Jiang Li

Affiliations:
  • Howard University, Washington, DC, USA


According to our database1, Jiang Li authored at least 43 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Sharding-Enabled Blockchain for Software-Defined Internet of Unmanned Vehicles in the Battlefield.
IEEE Netw., 2021

Privacy Preserving Misbehavior Detection in IoV Using Federated Machine Learning.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

Toward Bias Analysis Using Tweets and Natural Language Processing.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2018
Optimizing Message Ferry Scheduling in a DTN.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR framework.
Proceedings of the IEEE INFOCOM 2018, 2018

2015
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment.
Proceedings of the 12th International Conference on Information Technology, 2015

Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics.
Proceedings of the 12th International Conference on Information Technology, 2015

2013
Homing-pigeon-based messaging: multiple pigeon-assisted delivery in delay-tolerant networks.
Wirel. Commun. Mob. Comput., 2013

Minimizing the Average Delay of Messages in Pigeon Networks.
IEEE Trans. Commun., 2013

2012
Quasi-Optimal Dual-Phase Scheduling for Pigeon Networks.
IEEE Trans. Veh. Technol., 2012

A geographical partitioning-based pigeon assignment in a pigeon network.
Proceedings of IEEE International Conference on Communications, 2012

Study of visiting frequency in a delay tolerant network.
Proceedings of IEEE International Conference on Communications, 2012

2010
Location-centric storage and query in wireless sensor networks.
Wirel. Networks, 2010

HoP-DTN: Modeling and Evaluation of Homing-Pigeon-Based Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2010

Adaptive Scheduling of Message Carrying in a Pigeon Network.
J. Ubiquitous Syst. Pervasive Networks, 2010

Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application.
EURASIP J. Wirel. Commun. Netw., 2010

Heterogeneity of Device Contact Process in Pocket Switched Networks.
Proceedings of the Wireless Algorithms, 2010

Modeling Contacts and Mobility for Wireless Mobile Networks.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

2009
Peer-to-Peer Live Video Distribution under Heterogeneous Bandwidth Constraints.
IEEE Trans. Parallel Distributed Syst., 2009

Dynamic Scheduling of Pigeons for Delay Constrained Applications.
Proceedings of the Wireless Algorithms, 2009

Characterizing the association between mobile users using wireless network traces.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

A Multi-Signature Scheme Based on Two Difficult Mathematics Problems.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Modeling and Evaluation of Homing-Pigeon Based Delay Tolerant Networks with Periodic Scheduling.
Proceedings of IEEE International Conference on Communications, 2009

A Study on Routing Algorithm of Mass Transit.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
HoP: Pigeon-Assisted Forwarding in Partitioned Wireless Networks.
Proceedings of the Wireless Algorithms, 2008

Multicast Using Static Trees.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Generalized multicast congestion control.
Comput. Networks, 2007

LSONet: A Case of Layer-Encoded Video Transmission in Overlay Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

Comparative Analysis of Email Filtering Technologies.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Preventing parameterized vulnerability in Web based applications.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Efficient Caching Scheme for On-Demand Streaming Service on Overlay Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Explicit rate multicast congestion control.
Comput. Networks, 2006

2005
IEEE 1394: Another Low Cost Viable Alternative Interconnect for High Performance Computing.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Location-centric storage for sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

A Probabilistic Routing Algorithm for DTNs of Randomly Moving Nodes.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
MCA: an end-to-end multicast congestion avoidance scheme with feedback suppression.
Comput. Commun., 2004

Floating Parasitic Data Storage.
Proceedings of the International Conference on Internet Computing, 2004

2003
Generalized Multicast Congestion Control. An Efficient Multi-rate Scheme Using Single-rate Control.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

2002
LE-SBCC: Loss-Event Oriented Source-Based Multicast Congestion Control.
Multim. Tools Appl., 2002

MCA: a rate-based end-to-end multicast congestion avoidance scheme.
Proceedings of the IEEE International Conference on Communications, 2002


  Loading...