Baokang Zhao

According to our database1, Baokang Zhao
  • authored at least 107 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Supporting location/identity separation in mobility-enhanced satellite networks by virtual attachment point.
Pervasive and Mobile Computing, 2017

A Space Information Service Forwarding Mechnism Based on Software Defined Network.
J. Internet Serv. Inf. Secur., 2017

Exploring the Reliable Multicast Transport of BGP in Geostationary Satellite Networks Based on Network Coding.
IEICE Transactions, 2017

HERO: A Hybrid Electrical and Optical Multicast for Accelerating High-Performance Data Center Applications.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Poster: An Efficient Control Framework for Supporting the Future SDN/NFV-enabled Satellite Network.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Industrial Electronics, 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Security and Communication Networks, 2016

P2P Traffic Optimization based on Congestion Distance and DHT.
J. Internet Serv. Inf. Secur., 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
IJDWM, 2016

A Real-Time Processing System for Anonymization of Mobile Core Network Traffic.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

MSN: a mobility-enhanced satellite network architecture: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

QKDFlow: QKD Based Secure Communication Towards the OpenFlow Interface in SDN.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

An Event Grouping Approach for Infinite Stream with Differential Privacy.
Proceedings of the Advances in Services Computing, 2016

2015
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs.
IEEE Trans. Parallel Distrib. Syst., 2015

Mix-zones optimal deployment for protecting location privacy in VANET.
Peer-to-Peer Networking and Applications, 2015

Rollback Links Characterization for the Snapshot Routing Algorithm in Polar-Orbit Satellite Networks.
IEICE Transactions, 2015

ISL Reassignment Based Snapshot Routing Optimization for Polar-Orbit LEO Satellite Networks.
IEICE Transactions, 2015

FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer.
Computer Communication Review, 2015

A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Rollback Traffic Avoidance for Snapshot routing algorithm in cyclic mobile networks.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Poster: Avoiding Rollback Traffic during the Switch of Snapshot Routing in Cyclic Mobile Networks.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Improving the snapshot routing performance through reassigning the inter-satellite links.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

OpenSRN: A software-defined semantic routing network architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Towards efficient radio resource scheduling in LTE-based satellite mobile communication system.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Unsavory Data Detection Method for Internet Big Data.
Proceedings of the Information and Communication Technology, 2015

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
Proceedings of the Information and Communication Technology, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Tutorial on Quantum Key Distribution.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wireless Personal Communications, 2014

A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
JNW, 2014

A novel steganography approach for voice over IP.
J. Ambient Intelligence and Humanized Computing, 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Generation Comp. Syst., 2014

Link Reassignment based Snapshot Partition for Polar-orbit LEO Satellite Networks.
CoRR, 2014

A Novel Resource-Efficient Privacy Amplification Scheme: Towards Ground-Satellite Quantum Key Distribution Post-processing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

NC-STP: A High Performance Network Coding Based Space Transport Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Time-efficient transient loops avoiding in snapshot routing algorithm.
Proceedings of the International Conference on Smart Computing, 2014

OpenSAN: a software-defined satellite network architecture.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A Pipeline Optimization Model for QKD Post-processing System.
Proceedings of the Information and Communication Technology, 2014

Improving Availability through Energy-Saving Optimization in LEO Satellite Networks.
Proceedings of the Information and Communication Technology, 2014

A Semantic-Based Malware Detection System Design Based on Channels.
Proceedings of the Information and Communication Technology, 2014

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources.
Proceedings of the Information and Communication Technology, 2014

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures.
Proceedings of the Information and Communication Technology, 2014

Software defined satellite networks: Benefits and challenges.
Proceedings of the IEEE Computers, 2014

Towards a Key Consuming Detection in QKD-VoIP Systems.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Mathematical and Computer Modelling, 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Mathematical and Computer Modelling, 2013

A Security Real-time Privacy Amplification Scheme in QKD System.
J. UCS, 2013

Guest Editorial: Special Issue on Advances in Internet Security and Technology.
J. Internet Serv. Inf. Secur., 2013

PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System.
IJDSN, 2013

IBShare: A Novel InfiniBand Network Bandwidth Allocation for Cloud Datacenter.
IEICE Transactions, 2013

Failure Microscope: Precisely Diagnosing Routing Instability.
IEICE Transactions, 2013

Benefiting from the community structure in opportunistic forwarding.
Comput. Sci. Inf. Syst., 2013

Characterization of OSPF Convergence with Correlated Failures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center.
Proceedings of the 12th IEEE International Conference on Trust, 2013

SMC: A Shared Memory Based SpaceWire Controller Solution.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Qphone: a quantum security VoIP phone.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A Novel Resource Allocation Heuristic for a Power Constrained Data Center.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Flexible multi-authority attribute-based signature schemes for expressive policy.
Mobile Information Systems, 2012

Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing.
IEICE Transactions, 2012

Privacy aware publishing of successive location information in sensor networks.
Future Generation Comp. Syst., 2012

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds.
Comput. Syst. Sci. Eng., 2012

Towards efficient and practical network coding in delay tolerant networks.
Computers & Mathematics with Applications, 2012

SARM: A Congestion Control Algorithm for DTN.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

CLIP: A Distributed Emulation Platform for Research on Information Reconciliation.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Following Routing: An Active Congestion Control Approach for Delay-Tolerant Networks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

CRASP: congestion control routing algorithm against selfish behavior based on pigeonhole principle in DTN.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analytic Goodput Model for TCP Incast.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

VISOR: A Pratical VoIP Steganography Platform.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Protecting Router Forwarding Table in Space.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Shrew Attack in Cloud Data Center Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

One Leader at One Time: OLOT Routing in Delay Tolerant Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

NTC: Towards Efficient Network Coding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Building Practical Self Organization Networks on Heterogeneous Wireless Modems.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Formalization of an Emulation Based Co-designed Virtual Machine.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Snail Crawling: An Enhanced Method for DTNs Routing.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Thwarting audio steganography attacks in cloud storage systems.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming.
IEICE Transactions, 2010

A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Ferry Route Design with Delay Bounds in Delay-Tolerant Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems.
Intelligent Automation & Soft Computing, 2009

Automatic correction of non-uniform illumination for 3D surface heightmap reconstruction.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems.
Proceedings of the Fourteenth IEEE Internationl Conference on Embedded and Real-Time Computing Systems and Applications, 2008

Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems.
Proceedings of the Distributed Embedded Systems: Design, 2008

Towards Successive Privacy Protection in Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Loop-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...