Huiqiang Wang

According to our database1, Huiqiang Wang authored at least 115 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
An Attribute-Based Availability Model for Large Scale IaaS Clouds with CARMA.
IEEE Trans. Parallel Distrib. Syst., 2020

A near-optimal content placement in D2D underlaid cellular networks.
Peer Peer Netw. Appl., 2020

A multi-user multi-operator computing pricing method for Internet of things based on bi-level optimization.
Int. J. Distributed Sens. Networks, 2020

A method of fingerprint indoor localization based on received signal strength difference by using compressive sensing.
EURASIP J. Wirel. Commun. Netw., 2020

2019
Dynamic fault handling and reconfiguration for industrial automation systems.
PhD thesis, 2019

PUEGM: A Method of User Revenue Selection Based on a Publisher-User Evolutionary Game Model for Mobile Crowdsensing.
Sensors, 2019

UAV-assisted wireless relay networks for mobile offloading and trajectory optimization.
Peer Peer Netw. Appl., 2019

A near-optimal cloud offloading under multi-user multi-radio environments.
Peer Peer Netw. Appl., 2019

RealPot: an immersive virtual pottery system with handheld haptic devices.
Multim. Tools Appl., 2019

Modeling and Robust Estimation for the Residual Motion Error in Airborne SAR Interferometry.
IEEE Geosci. Remote. Sens. Lett., 2019

An effective method for service components selection based on micro-canonical annealing considering dependability assurance.
Frontiers Comput. Sci., 2019

A fusion optimization algorithm of network element layout for indoor positioning.
EURASIP J. Wirel. Commun. Netw., 2019

A Near-Optimal Resource Allocation Approach to Computation Offloading Under D2D Communications.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Unsupervised Feature Learning With Distributed Stacked Denoising Sparse Autoencoder for Abnormal Behavior Detection Using Apache Spark.
Proceedings of the IEEE 2nd International Conference on Knowledge Innovation and Invention, 2019

Joint Uplink and Downlink Optimization for Resource Allocation Under D2D Communication Networks.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

A Near-Optimal Heterogeneous Task Allocation Scheme for Mobile Crowdsensing.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

2018
A User Recognition Strategy Under Mobile Cloud Environment.
Wirel. Pers. Commun., 2018

A Wavelet Decomposition and Polynomial Fitting-Based Method for the Estimation of Time-Varying Residual Motion Error in Airborne Interferometric SAR.
IEEE Trans. Geosci. Remote. Sens., 2018

NWBBMP: a novel weight-based buffer management policy for DTN routing protocols.
Peer Peer Netw. Appl., 2018

一种面向室内定位的基站选择优化方法 (Base Station Selection Optimization Method Oriented at Indoor Positioning).
计算机科学, 2018

RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight.
Int. J. Distributed Sens. Networks, 2018

A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment.
Future Gener. Comput. Syst., 2018

A Delay Tolerant Network Routing Policy Based on Optimized Control Information Generation Method.
IEEE Access, 2018

ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes' Selfishness.
IEEE Access, 2018

Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark.
IEEE Access, 2018

Optimal Cooperative Wireless Communication for Mobile User Data Offloading.
IEEE Access, 2018

A joint optimization method for data offloading in D2D-enabled cellular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Abstract: An Indoor Localization Simulation Platform for Localization Accuracy Evaluation.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Cooperative Indoor Localization Method Based on Spatial Analysis.
Proceedings of the Data Science, 2018

A Heuristic Indoor Path Planning Method Based on Hierarchical Indoor Modelling.
Proceedings of the Data Science, 2018

A Non-Cooperative Game-Theoretical Approach to Mobile Data Offloading.
Proceedings of the IEEE Global Communications Conference, 2018

A Collision-Free Path Planning Approach for Multiple Robots Under Warehouse Scenarios.
Proceedings of the Wireless Sensor Networks - 12th China Conference, 2018

An Action Recognition Method Based on Wearable Sensors.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

A Decision Tree Candidate Property Selection Method Based on Improved Manifold Learning Algorithm.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China.
Remote. Sens., 2017

Underlying Topography Estimation over Forest Areas Using High-Resolution P-Band Single-Baseline PolInSAR Data.
Remote. Sens., 2017

Optimizing broadcast duration for layered video streams in cellular networks.
Peer Peer Netw. Appl., 2017

Performance analysis and optimization for chunked network coding based wireless cooperative downloading systems.
Frontiers Inf. Technol. Electron. Eng., 2017

DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks.
Frontiers Inf. Technol. Electron. Eng., 2017

面向移动物联网的可信超网络概念及构架研究 (Concept and Architecture of Trustworthy Super Network for Mobile Internet of Things).
计算机科学, 2017

DCAR: DTN Congestion Avoidance Routing Algorithm Based on Tokens in an Urban Environment.
J. Sensors, 2017

Joint optimization of downlink and D2D transmissions for SVC streaming in cooperative cellular networks.
Neurocomputing, 2017

Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network.
Int. J. Distributed Sens. Networks, 2017

A Cooperative Abnormal Behavior Detection Framework Based on Big Data Analytics.
Proceedings of the Data Science, 2017

A Cooperative Optimization Method for Mobile User Data Offloading.
Proceedings of the Wireless Sensor Networks, 2017

2016
Spatio-Temporal Error Sources Analysis and Accuracy Improvement in Landsat 8 Image Ground Displacement Measurements.
Remote. Sens., 2016

服务器监控技术综述及展望 (Review and Prospect of Server Monitoring Technology).
计算机科学, 2016

An adaptive disorder-avoidance cooperative downloading method.
Comput. Networks, 2016

Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

MM-Sync: A Mobility Built-In Model Based Time Synchronization Approach for Underwater Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

A Dynamic Grouping-Based Trust Model for Mobile P2P Networks.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation.
Frontiers Inf. Technol. Electron. Eng., 2015

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Int. J. Web Serv. Res., 2015

An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An Availability Evaluation Method of Web Services Using Improved Grey Correlation Analysis with Entropy Difference and Weight.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Study on Measuring System of Casing Machine Based on PLC.
J. Networks, 2014

Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks.
J. Networks, 2014

A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks.
J. Commun., 2014

Spectrum Migration Approach Based on Pre-decision Aid and Interval Mamdani Fuzzy Inference in Cognitive Radio Networks.
Int. J. Comput. Commun. Control, 2014

An Adaptive Channel Sensing Approach Based on Sequential Order in Distributed Cognitive Radio Networks.
Proceedings of the Network and Parallel Computing, 2014

A search and summary application for traffic events detection based on Twitter data.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

A Heuristic Method of Attack Graph Analysis for Network Security Hardening.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

An Adaptive Channel Sensing Approach and its Analysis Based on Hierarchical Colored Petri Net in Distributed Cognitive Radio Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Random Network Coding Based Schemes for Perfect Wireless Packet Retransmission Problems in Multiple Channel Networks.
Wirel. Pers. Commun., 2013

Random network coding-based optimal scheme for perfect wireless packet retransmission problems.
Wirel. Commun. Mob. Comput., 2013

Research on Attack Graph Generation for Network Security Situation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach.
Wirel. Pers. Commun., 2012

Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

2011
Boosting video popularity through recommendation systems.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

End-to-end performance of network with coding-aware.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
J. Networks, 2010

2009
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus.
Proceedings of the Third International Conference on Network and System Security, 2009

Dynamic Self-configuration of User QoS for Next Generation Network.
Proceedings of the NPC 2009, 2009

Using Hessian Locally Linear Embedding for Autonomic Failure Prediction.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A Self-Recovery Method Based on Mixed Reboot.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

The Research and Design of the Belt Grinder which Based on PLC.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

2008
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.
J. Comput. Sci. Technol., 2008

An Optimization Approach to Restart Tree Based on Mean Failure Frequencies.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Research on Autonomic-Trusted Software Evaluation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Novel Approach of Alarm Classification for Intrusion Detection based upon Dempster-Shafer Theory.
Proceedings of the WEBIST 2007, 2007

An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Novel Situation Awareness Model for Network Systems' Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Experiment of Event Injection Technology for Network Dependability Evaluation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
A Computer Immune System: LAN Immune System Model based on Host (LISMH).
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Novel Quantitative Analysis Method for Network Survivability.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Bio-inspired Multidimensional Network Security Model.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

ERAS - an Emergency Response Algorithm for Survivability of Critical Services.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2006

Analysis of an Intelligent Agent Intrusion Response System.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition.
Proceedings of the Computer Science, 2006

Research and Design on Intelligent Agent Intrusion Response System.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

A New Bio-inspired Model for Network Security and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

A New Automatic Intrusion Response Taxonomy and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Evaluation of Network Dependability Using Event Injection.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
A Comprehensive Bio-inspired Model for Network Security.
Proceedings of the 2005 International Conference on Semantics, 2005

2004
Speech Hiding Based on Auditory Wavelet.
Proceedings of the Computational Science and Its Applications, 2004

IADIDF: A Framework for Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004

A Useful System Prototype for Intrusion Detection - Architecture and Experiments.
Proceedings of the Discovery Science, 7th International Conference, 2004

HMMs for Anomaly Intrusion Detection.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...