Guojun Wang

According to our database1, Guojun Wang authored at least 288 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Fast curvelet transform through genetic algorithm for multimodal medical image fusion.
Soft Comput., 2020

Edge-based differential privacy computing for sensor-cloud systems.
J. Parallel Distributed Comput., 2020

An efficient privacy-enhanced attribute-based access control mechanism.
Concurrency and Computation: Practice and Experience, 2020

An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City.
Comput. Electr. Eng., 2020

Towards Recommendation in Internet of Things: An Uncertainty Perspective.
IEEE Access, 2020

2019
A survey on security attacks in VANETs: Communication, applications and challenges.
Vehicular Communications, 2019

Sustainable and Efficient Data Collection from WSNs to Cloud.
T-SUSC, 2019

Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing.
TOSN, 2019

A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.
IEEE Trans. Industrial Informatics, 2019

An Immunization Framework for Social Networks Through Big Data Based Influence Modeling.
IEEE Trans. Dependable Sec. Comput., 2019

Intelligent route planning on large road networks with efficiency and privacy.
J. Parallel Distributed Comput., 2019

Influence maximization by leveraging the crowdsensing data in information diffusion network.
J. Netw. Comput. Appl., 2019

Enabling Cooperative Privacy-preserving Personalized search in cloud environments.
Inf. Sci., 2019

Fog-Based Computing and Storage Offloading for Data Synchronization in IoT.
IEEE Internet of Things Journal, 2019

An adaptive and configurable protection framework against android privilege escalation threats.
Future Gener. Comput. Syst., 2019

Economic perspective analysis of protecting big data security and privacy.
Future Gener. Comput. Syst., 2019

Multidimensional privacy preservation in location-based services.
Future Gener. Comput. Syst., 2019

Wi-Fi frequency selection concept for effective coverage in collapsed structures.
Future Gener. Comput. Syst., 2019

A Novel S-Box Design Algorithm Based on a New Compound Chaotic System.
Entropy, 2019

A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues.
Ad Hoc & Sensor Wireless Networks, 2019

Efficient Authentication of Multi-Dimensional Top-k Queries.
IEEE Access, 2019

Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019

Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures.
IEEE Access, 2019

A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier Transform.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive Care.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Superior Prosthetic Member Based on Assistive Technologies.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Libra Critique Towards Global Decentralized Financial System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Semantic Knowledge Based Graph Model in Smart Cities.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Recommender System for Decentralized Cloud Manufacturing.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain.
Wireless Communications and Mobile Computing, 2018

Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wireless Commun., 2018

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing.
IEEE Trans. Emerging Topics in Comput. Intellig., 2018

A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.
Security and Communication Networks, 2018

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
IEEE Internet of Things Journal, 2018

Area coverage estimation model for directional sensor networks.
IJES, 2018

An Anonymous Offline RFID Grouping-Proof Protocol.
Future Internet, 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Gener. Comput. Syst., 2018

HEPart: A balanced hypergraph partitioning algorithm for big data applications.
Future Gener. Comput. Syst., 2018

Maximizing positive influence spread in online social networks via fluid dynamics.
Future Gener. Comput. Syst., 2018

Acoustic sensor networks in the Internet of Things applications.
Future Gener. Comput. Syst., 2018

Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring.
IEEE Communications Magazine, 2018

PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Communications Magazine, 2018

PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data.
IEEE Access, 2018

Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators.
IEEE Access, 2018

Low-Dimensional Vectors Learning for Influence Maximization.
Proceedings of the 2018 IEEE SmartWorld, 2018

Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance.
Proceedings of the 2018 IEEE SmartWorld, 2018

Towards Wi-Fi Radar in Collapsed Structures.
Proceedings of the 2018 IEEE SmartWorld, 2018

Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph.
Proceedings of the 2018 IEEE SmartWorld, 2018

Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

Achieving Secure and Effective Search Services in Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Blockchain-Based Decentralized Data Storage and Access Framework for PingER.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Authentication of Skyline Query over Road Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SDN-Based Secure VANETs Communication with Fog Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Privacy-Preserving Attribute-Based Access Control Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Information Security Practice and Experience, 2018

Wi-Fi Radar Placement for Coverage in Collapsed Structures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Method for Privacy-Preserving in IoT-SDN Integration Environment.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Blockchain and Big Data to Transform the Healthcare.
Proceedings of the International Conference on Data Processing and Applications, 2018

Internet Performance Prediction Framework Based on PingER Dataset.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Android Malware Detection Using Category-Based Permission Vectors.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks.
Wireless Personal Communications, 2017

Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2017

Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks.
IEEE Trans. Industrial Informatics, 2017

Dependable Structural Health Monitoring Using Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2017

Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities.
TCPS, 2017

e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems.
TAAS, 2017

Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Systems Journal, 2017

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges.
IEEE Network, 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Netw. Comput. Appl., 2017

Effective Query Grouping Strategy in Clouds.
J. Comput. Sci. Technol., 2017

Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017

U-Search: usage-based search with collective intelligence.
IJHPCN, 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017

Preface: Security and privacy in big data clouds.
Future Gener. Comput. Syst., 2017

A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Computing in Science and Engineering, 2017

Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures.
Concurrency and Computation: Practice and Experience, 2017

Achieving reliable and secure services in cloud computing environments.
Comput. Electr. Eng., 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Inf., 2017

Exploring user topic influence for group recommendation on learning resources.
Proceedings of the 2017 IEEE SmartWorld, 2017

Naturalistic driving data for a smart cloud-based abnormal driving detector.
Proceedings of the 2017 IEEE SmartWorld, 2017

Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study.
Proceedings of the 2017 IEEE SmartWorld, 2017

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An ECC-Based Off-line Anonymous Grouping-Proof Protocol.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Smartphone Bloatware: An Overlooked Privacy Problem.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Module-Level Software Streaming Loading Model Based on Hypervisor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Protected Data Collection in Wireless Medical Sensor Networks.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

The Strength of Dithering in Recommender System.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Attribute-Based Encryption with Personalized Search.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

An Adaptive Android Security Extension against Privilege Escalation Attacks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Data-Driven Influence Learning in Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Lightweight Privacy Aware Friend Locator in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Segmentation of Calcification and Brain Hemorrhage with Midline Detection.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Achieving Flow-Oriented Reliable Services in Cloud Computing.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Privacy-Aware Conceptual Framework for Coordination.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Using Deep Neural Networks to Simulate Human Body.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Content-Centric Event-Insensitive Big Data Reduction in Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Survey on Deep Learning in Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Unsupervised learning of indoor localization based on received signal strength.
Wireless Communications and Mobile Computing, 2016

Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring.
IEEE Trans. Industrial Informatics, 2016

Trust Evaluation in Online Social Networks Using Generalized Network Flow.
IEEE Trans. Computers, 2016

Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics.
IEEE Trans. Computers, 2016

Blood typing for families: a novel hybrid human-computer application.
IJPEDS, 2016

An efficient spatial query processing algorithm in multi-sink wireless sensor networks.
IJSNet, 2016

Heterogeneous educational resource recommender system based on user preferences.
IJAACS, 2016

Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Communications Letters, 2016

Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph.
Future Gener. Comput. Syst., 2016

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges.
ACM Comput. Surv., 2016

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing Location Privacy through User-Defined Grid in Location-Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

Building Bayesian Inference Graphs for Healthcare Statistic Evidence.
Proceedings of the 45th International Conference on Parallel Processing Workshops, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

DHMRF: A Dynamic Hybrid Movie Recommender Framework.
Proceedings of the Advances in Services Computing, 2016

Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks.
Proceedings of the Advances in Services Computing, 2016

2015
On Selecting Recommenders for Trust Evaluation in Online Social Networks.
ACM Trans. Internet Techn., 2015

Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring.
IEEE Trans. Computers, 2015

κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph.
Inf. Sci., 2015

Energy-efficient healthcare monitoring with smartphones and IoT technologies.
IJHPCN, 2015

Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring.
IJES, 2015

Selective partial recovery optimisation strategy for SSL connection migration.
IJAACS, 2015

Dependable Structural Helath Monitoring Using Wireless Sensor Networks.
CoRR, 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Resource-Efficient Vibration Data Collection in Cyber-Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

User-Controlled Security Mechanism in Data-Centric Clouds.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distrib. Syst., 2014

Sensor Placement with Multiple Objectives for Structural Health Monitoring.
TOSN, 2014

Consistency as a Service: Auditing Cloud Consistency.
IEEE Trans. Network and Service Management, 2014

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014

Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks.
Future Gener. Comput. Syst., 2014

Generating trusted graphs for trust evaluation in online social networks.
Future Gener. Comput. Syst., 2014

Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Comput. Secur., 2014

Containing smartphone worm propagation with an influence maximization algorithm.
Comput. Networks, 2014

Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Unified Security Architecture Research for 5G Wireless System.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
A scalable encryption scheme for multi-privileged group communications.
The Journal of Supercomputing, 2013

User requirements-aware security ranking in SSL protocol.
The Journal of Supercomputing, 2013

A secure self-destructing scheme for electronic data.
J. Comput. Syst. Sci., 2013

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013

Practical secure and fast handoff framework for pervasive Wi-Fi access.
IET Information Security, 2013

Modeling Malware Propagation in Smartphone Social Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Local Monitoring and Maintenance for Operational Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

RATE: Recommendation-aware Trust Evaluation in Online Social Networks.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Cooperative private searching in clouds.
J. Parallel Distributed Comput., 2012

Secure and privacy preserving keyword searching for cloud storage services.
J. Netw. Comput. Appl., 2012

Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2012

Evaluating User Community Influence in Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Dynamic Grouping Strategy in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
Security and Communication Networks, 2011

Multi-dimensional evidence-based trust management with multi-trusted paths.
Future Gener. Comput. Syst., 2011

FlowTrust: trust inference with network flows.
Frontiers Comput. Sci. China, 2011

Achieving fine-grained access control for secure data sharing on cloud servers.
Concurrency and Computation: Practice and Experience, 2011

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Comput. Secur., 2011

Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Routing with Virtual Region Coordinates in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011

Fault tolerant WSN-based structural health monitoring.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks.
IEICE Transactions, 2010

Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2010

Node-Disjoint Multipath Routing with Group Mobility in MANETs.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Target Trajectory Querying in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Fuzzy Location Service for Mobile Ad Hoc Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Efficient Sharing of Secure Cloud Storage Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Adaptive location updates for mobile sinks in wireless sensor networks.
The Journal of Supercomputing, 2009

Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks.
J. Comput. Sci. Technol., 2009

Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks.
JCP, 2009

Analysis of channel allocation scheme for wireless cellular networks.
IJAHUC, 2009

A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
IJAHUC, 2009

Herd-Based Target Tracking Protocol in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Square region-based coverage and connectivity probability model in wireless sensor networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Hole-shadowing routing in large-scale MANETs.
IJSNet, 2008

Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Attacks vs. Countermeasures of SSL Protected Trust Model.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multipath-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Node-Disjoint Multipath Routing with Zoning Method in MANETs.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks.
IEEE Trans. Computers, 2007

Probabilistic analysis on mesh network fault tolerance.
J. Parallel Distributed Comput., 2007

Energy-Efficient Dual Prediction-Based Data Gathering for Environmental Monitoring Applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Hole Avoiding in Advance Routing in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Local Retransmission-Based Gossip Protocol in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks.
Proceedings of IEEE International Conference on Communications, 2007

Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks.
Proceedings of IEEE International Conference on Communications, 2007

Polynomial Regression for Data Gathering in Environmental Monitoring Applications.
Proceedings of the Global Communications Conference, 2007

Designing Piecewise QoS Routing Protocol in Large-Scale MANETs.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Scalable key management for secure multicast communication in the mobile environment.
Pervasive Mob. Comput., 2006

A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks.
Comput. Commun., 2006

SSR: Segment-by-Segment Routing in Large-Scale Mobile Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Logical Location-based Routing with Hole-shadowing in Large-scale MANETs.
Proceedings of IEEE International Conference on Communications, 2006

A Proxy-based Mobile Group Membership Protocol for Large Scale and Highly Dynamic Groups.
Proceedings of IEEE International Conference on Communications, 2006

2005
A protocol for partitionable group membership service in mobile Internet.
Wireless Communications and Mobile Computing, 2005

A novel group communication protocol using the RingNet hierarchy in mobile Internet.
Parallel Algorithms Appl., 2005

Hypercube Network Fault Tolerance: A Probabilistic Approach.
Journal of Interconnection Networks, 2005

Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Prediction-Based Multicast Mobility Management in Mobile Internet.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Novel QoS Multicast Model in Mobile Ad Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Available Bandwidth Measurement Schemes over Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Modeling and Performance Evaluation of Handover Service in Wireless Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
On Fault Tolerance of 3-Dimensional Mesh Networks.
J. Comput. Sci. Technol., 2004

Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Protocol.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

RGB: A Scalable and Reliable Group Membership Protocol in Mobile Internet.
Proceedings of the 33rd International Conference on Parallel Processing (ICPP 2004), 2004

Key Management for Secure Multicast Using the RingNet Hierarchy.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
Probabilistic Analysis of Connectivity on Mesh Networks.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Probability Model for Faults in Large-Scale Multicomputer Systems.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results.
IEEE Trans. Computers, 2002

2001
Routing in Hypercube Networks with a Constant Fraction of Faulty Nodes.
Journal of Interconnection Networks, 2001


  Loading...