default search action
Maggie Xiaoyan Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Dafa Li, Maggie Xiaoyan Cheng, Xiongrong Li, Shuwany Li:
Classification of large black holes. Quantum Inf. Comput. 24(7&8): 576-608 (2024) - [j24]Dafa Li, Maggie Xiaoyan Cheng, Xiangrong Li, Shuwany Li:
The necessary and sufficient condition for the uniqueness of Schmidt decomposition and the necessary condition for the maximal von Neumann entanglement entropy. Quantum Inf. Comput. 24(9&10): 800-824 (2024) - [i2]Pawan Negi, Maggie Xiaoyan Cheng, Mahesh Krishnamurthy, Wenjun Ying, Shuwang Li:
Learning Domain-Independent Green's Function For Elliptic Partial Differential Equations. CoRR abs/2401.17172 (2024) - [i1]Huiyuan Yu, Jia He, Maggie X. Cheng:
Fast OMP for Exact Recovery and Sparse Approximation. CoRR abs/2404.00146 (2024) - 2023
- [j23]Dafa Li, Maggie Xiaoyan Cheng, Xiangrong Li, Shuwang Li:
A relation among tangle, 3-tangle, and von Neumann entropy of entanglement for three qubits. Quantum Inf. Process. 22(1): 14 (2023) - 2021
- [j22]Jia He, Maggie X. Cheng:
Weighting Methods for Rare Event Identification From Imbalanced Datasets. Frontiers Big Data 4: 715320 (2021) - [c39]Shuya Feng, Jia He, Maggie X. Cheng:
Security Analysis of Block Withholding Attacks in Blockchain. ICC 2021: 1-6 - 2020
- [c38]Jia He, Maggie X. Cheng:
Graph Convolutional Neural Networks for Power Line Outage Identification. ICPR 2020: 4198-4205 - [c37]Huiyuan Yu, Maggie X. Cheng, Yingdong Lu:
A Randomized Algorithm for Sparse Recovery. ICPR 2020: 8312-8319
2010 – 2019
- 2019
- [c36]Xinhui Zhan, Fiona Nah, Keng Siau, Richard H. Hall, Maggie X. Cheng:
Impact of Framing and Base Size of Computer Security Risk Information. AMCIS 2019 - 2018
- [c35]Xinhui Zhan, Fiona Fui-Hoon Nah, Maggie X. Cheng:
An Assessment of Users' Cyber Security Risk Tolerance in Reward-Based Exchange. HCI (23) 2018: 431-441 - [c34]Maggie X. Cheng, Yi Ling, Wei Biao Wu:
MAC Layer Misbehavior Detection Using Time Series Analysis. ICC 2018: 1-7 - [c33]Jia He, Maggie X. Cheng, Yixin Fang, Mariesa L. Crow:
A Machine Learning Approach for Line Outage Identification in Power Systems. LOD 2018: 482-493 - 2017
- [j21]Maggie X. Cheng, Yi Ling, Brian M. Sadler:
Network connectivity assessment and improvement through relay node deployment. Theor. Comput. Sci. 660: 86-101 (2017) - [c32]Maggie X. Cheng, Yi Ling, Wei Biao Wu:
Time Series Analysis for Jamming Attack Detection in Wireless Networks. GLOBECOM 2017: 1-7 - 2016
- [j20]Maggie X. Cheng, Wei Biao Wu:
Data Analytics for Fault Localization in Complex Networks. IEEE Internet Things J. 3(5): 701-708 (2016) - [j19]Wei Biao Wu, Maggie X. Cheng, Bei Gou:
A Hypothesis Testing Approach for Topology Error Detection in Power Grids. IEEE Internet Things J. 3(6): 979-985 (2016) - [c31]Samuel N. Smith, Fiona Fui-Hoon Nah, Maggie X. Cheng:
The Impact of Security Cues on User Perceived Security in e-Commerce. HCI (20) 2016: 164-173 - [c30]Maggie X. Cheng, Yi Ling, Wei Biao Wu:
In-band wormhole detection in wireless ad hoc networks using change point detection method. ICC 2016: 1-6 - [c29]Maggie X. Cheng, Wei Biao Wu:
A model-free localization method for sensor networks with sparse anchors. ICC 2016: 1-7 - [c28]Maggie X. Cheng, Quanmin Ye, Xiaochun Cheng, Lin Cai:
Maximizing coding gain in wireless networks with decodable network coding. ICC 2016: 1-6 - 2015
- [j18]Maggie Xiaoyan Cheng, Quanmin Ye, Lin Cai:
Rate-Adaptive Concurrent Transmission Scheduling Schemes for WPANs With Directional Antennas. IEEE Trans. Veh. Technol. 64(9): 4113-4123 (2015) - [c27]Maggie X. Cheng, Yi Ling, Brian M. Sadler:
SINR-based connectivity enhancement in wireless ad hoc networks. ICC 2015: 3696-3701 - [c26]Maggie X. Cheng, Quanmin Ye, Xiaochun Cheng, Robert F. Erbacher:
Network coding and coding-aware scheduling for multicast in wireless networks. ICC 2015: 5703-5708 - 2014
- [c25]Kenneth K. Fletcher, Xiaoqing (Frank) Liu, Maggie X. Cheng:
Aggregating Ranked Services for Selection. IEEE SCC 2014: 331-338 - [c24]Maggie X. Cheng, Yi Ling, Brian M. Sadler:
Wireless ad hoc networks connectivity assessment and relay node deployment. GLOBECOM 2014: 399-404 - [c23]Maggie X. Cheng, Quanmin Ye, Lin Cai:
Concurrent transmission scheduling for WPANs with adaptive data rate. GLOBECOM 2014: 4814-4819 - 2013
- [j17]Maggie Xiaoyan Cheng, Quanmin Ye, Lin Cai:
Cross-Layer Schemes for Reducing Delay in Multihop Wireless Networks. IEEE Trans. Wirel. Commun. 12(2): 928-937 (2013) - [c22]Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher:
Visualizing graph features for fast port scan detection. CSIIRW 2013: 30 - [c21]Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher:
Vulnerability analysis of a smart grid with monitoring and control system. CSIIRW 2013: 59 - [c20]Maggie X. Cheng, Quanmin Ye, Xiaochun Cheng:
Simultaneous routing and multiplexing in ad hoc networks with MIMO links. ICC 2013: 1414-1418 - [c19]Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher:
Characterization and visualization of sophisticated scanning attacks. ICC 2013: 2047-2051 - 2012
- [c18]Maggie Xiaoyan Cheng, Quanmin Ye:
A Combinatorial Solution for scheduling spatial multiplexing in MIMO-based ad hoc networks. GLOBECOM Workshops 2012: 931-936 - [c17]Maggie Xiaoyan Cheng, Quanmin Ye:
Transmission scheduling based on a new conflict graph model for multicast in multihop wireless networks. GLOBECOM 2012: 5717-5722 - 2011
- [j16]Xuan Gong, Maggie X. Cheng, Yibo Xu:
Throughput and Delay Optimization with Configurable Tradeoff in Multihop Wireless Networks. Discret. Math. Algorithms Appl. 3(1): 43-52 (2011) - [j15]Maggie X. Cheng, Xuan Gong:
Maximum lifetime coverage preserving scheduling algorithms in sensor networks. J. Glob. Optim. 51(3): 447-462 (2011) - [j14]Maggie X. Cheng, Xuan Gong, Lin Cai, Xiaohua Jia:
Cross-Layer Throughput Optimization With Power Control in Sensor Networks. IEEE Trans. Veh. Technol. 60(7): 3300-3308 (2011) - [c16]Maggie X. Cheng, Quanmin Ye:
Towards Minimum Delay Broadcasting and Multicasting in Multihop Wireless Networks. COCOA 2011: 546-560 - [c15]Maggie X. Cheng, Xuan Gong, Yibo Xu, Lin Cai:
Link Activity Scheduling for Minimum End-to-End Latency in Multihop Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c14]Maggie X. Cheng, Xuan Gong, Peng-Jun Wan:
Minimum Delay Routing in Multihop Wireless Networks. WASA 2011: 146-156 - 2010
- [c13]Maggie X. Cheng, Xuan Gong:
Interference-Aware Multipath Routing and Link Rate Control in Multihop Wireless Networks. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [j13]Maggie Xiaoyan Cheng, Xuan Gong, Lin Cai:
Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks. IEEE Trans. Wirel. Commun. 8(7): 3770-3779 (2009) - [c12]Maggie X. Cheng, Xuan Gong, Scott C.-H. Huang:
Improving Sensor Network Lifetime Through Hierarchical Multihop Clustering. ICC 2009: 1-6 - [c11]Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, Maggie X. Cheng:
Bio-Inspired Node Localization in Wireless Sensor Networks. SMC 2009: 205-210 - [e1]Maggie X. Cheng:
Nano-Net - Third International ICST Conference, NanoNet 2008, Boston, MA, USA, September 14-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 3, Springer 2009, ISBN 978-3-642-02426-9 [contents] - 2008
- [j12]Maggie X. Cheng, Li Yin:
Energy-efficient data gathering algorithm in sensor networks with partial aggregation. Int. J. Sens. Networks 4(1/2): 48-54 (2008) - [c10]Maggie X. Cheng, Xuan Gong, Lin Cai:
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks. GLOBECOM 2008: 5123-5127 - [c9]Maggie X. Cheng, Xuan Gong, Lin Cai, Ahmad Ali Abdullah:
Transmission Scheduling for CBR Traffic in Multihop Wireless Networks. WASA 2008: 298-309 - 2007
- [j11]Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu:
Coverage breach problems in bandwidth-constrained sensor networks. ACM Trans. Sens. Networks 3(2): 12 (2007) - [c8]Maggie X. Cheng, Li Yin:
Transmission Scheduling in Sensor Networks via Directed Edge Coloring. ICC 2007: 3710-3715 - 2006
- [j10]Scott C.-H. Huang, Maggie Xiaoyan Cheng, Ding-Zhu Du:
GeoSENS: geo-based sensor network secure communication protocol. Comput. Commun. 29(4): 456-461 (2006) - [j9]Maggie Xiaoyan Cheng:
Editorial. J. Comb. Optim. 11(1): 5-6 (2006) - [j8]Maggie Xiaoyan Cheng, Jianhua Sun, Manki Min, Yingshu Li, Weili Wu:
Energy-efficient broadcast and multicast routing in multihop ad hoc wireless networks. Wirel. Commun. Mob. Comput. 6: 213-223 (2006) - [c7]Maggie X. Cheng, Yadi Ma, Yi Wang:
Improving Channel Throughput of WLANs and Ad Hoc Networks Using Explicit Denial of Requests. GLOBECOM 2006 - [c6]Mingjun Zhang, Maggie Xiaoyan Cheng, Tzyh Jong Tarn:
Genetic Code based Coding and Mathematical Formualation for DNA Computation. ICRA 2006: 3630-3635 - 2005
- [j7]Yingshu Li, Maggie Xiaoyan Cheng, Weili Wu:
Optimal topology control for balanced energy consumption in wireless networks. J. Parallel Distributed Comput. 65(2): 124-131 (2005) - [j6]Maggie Xiaoyan Cheng, David Hung-Chang Du, Ding-Zhu Du:
Location management in mobile ad hoc wireless networks using quorums and clusters. Wirel. Commun. Mob. Comput. 5: 793-803 (2005) - [c5]Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu:
Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. INFOCOM 2005: 2638-2645 - [c4]Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang:
Proving secure properties of cryptographic protocols with knowledge based approach. IPCCC 2005: 3-9 - [c3]Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan Cheng, Bruce M. McMillin:
Energy Balanced Broadcasting Through Delayed Intelligence. ITCC (2) 2005: 627-632 - 2004
- [j5]Maggie X. Cheng, Yiyuan J. Zhao:
Connectivity of Ad Hoc Networks for Advanced Air Traffic Management. J. Aerosp. Comput. Inf. Commun. 1(5): 225-238 (2004) - [j4]Maggie Xiaoyan Cheng, Mihaela Cardei, Jianhua Sun, Xiaochun Cheng, Lusheng Wang, Yinfeng Xu, Ding-Zhu Du:
Topology Control of Ad Hoc Wireless Networks for Energy Efficiency. IEEE Trans. Computers 53(12): 1629-1635 (2004) - 2003
- [j3]Maggie Xiaoyan Cheng, Xiufeng Du, Manki Min, Hung Q. Ngo, Lu Ruan, Jianhua Sun, Weili Wu:
Super link-connectivity of iterated line digraphs. Theor. Comput. Sci. 304(1-3): 461-469 (2003) - [j2]Xiuzhen Cheng, Bhagirath Narahari, Rahul Simha, Maggie Xiaoyan Cheng, Dan Liu:
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics. IEEE Trans. Mob. Comput. 2(3): 248-256 (2003) - [c2]Maggie Xiaoyan Cheng, Jianhua Sun, Manki Min, Ding-Zhu Du:
Energy-efficient broadcast and multicast routing in ad hoc wireless networks. IPCCC 2003: 87-94 - 2002
- [j1]Mihaela Cardei, David MacCallum, Maggie Xiaoyan Cheng, Manki Min, Xiaohua Jia, Deying Li, Ding-Zhu Du:
Wireless Sensor Networks with Energy Efficient Organization. J. Interconnect. Networks 3(3-4): 213-229 (2002) - [c1]Mihaela Cardei, Maggie Xiaoyan Cheng, Xiuzhen Cheng, Ding-Zhu Du:
Connected Domination in Multihop Ad Hoc Wireless Networks. JCIS 2002: 251-255
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint