Liusheng Huang

According to our database1, Liusheng Huang authored at least 353 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Integrating Coflow and Circuit Scheduling for Optical Networks.
IEEE Trans. Parallel Distrib. Syst., 2019

Local Differential Private Data Aggregation for Discrete Distribution Estimation.
IEEE Trans. Parallel Distrib. Syst., 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation.
IEEE Trans. Knowl. Data Eng., 2019

Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation.
Quantum Information Processing, 2019

An improved entropy-based approach to steganalysis of compressed speech.
Multimedia Tools Appl., 2019

Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones.
IEEE Internet of Things Journal, 2019

Contextual Combinatorial Cascading Thompson Sampling.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Differentially Private Greedy Decision Forest.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Toward Urban Electric Taxi Systems in Smart Cities: The Battery Swapping Challenge.
IEEE Trans. Vehicular Technology, 2018

Joint Optimization of Flow Table and Group Table for Default Paths in SDNs.
IEEE/ACM Trans. Netw., 2018

CountMax: A Lightweight and Cooperative Sketch Measurement for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2018

Achieving High Scalability Through Hybrid Switching in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2018

Minimizing Controller Response Time Through Flow Redirecting in SDNs.
IEEE/ACM Trans. Netw., 2018

Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles.
IEEE Trans. Mob. Comput., 2018

Joint Virtual Switch Deployment and Routing for Load Balancing in SDNs.
IEEE Journal on Selected Areas in Communications, 2018

Corrections to "Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks".
IEEE Journal on Selected Areas in Communications, 2018

Hybrid covert channel in LTE-A: Modeling and analysis.
J. Network and Computer Applications, 2018

Concealed in web surfing: Behavior-based covert channels in HTTP.
J. Network and Computer Applications, 2018

Centralized spectrum leasing via cooperative SU assignment in cognitive radio networks.
Int. J. Communication Systems, 2018

Optimal channel allocation for multi-PU and multi-SU pairs in underlay cognitive radio networks.
IJAHUC, 2018

Supervised learning framework for covert channel detection in LTE-A.
IET Information Security, 2018

Load-balancing routing in software defined networks with multiple controllers.
Computer Networks, 2018

A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Smart Device Fingerprinting Based on Webpage Loading.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Link Us if You Can: Enabling Unlinkable Communication on the Internet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PrivSet: Set-Valued Data Analyses with Locale Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Automatic Recognition for Arbitrarily Tilted License Plate.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

A robust and efficient method for license plate recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Anomalous Trajectory Detection Between Regions of Interest Based on ANPR System.
Proceedings of the Computational Science - ICCS 2018, 2018

COUSTIC: Combinatorial Double Auction for Crowd Sensing Task Assignment in Device-to-Device Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Task Offloading in Edge-Clouds with Budget Constraint.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline.
Proceedings of the Computer Vision - ECCV 2018, 2018

TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud.
Proceedings of the Database Systems for Advanced Applications, 2018

Classification Learning from Private Data in Heterogeneous Settings.
Proceedings of the Database Systems for Advanced Applications, 2018

An Entropy-based Method for Detection of Covert Channels over LTE.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Collaborative Thompson Sampling.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Quality-Aware Online Task Assignment Using Latent Topic Model.
Proceedings of the Algorithmic Aspects in Information and Management, 2018

2017
Price-based resource allocation for revenue maximization with cooperative communication.
Wireless Networks, 2017

Shared relay assignment in cooperative communications for bandwidth maximization.
Wireless Networks, 2017

Opportunistic Mobile Data Offloading with Deadline Constraints.
IEEE Trans. Parallel Distrib. Syst., 2017

Minimizing Flow Statistics Collection Cost Using Wildcard-Based Requests in SDNs.
IEEE/ACM Trans. Netw., 2017

Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs.
IEEE/ACM Trans. Netw., 2017

Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN.
IEEE/ACM Trans. Netw., 2017

Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks.
IEEE Trans. Mob. Comput., 2017

SOS: Real-time and accurate physical assault detection using smartphone.
Peer-to-Peer Networking and Applications, 2017

Achieving fully privacy-preserving private range queries over outsourced cloud data.
Pervasive and Mobile Computing, 2017

Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks.
IEEE Journal on Selected Areas in Communications, 2017

WiStep: Device-free Step Counting with WiFi Signals.
IMWUT, 2017

Joint channel and sink assignment for data collection in cognitive wireless sensor networks.
Int. J. Communication Systems, 2017

Cooperative topology control for low interference in wireless ad hoc networks.
IJAHUC, 2017

FAST: truthful auction with access flexibility for cooperative communications.
IET Communications, 2017

Auction-based resource allocation for cooperative cognitive radio networks.
Computer Communications, 2017

Optimizing virtual machine placement in distributed clouds with M/M/1 servers.
Computer Communications, 2017

Partial flow statistics collection for load-balanced routing in software defined networks.
Computer Networks, 2017

FTRS: A mechanism for reducing flow table entries in software defined networks.
Computer Networks, 2017

AIS: An Inaudible Guider in Your Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Load-Balancing Software-Defined Networking Through Hybrid Routing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

SmartMonitoring: Reckoning Traffic Statuses of Road System in Real-Time Based on Scarce Road Surveillance Cameras.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Joint deployment and routing in hybrid SDNs.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Local private ordinal data distribution estimation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Exploiting Cantor Expansion for Covert Channels over LTE-Advanced.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Detect Malicious Attacks from Entire TCP Communication Process.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Deploying default paths by joint optimization of flow table and group table in SDNs.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

On the effect of flow table size and controller capacity on SDN network throughput.
Proceedings of the IEEE International Conference on Communications, 2017

Achieving personalized and privacy-preserving range queries over outsourced cloud data.
Proceedings of the IEEE International Conference on Communications, 2017

Energy-Efficient Cooperative Communications with Shared Relay in Wireless Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A General Fine-Grained Truth Discovery Approach for Crowdsourced Data Aggregation.
Proceedings of the Database Systems for Advanced Applications, 2017

A Classifier Method for Detection of Covert Channels over LTE.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Joint relay assignment and rate-power allocation for multiple paths in cooperative networks.
Wireless Networks, 2016

Energy-aware virtual multi-input-multi-output-based routing for wireless ad hoc networks.
Wireless Communications and Mobile Computing, 2016

Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks.
IEEE Trans. Mob. Comput., 2016

Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2016

Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones.
Sensors, 2016

Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption.
J. Web Eng., 2016

A self-adaptive reconfiguration scheme for throughput maximization in municipal WMNs.
J. Parallel Distrib. Comput., 2016

Maximum-lifetime data aggregation for wireless sensor networks with cooperative communication.
IJSNet, 2016

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
I. J. Network Security, 2016

A scale-independent way for differential estimation in dynamic radio frequency identification systems.
Int. J. Communication Systems, 2016

Queueing analysis for preemptive transmission in underlay CRNs.
Int. J. Communication Systems, 2016

Identity-based Signatures from Lattices: Simpler, Faster, Shorter.
Fundam. Inform., 2016

iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Private Weighted Histogram Aggregation in Crowdsourcing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Social Welfare Maximization Auction for Secondary Spectrum Markets: A Long-Term Perspective.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Urban Traffic Condition Estimation: Let WiFi Do It.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

i-Shield: A System to Protect the Security of Your Smartphone.
Proceedings of the Knowledge Science, Engineering and Management, 2016

High-throughput anycast routing and congestion-free reconfiguration for SDNs.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Efficient and proactive V2V information diffusion using Named Data Networking.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

A decision-tree-based on-line flow table compressing method in Software Defined Networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Truthful incentive mechanism for vehicle-based nondeterministic crowdsensing.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

WiCare: A Synthesized Healthcare Service System Based on WiFi Signals.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Real-time update with joint optimization of route selection and update scheduling for SDNs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Deadline-sensitive User Recruitment for mobile crowdsensing with probabilistic collaboration.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

The Development of a Smart Taxicab Scheduling System: A Multi-source Data Fusion Perspective.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

A Realistic and Optimized V2V Communication System for Taxicabs.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

WiFinger: talk to your smart devices with finger-grained gesture.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Geospatial Streams Publish with Differential Privacy.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Secure and Robust Covert Channel Based on Secret Sharing Scheme.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

A Real Time Wireless Interactive Multimedia System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms.
IEEE Trans. Parallel Distrib. Syst., 2015

Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs.
IEEE/ACM Trans. Netw., 2015

Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets.
IEEE Trans. Mob. Comput., 2015

Cooperative optimal pricing for stochastic access control in overlaid radio access networks.
Telecommunication Systems, 2015

On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Sec. Comput., 2015

Certificateless and certificate-based signatures from lattices.
Security and Communication Networks, 2015

A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Security and Communication Networks, 2015

Privacy-preserving LOF outlier detection.
Knowl. Inf. Syst., 2015

Handoff optimization and load balancing in wireless LANs using association control.
Int. J. Communication Systems, 2015

Selectable sensing period optimisation for energy-constrained cognitive radio networks.
IJAHUC, 2015

Joint relay assignment and bandwidth allocation for all-to-one communication in cooperative networks.
IJAHUC, 2015

Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers.
IET Communications, 2015

Distributed Compressed Sensing in Vehicular Ad-hoc Network.
Ad Hoc & Sensor Wireless Networks, 2015

Spectrum Allocation Mechanisms in Wireless Networks with Performance Guarantee.
Ad Hoc & Sensor Wireless Networks, 2015

(Invited) popularity-based content replication scheme for wireless mesh network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

A solution of splittable large flow scheduling based on MCMF in software defined network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Achieving primary secrecy in energy harvesting CRNs using stackelberg game.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

iProtect: Detecting Physical Assault Using Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Private Range Queries on Outsourced Databases.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Privacy-Preserving Naive Bayes Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Recognizing the Operating Hand from Touchscreen Traces on Smartphones.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Secure double spectrum auctions.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

A self-adaptive reconfiguration scheme for throughput maximization in municipal WMNs.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Privacy preserving big histogram aggregation for spatial crowdsensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Minimizing response latency via efficient virtual machine placement in cloud systems.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Multi-task assignment for crowdsensing in mobile social networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ITSEC: An information-theoretically secure framework for truthful spectrum auctions.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Planning Battery Swapping Stations for Urban Electrical Taxis.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

A mechanism for reducing flow tables in software defined network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Rule Anomalies Detecting and Resolving for Software Defined Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Preserving Worker Location Privacy in Spatial Crowdsourcing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Queuing-Theoretical Multi-user Spectrum Sensing and Access in Multi-channel Cognitive Radio Networks.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

Efficient Privacy-Preserving Aggregation for Mobile Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

Protecting Location Privacy in Spatial Crowdsourcing.
Proceedings of the Web Technologies and Applications, 2015

2014
Providing reliable and real-time delivery in the presence of body shadowing in breadcrumb systems.
ACM Trans. Embedded Comput. Syst., 2014

Community-Aware Opportunistic Routing in Mobile Social Networks.
IEEE Trans. Computers, 2014

A novel distributed covert channel in HTTP.
Security and Communication Networks, 2014

SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications.
Personal and Ubiquitous Computing, 2014

Processing Mutliple Requests to Construct Skyline Composite Services.
J. Web Eng., 2014

Emerging Applications for Cyber Transportation Systems.
J. Comput. Sci. Technol., 2014

Security Analysis of a fuzzy Identity-Based Encryption Scheme.
Journal of Circuits, Systems, and Computers, 2014

One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity.
I. J. Network Security, 2014

On the security of an enhanced signature scheme.
IJICT, 2014

Practical certificateless short signature scheme.
IJESDF, 2014

Distributed compressed sensing in wireless local area networks.
Int. J. Communication Systems, 2014

Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme.
Fundam. Inform., 2014

A novel anonymous authentication scheme without cryptography.
Trans. Emerging Telecommunications Technologies, 2014

Efficient Identity-Based Signature from Lattices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Shared relay assignment (SRA) for many-to-one traffic in cooperative wireless transmissions.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Replica placement in content delivery networks with stochastic demands and M/M/1 servers.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A combinatorial double auction mechanism for cloud resource group-buying.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Data-driven traffic flow analysis for vehicular communications.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Fairness-aware shared relay assignment for cooperative communications.
Proceedings of the IEEE International Conference on Communications, 2014

Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks.
Proceedings of the IEEE Computers, 2014

A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Topology Control with vMIMO Communication in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2013

True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions.
IEEE Trans. Wireless Communications, 2013

Coalitional Game for Community-Based Autonomous Web Services Cooperation.
IEEE Trans. Services Computing, 2013

An incentive energy-efficient routing for data gathering in wireless cooperative networks.
Telecommunication Systems, 2013

Secret sharing based on quantum Fourier transform.
Quantum Information Processing, 2013

Quantum state sharing against the controller's cheating.
Quantum Information Processing, 2013

A Fine-grained Hop-count Based Localization Algorithm for Wireless Sensor Networks.
JCP, 2013

An energy-efficient opportunistic relay assignment in wireless cooperative networks.
IJSNet, 2013

Energy-efficient tree-based cooperative data aggregation for wireless sensor networks.
IJSNet, 2013

Efficient hierarchical identity-based signatures from lattices.
IJESDF, 2013

Lattice-based message recovery signature schemes.
IJESDF, 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
IJDSN, 2013

R-MAC: Risk-Aware Dynamic MAC Protocol for Vehicular Cooperative Collision Avoidance System.
IJDSN, 2013

Depth Mapping for Stereoscopic Videos.
International Journal of Computer Vision, 2013

Cryptanalysis of a certificateless signature scheme without pairings.
Int. J. Communication Systems, 2013

A Truthful and Capacity-Aware Routing Protocol for Wireless Cooperative Networks.
Ad Hoc & Sensor Wireless Networks, 2013

Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.
Ad Hoc & Sensor Wireless Networks, 2013

Near optimal scheduling of data aggregation in wireless sensor networks.
Ad Hoc Networks, 2013

Design and implementation of a testbed for WSNs monitoring aquatic environment.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013

Achieving Handoff Optimization and Throughput Efficiency in Vehicular Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Steganalysis of Compressed Speech Based on Markov and Entropy.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Topology and Link quality-aware Geographical opportunistic routing in wireless ad-hoc networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On-road ads delivery scheduling and bandwidth allocation in vehicular CPS.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Homing spread: Community home-based multi-copy routing in mobile social networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Bandwidth-Power Aware Cooperative Multipath Routing for Wireless Multimedia Sensor Networks.
IEEE Trans. Wireless Communications, 2012

Performance Analysis of Wireless Sensor Networks With Mobile Sinks.
IEEE Trans. Vehicular Technology, 2012

On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays.
IEEE Trans. Vehicular Technology, 2012

Degree-bounded minimum spanning tree for unit disk graph.
Theor. Comput. Sci., 2012

Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.
Quantum Information Processing, 2012

Privacy-Preserving OLAP for Accurate Answer.
Journal of Circuits, Systems, and Computers, 2012

Flow-Based Transmission Scheduling in Constrained Delay Tolerant Networks.
JCP, 2012

Cooperative relay assignment for static energy-constrained networks.
IJSNet, 2012

Security of a Biometric Identity-based Encryption Scheme.
I. J. Network Security, 2012

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
I. J. Network Security, 2012

Breaking A Proxy Signature Scheme From Lattices.
I. J. Network Security, 2012

Truthful Relay Assignment for Cooperative Communication in Wireless Networks with Selfish Source-Destination Pairs.
IJDSN, 2012

Optimal relay assignment for fairness in wireless cooperative networks.
IJAHUC, 2012

A new scheme for covert communication via 3G encoded speech.
Computers & Electrical Engineering, 2012

An Adaptive Collision-Free MAC protocol based on TDMA for Inter-Vehicular communication.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Compressive Sensing based on local regional data in Wireless Sensor Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A novel system design and implementation for realtime sensing and warning of roadway hazards round-the-clock.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012

Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Capacity of distributed content delivery in large-scale wireless ad hoc networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Shapley Value Based Impression Propagation for Reputation Management in Web Service Composition.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

An Incremental BP Neural Network Based Spurious Message Filter for VANET.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Fast fourier transform based ip traffic classification system for SIPTO at H(e)NB.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Information Processing, 2011

Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state.
Quantum Information Processing, 2011

Detection of substitution-based linguistic steganography by relative frequency analysis.
Digital Investigation, 2011

Steganalysis against substitution-based linguistic steganography based on context clusters.
Computers & Electrical Engineering, 2011

An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2011

Quality Driven Web Services Replication Using Directed Acyclic Graph Coding.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A Stable Joint Routing and Spectrum Scheduling Scheme for Cognitive Radio Ad Hoc Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS.
Proceedings of IEEE International Conference on Communications, 2011

2010
Joint relay assignment and power allocation for cooperative communications.
Wireless Networks, 2010

FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services.
IEEE Trans. Services Computing, 2010

Energy-efficient cooperative data aggregation for wireless sensor networks.
J. Parallel Distrib. Comput., 2010

Efficient protocols for point-convex hull inclusion decision problems.
JNW, 2010

Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
JCP, 2010

A Survey of Web Services Provision.
IJSSOE, 2010

Insurance-Based Business Web Services Composition.
IJOCI, 2010

A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

One-pass key establishment for anonymous wireless roaming.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2010

Efficient Wireless Broadcasting Using Onion Decoding.
Proceedings of the Wireless Algorithms, 2010

A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Blind Linguistic Steganalysis against Translation Based Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Joint power allocation and relay assignment for max-min fairness in cooperative networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

Passive interference measurement in Wireless Sensor Networks.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Maximal Lifetime Scheduling for Cooperative Communications in Wireless Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Interference-Aware Relay Assignment for Cooperative Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

Reputation-Driven Recommendation of Services with Uncertain QoS.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
A Chinese Handwriting Education System with Automatic Error Detection.
JSW, 2009

Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks.
J. Comput. Sci. Technol., 2009

Constraints-Aware Scheduling for Transactional Services Composition.
J. Comput. Sci. Technol., 2009

Minimizing transmission time in 802.16-based multi-channel mesh networks.
Int. J. Pervasive Computing and Communications, 2009

Topology control for delay-constraint data collection in wireless sensor networks.
Computer Communications, 2009

Practical indoor tracking using Wireless Sensor Networks.
Proceedings of the 6th Workshop on Positioning, Navigation and Communication, 2009

Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Privacy Preserving Attribute Reduction Based on Rough Set.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

A fine-grained localization algorithm in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Location-Independent Topology Control and Implementation for Wireless Sensor Networks.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Spanner-Aware Relay Node Placement in Wireless Ad Hoc Sensor Networks.
Proceedings of the MSN 2009, 2009

Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Hiding Information by Context-Based Synonym Substitution.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Consistent Message Ordering in Wireless Sensor and Actor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Web services provision: solutions, challenges and opportunities (invited paper).
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

A Transmit Antenna Selection for MIMO Wireless Ad-Hoc Networks in Lossy Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Storage Node Placement Algorithm in Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks.
Computer Communications, 2008

Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links.
Computer Communications, 2008

A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008

An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

QoS-Aware Scheduling of Web Services.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Delay-constraint topology control in wireless sensor networks format.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

A Tracking Range Based Ant-Colony Routing Protocol for Mobile Wireless.
Proceedings of the MSN 2008, 2008

Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks.
Proceedings of the MSN 2008, 2008

Swarm intelligence: Coverage and connectivity control for mobile sensors.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Topology control for minimal path interference in wireless sensor networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Energy-Efficient Location-Independent k -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Building Profit-Aware Service-Oriented Business Applications.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Building QKD Networks Based On a Novel QKD Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

NBLS: Neighbor-information-based localization system for wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008

Privacy-preserving Protocols for Finding the Convex Hulls.
Proceedings of the The Third International Conference on Availability, 2008

2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007

An efficient synchronisation protocol for wireless sensor network.
IJSNet, 2007

Centralized Scheduling and Channel Assignment in Multi-Channel Single-Transceiver WiMax Mesh Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Coverage-preserving Data Gathering in Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Privacy-preserving technology and its applications in statistics measurements.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Wireless fire monitoring system for ancient buildings.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Privacy-preserving collision detection of two circles.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A hybrid range-free localization scheme in wireless sensor networks work in progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Privacy-preserving statistical quantitative rules mining.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Quantum Oblivious Transfer Using Tripartite Entangled States.
Proceedings of the Future Generation Communication and Networking, 2007

2006
An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies.
The Journal of Supercomputing, 2006

Coverage and Exposure Paths in Wireless Sensor Networks.
J. Comput. Sci. Technol., 2006

Fault-Tolerant Orchestration of Transactional Web Services.
Proceedings of the Web Information Systems, 2006

QoS-Aware Web Services Composition Using Transactional Composition Operator.
Proceedings of the Advances in Web-Age Information Management, 2006

Self-organization Data Gathering for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Quantum ANDOS Protocol with Unconditional Security.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data.
Proceedings of the Grid and Cooperative Computing, 2006

Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Localized Algorithm for Coverage in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Accurate Time Synchronization for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Multimedia object placement for hybrid transparent data replication.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Arm up Administrators: Automated Vulnerability Management.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

2003
Automated Vulnerability Management through Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Common Vulnerability Markup Language.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4.
J. Comput. Sci. Technol., 2002

Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms.
J. Comb. Optim., 2002

2000
A Fast Algorithm for Mining Association Rules.
J. Comput. Sci. Technol., 2000

1996
Experimental Video Database Management System Based on Advanced Object-Oriented Techniques.
Proceedings of the Storage and Retrieval for Still Image and Video Databases IV, 1996

1995
A Dynamic Data Model for a Video Database Management System.
ACM Comput. Surv., 1995


  Loading...