User profiles for Helen Tang
Helen TangHospital of the University of Pennsylvania Verified email at pennmedicine.upenn.edu Cited by 1084 |
Genetic and transcriptional evolution alters cancer cell line drug response
Human cancer cell lines are the workhorse of cancer research. Although cell lines are known
to evolve in culture, the extent of the resultant genetic and transcriptional heterogeneity …
to evolve in culture, the extent of the resultant genetic and transcriptional heterogeneity …
A survey of security challenges in cognitive radio networks: Solutions and future research directions
A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type of …
cognitive radio network (CRN) framework. We classify attack techniques based on the type of …
A survey of blockchain technology applied to smart cities: Research issues and challenges
In recent years, the rapid urbanization of world's population causes many economic, social,
and environmental problems, which affect people's living conditions and quality of life …
and environmental problems, which affect people's living conditions and quality of life …
Security and privacy of smart cities: a survey, research issues and challenges
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide better …
emerged as a new paradigm to dynamically optimize the resources in cities and provide better …
A mean field game theoretic approach for security enhancements in mobile ad hoc networks
Y Wang, FR Yu, H Tang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks
(MANETs). Most of existing works on applying game theories to security only consider two …
(MANETs). Most of existing works on applying game theories to security only consider two …
Aneuploidy renders cancer cells vulnerable to mitotic checkpoint inhibition
…, C Marquis, SV Bernhard, M Kazachkova, H Tang… - Nature, 2021 - nature.com
Selective targeting of aneuploid cells is an attractive strategy for cancer treatment 1 . However,
it is unclear whether aneuploidy generates any clinically relevant vulnerabilities in cancer …
it is unclear whether aneuploidy generates any clinically relevant vulnerabilities in cancer …
Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
Z Wei, H Tang, FR Yu, M Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology
and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. …
and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. …
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
Cognitive radios (CRs) have been considered for use in mobile ad hoc networks (MANETs).
The area of security in Cognitive Radio MANETs (CR-MANETs) has yet to receive much …
The area of security in Cognitive Radio MANETs (CR-MANETs) has yet to receive much …
Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios
Cognitive radios, which are capable of sensing their surrounding environment and adapting
their internal parameters, have been considered in mobile ad hoc networks. Secondary …
their internal parameters, have been considered in mobile ad hoc networks. Secondary …
Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks
Multimodal biometric technology provides potential solutions for continuous user-to-device
authentication in high-security mobile ad hoc networks (MANETs). This paper studies …
authentication in high-security mobile ad hoc networks (MANETs). This paper studies …