default search action
Kewei Sha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Hui Sun, Zhiyong Wang, Ying Yu, Kewei Sha, Yalong Wu:
EdgeBrain: A Game Based Collaborative Computational Task Offloading Framework for Edge Video Analytics. IEEE Trans. Serv. Comput. 17(5): 2287-2303 (2024) - [j26]Hui Sun, Xiuye Zhang, Bo Zhang, Kewei Sha, Weisong Shi:
Optimal Task Offloading and Trajectory Planning Algorithms for Collaborative Video Analytics With UAV-Assisted Edge in Disaster Rescue. IEEE Trans. Veh. Technol. 73(5): 6811-6828 (2024) - [c41]Yuhan Zhou, Fengjiao Tu, Kewei Sha, Junhua Ding, Haihua Chen:
A Survey on Data Quality Dimensions and Tools for Machine Learning Invited Paper. AITest 2024: 120-131 - [c40]Yalong Wu, Shalini Dhamodharan, Vinuthna Ghattamaneni, Narmada Kokila, Chandrika Pathakamuri, Timothy Carter, Pu Tian, Kewei Sha:
Big Data Quality Scoring for Structured Data Using MapReduce. ICCCN 2024: 1-6 - [i1]Yuhan Zhou, Fengjiao Tu, Kewei Sha, Junhua Ding, Haihua Chen:
A Survey on Data Quality Dimensions and Tools for Machine Learning. CoRR abs/2406.19614 (2024) - 2023
- [j25]Hui Sun, Yiru Chen, Kewei Sha, Shaoyuan Huang, Xiaofei Wang, Weisong Shi:
A Proactive On-Demand Content Placement Strategy in Edge Intelligent Gateways. IEEE Trans. Parallel Distributed Syst. 34(7): 2072-2090 (2023) - [j24]Ran Ding, Yan Xu, Hong Zhong, Jie Cui, Kewei Sha:
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. IEEE Trans. Serv. Comput. 16(5): 3782-3795 (2023) - [c39]Ross B. Niswanger, Kewei Sha, Dorothea C. Lerman:
Poster: Design of Mixed Reality Dangerous Situations for Autistic Children: Road Safety. CHASE 2023: 205-206 - [c38]Zachary P. Neal, Kewei Sha:
Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras. ICCCN 2023: 1-7 - [c37]Kewei Sha:
Message from the Workshop General Chair. ICCCN 2023: 1-2 - [c36]Kewei Sha:
Message from the General Chair. SEC 2023: xii - 2022
- [j23]Sai Ram Vallam Sudhakar, Namrata Kayastha, Kewei Sha:
OFES: Optimal feature evaluation and selection for multi-class classification. Data Knowl. Eng. 139: 102007 (2022) - [j22]Hui Sun, Bo Zhang, Xiuye Zhang, Ying Yu, Kewei Sha, Weisong Shi:
FlexEdge: Dynamic Task Scheduling for a UAV-Based On-Demand Mobile Edge Server. IEEE Internet Things J. 9(17): 15983-16005 (2022) - [j21]Hui Sun, Ying Yu, Kewei Sha, Hong Zhong:
EdgeEye: A Data-Driven Approach for Optimal Deployment of Edge Video Analytics. IEEE Internet Things J. 9(19): 19273-19295 (2022) - [j20]Hui Sun, Qiyuan Li, Kewei Sha, Ying Yu:
ElasticEdge: An Intelligent Elastic Edge Framework for Live Video Analytics. IEEE Internet Things J. 9(22): 23031-23046 (2022) - [j19]Otmane Azeroual, Meena Jha, Anastasija Nikiforova, Kewei Sha, Mohammad A. Alsmirat, Sanjay Jha:
A Record Linkage-Based Data Deduplication Framework with DataCleaner Extension. Multimodal Technol. Interact. 6(4): 27 (2022) - [j18]Youhuizi Li, Yuyu Yin, Xu Chen, Jian Wan, Gangyong Jia, Kewei Sha:
A Secure Dynamic Mix Zone Pseudonym Changing Scheme Based on Traffic Context Prediction. IEEE Trans. Intell. Transp. Syst. 23(7): 9492-9505 (2022) - [c35]Kewei Sha, Piyush Manghani, Dorothea C. Lerman:
Poster: Design of AI-Powered Augmented Reality Games for Autistic Children. CHASE 2022: 154-155 - [c34]Thomas Neumann, Kyle Welsh, Caden Perez, Kewei Sha, Yalong Wu:
R2 P3: Renewal-Reward Process-Based Password Protection in Internet of Things. ICCCN 2022: 1-7 - [c33]Yalong Wu, Kewei Sha, Kwok-Bun Yue:
Poster: Blockchain-Enabled Federated Edge Learning for Big Data Quality Assessment. SEC 2022: 284-285 - [c32]Hui Sun, Yiru Chen, Kewei Sha, Yalong Wu:
Poster: Ensemble Federated Edge Learning for Recommender Systems. SEC 2022: 291-292 - 2021
- [j17]Sai Ram Vallam Sudhakar, Namrata Kayastha, Kewei Sha:
ActID: An efficient framework for activity sensor based user identification. Comput. Secur. 108: 102319 (2021) - [c31]Kwok-Bun Yue, Pavani Kallempudi, Kewei Sha, Wei Wei, Xinying Liu:
Governance Attributes of Consortium Blockchain Applications. AMCIS 2021 - [c30]Kewei Sha, Wei Wei, Arpit Jain:
Design of Network Forensics Labs for Teaching-oriented Institutions. CSCI 2021: 959-963 - [c29]Kewei Sha:
Lessons and Experiences From Teaching Computing Science Capstone Project Courses. CSCI 2021: 990-995 - 2020
- [j16]Hui Sun, Ying Yu, Kewei Sha, Bendong Lou:
mVideo: Edge Computing Based Mobile Video Processing Systems. IEEE Access 8: 11615-11623 (2020) - [j15]Kewei Sha, T. Andrew Yang, Wei Wei, Sadegh Davari:
A survey of edge computing-based designs for IoT security. Digit. Commun. Networks 6(2): 195-202 (2020)
2010 – 2019
- 2019
- [j14]Youhuizi Li, Zeyong Dong, Kewei Sha, Congfeng Jiang, Jian Wan, Yuan Wang:
TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing. IEEE Access 7: 40240-40257 (2019) - [c28]Kewei Sha, Zhandong Liu, Jack Dempsey:
Poster Abstract: Augmented Reality Based Therapy System for Social Skill Deficits. CHASE 2019: 19-20 - [c27]Namrata Kayastha, Kewei Sha:
Poster Abstract: A Novel and Efficient Approach to Evaluate Biometric Features for User Identification. CHASE 2019: 21-22 - [c26]Kewei Sha, Youhuizi Li:
ChordEdge: design of chord ring and SDN based edge infrastructure management system: poster. SEC 2019: 280-282 - 2018
- [j13]Kewei Sha, Wei Wei, T. Andrew Yang, Zhiwei Wang, Weisong Shi:
On security challenges and open issues in Internet of Things. Future Gener. Comput. Syst. 83: 326-337 (2018) - [c25]Kewei Sha, Madhu Kumari:
Patient Identification Based on Wrist Activity Data. CHASE 2018: 29-30 - [c24]Yunxiang Zhang, Xiaokun Yang, Lei Wu, Jiang Lu, Kewei Sha, Archit Gajjar, Han He:
Exploring Slice-Energy Saving on an Video Processing FPGA Platform with Approximate Computing. ICACS 2018: 138-143 - [c23]Hong Zhong, Bo Huang, Jie Cui, Jiang Li, Kewei Sha:
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. ICCCN 2018: 1-8 - [c22]Jie Cui, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha:
Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. ICCCN 2018: 1-9 - [c21]Siguang Chen, Zhihao Wang, Kewei Sha:
Cluster-Aware Kronecker Supported Data Collection for Sensory Data. ICCCN 2018: 1-6 - 2017
- [j12]Aseel Basheer, Kewei Sha:
Cluster-Based Quality-Aware Adaptive Data Compression for Streaming Data. ACM J. Data Inf. Qual. 9(1): 2:1-2:33 (2017) - [j11]Kewei Sha, Naif Alatrash, Zhiwei Wang:
A Secure and Efficient Framework to Read Isolated Smart Grid Devices. IEEE Trans. Smart Grid 8(6): 2519-2531 (2017) - [c20]Naveen Manoharan, Kewei Sha, Jiang Lu:
Exercise Evaluation Using Wrist Sensors. CHASE 2017: 268-269 - [c19]Jie Cui, Wenyu Xu, Kewei Sha, Hong Zhong:
An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs. CollaborateCom 2017: 508-518 - [c18]Mousa Alramadhan, Kewei Sha:
An Overview of Access Control Mechanisms for Internet of Things. ICCCN 2017: 1-6 - [c17]Kewei Sha, Ranadheer Errabelly, Wei Wei, T. Andrew Yang, Zhiwei Wang:
EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security. ICFEC 2017: 81-88 - 2016
- [j10]Shiwen Mao, Honggang Wang, Aaron Striegel, Kewei Sha:
Guest Editorial: Special Issue on Cognitive, Cellular and Mobile Networks. EAI Endorsed Trans. Wirel. Spectr. 2(7): e1 (2016) - [c16]Aseel Basheer, Kewei Sha:
QAAC: Quality-Assured Adaptive Data Compression for Sensor Data. ICCCN 2016: 1-6 - [c15]Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang:
Design and implementation of a multi-facet hierarchical cybersecurity education framework. ISI 2016: 273-278 - [c14]Sicong Liu, Junzhao Du, Xue Yang, Rui Li, Hui Liu, Kewei Sha:
CrowdBlueNet: Maximizing Crowd Data Collection Using Bluetooth Ad Hoc Networks. WASA 2016: 356-366 - 2015
- [j9]Kewei Sha, Sherali Zeadally:
Data Quality Challenges in Cyber-Physical Systems. ACM J. Data Inf. Qual. 6(2-3): 8:1-8:4 (2015) - [c13]Tom V. Darling, Kewei Sha:
REMEDY: Remote exercise monitoring using an evaluative data sensing system for cancer. HealthCom 2015: 661-664 - 2014
- [c12]Junzhao Du, Sicong Liu, Chi Xu, Kai Wang, Hui Liu, Kewei Sha:
Lightweight construction of the information potential field in wireless sensor networks. ICCCN 2014: 1-8 - [c11]Kewei Sha, Chenguang Xu, Zhiwei Wang:
One-time symmetric key based cloud supported secure smart meter reading. ICCCN 2014: 1-6 - 2013
- [j8]Kewei Sha, Jegnesh Gehlot, Robert A. Greve:
Multipath Routing Techniques in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 70(2): 807-829 (2013) - [j7]Kewei Sha, Zhengping Wu:
Editorial: Special Issue in Privacy, Security and Trust for Mobile Systems. Wirel. Pers. Commun. 73(1): 1-3 (2013) - [j6]Zhiwei Wang, Kewei Sha, Wei Lv:
Slight Homomorphic Signature for Access Controlling in Cloud Computing. Wirel. Pers. Commun. 73(1): 51-61 (2013) - 2010
- [j5]Kewei Sha, Shinan Wang, Weisong Shi:
: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs. IEEE Trans. Veh. Technol. 59(3): 1183-1190 (2010) - [c10]Junzhao Du, Yawei Li, Hui Liu, Kewei Sha:
On Sweep Coverage with Minimum Mobile Sensors. ICPADS 2010: 283-290 - [c9]Junzhao Du, Chang Liu, Hui Liu, Kewei Sha:
Sleep-Wakeup Algorithms for Virtual Barriers of Wireless Sensor Networks in 3D Space. MSN 2010: 47-52
2000 – 2009
- 2009
- [j4]Junzhao Du, Weisong Shi, Kewei Sha:
Asymmetry-aware link layer services in wireless sensor networks. J. Embed. Comput. 3(2): 141-154 (2009) - [c8]Shinan Wang, Kewei Sha, Weisong Shi:
Post abstract: Role-based deceptive detection and filtering in WSNs. IPSN 2009: 387-388 - 2008
- [j3]Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang:
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. J. Comput. Sci. Technol. 23(6): 916-928 (2008) - [j2]Kewei Sha, Weisong Shi:
Consistency-driven data quality management of networked sensor systems. J. Parallel Distributed Comput. 68(9): 1207-1221 (2008) - [c7]Kewei Sha, Guoxing Zhan, Safwan Al-Omari, Tim Calappi, Weisong Shi, Carol J. Miller:
Data Quality and Failures Characterization of Sensing Data in Environmental Applications. CollaborateCom 2008: 679-695 - 2007
- [c6]Kewei Sha, Weisong Shi:
Modeling Data Consistency in Wireless Sensor Networks. ICDCS Workshops 2007: 16 - [c5]Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang:
Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks. ISADS 2007: 344-351 - 2006
- [j1]Kewei Sha, Junzhao Du, Weisong Shi:
WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs. Int. J. Sens. Networks 1(3/4): 156-168 (2006) - [c4]Kewei Sha, Weisong Shi:
On the Effects of Consistency in Data Operations in Wireless Sensor Networks. ICPADS (1) 2006: 195-202 - 2005
- [c3]Junzhao Du, Weisong Shi, Kewei Sha:
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks. EUC 2005: 745-754 - 2004
- [c2]Weisong Shi, Sivakumar Sellamuthu, Kewei Sha, Loren Schwiebert:
QueryAgent: A General Query Processing Tool for Sensor Networks. ICPP Workshops 2004: 488-495 - [c1]Kewei Sha, Weisong Shi:
Revisiting the lifetime of wireless sensor networks. SenSys 2004: 299-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint