Tongtong Li
Tongtong Li
Professor of ECE, Michigan State University
Verified email at egr.msu.edu - Homepage
Title
Cited by
Cited by
Year
The handbook of technology management: Supply chain management, marketing and advertising, and global management
JRTLH Bidgoli
1432010
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
IEEE transactions on information forensics and security 9 (5), 772-781, 2014
1062014
Cost-aware secure routing (CASER) protocol design for wireless sensor networks
D Tang, T Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014
832014
Anti-jamming message-driven frequency hopping—Part I: System design
L Zhang, H Wang, T Li
IEEE transactions on wireless communications 12 (1), 70-79, 2012
782012
Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion
JK Tugnait, T Li
IEEE transactions on signal processing 49 (7), 1300-1309, 2001
632001
Blind asynchronous multiuser CDMA receivers for ISI channels using code-aided CMA
JK Tugnait, T Li
IEEE Journal on Selected Areas in Communications 19 (8), 1520-1530, 2001
572001
Blind identification of the aortic pressure waveform from multiple peripheral artery pressure waveforms
G Swamy, Q Ling, T Li, R Mukkamala
American Journal of Physiology-Heart and Circulatory Physiology 292 (5 …, 2007
562007
Anti-jamming message-driven frequency hopping—Part II: Capacity analysis under disguised jamming
L Zhang, T Li
IEEE transactions on wireless communications 12 (1), 80-88, 2012
532012
Secure wireless monitoring and control systems for smart grid and smart home
T Li, J Ren, X Tang
IEEE Wireless Communications 19 (3), 66-73, 2012
492012
Distributed detection in mobile access wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, J Ren, T Li
IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013
482013
An energy efficient link-layer security protocol for wireless sensor networks
LE Lighfoot, J Ren, T Li
2007 IEEE International Conference on Electro/Information Technology, 233-238, 2007
452007
Message-driven frequency hopping: Design and analysis
Q Ling, T Li
IEEE transactions on wireless communications 8 (4), 1773-1782, 2009
442009
Bitcoin and blockchain: Security and privacy
E Zaghloul, T Li, MW Mutka, J Ren
IEEE Internet of Things Journal 7 (10), 10288-10313, 2020
392020
On phy-layer security of cognitive radio: Collaborative sensing under malicious attacks
H Wang, L Lightfoot, T Li
2010 44th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2010
382010
Joint transmitter-receiver optimization for partial response channels based on nonmaximally decimated filterbank precoding technique
T Li, Z Ding
IEEE transactions on signal processing 47 (9), 2407-2414, 1999
361999
Resource allocation with load balancing for cognitive radio networks
H Wang, J Ren, T Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
342010
Secure collision-free frequency hopping for OFDMA-based wireless networks
L Lightfoot, L Zhang, J Ren, T Li
EURASIP Journal on Advances in Signal Processing 2009, 1-11, 2009
322009
Hybrid ALOHA: a novel MAC protocol
H Wang, T Li
IEEE Transactions on signal processing 55 (12), 5821-5832, 2007
322007
Cooperative sensing in cognitive networks under malicious attack
M Abdelhakim, L Zhang, J Ren, T Li
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
312011
Mobile coordinated wireless sensor network: An energy efficient scheme for real-time transmissions
M Abdelhakim, Y Liang, T Li
IEEE Journal on Selected Areas in Communications 34 (5), 1663-1675, 2016
292016
The system can't perform the operation now. Try again later.
Articles 1–20