Huiqiang Wang

According to our database1, Huiqiang Wang authored at least 97 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
PUEGM: A Method of User Revenue Selection Based on a Publisher-User Evolutionary Game Model for Mobile Crowdsensing.
Sensors, 2019

A near-optimal cloud offloading under multi-user multi-radio environments.
Peer-to-Peer Networking and Applications, 2019

RealPot: an immersive virtual pottery system with handheld haptic devices.
Multimedia Tools Appl., 2019

Modeling and Robust Estimation for the Residual Motion Error in Airborne SAR Interferometry.
IEEE Geosci. Remote Sensing Lett., 2019

An effective method for service components selection based on micro-canonical annealing considering dependability assurance.
Frontiers Comput. Sci., 2019

2018
A User Recognition Strategy Under Mobile Cloud Environment.
Wireless Personal Communications, 2018

A Wavelet Decomposition and Polynomial Fitting-Based Method for the Estimation of Time-Varying Residual Motion Error in Airborne Interferometric SAR.
IEEE Trans. Geoscience and Remote Sensing, 2018

NWBBMP: a novel weight-based buffer management policy for DTN routing protocols.
Peer-to-Peer Networking and Applications, 2018

RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight.
IJDSN, 2018

A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment.
Future Generation Comp. Syst., 2018

A Delay Tolerant Network Routing Policy Based on Optimized Control Information Generation Method.
IEEE Access, 2018

ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes' Selfishness.
IEEE Access, 2018

Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark.
IEEE Access, 2018

Optimal Cooperative Wireless Communication for Mobile User Data Offloading.
IEEE Access, 2018

A joint optimization method for data offloading in D2D-enabled cellular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Abstract: An Indoor Localization Simulation Platform for Localization Accuracy Evaluation.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Cooperative Indoor Localization Method Based on Spatial Analysis.
Proceedings of the Data Science, 2018

A Heuristic Indoor Path Planning Method Based on Hierarchical Indoor Modelling.
Proceedings of the Data Science, 2018

A Non-Cooperative Game-Theoretical Approach to Mobile Data Offloading.
Proceedings of the IEEE Global Communications Conference, 2018

An Action Recognition Method Based on Wearable Sensors.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

A Decision Tree Candidate Property Selection Method Based on Improved Manifold Learning Algorithm.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China.
Remote Sensing, 2017

Underlying Topography Estimation over Forest Areas Using High-Resolution P-Band Single-Baseline PolInSAR Data.
Remote Sensing, 2017

Optimizing broadcast duration for layered video streams in cellular networks.
Peer-to-Peer Networking and Applications, 2017

Performance analysis and optimization for chunked network coding based wireless cooperative downloading systems.
Frontiers of IT & EE, 2017

DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks.
Frontiers of IT & EE, 2017

DCAR: DTN Congestion Avoidance Routing Algorithm Based on Tokens in an Urban Environment.
J. Sensors, 2017

Joint optimization of downlink and D2D transmissions for SVC streaming in cooperative cellular networks.
Neurocomputing, 2017

Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network.
IJDSN, 2017

A Cooperative Abnormal Behavior Detection Framework Based on Big Data Analytics.
Proceedings of the Data Science, 2017

A Cooperative Optimization Method for Mobile User Data Offloading.
Proceedings of the Wireless Sensor Networks, 2017

2016
Spatio-Temporal Error Sources Analysis and Accuracy Improvement in Landsat 8 Image Ground Displacement Measurements.
Remote Sensing, 2016

An adaptive disorder-avoidance cooperative downloading method.
Computer Networks, 2016

Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

MM-Sync: A Mobility Built-In Model Based Time Synchronization Approach for Underwater Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

A Dynamic Grouping-Based Trust Model for Mobile P2P Networks.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation.
Frontiers of IT & EE, 2015

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Int. J. Web Service Res., 2015

An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An Availability Evaluation Method of Web Services Using Improved Grey Correlation Analysis with Entropy Difference and Weight.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Study on Measuring System of Casing Machine Based on PLC.
JNW, 2014

Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks.
JNW, 2014

A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks.
JCM, 2014

An Adaptive Channel Sensing Approach Based on Sequential Order in Distributed Cognitive Radio Networks.
Proceedings of the Network and Parallel Computing, 2014

A search and summary application for traffic events detection based on Twitter data.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

A Heuristic Method of Attack Graph Analysis for Network Security Hardening.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

An Adaptive Channel Sensing Approach and its Analysis Based on Hierarchical Colored Petri Net in Distributed Cognitive Radio Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Random Network Coding Based Schemes for Perfect Wireless Packet Retransmission Problems in Multiple Channel Networks.
Wireless Personal Communications, 2013

Random network coding-based optimal scheme for perfect wireless packet retransmission problems.
Wireless Communications and Mobile Computing, 2013

Research on Attack Graph Generation for Network Security Situation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach.
Wireless Personal Communications, 2012

Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

2011
Boosting video popularity through recommendation systems.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

End-to-end performance of network with coding-aware.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
JNW, 2010

2009
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus.
Proceedings of the Third International Conference on Network and System Security, 2009

Dynamic Self-configuration of User QoS for Next Generation Network.
Proceedings of the NPC 2009, 2009

Using Hessian Locally Linear Embedding for Autonomic Failure Prediction.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A Self-Recovery Method Based on Mixed Reboot.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

The Research and Design of the Belt Grinder which Based on PLC.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

2008
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.
J. Comput. Sci. Technol., 2008

An Optimization Approach to Restart Tree Based on Mean Failure Frequencies.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Research on Autonomic-Trusted Software Evaluation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Novel Approach of Alarm Classification for Intrusion Detection based upon Dempster-Shafer Theory.
Proceedings of the WEBIST 2007, 2007

An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Novel Situation Awareness Model for Network Systems' Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Experiment of Event Injection Technology for Network Dependability Evaluation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
A Computer Immune System: LAN Immune System Model based on Host (LISMH).
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Novel Quantitative Analysis Method for Network Survivability.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Bio-inspired Multidimensional Network Security Model.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

ERAS - an Emergency Response Algorithm for Survivability of Critical Services.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2006

Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition.
Proceedings of the Computer Science, 2006

A New Bio-inspired Model for Network Security and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

A New Automatic Intrusion Response Taxonomy and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Evaluation of Network Dependability Using Event Injection.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
A Comprehensive Bio-inspired Model for Network Security.
Proceedings of the 2005 International Conference on Semantics, 2005

2004
Speech Hiding Based on Auditory Wavelet.
Proceedings of the Computational Science and Its Applications, 2004

IADIDF: A Framework for Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004

A Useful System Prototype for Intrusion Detection - Architecture and Experiments.
Proceedings of the Discovery Science, 7th International Conference, 2004

HMMs for Anomaly Intrusion Detection.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...