Jiejun Hu

Orcid: 0000-0002-5274-1869

According to our database1, Jiejun Hu authored at least 16 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Service-Based, Multi-Provider, Fog Ecosystem With Joint Optimization of Request Mapping and Response Routing.
IEEE Trans. Serv. Comput., 2023

2022
A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace.
IEEE Trans. Netw. Serv. Manag., December, 2022

2021
Hybrid Blockchain for IoT - Energy Analysis and Reward Plan.
Sensors, 2021

Securing SDN-Controlled IoT Networks Through Edge Blockchain.
IEEE Internet Things J., 2021

2020
A Blockchain-Based Reward Mechanism for Mobile Crowdsensing.
IEEE Trans. Comput. Soc. Syst., 2020

Blockchain-Aided Flow Insertion and Verification in Software Defined Networks.
Proceedings of the 2020 Global Internet of Things Summit, 2020

2019
Mobile Edge Provision with Flexible Deployment.
IEEE Trans. Serv. Comput., 2019

2018
Q-FDBA: improving QoE fairness for video streaming.
Multim. Tools Appl., 2018

SRMCS: A semantic-aware recommendation framework for mobile crowd sensing.
Inf. Sci., 2018

Reward-Aided Sensing Task Execution in Mobile Crowdsensing Enabled by Energy Harvesting.
IEEE Access, 2018

2017
A semantics-based approach to multi-source heterogeneous information fusion in the internet of things.
Soft Comput., 2017

Role-based intelligent application state computing for OpenFlow distributed controllers in software-defined networking.
Soft Comput., 2017

2016
Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data.
Multim. Tools Appl., 2016

2015
Software Toolkits: Practical Aspects of the Internet of Things - A Survey.
Int. J. Distributed Sens. Networks, 2015

Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream.
Ad Hoc Networks, 2015

False positive elimination in intrusion detection based on clustering.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015


  Loading...