Guowei Wu

According to our database1, Guowei Wu authored at least 110 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019

Battlefield situation awareness and networking based on agent distributed computing.
Physical Communication, 2019

Execution allowance based fixed priority scheduling for probabilistic real-time systems.
Journal of Systems and Software, 2019

Workload-aware harmonic partitioned scheduling for fixed-priority probabilistic real-time tasks on multiprocessors.
Journal of Systems Architecture - Embedded Systems Design, 2019

Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Communication Systems, 2019

Double warning thresholds for preemptive charging scheduling in Wireless Rechargeable Sensor Networks.
Computer Networks, 2019

When Wireless Charging Meets Fresnel Zones: Even Obstacles Can Enhance Charging Efficiency.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

NFV-Enabled Multicasting in Mobile Edge Clouds with Resource Sharing.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Workload-Aware Harmonic Partitioned Scheduling of Periodic Real-Time Tasks with Constrained Deadlines.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks.
IEEE Trans. Vehicular Technology, 2018

GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Vehicular Technology, 2018

TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018

OPPC: An Optimal Path Planning Charging Scheme Based on Schedulability Evaluation for WRSNs.
ACM Trans. Embedded Comput. Syst., 2018

Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems.
IEEE Systems Journal, 2018

The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs.
Sensors, 2018

Broadcast tree construction framework in tactile internet via dynamic algorithm.
Journal of Systems and Software, 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
Journal of Systems and Software, 2018

ESLD: An efficient and secure link discovery scheme for software-defined networking.
Int. J. Communication Systems, 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Communication Systems, 2018

CFR: A cooperative link failure recovery scheme in software-defined networks.
Int. J. Communication Systems, 2018

MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

WiAU: An Accurate Device-Free Authentication System with ResNet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

DoS Mitigation Mechanism Based on Non-Cooperative Repeated Game for SDN.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

The Community Characteristic Based Controller Deployment Strategy for SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

Workload-aware harmonic partitioned scheduling for probabilistic real-time systems.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
P2S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Vehicular Technology, 2017

A probabilistic mix-critical task scheduling algorithm for wireless networked control system.
IJHPCN, 2017

Probabilistic energy-aware scheduling for wireless networked control systems.
Comput. Syst. Sci. Eng., 2017

Preserving the Relationship Privacy of the published social-network data based on Compressive Sensing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

2016
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Security and Communication Networks, 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

TADP: Enabling temporal and distantial priority scheduling for on-demand charging architecture in wireless rechargeable sensor Networks.
Journal of Systems Architecture - Embedded Systems Design, 2016

Differential Privacy Preserving in Big Data Analytics for Connected Health.
J. Medical Systems, 2016

A low-cost node capture attack algorithm for wireless sensor networks.
Int. J. Communication Systems, 2016

An anonymous authentication scheme in data-link layer for VANETs.
IJAHUC, 2016

A differential privacy protection scheme for sensitive big data in body sensor networks.
Annales des Télécommunications, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

Pollution Attack Resistance Dissemination in VANETs Based on Network Coding.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Maximizing destructiveness of node capture attack in wireless sensor networks.
The Journal of Supercomputing, 2015

GTRF: A Game Theory Approach for Regulating Node Behavior in Real-Time Wireless Sensor Networks.
Sensors, 2015

Algorithm and Theory for Robust Wireless Sensor Networks 2014.
IJDSN, 2015

Probabilistic response-time analysis for real-time systems in body area sensor networks.
Int. J. Communication Systems, 2015

Protecting source-location privacy based on multirings in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Protecting location privacy and query privacy: a combined clustering approach.
Concurrency and Computation: Practice and Experience, 2015

A-CACHE: An anchor-based public key caching scheme in large wireless networks.
Computer Networks, 2015

A Trust Routing for Multimedia Social Networks.
Comput. J., 2015

Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

EDP: A Wireless Network Control System Energy-Efficient Real-Time Task Scheduling Algorithm.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
A dynamic trust model exploiting the time slice in WSNs.
Soft Comput., 2014

Human mobility in opportunistic networks: Characteristics, models and prediction methods.
J. Network and Computer Applications, 2014

SOS: a secure social-aware credit-based stimulating mechanism for BikeNet.
IJAHUC, 2014

An efficient wormhole attack detection method in wireless sensor networks.
Comput. Sci. Inf. Syst., 2014

Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration.
Comput. J., 2014

2013
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach.
The Journal of Supercomputing, 2013

A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Security and Communication Networks, 2013

Protecting the sink location privacy in wireless sensor networks.
Personal and Ubiquitous Computing, 2013

A sensitive data aggregation scheme for body sensor networks based on data hiding.
Personal and Ubiquitous Computing, 2013

Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set.
MONET, 2013

A Fuzzy-based Trust Management in WSNs.
J. Internet Serv. Inf. Secur., 2013

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

An Energy-Aware Multi-Core Scheduler based on Generalized Tit-For-Tat Cooperative Game.
JCP, 2012

A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks.
JCP, 2012

A Clustering K-Anonymity Scheme for Location Privacy Preservation.
IEICE Transactions, 2012

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Life cycle management method for smart grid asset with real option theory.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Risk-based life cycle cost analysis method for transmission systems.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Location Anonymity Based on Fake Queries in Continuous Location-Based Services.
Proceedings of the Seventh International Conference on Availability, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks.
JSW, 2011

A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems.
ITC, 2011

A Biometric Key Establishment Protocol for Body Area Networks.
IJDSN, 2011

A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks.
IJDSN, 2011

Tree-based Multicast Key Management in ubiquitous computing environment.
IJAHUC, 2011

ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications.
IET Communications, 2011

A packet buffer evaluation method exploiting queueing theory for wireless sensor networks.
Comput. Sci. Inf. Syst., 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

2010
An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks.
Sensors, 2010

Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks.
Sensors, 2010

Temperature-aware task scheduling algorithm for soft real-time multi-core systems.
Journal of Systems and Software, 2010

An inter-domain authentication scheme for pervasive computing environment.
Computers & Mathematics with Applications, 2010

An ECG-Based Signal Key Establishment Protocol in Body Area Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

GTFTTS: A Generalized Tit-for-Tat Based Corporative Game for Temperature-Aware Task Scheduling in Multi-core Systems.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Task Allocation and Migration Algorithm for Temperature-Constrained Real-Time Multi-Core Systems.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Group-Based Mobile Agent Routing Protocol for Multitype Wireless Sensor Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

iCare: A Mobile Health Monitoring System for the Elderly.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Leakage-Aware Reallocation for Periodic Real-Time Tasks on Multicore Processors.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
An Improved Method for Induction Motor Constant Current Soft-Starting Using Fuzzy-Control.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2007
A Graph-Theory Algorithm for WCET Estimation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2004
A New WCET Estimation Algorithm Based on Instruction Cache and Prefetching Combined Model.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

2003
A novel frequency domain watermarking algorithm with resistance to geometric distortions and copy attack.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity.
Proceedings of the Digital Watermarking, First International Workshop, 2002


  Loading...