based Services Wireless Personal Communications. 51: 53-65. DOI: 10.1007/S11277-008-9608-9  0.451
2007 Chen Y, Hwang K, Ku W. Collaborative Detection of DDoS Attacks over Multiple Network Domains Ieee Transactions On Parallel and Distributed Systems. 18: 1649-1662. DOI: 10.1109/Tpds.2007.1111  0.359
2006 Zimmermann R, Ku W, Wang H, Zand A, Bardet J-. A Distributed Geotechnical Information Management and Exchange Architecture Ieee Internet Computing. 10: 26-33. DOI: 10.1109/Mic.2006.92  0.324
2005 Wang H, Zimmermann R, Ku W. ASPEN: an adaptive spatial peer-to-peer network International Journal of Geographical Information Science. 230-239. DOI: 10.1145/1097064.1097097  0.42
2005 Ku W, Zimmermann R, Wang H, Wan C. Adaptive nearest neighbor queries in travel time networks International Journal of Geographical Information Science. 210-219. DOI: 10.1145/1097064.1097094  0.403
2004 Zimmermann R, Ku W, Chu W. Efficient query routing in distributed spatial databases International Journal of Geographical Information Science. 176-183. DOI: 10.1145/1032222.1032249  0.422
Show low-probability matches.