Limin Sun

According to our database1, Limin Sun authored at least 227 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild.
Proc. ACM Meas. Anal. Comput. Syst., 2020

iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting.
IEEE J. Sel. Areas Commun., 2020

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020

Automatic Segmentation and Measurement on Knee Computerized Tomography Images for Patellar Dislocation Diagnosis.
Comput. Math. Methods Medicine, 2020

Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service.
IEEE Commun. Mag., 2020

Defining Social Engineering in Cybersecurity.
IEEE Access, 2020

Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

VES: A Component Version Extracting System for Large-Scale IoT Firmwares.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Survey of Blockchain-based Cybersecurity for Vehicular Networks.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Blockchain for Large-Scale Internet of Things Data Storage and Protection.
IEEE Trans. Serv. Comput., 2019

Traffic Sensing Methodology Combining Influence Line Theory and Computer Vision Techniques for Girder Bridges.
J. Sensors, 2019

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019

Towards IP geolocation with intermediate routers based on topology discovery.
Cybersecur., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Towards automatic fingerprinting of IoT devices in the cyberspace.
Comput. Networks, 2019

IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Side-Channel Information Leakage of Traffic Data in Instant Messaging.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Remote Fingerprinting on Internet-Wide Printers Based on Neural Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Deep Memory Network with Auxiliary Sequences for Chinese Implied Sentiment Analysis.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

An Anonymous Blockchain-Based Logging System for Cloud Computing.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018

基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018

MIAC: A mobility intention auto-completion model for location prediction.
Intell. Syst. Account. Finance Manag., 2018

Understanding the Usage of Industrial Control System Devices on the Internet.
IEEE Internet Things J., 2018

Who owns Internet of Thing devices?
Int. J. Distributed Sens. Networks, 2018

A survey of intrusion detection on industrial control systems.
Int. J. Distributed Sens. Networks, 2018

Context-aware personalized path inference from large-scale GPS snippets.
Expert Syst. Appl., 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018

Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 27th USENIX Security Symposium, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

A Check-In System Leveraging Face Recognition.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Discovery of Internet of Thing devices based on rules.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.
Proceedings of the IEEE Global Communications Conference, 2018

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence.
Wirel. Commun. Mob. Comput., 2017

Game Theoretic Study on Channel-Based Authentication in MIMO Systems.
IEEE Trans. Veh. Technol., 2017

ViMediaNet: an emulation system for interactive multimedia based telepresence services.
J. Supercomput., 2017

Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.
Sensors, 2017

A Framework for Searching Internet-Wide Devices.
IEEE Netw., 2017

Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks.
J. Sensors, 2017

Mobility Intention-Based Relationship Inference from Spatiotemporal Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

MOSTPC: Performance of a Massive Oblique Space-Time-Polarization Precoding System over Ricean-K Fading Channel.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Automatically Discovering Surveillance Devices in the Cyberspace.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

MIAC: A Mobility Intention Auto-Completion Model for Location Prediction.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Game theoretic study on blockchain based secure edge networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Collaborative UFH-based anti-jamming broadcast with learning.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

Mobility Pattern Based Relationship Inference from Spatiotemporal Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Collaborative Recognition of Queuing Behavior on Mobile Phones.
IEEE Trans. Mob. Comput., 2016

An energy efficient privacy-preserving content sharing scheme in mobile social networks.
Pers. Ubiquitous Comput., 2016

An optimal query strategy for protecting location privacy in location-based services.
Peer Peer Netw. Appl., 2016

A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016

Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016

Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs.
IEEE Commun. Lett., 2016

Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

Influential spatial facility prediction over large scale cyber-physical vehicles in smart city.
EURASIP J. Wirel. Commun. Netw., 2016

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wirel. Commun. Netw., 2016

Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

ASCEND: A search engine for online industrial control devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Characterizing industrial control system devices on the Internet.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Active Profiling of Physical Devices at Internet Scale.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Identification of visible industrial control devices at Internet scale.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Channel-Based Authentication Game in MIMO Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Generalized Project Gradient Algorithm for Solving Constrained Minimax Problems.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks.
IEEE Trans. Veh. Technol., 2015

Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015

ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks.
IEEE Trans. Mob. Comput., 2015

B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol).
计算机科学, 2015

Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks.
Int. J. Inf. Secur. Priv., 2015

Fog Computing: Focusing on Mobile Users at the Edge.
CoRR, 2015

Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

On the Stable Throughput in Wireless LANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Influential Spatial Facility Prediction over Dynamic Objects.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Abnormal event detection via adaptive cascade dictionary learning.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Disseminating real-time messages in opportunistic mobile social networks: A ranking perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Vehicle Anomaly Detection Based on Trajectory Data of ANPR System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

2014
A Quality-Aware Voice Streaming System for Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery.
IEEE Trans. Mob. Comput., 2014

Performance monitoring and evaluation in dance teaching with mobile sensing technology.
Pers. Ubiquitous Comput., 2014

Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution.
Pers. Ubiquitous Comput., 2014

Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks.
Pers. Ubiquitous Comput., 2014

Identity privacy-based reliable routing method in VANETs.
Peer Peer Netw. Appl., 2014

Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects.
IEEE Internet Things J., 2014

TDMA-Based Control Channel Access for IEEE 802.11p in VANETs.
Int. J. Distributed Sens. Networks, 2014

Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
Int. J. Distributed Sens. Networks, 2014

Optimization of Sampling Cell Size for Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2014

A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014

UserIntent: Detection of user intent for triggering smartphone sensing applications.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

QueueSense: Collaborative recognition of queuing on mobile phones.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Poster: Crowdsourcing for video traffic surveillance.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Eye localization based on correlation filter bank.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Vehicle Activity Analysis Based on ANPR System.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Message Forwarding Scheme for Multi-area Opportunistic Network Based on Message Significance.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Quantifying individual communication capability in opportunistic mobile social networks.
Proceedings of the IEEE Computers, 2014

2013
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wirel. Commun., 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
Int. J. Distributed Sens. Networks, 2013

Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective.
Int. J. Distributed Sens. Networks, 2013

Amortized Fairness for Drive-Thru Internet.
Int. J. Distributed Sens. Networks, 2013

Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs.
Int. J. Distributed Sens. Networks, 2013

Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
Int. J. Distributed Sens. Networks, 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2013

Multi-sensor data fusion based on consistency test and sliding window variance weighted algorithm in sensor networks.
Comput. Sci. Inf. Syst., 2013

False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

Context-Aware Handoff on Smartphones.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A cooperation incentive scheme based on coalitional game theory for sparse and dense VANETs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

MERPL: A more memory-efficient storing mode in RPL.
Proceedings of the 19th IEEE International Conference on Networks, 2013

A new method of post-evaluation researches on land consolidation project based on rough sets.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

2012
ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

The XM Satellite Radio Software Module of an Embedded Car Audio System.
J. Softw., 2012

Routing Algorithm Based on Multi-Community Evolutionary Game for VANET.
J. Networks, 2012

An Open Conformance Test System towards the Standardization of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Nonlinear Behaviors of Gear Shifting Digital Phase Locked Loops.
Int. J. Bifurc. Chaos, 2012

GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Exploiting ephemeral link correlation for mobile wireless networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

NSSN: A network monitoring and packet sniffing tool for wireless sensor networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

The Converged Service Oriented Architecture in Smart Home Service.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Application of Internet of Things in Power-Line Monitoring.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A case study on REST-style architecture for cyber-physical systems: Restful smart gateway.
Comput. Sci. Inf. Syst., 2011

A game based routing algorithm for congestion control of multimedia transmission in VANETs.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

A Research of Reduction Algorithm for Support Vector Machine.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Design and Implementation of Network Management System for Large-Scale Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Demo: a sensor network time synchronization protocol based on fm radio data system.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Exploiting FM radio data system for adaptive clock calibration in sensor networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

The Trajectory Exposure Problem in Location-Aware Mobile Networking.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Bi-Parameters Method For Structural Vulnerability Analysis.
Intell. Autom. Soft Comput., 2010

Structural Condition Assessment Based On Canonical Correlation Analysis And Outlier Analysis.
Intell. Autom. Soft Comput., 2010

Ambient Data Collection with Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A High-Accuracy Nonintrusive Networking Testbed for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Adaptive Voice Stream Multicast Over Low-Power Wireless Networks.
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010

ZiFi: wireless LAN discovery via ZigBee interference signatures.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Frequency-hopping/M-ary frequency-shift keying for wireless sensor networks: Noncoherent detection and performance.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Optimal infostation deployment for spatio-temporal information dissemination.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2010

Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010

A Prediction Based Long-Cycle Time Synchronization Algorithm for Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Maximum noise fraction (MNF) transformation to remove ballistocardiographic artifacts in EEG signals recorded during fMRI scanning.
NeuroImage, 2009

Editorial.
J. Softw., 2009

Editorial.
J. Networks, 2009

BoSS: a moving strategy for mobile sinks in wireless sensor networks.
Int. J. Sens. Networks, 2009

NISAT: a zero-side-effect testbed for wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Recognition the Spatio-temporal Patterns of Low-flow Changes in the Yellow River over the Last Half Century.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Using L-moments Approach to Conduct Regional Flood Frequency and Associated Spatial Patterns Analysis in the Pearl River Delta Region.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN.
J. Signal Process. Syst., 2008

THTA: Triangle-Shaped Hierarchy Aggregation Time Allocation Algorithm for Wireless Sensor Network.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

An Improved Perceptron based Illative Network for the Fault Signal Diagnosis.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2007

DAR: An energy-balanced data-gathering scheme for wireless sensor networks.
Comput. Commun., 2007

A Two-Stage Genetic Algorithm for the Multi-multicast Routing.
Proceedings of the Advances in Computation and Intelligence, 2007

Moving Schemes for Mobile Sinks in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A Content-based Robust Mode Decision Scheme for Internet Videophone Applications.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

P2P-Leveraged Mobile Live Streaming.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Channel-State Aware Scheduling Mechanism for Wireless Local Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

ESTS: An Error Statistic Based Time Synchronization Protocol for Wireless Sensor Networks.
Proceedings of the Computational Intelligence, 2006

Performance Analysis and Enhancement for Priority Based IEEE 802.11 Network.
Proceedings of IEEE International Conference on Communications, 2006

MotePlat: A Monitoring and Control Platform for Wireless Sensor Networks.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

HCCR by contour-based elastic mesh fuzzy feature.
Proceedings of the Document Recognition and Retrieval XIII, 2006

2005
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Adaptive robust TCP/IP header compression algorithm for 3G wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

An efficient multicast protocol in mobile IPv6 networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Channel state dependent robust TCP/IP header compression for 3G wireless networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
A Reliable Region based Hierarchical Mobile Multicast Protocol for IPv6 Network.
Proceedings of the Mobile and Wireless Communications Networks, 2003

Improved joint carrier and sampling frequency offset estimation scheme for OFDM systems.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...