User profiles for Helen Tang

Helen Tang

Hospital of the University of Pennsylvania
Verified email at pennmedicine.upenn.edu
Cited by 1084

Genetic and transcriptional evolution alters cancer cell line drug response

U Ben-David, B Siranosian, G Ha, H Tang, Y Oren… - Nature, 2018 - nature.com
Human cancer cell lines are the workhorse of cancer research. Although cell lines are known
to evolve in culture, the extent of the resultant genetic and transcriptional heterogeneity …

A survey of security challenges in cognitive radio networks: Solutions and future research directions

A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type of …

A survey of blockchain technology applied to smart cities: Research issues and challenges

J Xie, H Tang, T Huang, FR Yu, R Xie… - … surveys & tutorials, 2019 - ieeexplore.ieee.org
In recent years, the rapid urbanization of world's population causes many economic, social,
and environmental problems, which affect people's living conditions and quality of life …

Security and privacy of smart cities: a survey, research issues and challenges

M Sookhak, H Tang, Y He, FR Yu - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
With recent advances of information and communication technology, smart city has been
emerged as a new paradigm to dynamically optimize the resources in cities and provide better …

A mean field game theoretic approach for security enhancements in mobile ad hoc networks

Y Wang, FR Yu, H Tang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks
(MANETs). Most of existing works on applying game theories to security only consider two …

Aneuploidy renders cancer cells vulnerable to mitotic checkpoint inhibition

…, C Marquis, SV Bernhard, M Kazachkova, H Tang… - Nature, 2021 - nature.com
Selective targeting of aneuploid cells is an attractive strategy for cancer treatment 1 . However,
it is unclear whether aneuploidy generates any clinically relevant vulnerabilities in cancer …

Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning

Z Wei, H Tang, FR Yu, M Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology
and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. …

Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios

FR Yu, H Tang, M Huang, Z Li… - MILCOM 2009-2009 …, 2009 - ieeexplore.ieee.org
Cognitive radios (CRs) have been considered for use in mobile ad hoc networks (MANETs).
The area of security in Cognitive Radio MANETs (CR-MANETs) has yet to receive much …

Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios

FR Yu, M Huang, H Tang - IEEE network, 2010 - ieeexplore.ieee.org
Cognitive radios, which are capable of sensing their surrounding environment and adapting
their internal parameters, have been considered in mobile ad hoc networks. Secondary …

Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks

…, FR Yu, XP Liu, P Mason, H Tang - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Multimodal biometric technology provides potential solutions for continuous user-to-device
authentication in high-security mobile ad hoc networks (MANETs). This paper studies …