Jiguo Yu

According to our database1, Jiguo Yu authored at least 180 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Noise-Suppressing Neural Algorithm for Solving the Time-Varying System of Linear Equations: A Control-Based Approach.
IEEE Trans. Industrial Informatics, 2019

Triangle edge deletion on planar glasses-free RGB-digraphs.
Theor. Comput. Sci., 2019

Edge Computing Security: State of the Art and Challenges.
Proceedings of the IEEE, 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Network and Computer Applications, 2019

Network security situation: From awareness to awareness-control.
J. Network and Computer Applications, 2019

I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
IEEE Internet of Things Journal, 2019

A Novel Secure and Efficient Data Aggregation Scheme for IoT.
IEEE Internet of Things Journal, 2019

Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering.
IEEE Internet of Things Journal, 2019

Personalised service recommendation process based on service clustering.
IJCSE, 2019

A Structure of 1-Planar Graph and Its Applications to Coloring Problems.
Graphs and Combinatorics, 2019

A structure of 1-planar graph and its applications to coloring problems.
CoRR, 2019

Information, knowledge, and semantics for interacting with Internet-of-Things.
Computer Networks, 2019

An XGBoost-based physical fitness evaluation model using advanced feature selection and Bayesian hyper-parameter optimization for wearable running monitoring.
Computer Networks, 2019

An upper bound for the choice number of star edge coloring of graphs.
Applied Mathematics and Computation, 2019

MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks.
IEEE Access, 2019

User Identity De-anonymization Based on Attributes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Distributed Dominating Set and Connected Dominating Set Construction Under the Dynamic SINR Model.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

Fast Distributed Backbone Construction Despite Strong Adversarial Jamming.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Interaction-Aware Influence Maximization and Iterated Sandwich Method.
Proceedings of the Algorithmic Aspects in Information and Management, 2019

2018
N-in-One: A Novel Location-Based Service.
IEEE Trans. Vehicular Technology, 2018

Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data.
IEEE Trans. Vehicular Technology, 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Vehicular Technology, 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Vehicular Technology, 2018

Stable Local Broadcast in Multihop Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2018

Regularized Non-Negative Matrix Factorization for Identifying Differentially Expressed Genes and Clustering Samples: A Survey.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Structural Balance Theory-Based E-Commerce Recommendation over Big Rating Data.
IEEE Trans. Big Data, 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.
Security and Communication Networks, 2018

CRPD: a novel clustering routing protocol for dynamic wireless sensor networks.
Personal and Ubiquitous Computing, 2018

Advancing researches on IoT systems and intelligent applications.
Personal and Ubiquitous Computing, 2018

Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices.
IEEE Network, 2018

SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks.
IEEE Network, 2018

A survey on key fields of context awareness for mobile devices.
J. Network and Computer Applications, 2018

A nonlinear and noise-tolerant ZNN model solving for time-varying linear matrix equation.
Neurocomputing, 2018

Robot manipulator control using neural networks: A survey.
Neurocomputing, 2018

Methods of increasing two-way transmission capacity of wireless ad hoc networks.
EURASIP J. Wireless Comm. and Networking, 2018

A novel centralized algorithm for constructing virtual backbones in wireless sensor networks.
EURASIP J. Wireless Comm. and Networking, 2018

On partitions of K2, 3-free graphs under degree constraints.
Discrete Mathematics, 2018

A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks.
Computer Networks, 2018

DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data.
IEEE Access, 2018

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Cancer-Drug Interaction Network Construction and Drug Target Prediction Based on Multi-source Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy-Preserving Data Collection in Context-Aware Applications.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Fully Dynamic Broadcasting under SINR.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Exact Implementation of Abstract MAC Layer via Carrier Sensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks.
Proceedings of the 2018 International Conference on Identification, 2018

De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method.
Proceedings of the 2018 International Conference on Identification, 2018

Forecasting of Forex Time Series Data Based on Deep Learning.
Proceedings of the 2018 International Conference on Identification, 2018

Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Preface.
Proceedings of the 2018 International Conference on Identification, 2018

2017
Coverage Contribution Area Based k-Coverage for Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2017

Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model.
IEEE Trans. Vehicular Technology, 2017

Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Vehicular Technology, 2017

Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks.
IEEE Trans. Vehicular Technology, 2017

Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Vehicular Technology, 2017

Approximate Holistic Aggregation in Wireless Sensor Networks.
TOSN, 2017

Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2017

Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness.
IEEE/ACM Trans. Netw., 2017

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing.
IEEE Trans. Industrial Informatics, 2017

An Invocation Cost Optimization Method for Web Services in Cloud Environment.
Scientific Programming, 2017

Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation.
Security and Communication Networks, 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive and Mobile Computing, 2017

SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Network and Computer Applications, 2017

Maximizing target-temporal coverage of mission-driven camera sensor networks.
J. Comb. Optim., 2017

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems.
IEEE Internet of Things Journal, 2017

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
IEEE Internet of Things Journal, 2017

Ultraviolet Radiation Measurement via Smart Devices.
IEEE Internet of Things Journal, 2017

IoT Applications on Secure Smart Shopping System.
IEEE Internet of Things Journal, 2017

Guest Editorial Special Issue on Fog Computing in the Internet of Things.
IEEE Internet of Things Journal, 2017

An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context.
IEEE Internet of Things Journal, 2017

"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
IJDSN, 2017

Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Transactions, 2017

Neighbor Sum (Set) Distinguishing Total Choosability Via the Combinatorial Nullstellensatz.
Graphs and Combinatorics, 2017

Influence maximization by probing partial communities in dynamic online social networks.
Trans. Emerging Telecommunications Technologies, 2017

Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.
Complexity, 2017

Robust Nonnegative Matrix Factorization via Joint Graph Laplacian and Discriminative Information for Identifying Differentially Expressed Genes.
Complexity, 2017

Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A New Greedy Algorithm for Constructing the Minimum Size Connected Dominating Sets in Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Addressing the Threats of Inference Attacks on Traits and Genotypes from Individual Genomic Data.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Modeling and Analysis of Two-tier MIMO Heterogeneous Cellular Network.
Proceedings of the 2017 International Conference on Identification, 2017

Fine-grained Access Control with Privacy Support and Network Service Optimization in Ad hoc Networks.
Proceedings of the 2017 International Conference on Identification, 2017

A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network.
Proceedings of the 2017 International Conference on Identification, 2017

Differential Private Preservation Multi-core DBScan Clustering for Network User Data.
Proceedings of the 2017 International Conference on Identification, 2017

TSQM: Trust-based Secure Query Method in Anonymous Communication System.
Proceedings of the 2017 International Conference on Identification, 2017

ACS-DFP: Anonymous Communication Scheme Based on Decreased Forwarding Probability.
Proceedings of the 2017 International Conference on Identification, 2017

SA Framework based De-anonymization of Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Energy-efficient adaptive slice-based secure data aggregation scheme in WSN.
Proceedings of the 2017 International Conference on Identification, 2017

2016
An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets.
IEEE Trans. Cogn. Comm. & Networking, 2016

On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Connected dominating set construction in cognitive radio networks.
Personal and Ubiquitous Computing, 2016

A novel contention-on-demand design for WiFi hotspots.
Personal and Ubiquitous Computing, 2016

Time-Aware IoE Service Recommendation on Sparse Data.
Mobile Information Systems, 2016

Distributed wireless link scheduling in the SINR model.
J. Comb. Optim., 2016

Bounded information dissemination in multi-channel wireless networks.
J. Comb. Optim., 2016

An improved approximation algorithm for the shortest link scheduling in wireless networks under SINR and hypergraph models.
J. Comb. Optim., 2016

Information exchange with collision detection on multiple channels.
J. Comb. Optim., 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
IJDSN, 2016

Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wireless Comm. and Networking, 2016

Analysis and optimization of delayed channel access for wireless cyber-physical systems.
EURASIP J. Wireless Comm. and Networking, 2016

A Novel Delay Analysis for Polling Schemes with Power Management Under Heterogeneous Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Efficient privacy-preserving schemes for dot-product computation in mobile computing.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Detecting driver phone calls in a moving vehicle based on voice features.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Data Aggregation Scheduling in Wireless Sensor Networks under SINR.
Proceedings of the International Conference on Identification, 2016

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
Proceedings of the International Conference on Identification, 2016

SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR.
Proceedings of the International Conference on Identification, 2016

Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing.
Proceedings of the International Conference on Identification, 2016

IoT Applications on Secure Smart Shopping.
Proceedings of the International Conference on Identification, 2016

Multi-leader Election in Dynamic Sensor Networks.
Proceedings of the International Conference on Identification, 2016

Characteristic gene selection via L2, 1-norm Sparse Principal Component Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Robust graph regularized discriminative nonnegative matrix factorization for characteristic gene selection.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
DS-MAC: An energy efficient demand sleep MAC protocol with low latency for wireless sensor networks.
J. Network and Computer Applications, 2015

The r-acyclic chromatic number of planar graphs.
J. Comb. Optim., 2015

A Reliable Broadcast Protocol in Vehicular Ad Hoc Networks.
IJDSN, 2015

Heuristic Algorithms for One-Slot Link Scheduling in Wireless Sensor Networks under SINR.
IJDSN, 2015

IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
IJDSN, 2015

Routing, spectrum access, and scheduling in multi-hop multi-channel wireless networks with MIMO links.
EURASIP J. Wireless Comm. and Networking, 2015

On the Stable Throughput in Wireless LANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Domatic Partition in Homogeneous Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Impact of a Deterministic Delay in the DCA Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Distributed Algorithms for Maximum Clique in Wireless Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Speedup of information exchange using multiple channels in wireless ad hoc networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Minimum connected dominating set construction in wireless networks under the beeping model.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Connected Dominating Set Construction in Cognitive Radio Networks.
Proceedings of the International Conference on Identification, 2015

On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015

A Novel Scheme for Wireless Hot-Spot Networks.
Proceedings of the International Conference on Identification, 2015

Application of Graph Regularized Non-negative Matrix Factorization in Characteristic Gene Selection.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
A Local Energy Consumption Prediction-Based Clustering Protocol for Wireless Sensor Networks.
Sensors, 2014

Domatic partition in homogeneous wireless sensor networks.
J. Network and Computer Applications, 2014

SINR based Maximum Link Scheduling with Uniform Power in Wireless Sensor Networks.
TIIS, 2014

ECDC: An energy and coverage-aware distributed clustering protocol for wireless sensor networks.
Computers & Electrical Engineering, 2014

An Improved Approximation Algorithm for the Shortest Link Scheduling Problem in Wireless Networks under SINR and Hypergraph Models.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

2-m-Domatic Partition in Homogeneous Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

S-Disjunct Code Based MAC Protocol for Reliable Broadcast in Vehicular Ad Hoc Networks.
Proceedings of the International Conference on Identification, 2014

2013
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey.
Computer Communications, 2013

Efficient distributed multiple-message broadcasting in unstructured wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Virtual Backbone Construction Algorithms Based on Protocol Interference Model.
Proceedings of the Advances in Wireless Sensor Networks, 2013

An Algorithm for Constructing Strongly Connected Dominating and Absorbing Sets in Wireless Networks with Unidirectional Links.
Proceedings of the Advances in Wireless Sensor Networks, 2013

2012
Constructing minimum extended weakly-connected dominating sets for clustering in ad hoc networks.
J. Parallel Distrib. Comput., 2012

E-DPSO Algorithm Design and Demonstration about Dynamic Selection and Merging Process of ac-Service Flow.
JCP, 2012

A Stochastic k-Coverage Scheduling Algorithm in Wireless Sensor Networks.
IJDSN, 2012

Transforming Area Coverage to Target Coverage to Maintain Coverage and Connectivity for Wireless Sensor Networks.
IJDSN, 2012

Circular Coloring of Planar Digraphs.
Graphs and Combinatorics, 2012

Edge Dominating Capability based Backbone Construction in Wireless Networks
CoRR, 2012

Winner-take-all based on discrete-time dynamic feedback.
Applied Mathematics and Computation, 2012

2011
An Energy-Aware Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
IJDSN, 2011

2010
On the fractional f-chromatic index of a graph.
Int. J. Comput. Math., 2010

Heuristic Algorithms for Constructing Connected Dominating Sets with Minimum Size and Bounded Diameter in Wireless Networks.
Proceedings of the Wireless Algorithms, 2010

2009
A Novel Hierarchical Overlay for Structured Peer-to-Peer Network.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric System.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

An Algorithm with Better Approximation Ratio for Multicast Traffic in Unidirectional SONET/WDM Rings.
Proceedings of the Combinatorial Optimization and Applications, 2009

Approximating the Multicast Traffic Grooming Problem in Unidirectional SONET/WDM Rings.
Proceedings of the Combinatorial Optimization and Applications, 2009

An Efficient Search Algorithm for REIK Overlay Network.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Scale-free Overlay Structures for Unstructured Peer-to-Peer Networks.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Novel P2P Overlay Network Based on Cycloid and Folded Hypercube.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

ERASP: An Efficient and Robust Adaptive Superpeer Overlay Network.
Proceedings of the Progress in WWW Research and Development, 2008

EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networks.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
KZCAN: A Kautz based content-addressable network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem .
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

REIK: A Novel P2P Overlay Network with Byzantine Fault Tolerance.
Proceedings of the Third International Conference on Semantics, 2007

Concept Interconnection Based on Many-Valued Context Analysis.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Note on Factional Extendable Graphs.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Formal Description-Based Approach to Extended Many-Valued Context Analysis.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Notes on Fractional (1, f )-Odd Factors of Graphs.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007


  Loading...