Liusheng Huang

Orcid: 0000-0001-8417-3256

According to our database1, Liusheng Huang authored at least 450 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Federated Learning With Server-Side Unlabeled Data by Adaptive Client and Data Selection.
IEEE Trans. Mob. Comput., April, 2024

Segmented Entanglement Establishment With All-Optical Switching in Quantum Networks.
IEEE/ACM Trans. Netw., February, 2024

2023
Scalable and Robust East-West Forwarding Framework for Hyperscale Clouds.
IEEE/ACM Trans. Netw., December, 2023

Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023

Joint Model Pruning and Topology Construction for Accelerating Decentralized Machine Learning.
IEEE Trans. Parallel Distributed Syst., October, 2023

Accelerating Decentralized Federated Learning in Heterogeneous Edge Computing.
IEEE Trans. Mob. Comput., September, 2023

AFall: Wi-Fi-Based Device-Free Fall Detection System Using Spatial Angle of Arrival.
IEEE Trans. Mob. Comput., August, 2023

AutoProfile: An Intelligent Profile Switching System for Smartphones.
IEEE Trans. Mob. Comput., June, 2023

Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization.
Entropy, January, 2023

Adaptive Batch Size for Federated Learning in Resource-Constrained Edge Computing.
IEEE Trans. Mob. Comput., 2023

Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Integrating All-optical Switching and Entangled Photon Source Placement for Entanglement Routing.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Asynchronous Entanglement Provisioning and Routing for Distributed Quantum Computing.
Proceedings of the IEEE INFOCOM 2023, 2023

Enhancing Decentralized Federated Learning for Non-IID Data on Heterogeneous Devices.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2022
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks.
IEEE/ACM Trans. Netw., 2022

Attention-Based Gait Recognition and Walking Direction Estimation in Wi-Fi Networks.
IEEE Trans. Mob. Comput., 2022

Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data.
IEEE Trans. Knowl. Data Eng., 2022

Public Curb Parking Demand Estimation With POI Distribution.
IEEE Trans. Intell. Transp. Syst., 2022

STBC: A Novel Blockchain-Based Spectrum Trading Solution.
IEEE Trans. Cogn. Commun. Netw., 2022

Segment as Points for Efficient and Effective Online Multi-Object Tracking and Segmentation.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

A Blockchain-Based Protocol for Malicious Price Discrimination.
J. Comput. Sci. Technol., 2022

Federated synthetic data generation with differential privacy.
Neurocomputing, 2022

RoNS: Robust network function services in clouds.
Comput. Networks, 2022

Zeta: A Scalable and Robust East-West Communication Framework in Large-Scale Clouds.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

AtHom: Two Divergent Attentions Stimulated By Homomorphic Training in Text-to-Image Synthesis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Enhancing Federated Learning with In-Cloud Unlabeled Data.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Against Backdoor Attacks In Federated Learning With Differential Privacy.
Proceedings of the IEEE International Conference on Acoustics, 2022

V2X and Vision Fusion Based Undulating Road Recognition and Intelligent Vehicle Control.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Offloading Tasks With Dependency and Service Caching in Mobile Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2021

Achieving Fine-Grained Flow Management Through Hybrid Rule Placement in SDNs.
IEEE Trans. Parallel Distributed Syst., 2021

F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.
Secur. Commun. Networks, 2021

FedSA: A Semi-Asynchronous Federated Learning Mechanism in Heterogeneous Edge Computing.
IEEE J. Sel. Areas Commun., 2021

Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Real-Time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

DNN Inference Acceleration with Partitioning and Early Exiting in Edge Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Private Frequent Itemset Mining in the Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Design and Implementation of a Real-Time Distributed Precise Point Positioning Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ABPNet: Adaptive Background Modeling for Generalized Few Shot Segmentation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

AggNet for Self-supervised Monocular Depth Estimation: Go An Aggressive Step Furthe.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture.
Proceedings of the International Joint Conference on Neural Networks, 2021

MDANet: Multi-Modal Deep Aggregation Network for Depth Completion.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

Continuous Copy-Paste for One-stage Multi-object Tracking and Segmentation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Revealing the Reciprocal Relations between Self-Supervised Stereo and Monocular Depth Estimation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Pointer Networks for Arbitrary-Shaped Text Spotting.
Proceedings of the IEEE International Conference on Acoustics, 2021

Adversarial Attacks on Object Detectors with Limited Perturbations.
Proceedings of the IEEE International Conference on Acoustics, 2021

Mask4D: 4D Convolution Network for Light Field Occlusion Removal.
Proceedings of the IEEE International Conference on Acoustics, 2021

VK-Net: Category-Level Point Cloud Registration with Unsupervised Rotation Invariant Keypoints.
Proceedings of the IEEE International Conference on Acoustics, 2021

Study on Multi-Vehicle Scheduling Problem.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Research on Informatization Forecasting Particulate Matter Using Spatio-Temporal Data.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
Fast and Accurate Traffic Measurement With Hierarchical Filtering.
IEEE Trans. Parallel Distributed Syst., 2020

Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing.
IEEE/ACM Trans. Netw., 2020

Best Bang for the Buck: Cost-Effective Seed Selection for Online Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Bayesian Co-Clustering Truth Discovery for Mobile Crowd Sensing Systems.
IEEE Trans. Ind. Informatics, 2020

Quality-aware online task assignment mechanisms using latent topic model.
Theor. Comput. Sci., 2020

Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers.
IEEE Trans. Cloud Comput., 2020

Set-valued Data Publication with Local Privacy: Tight Error Bounds and Efficient Mechanisms.
Proc. VLDB Endow., 2020

TransNet: Training Privacy-Preserving Neural Network over Transformed Layer.
Proc. VLDB Endow., 2020

Collaborative Thompson Sampling.
Mob. Networks Appl., 2020

DPDT: A Differentially Private Crowd-Sensed Data Trading Mechanism.
IEEE Internet Things J., 2020

Self-accelerated Thompson sampling with near-optimal regret upper bound.
Neurocomputing, 2020

PointTrack++ for Effective Online Multi-Object Tracking and Segmentation.
CoRR, 2020

Joint Switch Upgrade and VNF Placement for NFV-Based SDNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Offloading Dependent Tasks in Mobile Edge Computing with Service Caching.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNs.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Incremental Server Deployment for Scalable NFV-enabled Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Performance Guaranteed Single Link Failure Recovery in SDN Overlay Networks.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing Network.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Segment as Points for Efficient Online Multi-Object Tracking and Segmentation.
Proceedings of the Computer Vision - ECCV 2020, 2020

GDS: General Distributed Strategy for Functional Dependency Discovery Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2020

PrivGMM: Probability Density Estimation with Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2020

ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Integrating Coflow and Circuit Scheduling for Optical Networks.
IEEE Trans. Parallel Distributed Syst., 2019

Local Differential Private Data Aggregation for Discrete Distribution Estimation.
IEEE Trans. Parallel Distributed Syst., 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation.
IEEE Trans. Knowl. Data Eng., 2019

Practical quantum Byzantine protocol via nearly optimal entanglement resources.
Quantum Inf. Process., 2019

Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2019

An improved entropy-based approach to steganalysis of compressed speech.
Multim. Tools Appl., 2019

Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones.
IEEE Internet Things J., 2019

Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability.
CoRR, 2019

GAN Generate Adversarial Examples to Fool Deep Networks.
Aust. J. Intell. Inf. Process. Syst., 2019

How Bob in Quantum Private Query Protocol Gets the Element?
IEEE Access, 2019

Contextual Combinatorial Cascading Thompson Sampling.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

SAFE-ME: Scalable and Flexible Middlebox Policy Enforcement with Software Defined Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Online Scheduling Strategy to Minimize Penalty of Tardiness for Real-Time Tasks in Mobile Edge Computing Systems.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

Differentially Private Greedy Decision Forest.
Proceedings of the IEEE International Conference on Acoustics, 2019

Fast Recovery for Single Link Failure with Segment Routing in SDNs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Joint Job Offloading and Resource Allocation for Distributed Deep Learning in Edge Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Collaborative Contextual Combinatorial Cascading Thompson Sampling.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Toward Urban Electric Taxi Systems in Smart Cities: The Battery Swapping Challenge.
IEEE Trans. Veh. Technol., 2018

Joint Optimization of Flow Table and Group Table for Default Paths in SDNs.
IEEE/ACM Trans. Netw., 2018

CountMax: A Lightweight and Cooperative Sketch Measurement for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2018

Achieving High Scalability Through Hybrid Switching in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2018

Minimizing Controller Response Time Through Flow Redirecting in SDNs.
IEEE/ACM Trans. Netw., 2018

Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles.
IEEE Trans. Mob. Comput., 2018

Joint Virtual Switch Deployment and Routing for Load Balancing in SDNs.
IEEE J. Sel. Areas Commun., 2018

Corrections to "Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks".
IEEE J. Sel. Areas Commun., 2018

Hybrid covert channel in LTE-A: Modeling and analysis.
J. Netw. Comput. Appl., 2018

Concealed in web surfing: Behavior-based covert channels in HTTP.
J. Netw. Comput. Appl., 2018

Centralized spectrum leasing via cooperative SU assignment in cognitive radio networks.
Int. J. Commun. Syst., 2018

Optimal channel allocation for multi-PU and multi-SU pairs in underlay cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Supervised learning framework for covert channel detection in LTE-A.
IET Inf. Secur., 2018

COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds.
CoRR, 2018

Load-balancing routing in software defined networks with multiple controllers.
Comput. Networks, 2018

A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Smart Device Fingerprinting Based on Webpage Loading.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Link Us if You Can: Enabling Unlinkable Communication on the Internet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PrivSet: Set-Valued Data Analyses with Locale Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Automatic Recognition for Arbitrarily Tilted License Plate.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

A robust and efficient method for license plate recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Anomalous Trajectory Detection Between Regions of Interest Based on ANPR System.
Proceedings of the Computational Science - ICCS 2018, 2018

COUSTIC: Combinatorial Double Auction for Crowd Sensing Task Assignment in Device-to-Device Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Task Offloading in Edge-Clouds with Budget Constraint.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline.
Proceedings of the Computer Vision - ECCV 2018, 2018

TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud.
Proceedings of the Database Systems for Advanced Applications, 2018

Classification Learning from Private Data in Heterogeneous Settings.
Proceedings of the Database Systems for Advanced Applications, 2018

An Entropy-based Method for Detection of Covert Channels over LTE.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Quality-Aware Online Task Assignment Using Latent Topic Model.
Proceedings of the Algorithmic Aspects in Information and Management, 2018

2017
Price-based resource allocation for revenue maximization with cooperative communication.
Wirel. Networks, 2017

Shared relay assignment in cooperative communications for bandwidth maximization.
Wirel. Networks, 2017

Opportunistic Mobile Data Offloading with Deadline Constraints.
IEEE Trans. Parallel Distributed Syst., 2017

Minimizing Flow Statistics Collection Cost Using Wildcard-Based Requests in SDNs.
IEEE/ACM Trans. Netw., 2017

Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs.
IEEE/ACM Trans. Netw., 2017

Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN.
IEEE/ACM Trans. Netw., 2017

Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks.
IEEE Trans. Mob. Comput., 2017

SOS: Real-time and accurate physical assault detection using smartphone.
Peer-to-Peer Netw. Appl., 2017

Achieving fully privacy-preserving private range queries over outsourced cloud data.
Pervasive Mob. Comput., 2017

Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks.
IEEE J. Sel. Areas Commun., 2017

WiStep: Device-free Step Counting with WiFi Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Joint channel and sink assignment for data collection in cognitive wireless sensor networks.
Int. J. Commun. Syst., 2017

Cooperative topology control for low interference in wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017

FAST: truthful auction with access flexibility for cooperative communications.
IET Commun., 2017

Cost-Effective Seed Selection in Online Social Networks.
CoRR, 2017

Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing.
CoRR, 2017

Auction-based resource allocation for cooperative cognitive radio networks.
Comput. Commun., 2017

Optimizing virtual machine placement in distributed clouds with M/M/1 servers.
Comput. Commun., 2017

Partial flow statistics collection for load-balanced routing in software defined networks.
Comput. Networks, 2017

FTRS: A mechanism for reducing flow table entries in software defined networks.
Comput. Networks, 2017

AIS: An Inaudible Guider in Your Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Load-Balancing Software-Defined Networking Through Hybrid Routing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

SmartMonitoring: Reckoning Traffic Statuses of Road System in Real-Time Based on Scarce Road Surveillance Cameras.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Joint deployment and routing in hybrid SDNs.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Local private ordinal data distribution estimation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Exploiting Cantor Expansion for Covert Channels over LTE-Advanced.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Detect Malicious Attacks from Entire TCP Communication Process.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Deploying default paths by joint optimization of flow table and group table in SDNs.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

On the effect of flow table size and controller capacity on SDN network throughput.
Proceedings of the IEEE International Conference on Communications, 2017

Achieving personalized and privacy-preserving range queries over outsourced cloud data.
Proceedings of the IEEE International Conference on Communications, 2017

Energy-Efficient Cooperative Communications with Shared Relay in Wireless Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A General Fine-Grained Truth Discovery Approach for Crowdsourced Data Aggregation.
Proceedings of the Database Systems for Advanced Applications, 2017

A Classifier Method for Detection of Covert Channels over LTE.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Joint relay assignment and rate-power allocation for multiple paths in cooperative networks.
Wirel. Networks, 2016

Energy-aware virtual multi-input-multi-output-based routing for wireless ad hoc networks.
Wirel. Commun. Mob. Comput., 2016

Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks.
IEEE Trans. Mob. Comput., 2016

Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2016

Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones.
Sensors, 2016

Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption.
J. Web Eng., 2016

A self-adaptive reconfiguration scheme for throughput maximization in municipal WMNs.
J. Parallel Distributed Comput., 2016

Maximum-lifetime data aggregation for wireless sensor networks with cooperative communication.
Int. J. Sens. Networks, 2016

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
Int. J. Netw. Secur., 2016

A scale-independent way for differential estimation in dynamic radio frequency identification systems.
Int. J. Commun. Syst., 2016

Queueing analysis for preemptive transmission in underlay CRNs.
Int. J. Commun. Syst., 2016

Identity-based Signatures from Lattices: Simpler, Faster, Shorter.
Fundam. Informaticae, 2016

Mutual Information Optimally Local Private Discrete Distribution Estimation.
CoRR, 2016

iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Private Weighted Histogram Aggregation in Crowdsourcing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Social Welfare Maximization Auction for Secondary Spectrum Markets: A Long-Term Perspective.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Urban Traffic Condition Estimation: Let WiFi Do It.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

i-Shield: A System to Protect the Security of Your Smartphone.
Proceedings of the Knowledge Science, Engineering and Management, 2016

High-throughput anycast routing and congestion-free reconfiguration for SDNs.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Efficient and proactive V2V information diffusion using Named Data Networking.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

A decision-tree-based on-line flow table compressing method in Software Defined Networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Truthful incentive mechanism for vehicle-based nondeterministic crowdsensing.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

WiCare: A Synthesized Healthcare Service System Based on WiFi Signals.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Real-time update with joint optimization of route selection and update scheduling for SDNs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Deadline-sensitive User Recruitment for mobile crowdsensing with probabilistic collaboration.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

The Development of a Smart Taxicab Scheduling System: A Multi-source Data Fusion Perspective.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

A Realistic and Optimized V2V Communication System for Taxicabs.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

WiFinger: talk to your smart devices with finger-grained gesture.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Geospatial Streams Publish with Differential Privacy.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Secure and Robust Covert Channel Based on Secret Sharing Scheme.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

A Real Time Wireless Interactive Multimedia System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2015

PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms.
IEEE Trans. Parallel Distributed Syst., 2015

Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs.
IEEE/ACM Trans. Netw., 2015

Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets.
IEEE Trans. Mob. Comput., 2015

Cooperative optimal pricing for stochastic access control in overlaid radio access networks.
Telecommun. Syst., 2015

On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Secur. Comput., 2015

Certificateless and certificate-based signatures from lattices.
Secur. Commun. Networks, 2015

A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Secur. Commun. Networks, 2015

Privacy-preserving LOF outlier detection.
Knowl. Inf. Syst., 2015

Handoff optimization and load balancing in wireless LANs using association control.
Int. J. Commun. Syst., 2015

Selectable sensing period optimisation for energy-constrained cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Joint relay assignment and bandwidth allocation for all-to-one communication in cooperative networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers.
IET Commun., 2015

Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks.
CoRR, 2015

Distributed Compressed Sensing in Vehicular Ad-hoc Network.
Ad Hoc Sens. Wirel. Networks, 2015

Spectrum Allocation Mechanisms in Wireless Networks with Performance Guarantee.
Ad Hoc Sens. Wirel. Networks, 2015

(Invited) popularity-based content replication scheme for wireless mesh network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

A solution of splittable large flow scheduling based on MCMF in software defined network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Achieving primary secrecy in energy harvesting CRNs using stackelberg game.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

iProtect: Detecting Physical Assault Using Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Private Range Queries on Outsourced Databases.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Privacy-Preserving Naive Bayes Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Recognizing the Operating Hand from Touchscreen Traces on Smartphones.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Secure double spectrum auctions.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Privacy preserving big histogram aggregation for spatial crowdsensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Minimizing response latency via efficient virtual machine placement in cloud systems.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Multi-task assignment for crowdsensing in mobile social networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ITSEC: An information-theoretically secure framework for truthful spectrum auctions.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Planning Battery Swapping Stations for Urban Electrical Taxis.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

A mechanism for reducing flow tables in software defined network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Rule Anomalies Detecting and Resolving for Software Defined Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Preserving Worker Location Privacy in Spatial Crowdsourcing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Queuing-Theoretical Multi-user Spectrum Sensing and Access in Multi-channel Cognitive Radio Networks.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

Efficient Privacy-Preserving Aggregation for Mobile Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

Protecting Location Privacy in Spatial Crowdsourcing.
Proceedings of the Web Technologies and Applications, 2015

2014
Providing reliable and real-time delivery in the presence of body shadowing in breadcrumb systems.
ACM Trans. Embed. Comput. Syst., 2014

Community-Aware Opportunistic Routing in Mobile Social Networks.
IEEE Trans. Computers, 2014

A novel distributed covert channel in HTTP.
Secur. Commun. Networks, 2014

SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications.
Pers. Ubiquitous Comput., 2014

Processing Mutliple Requests to Construct Skyline Composite Services.
J. Web Eng., 2014

Improvement of a Lattice-based Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2014

Emerging Applications for Cyber Transportation Systems.
J. Comput. Sci. Technol., 2014

Security Analysis of a fuzzy Identity-Based Encryption Scheme.
J. Circuits Syst. Comput., 2014

One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity.
Int. J. Netw. Secur., 2014

On the security of an enhanced signature scheme.
Int. J. Inf. Commun. Technol., 2014

Practical certificateless short signature scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014

Distributed compressed sensing in wireless local area networks.
Int. J. Commun. Syst., 2014

Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme.
Fundam. Informaticae, 2014

A novel anonymous authentication scheme without cryptography.
Trans. Emerg. Telecommun. Technol., 2014

Efficient Identity-Based Signature from Lattices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Shared relay assignment (SRA) for many-to-one traffic in cooperative wireless transmissions.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Replica placement in content delivery networks with stochastic demands and M/M/1 servers.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A combinatorial double auction mechanism for cloud resource group-buying.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Data-driven traffic flow analysis for vehicular communications.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Fairness-aware shared relay assignment for cooperative communications.
Proceedings of the IEEE International Conference on Communications, 2014

Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks.
Proceedings of the IEEE Computers, 2014

A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Topology Control with vMIMO Communication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions.
IEEE Trans. Wirel. Commun., 2013

Coalitional Game for Community-Based Autonomous Web Services Cooperation.
IEEE Trans. Serv. Comput., 2013

An incentive energy-efficient routing for data gathering in wireless cooperative networks.
Telecommun. Syst., 2013

Secret sharing based on quantum Fourier transform.
Quantum Inf. Process., 2013

Quantum state sharing against the controller's cheating.
Quantum Inf. Process., 2013

A Fine-grained Hop-count Based Localization Algorithm for Wireless Sensor Networks.
J. Comput., 2013

An energy-efficient opportunistic relay assignment in wireless cooperative networks.
Int. J. Sens. Networks, 2013

Energy-efficient tree-based cooperative data aggregation for wireless sensor networks.
Int. J. Sens. Networks, 2013

Efficient hierarchical identity-based signatures from lattices.
Int. J. Electron. Secur. Digit. Forensics, 2013

Lattice-based message recovery signature schemes.
Int. J. Electron. Secur. Digit. Forensics, 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
Int. J. Distributed Sens. Networks, 2013

R-MAC: Risk-Aware Dynamic MAC Protocol for Vehicular Cooperative Collision Avoidance System.
Int. J. Distributed Sens. Networks, 2013

Depth Mapping for Stereoscopic Videos.
Int. J. Comput. Vis., 2013

Cryptanalysis of a certificateless signature scheme without pairings.
Int. J. Commun. Syst., 2013

Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets
CoRR, 2013

A Truthful and Capacity-Aware Routing Protocol for Wireless Cooperative Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Near optimal scheduling of data aggregation in wireless sensor networks.
Ad Hoc Networks, 2013

Design and implementation of a testbed for WSNs monitoring aquatic environment.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013

Achieving Handoff Optimization and Throughput Efficiency in Vehicular Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Steganalysis of Compressed Speech Based on Markov and Entropy.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Topology and Link quality-aware Geographical opportunistic routing in wireless ad-hoc networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On-road ads delivery scheduling and bandwidth allocation in vehicular CPS.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Homing spread: Community home-based multi-copy routing in mobile social networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Bandwidth-Power Aware Cooperative Multipath Routing for Wireless Multimedia Sensor Networks.
IEEE Trans. Wirel. Commun., 2012

Performance Analysis of Wireless Sensor Networks With Mobile Sinks.
IEEE Trans. Veh. Technol., 2012

On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays.
IEEE Trans. Veh. Technol., 2012

Degree-bounded minimum spanning tree for unit disk graph.
Theor. Comput. Sci., 2012

Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.
Quantum Inf. Process., 2012

Privacy-Preserving OLAP for Accurate Answer.
J. Circuits Syst. Comput., 2012

Flow-Based Transmission Scheduling in Constrained Delay Tolerant Networks.
J. Comput., 2012

Cooperative relay assignment for static energy-constrained networks.
Int. J. Sens. Networks, 2012

Security of a Biometric Identity-based Encryption Scheme.
Int. J. Netw. Secur., 2012

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
Int. J. Netw. Secur., 2012

Breaking A Proxy Signature Scheme From Lattices.
Int. J. Netw. Secur., 2012

Truthful Relay Assignment for Cooperative Communication in Wireless Networks with Selfish Source-Destination Pairs.
Int. J. Distributed Sens. Networks, 2012

Optimal relay assignment for fairness in wireless cooperative networks.
Int. J. Ad Hoc Ubiquitous Comput., 2012

More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis
CoRR, 2012

True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions
CoRR, 2012

Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks
CoRR, 2012

On the Security of an identity-based short signature scheme
CoRR, 2012

A new scheme for covert communication via 3G encoded speech.
Comput. Electr. Eng., 2012

An Adaptive Collision-Free MAC protocol based on TDMA for Inter-Vehicular communication.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Compressive Sensing based on local regional data in Wireless Sensor Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A novel system design and implementation for realtime sensing and warning of roadway hazards round-the-clock.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012

Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Capacity of distributed content delivery in large-scale wireless ad hoc networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Shapley Value Based Impression Propagation for Reputation Management in Web Service Composition.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Integrated Traffic-Driving-Networking Simulator: A Unique R&D Tool for Connected Vehicles.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

An Incremental BP Neural Network Based Spurious Message Filter for VANET.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Fast fourier transform based ip traffic classification system for SIPTO at H(e)NB.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Inf. Process., 2011

Asymmetric multi-party quantum state sharing of an arbitrary <i>m</i>-qubit state.
Quantum Inf. Process., 2011

Detection of substitution-based linguistic steganography by relative frequency analysis.
Digit. Investig., 2011

Steganalysis against substitution-based linguistic steganography based on context clusters.
Comput. Electr. Eng., 2011

An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Quality Driven Web Services Replication Using Directed Acyclic Graph Coding.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A Stable Joint Routing and Spectrum Scheduling Scheme for Cognitive Radio Ad Hoc Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS.
Proceedings of IEEE International Conference on Communications, 2011

2010
Joint relay assignment and power allocation for cooperative communications.
Wirel. Networks, 2010

FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services.
IEEE Trans. Serv. Comput., 2010

Energy-efficient cooperative data aggregation for wireless sensor networks.
J. Parallel Distributed Comput., 2010

Efficient protocols for point-convex hull inclusion decision problems.
J. Networks, 2010

Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
J. Comput., 2010

A Survey of Web Services Provision.
Int. J. Syst. Serv. Oriented Eng., 2010

Insurance-Based Business Web Services Composition.
Int. J. Organ. Collect. Intell., 2010

A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

One-pass key establishment for anonymous wireless roaming.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2010

Efficient Wireless Broadcasting Using Onion Decoding.
Proceedings of the Wireless Algorithms, 2010

A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Blind Linguistic Steganalysis against Translation Based Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Joint power allocation and relay assignment for max-min fairness in cooperative networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

Passive interference measurement in Wireless Sensor Networks.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Maximal Lifetime Scheduling for Cooperative Communications in Wireless Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Interference-Aware Relay Assignment for Cooperative Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

Reputation-Driven Recommendation of Services with Uncertain QoS.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
A Chinese Handwriting Education System with Automatic Error Detection.
J. Softw., 2009

Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks.
J. Comput. Sci. Technol., 2009

Constraints-Aware Scheduling for Transactional Services Composition.
J. Comput. Sci. Technol., 2009

Minimizing transmission time in 802.16-based multi-channel mesh networks.
Int. J. Pervasive Comput. Commun., 2009

Topology control for delay-constraint data collection in wireless sensor networks.
Comput. Commun., 2009

Practical indoor tracking using Wireless Sensor Networks.
Proceedings of the 6th Workshop on Positioning, Navigation and Communication, 2009

Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Privacy Preserving Attribute Reduction Based on Rough Set.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

A fine-grained localization algorithm in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Location-Independent Topology Control and Implementation for Wireless Sensor Networks.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Spanner-Aware Relay Node Placement in Wireless Ad Hoc Sensor Networks.
Proceedings of the MSN 2009, 2009

Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Hiding Information by Context-Based Synonym Substitution.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Consistent Message Ordering in Wireless Sensor and Actor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Web services provision: solutions, challenges and opportunities (invited paper).
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A Transmit Antenna Selection for MIMO Wireless Ad-Hoc Networks in Lossy Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Storage Node Placement Algorithm in Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks.
Comput. Commun., 2008

Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links.
Comput. Commun., 2008

A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008

An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

QoS-Aware Scheduling of Web Services.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Delay-constraint topology control in wireless sensor networks format.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

A Tracking Range Based Ant-Colony Routing Protocol for Mobile Wireless.
Proceedings of the MSN 2008, 2008

Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks.
Proceedings of the MSN 2008, 2008

Swarm intelligence: Coverage and connectivity control for mobile sensors.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Topology control for minimal path interference in wireless sensor networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Energy-Efficient Location-Independent <i>k</i> -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Building Profit-Aware Service-Oriented Business Applications.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Building QKD Networks Based On a Novel QKD Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

NBLS: Neighbor-information-based localization system for wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008

Privacy-preserving Protocols for Finding the Convex Hulls.
Proceedings of the The Third International Conference on Availability, 2008

2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007

An efficient synchronisation protocol for wireless sensor network.
Int. J. Sens. Networks, 2007

Centralized Scheduling and Channel Assignment in Multi-Channel Single-Transceiver WiMax Mesh Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Coverage-preserving Data Gathering in Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Privacy-preserving technology and its applications in statistics measurements.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Wireless fire monitoring system for ancient buildings.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Privacy-preserving collision detection of two circles.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A hybrid range-free localization scheme in wireless sensor networks work in progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Privacy-preserving statistical quantitative rules mining.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Quantum Oblivious Transfer Using Tripartite Entangled States.
Proceedings of the Future Generation Communication and Networking, 2007

Wireless Sensor Networks for Intensive Irrigated Agriculture.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies.
J. Supercomput., 2006

Coverage and Exposure Paths in Wireless Sensor Networks.
J. Comput. Sci. Technol., 2006

Fault-Tolerant Orchestration of Transactional Web Services.
Proceedings of the Web Information Systems, 2006

QoS-Aware Web Services Composition Using Transactional Composition Operator.
Proceedings of the Advances in Web-Age Information Management, 2006

Self-organization Data Gathering for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Quantum ANDOS Protocol with Unconditional Security.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data.
Proceedings of the Grid and Cooperative Computing, 2006

Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Localized Algorithm for Coverage in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Accurate Time Synchronization for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Multimedia object placement for hybrid transparent data replication.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Arm up Administrators: Automated Vulnerability Management.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

2003
Automated Vulnerability Management through Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Common Vulnerability Markup Language.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4.
J. Comput. Sci. Technol., 2002

Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms.
J. Comb. Optim., 2002

2000
A Fast Algorithm for Mining Association Rules.
J. Comput. Sci. Technol., 2000

1996
Experimental Video Database Management System Based on Advanced Object-Oriented Techniques.
Proceedings of the Storage and Retrieval for Still Image and Video Databases IV, 1996

1995
A Dynamic Data Model for a Video Database Management System.
ACM Comput. Surv., 1995


  Loading...