Jiaqing Luo

Orcid: 0000-0002-5810-2339

According to our database1, Jiaqing Luo authored at least 33 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Pervasive Pose Estimation for Fall Detection.
ACM Trans. Comput. Heal., 2022

2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021

2019
Detection of Misplaced Stationary RFID Tags.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Detecting Misplaced RFID Tags on Static Shelved Items.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

2018
RILS: RFID indoor localization system using mobile readers.
Int. J. Distributed Sens. Networks, 2018

What's (Not) Validating Network Paths: A Survey.
CoRR, 2018

2016
Explore city dynamics from the communication network between base stations.
Int. J. Embed. Syst., 2016

An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

2015
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2015

The B<sup>+</sup>-tree-based method for nearest neighbour queries in traffic simulation systems.
Int. J. High Perform. Comput. Netw., 2015

The Design and Implementation of A Cost-effective RFID Indoor Localization System.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks.
ACM Trans. Auton. Adapt. Syst., 2014

A general approach for the intensive RFID reader deployment.
Int. J. Ad Hoc Ubiquitous Comput., 2014

The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2013

A bottom-up model for heterogeneous BitTorrent systems.
J. Parallel Distributed Comput., 2013

A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Research on Tax Transfer inside China's Different Regions by Using a Statistical Analysis Method.
Int. J. Asian Bus. Inf. Manag., 2012

2011
Detecting Malware Variants by Byte Frequency.
J. Networks, 2011

EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
A clone of social networks to decentralized bootstrapping P2P networks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2009
Concept, Characteristics and Defending Mechanism of Worms.
IEICE Trans. Inf. Syst., 2009

Reliable navigation of mobile sensors in wireless sensor networks without localization service.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2007
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

2006
IAC: Interest-Aware Caching for Unstructured P2P.
Proceedings of the 2006 International Conference on Semantics, 2006

An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006


  Loading...