Maode Ma

According to our database1, Maode Ma authored at least 274 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks.
IEEE Trans. Vehicular Technology, 2019

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Vehicular Technology, 2019

Fog-Based Pub/Sub Index With Boolean Expressions in the Internet of Industrial Vehicles.
IEEE Trans. Industrial Informatics, 2019

Minimum Connected Dominating Set Algorithms for Ad Hoc Sensor Networks.
Sensors, 2019

Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks.
IEEE Network, 2019

Concentration-based demodulation scheme for mobile receiver in molecular communication.
Nano Comm. Netw., 2019

A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology.
Knowl.-Based Syst., 2019

Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet of Things Journal, 2019

LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Communication Systems, 2019

A privacy-preserving sensory data sharing scheme in Internet of Vehicles.
Future Generation Comp. Syst., 2019

An accurate partially attracted firefly algorithm.
Computing, 2019

Connectivity aware tribrid routing framework for a generalized software defined vehicular network.
Computer Networks, 2019

A Hybrid Authentication Protocol for LTE/LTE-A Network.
IEEE Access, 2019

ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks.
IEEE Access, 2019

Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol.
IEEE Access, 2019

Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory.
IEEE Access, 2019

TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Blockchain-Based Mobility Management for LTE and Beyond.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks.
Wireless Communications and Mobile Computing, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Security and Communication Networks, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Network and Computer Applications, 2018

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V.
TIIS, 2018

Secure Group Mobility Support for 6LoWPAN Networks.
IEEE Internet of Things Journal, 2018

A Novel Receiver Design for HACO-OFDM by Time-Domain Clipping Noise Elimination.
IEEE Communications Letters, 2018

Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data.
Future Generation Comp. Syst., 2018

Controller placement optimization in hierarchical distributed software defined vehicular networks.
Computer Networks, 2018

EBTCOR: an Energy-Balanced 3D Topology Control Algorithm Based on Optimally Rigid Graph in UWSNs.
Ad Hoc & Sensor Wireless Networks, 2018

Distributed Power Saving for Large-Scale Software-Defined Data Center Networks.
IEEE Access, 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs.
IEEE Access, 2018

A Novel Mechanism for Fast Detection of Transformed Data Leakage.
IEEE Access, 2018

The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs.
IEEE Access, 2018

Modeling and analysis on double-tiered device-to-device communications in vehicle networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Cooperative Data Routing & Scheduling In Software Defined Vehicular Networks.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

A Sustainable Marriage of Telcos and Transp in the Era of Big Data: Are We Ready?
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

Temporary Internet Access for Authentication and Key Agreement for LTE Networks.
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

A Bio-Inspired and User-Experience Preferred Load-Balance Algorithm for Heterogeneous Networks.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Balance-Based SDN Controller Placement and Assignment with Minimum Weight Matching.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Link Stability Based Hybrid Routing Protocol for Software Defined Vehicular Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Weighted Context Graph Model for Fast Data Leak Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Proximity Testing for Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks.
Wireless Personal Communications, 2017

Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC).
Wireless Personal Communications, 2017

Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm.
Wireless Personal Communications, 2017

A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wireless Personal Communications, 2017

Resource Matching in Carrier Aggregation Enabling 5G Networks.
Wireless Personal Communications, 2017

Resource management for symmetrical applications over heterogeneous services in IEEE 802.16.
Wireless Networks, 2017

G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Vehicular Technology, 2017

Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels.
IEEE Trans. Circuits Syst. Video Techn., 2017

Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks.
IEEE Trans. Communications, 2017

Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.
Sensors, 2017

Design of a novel dynamic trust model for spectrum management in WRANs of TV white space.
J. Network and Computer Applications, 2017

A proxy signature-based handover authentication scheme for LTE wireless networks.
J. Network and Computer Applications, 2017

A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks.
JCM, 2017

Delay guaranteed MDP scheduling scheme for HCCA based on 802.11p protocol in V2R environments.
Int. J. Communication Systems, 2017

An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space.
Int. J. Communication Systems, 2017

A non-biased trust model for wireless mesh networks.
Int. J. Communication Systems, 2017

Adaptive fuzzy multiple attribute decision routing in VANETs.
Int. J. Communication Systems, 2017

Time Synchronization for Molecular Communication With Drift.
IEEE Communications Letters, 2017

Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks.
Complexity, 2017

An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems.
Computer Networks, 2017

A Special Section in IEEE Access: Cooperative and Intelligent Sensing.
IEEE Access, 2017

A Novel Efficient Address Mutation Scheme for IPv6 Networks.
IEEE Access, 2017

An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space.
IEEE Access, 2017

Multi-Population Ant Colony Algorithm for Virtual Machine Deployment.
IEEE Access, 2017

Advanced Perceptive Forwarding in Content-Centric Networks.
IEEE Access, 2017

Parameterized Spatio-Textual Publish/Subscribe in Road Sensor Networks.
IEEE Access, 2017

Scalable protection scheme for the H.264/SVC video streaming.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Efficient Flow Instantiation via Source Routing in Software Defined Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Fast and efficient physical layer authentication for 5G HetNet handover.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Achievable rate for a mobile molecular communication system invited paper.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

A Framework of Real-time Wandering Management for Person with Dementia.
Proceedings of the 8th International Conference on Computer Modeling and Simulation, 2017

A secure PMIPv6-based group mobility scheme for 6L0WPAN networks.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

GAKAV: Group Authentication and Key Agreement for LTE/LTE-A Vehicular Networks.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

An Efficient EAP-Based Pre-Authentication Scheme for Handovers in WRANs over TVWS.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Link Dynamics Based Packet Routing Framework for Software Defined Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Utility-Based Network Bandwidth Allocation in the Hybrid SDNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

DC and CoMP Authentication in LTE-Advanced 5G HetNet.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks.
Wireless Personal Communications, 2016

Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems.
Wireless Networks, 2016

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks.
IEEE Trans. Vehicular Technology, 2016

Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks.
IEEE Trans. Vehicular Technology, 2016

Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks.
IEEE Trans. Mob. Comput., 2016

A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.
The Journal of Supercomputing, 2016

A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks.
IEEE Trans. Industrial Informatics, 2016

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds.
IEEE Trans. Information Forensics and Security, 2016

Special Issue on Cognitive-Inspired Network Systems.
IEEE Systems Journal, 2016

Security enhancement for dynamic key refreshment in neighborhood area network of smart grid.
Security and Communication Networks, 2016

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Security and Communication Networks, 2016

Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era.
J. Inf. Sci. Eng., 2016

A Load Balance Mechanism in Heterogeneous Network Based on Utility Function.
JCM, 2016

Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm.
JCM, 2016

Efficient Deployment of Base Stations in Wireless Communication Networks.
JCM, 2016

Secure delegation of services through proxy signature with revocation.
IJTMCC, 2016

H-LCFST: a hash lowest cost first search tree for flexible packet classification.
Int. Journal of Network Management, 2016

Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems.
IET Communications, 2016

E3MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks.
IEEE Access, 2016

Offset estimation for clock synchronization in mobile molecular communication system.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Delay efficient software defined networking based architecture for vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

An efficient authentication framework over heterogeneous vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

A PMIPv6-Based Secured Mobility Scheme for 6LoWPAN.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A unified grid-based wandering pattern detection algorithm.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Information Forensics and Security, 2015

CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs.
Sensors, 2015

Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks.
Sensors, 2015

An enhanced authentication protocol for WRANs in TV white space.
Security and Communication Networks, 2015

GBAAM: group-based access authentication for MTC in LTE networks.
Security and Communication Networks, 2015

QoS provisioning by power control for video communication via satellite links.
Int. J. Satellite Communications Networking, 2015

Collaborative Wireless Sensor Networks and Applications.
IJDSN, 2015

TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs.
IJDSN, 2015

Performance improvements of HCCA scheduling in V2R environments.
Int. J. Communication Systems, 2015

Novel Frequency-Domain Oversampling Receiver for CP MC-CDMA Systems.
IEEE Communications Letters, 2015

TR-SDTN: Trust based efficient routing in hostile social DTNs.
Proceedings of the IEEE International Conference on Communication, 2015

An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs.
Proceedings of the IEEE International Conference on Communication, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Provable secure protected designated proxy signature with revocation.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

A Lightweight Secure VANET-Based Navigation System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Perceptive Forwarding Strategy in Content-Centric Network.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems.
Proceedings of the BICT 2015, 2015

Neighborhood area network security in smart grid using security enhanced key updating.
Proceedings of the 10th International Conference on Information, 2015

Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting.
Proceedings of the 10th International Conference on Information, 2015

Pareto efficient resource matching for LTE-A system.
Proceedings of the 10th International Conference on Information, 2015

2014
Resource Management and QoS Provisioning for Duplex Services in IEEE 802.16.
Wireless Personal Communications, 2014

A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple.
Wireless Personal Communications, 2014

Optimal Relay Placement in Cellular Networks.
IEEE Trans. Wireless Communications, 2014

Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart CR, 2014

A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks.
Sensors, 2014

Network selection and resource allocation for multicast in HetNets.
J. Network and Computer Applications, 2014

An ultralightweight RFID authentication protocol with CRC and permutation.
J. Network and Computer Applications, 2014

Scalable and efficient key management for Mobile WiMAX networks.
Int. J. Communication Systems, 2014

Iterative frequency-domain fractionally spaced receiver for zero-padded multi-carrier code division multiple access systems.
IET Communications, 2014

SNR Improvement for Energy Detection of Narrow Band Signal in OFDM System.
IEEE Communications Letters, 2014

A Survey on MAC Protocols for Underwater Wireless Sensor Networks.
IEEE Communications Surveys and Tutorials, 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Communications Surveys and Tutorials, 2014

Sustainable mobile computing.
Computing, 2014

A geometrical approach for power optimization in relay-based cellular networks.
Proceedings of the Twentieth National Conference on Communications, 2014

Performance measurements for symmetrical services in wireless networks.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

An improved transport algorithm over DCCP in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Fuzzy Multiple Attribute Decision Routing in VANETs.
Proceedings of the IEEE International Conference on Communication Systems, 2014

A novel authenticated multi-party key agreement for private cloud.
Proceedings of the IEEE International Conference on Communications, 2014

Bandwidth efficient multicast in HetNets.
Proceedings of the IEEE Global Communications Conference, 2014

2013
A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme.
Wireless Personal Communications, 2013

SIR Estimation in Hexagonal Cellular Networks with Best Server Policy.
Wireless Personal Communications, 2013

Protecting Satellite Systems from Disassociation DoS Attacks.
Wireless Personal Communications, 2013

A Cross-Layer Cognitive Radio-Based Framework and CAC Scheme in WiMAX Networks.
Wireless Personal Communications, 2013

A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems.
Wireless Personal Communications, 2013

Proactive load balancing with admission control for heterogeneous overlay networks.
Wireless Communications and Mobile Computing, 2013

A novel authenticated encryption scheme with convertibility.
Mathematical and Computer Modelling, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Network and Computer Applications, 2013

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Communication Systems, 2013

Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Computer Networks, 2013

A fluid approach for performance analysis of LTE-A networks with relays.
Proceedings of the IEEE 24th International Symposium on Personal, 2013

CCS-DTN: Efficient routing in social DTNs based on clustering and network coding.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Achieving Faster Handovers in Mobile WiMAX Networks.
Wireless Personal Communications, 2012

A MAC-Layer QoS Provisioning Protocol for Cognitive Radio Networks.
Wireless Personal Communications, 2012

Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks.
IEEE Trans. Wireless Communications, 2012

An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wireless Communications, 2012

A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

A Server Independent Authentication Scheme for RFID Systems.
IEEE Trans. Industrial Informatics, 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Security and Communication Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Security and Communication Networks, 2012

Cryptanalysis of some conference schemes for mobile communications.
Security and Communication Networks, 2012

Investigation of a large-scale P2P VoD overlay network by measurements.
Peer-to-Peer Networking and Applications, 2012

Differentiated service provisioning in the MAC layer of cognitive radio mesh networks.
IJCNDS, 2012

A survey and projection on medium access control protocols for wireless sensor networks.
ACM Comput. Surv., 2012

Securing wireless mesh networks in a unified security framework with corruption-resilience.
Computer Networks, 2012

Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels.
Computer Networks, 2012

An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors.
Computer Networks, 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Computer Networks, 2012

Hybrid multimedia broadcast encryption schemes.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks.
Proceedings of IEEE International Conference on Communications, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

QoS guaranteed resource block allocation algorithm in LTE downlink.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Cross-Layer MAC Protocol and Holistic Opportunistic Scheduling with Adaptive Power Control for QoS in WiMAX.
Wireless Personal Communications, 2011

UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
IEEE Trans. Smart Grid, 2011

A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis.
J. Network Syst. Manage., 2011

Design of parameter tunable robust controller for active queue management based on H control theory.
J. Network and Computer Applications, 2011

Group mobility support in mobile WiMAX networks.
J. Network and Computer Applications, 2011

Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system.
J. Network and Computer Applications, 2011

A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks.
J. Network and Computer Applications, 2011

A performance model for differentiated service over single-hop passive star coupled WDM optical networks.
J. Network and Computer Applications, 2011

A strong user authentication scheme with smart cards for wireless communications.
Computer Communications, 2011

Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX.
Computer Networks, 2011

Routing and QoS provisioning in cognitive radio networks.
Computer Networks, 2011

Performance benchmarking for wireless body area networks at 2.4 GHz.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

A Batch Authentication Protocol for V2G Communications.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Unified Security Framework for Multi-domain Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2011

Matrix-tree based hybrid broadcast encryption.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

A cross-layer selfishness Avoidance Routing Protocol for the dynamic Cognitive Radio Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Understanding link-level characterization of long-distance 802.11g semi-urban links.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Scalable Rekeying Algorithm in IEEE 802.16e.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

An efficient and secured multi-server authentication scheme.
Proceedings of the 8th International Conference on Information, 2011

An untraceable and server-independent RFID authentication scheme.
Proceedings of the 8th International Conference on Information, 2011

Study of effect of timeout settings on energy saving of lighting systems using queuing model.
Proceedings of the 8th International Conference on Information, 2011

2010
Narrowband Interference Mitigation in DS-UWB Systems.
IEEE Signal Process. Lett., 2010

Network lifetime optimization in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

QoS-aware cooperative medium access control for MIMO ad-hoc networks.
IEEE Communications Letters, 2010

A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX.
Computer Networks, 2010

Decoding of QOSTBC concatenates RS code using parallel interference cancellation.
Proceedings of the Second International Conference on Digital Image Processing, 2010

Cross-Layer Self-Optimizing Temporal-Spectrum Block Scheduling for QoS Provisioning in WiMAX.
Proceedings of the Global Communications Conference, 2010

An Opportunistic Service Differentiation Routing Protocol for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

2009
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks.
Wireless Personal Communications, 2009

Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks.
Wireless Personal Communications, 2009

Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2009

A utility-based joint power and rate adaptive algorithm in wireless ad hoc networks.
IEEE Trans. Communications, 2009

WLAN Traffic Prediction Using Support Vector Machine.
IEICE Transactions, 2009

A hybrid load balancing strategy of sequential tasks for grid computing environments.
Future Generation Comp. Syst., 2009

A QoS-Based Vertical Handoff Scheme for Interworking of WLAN and WiMAX.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Network lifetime maximization with cross-layer design in wireless sensor networks.
IEEE Trans. Wireless Communications, 2008

Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks.
IEEE Trans. Communications, 2008

Providing differentiated services in CDMA wireless networks.
IET Communications, 2008

Providing delay guaranteed service in CDMA wireless networks.
Computer Communications, 2008

Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks.
Science in China Series F: Information Sciences, 2008

Intelligent MAC model for traffic scheduling in IEEE 802.11e wireless LANs.
Applied Mathematics and Computation, 2008

A Queue Based Scheduling Approach for WMAN with Adaptive Augmentation.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Analysis of K-Connectivity in Shadowing and Nakagami Fading Wireless Multi-Hop Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Experimental evaluation of an adaptive PI rate controller for congestion control.
Proceedings of the IEEE International Conference on Systems, 2008

Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

Fluid-Based Modeling of TCP Veno.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

AOA Cooperative Position Localization.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Task scheduling by Mean Field Annealing algorithm in grid computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Providing Real-Time Service in CDMA Wireless Networks.
Wireless Personal Communications, 2007

Call Completion in Wireless Networks Over Lossy Link.
IEEE Trans. Vehicular Technology, 2007

A Link Adaptation Algorithm in MIMO-based WiMAX Systems.
JCM, 2007

Performance Study of Packing Aggregation in Wireless Sensor Networks.
IEICE Transactions, 2007

A Rehearsal-Assisted Distributed MAC Protocol for TDD-CDMA Based Multihop Networks.
IEEE Communications Letters, 2007

Wireless Broadband Access: WiMAX and Beyond [Guest Editorial].
IEEE Communications Magazine, 2007

Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks.
Proceedings of the 2007 IEEE International Conference on Research, 2007

Adaptive Rate Selection Scheme Based on Intelligent Learning Algorithm in Wireless LANs.
Proceedings of the Advances in Computation and Intelligence, 2007

Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Backup Routing for Multimedia Transmissions over Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2007

A Utility-Based Joint Power and Rate Adaptive Algorithm for Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

Theoretical Lower Bound for UWB TDOA Positioning.
Proceedings of the Global Communications Conference, 2007

Network Lifetime Global Optimization by Duality Approach in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Supporting Differentiated Services with Fairness by an Urgency Fair Queuing Scheduling Scheme in EPONs.
Photonic Network Communications, 2006

Adaptive polling interval scheduling to support real-time service in Bluetooth networks.
IJWMC, 2006

Supporting Real-Time Service in Packet-Switched Wireless Networks.
IJBDCN, 2006

Modeling location management in wireless networks with generally distributed parameters.
Computer Communications, 2006

Hierarchical scheduling to support differentiated services in Ethernet passive optical networks.
Computer Networks, 2006

Dynamic admission control in hybrid QoS networks with WiFi access.
Science in China Series F: Information Sciences, 2006

An efficient solution for mitigating light-load penalty in EPONs.
Computers & Electrical Engineering, 2006

Providing integrated service in CDMA wireless networks.
Computers & Electrical Engineering, 2006

Ubiquitous Mobility in Next Generation Networks.
Proceedings of the 14th IEEE International Conference on Networks, 2006

SVM-Based Models for Predicting WLAN Traffic.
Proceedings of IEEE International Conference on Communications, 2006

A Power-Controlled Rate-Adaptive MAC Protocol to Support Differentiated Service in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Task Scheduling by Neural Network with Mean Field Annealing Improvement in Grid Computing.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
An urgency fair queuing scheduling to support differentiated services in EPONs.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Efficient message scheduling for WDM optical networks with minimizing flow time.
Journal of Communications and Networks, 2004

Adaptive scheduling for integrated traffic on WDM optical networks.
Computer Networks, 2004

An efficient multiple access control scheme to support differentiated services in EPONS.
Proceedings of the 12th IEEE International Conference on Networks, 2004

An efficient scheduling algorithm with reduced message delay for WDM optical networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Message scheduling in WDM optical networks with reduced transmitter tuning overhead.
Proceedings of IEEE International Conference on Communications, 2004

2003
A cost-based scheduling algorithm for differentiated service on WDM optical networks.
IEEE Communications Letters, 2003

A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

A novel multiple access scheme for Ethernet passive optical networks.
Proceedings of the Global Telecommunications Conference, 2003

2001
An adaptive scheduling algorithm for differentiated services on WDM optical networks.
Proceedings of the Global Telecommunications Conference, 2001

2000
Providing deterministic quality-of-service guarantees on WDM optical networks.
IEEE Journal on Selected Areas in Communications, 2000

A Systematic Scheme for Guaranteed Deterministic Performance Service on WDM Optical Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

Providing guaranteed deterministic performance service to multimedia applications on WDM optical networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
An Efficient Message Scheduling Algorithm for WDM Lightwave Networks.
Computer Networks, 1999

1998
Efficient Scheduling Algorithms for Real-Time Service on WDM Optical Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1996
A Fault-tolerant Strategy for Real-time Task Scheduling on Multiprocessor System.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996


  Loading...