Publications

Conference

  • S. Abdulsalam, Z. Zong, Q. Gu, M. Qiu "Using the Greenup, Powerup, and Speedup Metrics to Evaluate Software Energy Efficiency", Proceedings of the International Green and Sustainable Computing Conference, 2015.
  • T. Penner, A. Johnson, B. V. Slyke, M. Guirguis, Q. Gu, "Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices", Proceedings of IEEE Globecom, 2014.
  • D. Jackson, W. Zang, Q. Gu, W. Cheng, "Exploiting and Defending Trust Models in Cooperative Spectrum Sensing", Proceedings of International Conference on Wireless Algorithms, Systems, and Applications, 2014.
  • S. Abdulsalam, D. Lakomski, Q. Gu, T. Jin, Z. Zong, "Program Energy Efficiency: The Impact of Language, Compiler and Implementation Choices", Proceedings of IEEE International Conference on Green Computing, 2014.
  • J. Wood, Z. Zong, Q. Gu, R. Ge, "Energy and Power Characterization of Parallel Programs Running on Intel Xeon Phi", Proceedings of the Workshop on Parallel Programming Models and Systems Software for High-End Computing, in conjunction with ICPP, 2014.
  • T. Langford, Q. Gu, A. Rivera-Longoria and M. Guirguis, "Collaborative Computing On-Demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs ", Proceedings of IEEE MASS, 2013.
  • S. Thapa, Q. Gu, "Originator Data Security for Collaborative Task Execution among Weak Devices", Proceedings of IEEE MASS (poster paper), 2013.
  • C. Walker, Q. Gu, T. Penner, "Computation Integrity in Mobile Cloud: Running Probabilistically Checkable Proof on Android", Proceedings of International Workshop on Internet of Things, 2013.
  • T. Penner, A. Johnson, M. Guirguis and Q. Gu, "Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices". Grace Hopper Conference, Poster Session, 2013.
  • Q. Gu, K. Jones, W. Zang, M. Yu, P. Liu, "Revealing Abuses of Channel Assignment Protocols in Multi-Channel Wireless Networks: An Investigation Logic Approach", Proceedings of ESORICS, 2012.
  • Q. Gu, W. Zang, M. Yu, P. Liu, "Collaborative Traffic-aware Intrusion Monitoring in Multi-channel Mesh Networks", Proceedings of IEEE Trustcom, 2012.
  • Q. Gu, M. Yu, W. Zang, P. Liu. "Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks", Proceedings of IEEE ICC, 2011.
  • M. Guirguis, R. Ogden, Z. Song, S. Thapa, Q. Gu. "Can You Help Me Run These Code Segments on Your Mobile Device?", Proceedings of IEEE Globecom, 2011.
  • H. Kim, Q. Gu, M. Yu, W. Zang, P. Liu. "A Simulation Framework for Performance Analysis of Multi-Interface and Multi-Channel Wireless Networks in INET/OMNET++", Proceedings of Communications and Networking Simulation Symposium, 2010.
  • Q. Gu. "Efficient Code Diversification for Network Reprogramming in Sensor Networks", Proceedings of ACM Conference on Wireless Network Security, 2010. (short paper)
  • Q. Gu, W. Zang, and M. Yu. Proceedings of ICST International Workshop on Security in Emerging Wireless Communication and Networking Systems, Springer, January 29, 2010.
  • C. Ferguson, Q. Gu, and H. Shi. "Self-healing Control Flow Protection in Sensor Applications", Proceedings of ACM Conference on Wireless Network Security, 2009.
  • W. Zang, Q. Gu, M. Yu, P. Liu. "An Attack-Resilient Channel Assignment MAC Protocol", Proceedings of International Conference on Network-Based Information Systems, 2009.
  • Q. Gu, X. Chen, Z. Jiang, and J. Wu. "Sink-Anonymity Mobility Control in Wireless Sensor Networks", Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2009.
  • Q. Gu and R. Noorani, "Towards Self-propagate Mal-packets in Sensor Networks" Proceedings of ACM Conference on Wireless Network Security, 2008.
  • Q. Gu, and X. Chen, "Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks" Proceeding of International Symposium on Parallel Architectures, Algorithms and Networks, 2008.
  • Y. Jhi, P. Liu, L. Li, Q. Gu, J. Jing, G. Kesidis. "PWC: A Proactive Worm Containment Solution for Enterprise Networks" Proceeding of IEEE  SecureComm, 2007.
  • Q. Gu. "Analysis of Software Vulnerability in Sensor Nodes" Proceeding of International Conference on Security and Management, 2007.
  • Q. Gu and J. Driss. "Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks" Proceeding of International Conference on Networking and Services, 2007.
  • J. Driss and Q. Gu. "Localized Broadcast Authentication in Large Sensor Networks" Proceeding of International Conference on Networking and Services, 2006.
  • Q. Gu, K Bai, H. Wang, P. Liu, C.H. Chu. "Modeling of Pollution in P2P File Sharing Systems" Proceeding of IEEE Consumer Communications and Networking Conference, 2006.

Journal

  • Z. Zong, R. Ge, Q. Gu, “Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics”, Journal of Big Data Research, Elsvier, 2017.
  • D. Jackson, W. Zang, Q. Gu, and M. Yu. "Robust detection of rogue signals in cooperative spectrum sensing". Journal of Internet Services and Information Security, 5(2):4–22, May 2015.
  • D. Jackson, W. Zang, Q. Gu, W. Cheng and M. Yu, "Exploiting and Defending Trust Models in Cooperative Spectrum Sensing", EURASIP Journal on Wireless Communications and Networking, special issues on Dynamic Spectrum Access for Throughput, Delay Fairness Enhancement In Cognitive Radio Networks, 2015.
  • S. Thapa, Q. Gu, "Collaborative Task Execution with Originator Data Security for Weak Devices", International Journal of Sensor Networks, Inderscience, 2014.
  • C. Ferguson, Q. Gu. "Self-healing Control Flow Protection in Sensor Applications", Transactions on Dependable and Secure Computing, IEEE, 2011.
  • Q. Gu, C. Fergusona, R. Noorania. "A Study Of Self-Propagating Mal-Packets In Sensor Networks: Attacks And Defenses", Computers & Security, Elsevier, 2011.
  • X. Chen, Q. Gu, J. Zheng, J. Wu. "Fast mobility control protocols with sink location protection in wireless sensor networks", International Journal of Internet Protocol Technology, Inderscience, 2011.
  • Y.-C. Jhi, P. Liu, L. Li, Q. Gu, J. Jing, and G. Kesidis. "PWC: A Proactive Worm Containment Solution for Enterprise Networks" Wiley Security and Communication Networks Journal, accepted, 2009.
  • Q. Gu, P. Liu, W.-C. Lee, and C.-H. Chu. "KTR: an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services" IEEE Transactions on Dependable and Secure Computing, 2008.
  • Q. Gu, C.-H. Chu, and P. Liu, "Modeling and Analysis of Bandwidth Competition in 802.11 Wireless Networks" International Journal of Mobile Network Design and Innovation, Inderscience, 2008.
  • Q. Gu, J. Driss. "Localized Broadcast Authentication in Large Sensor Networks" International Journal of  Intelligent Control and Systems, Special Issue on Information Assurance, 2007.
  • Q. Gu, P. Liu, S. Zhu, and C.-H. Chu. "Defense against Packet Injection Attacks in Unreliable Ad Hoc Networks" International Journal of Security and Networks, Inderscience, Special Issue on Computer & Network Security, 2007.
  • Q. Gu, C.-H. Chu, P. Liu, and S. Zhu. "Slander-Resistant Forwarding Isolation in Ad Hoc Networks" International Journal of Mobile Network Design and Innovation, Inderscience, 2006.
  • Q. Gu, C.-H. Chu, and P. Liu. "Analysis of Area-congestion-based DDoS Attacks in Ad Hoc Networks" Ad Hoc Networks Journal, Elsevier, 2006.

Book Chapters and Others

  • Q. Gu, M. Guirguis, "Secure Mobile Cloud Computing and Security Issues", in High Performance Cloud Auditing and Applications, K. Han, B.-Y. Choi, and S. Song Ed., Springer, 2014, pp. 65-90.
  • T. Langford, A. Rivera Longoria, Q. Gu, and M. Guirguis, "On Demand Adaptive Computing with Mobile Devices", Poster on UTSA College of Sciences Research Conference, University of Texas at San Antonio, 2012.
  • Q. Gu. "Intrusion Detection in Ad Hoc Networks", Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010.
  • Q. Gu. "Packet Dropping Attacks", Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010.
  • Q. Gu. "Secure Routing Protocols", Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2010.
  • C. Ferguson, Q. Gu, and R. Noorani, "Sensor, Heal Thyself!", Poster on Security Awareness Day, Texas State University at San Marcos, 2008.
  • Q. Gu and P. Liu, "Distributed Denial of Services", in Handbook of Computer Networks, Vol. III, John Wiley & Sons, 2007, pp.454-468.

2005 and Prior

  • Q. Gu, P. Liu, and C. H. Chu. "Hacking Techniques in Wired Networks" in Handbook of Information Security, John Wiley & Sons, 2005.
  • Q. Gu, P. Liu, and C.H. Chu. "Defense against Packet Injection Attacks in Unreliable Ad Hoc Networks" Proceeding of IEEE Global Telecommunications Conference, 2005.
  • Q. Gu, C.H. Chu, P. Liu, and S. Zhu. "Slander Resistant Attacker Isolation in Ad Hoc Networks" Proceeding of the 10th International Conference on Telecommunication Systems, Modeling and Analysis, 2005.
  • Q. Gu, P. Liu, W. C. Lee, and C.H. Chu. "KTR: an Efficient Key Management Scheme in Wireless Data Broadcast Services" Proceeding of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.
  • Q. Gu and C. H. Chu. "Genetic Algorithms for Multicast Routing with Multiple QoS Requirements" Proceeding of the 8th Joint Conference on Information Sciences, 2005.
  • Q. Gu, P. Liu, and C. H. Chu. "Tactical Bandwidth Exhaustion in Ad Hoc Networks" Proceeding of the 5th Annual IEEE Information Assurance Workshop, 2004.
  • Q. Gu and C. H. Chu. "Solving the QoS Multicast Routing Problems Using Genetic Algorithms" in Soft Computing in Communications, Berlin, DE: Springer-Verlag Co., 2004.
  • C. H. Chu, J. Gu, X. D. Hou, and Q. Gu. "A Heuristic Ant Algorithm For Solving Qos Multicast Routing Problem" Proceeding of the Congress on Evolutionary Computation, 2002.