Mingchu Li

According to our database1, Mingchu Li authored at least 175 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
MONET, 2019

RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.
Knowl.-Based Syst., 2019

Stochastic Computation Offloading and Scheduling Based on Mobile Edge Computing.
IEEE Access, 2019

Solving Security Problems in MEC Systems.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Novel Crowd-sourcing Inference Method.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems.
Scientific Programming, 2018

Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing.
Pervasive and Mobile Computing, 2018

Construction of compressed sensing matrices for signal processing.
Multimedia Tools Appl., 2018

A novel proactive secret image sharing scheme based on LISS.
Multimedia Tools Appl., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distrib. Comput., 2018

Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control.
Future Generation Comp. Syst., 2018

Spanning 3-ended trees in quasi-claw-free graphs.
Ars Comb., 2018

Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.
IEEE Access, 2018

Task Assignment for Simple Tasks with Small Budget in Mobile Crowdsourcing.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Optimally Protecting Elections with Uncertainty about Voter Preferences.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
GroupTrust: Dependable Trust Management.
IEEE Trans. Parallel Distrib. Syst., 2017

Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism.
ACM Trans. Internet Techn., 2017

Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference.
Peer-to-Peer Networking and Applications, 2017

Secure variable-capacity self-recovery watermarking scheme.
Multimedia Tools Appl., 2017

(t, n) Threshold secret image sharing scheme with adversary structure.
Multimedia Tools Appl., 2017

Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network.
TIIS, 2017

Effective hybrid load scheduling of online and offline clusters for e-health service.
Neurocomputing, 2017

A Verifiable E-voting Scheme with Secret Sharing.
I. J. Network Security, 2017

An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings.
Future Internet, 2017

SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT.
Computer Networks, 2017

A novel green software evaluation model for cloud robotics.
Computers & Electrical Engineering, 2017

A hierarchical combinatorial testing method for smart phone software in wearable IoT systems.
Computers & Electrical Engineering, 2017

Spanning 3-ended trees in k-connected claw-free graphs.
Ars Comb., 2017

Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems.
IEEE Access, 2017

Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN.
IEEE Access, 2017

Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV.
IEEE Access, 2017

Optimal patrol strategies against attacker's persistent attack with multiple resources.
Proceedings of the 2017 IEEE SmartWorld, 2017

TALENTED: An Advanced Guarantee Public Order Tool for Urban Inspectors.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Classification-Based Reputation Mechanism for Master-Worker Computing System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones.
Sensors, 2016

AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
Security and Communication Networks, 2016

An Eigentrust dynamic evolutionary model in P2P file-sharing systems.
Peer-to-Peer Networking and Applications, 2016

A region-adaptive semi-fragile dual watermarking scheme.
Multimedia Tools Appl., 2016

A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multimedia Tools Appl., 2016

A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems.
Knowl.-Based Syst., 2016

Hamiltonian properties of almost locally connected claw-free graphs.
Ars Comb., 2016

Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

ETSTM: A New Green Software Model.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Study of Self-adaptive Strategy Based Incentive Mechanism in Structured P2P System.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

Personalized pre-trust reputation management in social P2P network.
Proceedings of the 2016 International Conference on Computing, 2016

An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
Reliable and Resilient Trust Management in Distributed Service Provision Networks.
TWEB, 2015

Bridge Displacement Monitoring Method Based on Laser Projection-Sensing Technology.
Sensors, 2015

Reversible data hiding exploiting high-correlation regulation for high-quality images.
Security and Communication Networks, 2015

A novel weighted threshold secret image sharing scheme.
Security and Communication Networks, 2015

Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking.
J. Network and Computer Applications, 2015

A Novel Proactive Multi-secret Sharing Scheme.
I. J. Network Security, 2015

Initial Validation of Mobile-Structural Health Monitoring Method Using Smartphones.
IJDSN, 2015

[r, s, t]-Colorings of Friendship Graphs and Wheels.
Graphs and Combinatorics, 2015

Vertex Pancyclicity of Quadrangularly Connected Claw-free Graphs.
Graphs and Combinatorics, 2015

Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective.
Concurrency and Computation: Practice and Experience, 2015

[r, s, t]-colorings of fans.
Ars Comb., 2015

RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Prediction of Disease Dynamics with Structure Knowledge of Human Contact Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Identity-Based Broadcast Encryption Schemes for Open Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.
TIIS, 2014

Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

2013
Evolution of cooperation in reputation system by group-based scheme.
The Journal of Supercomputing, 2013

Attribute-based ring signcryption scheme.
Security and Communication Networks, 2013

Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks.
Security and Communication Networks, 2013

Lossless Information Hiding in the VQ Index Table.
JSW, 2013

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Information Security, 2013

Tank-Ring Factors in Supereulerian Claw-Free Graphs.
Graphs and Combinatorics, 2013

Hamiltonian Connectedness in Claw-Free Graphs.
Graphs and Combinatorics, 2013

Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digital Signal Processing, 2013

Hamiltonian claw-free graphs involving minimum degrees.
Discrete Applied Mathematics, 2013

Locating using prior information: wireless indoor localization algorithm.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets.
Proceedings of the Advanced Parallel Processing Technologies, 2013

Research on Indirect Cost of Irregular Flight.
Proceedings of the 4th International Conference on Ambient Systems, 2013

ServiceTrust: Trust Management in Service Provision Networks.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
A novel multi-group exploiting modification direction method based on switch map.
Signal Processing, 2012

Reversible secret image sharing with steganography and dynamic embedding.
Security and Communication Networks, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Network and Computer Applications, 2012

Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

Behavior-based reputation management in P2P file-sharing networks.
J. Comput. Syst. Sci., 2012

A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing.
JCP, 2012

Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012

Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks.
IJDSN, 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

A proportional fairness backoff scheme for funnelling effect in wireless sensor networks.
Trans. Emerging Telecommunications Technologies, 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurrency and Computation: Practice and Experience, 2012

Evolution of Cooperation Based on Reputation on Dynamical Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Research and simulation of transport protocols optimization on wireless multi-hop networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

FoSSicker: A personalized search engine by location-awareness.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

EigenTrustp++: Attack resilient trust management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
A formal separation method of protocols to eliminate parallel attacks in virtual organization.
Security and Communication Networks, 2011

FineTrust: a fine-grained trust model for peer-to-peer networks.
Security and Communication Networks, 2011

Hamiltonian connectedness in 4-connected hourglass-free claw-free graphs.
Journal of Graph Theory, 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Transactions, 2011

Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

An Improved Iris Localization Method for Authentication System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Multi-attribute Hierarchical Threshold Scheme.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors.
Proceedings of IEEE International Conference on Communications, 2011

2010
A robust iterative refinement clustering algorithm with smoothing search space.
Knowl.-Based Syst., 2010

An encoding method for both image compression and data lossless information hiding.
Journal of Systems and Software, 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
JCM, 2010

A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
IJIPM, 2010

Supereulerian index is stable under contractions and closures.
Ars Comb., 2010

Spanning eulerian subgraphs in N2-locally connected claw-free graphs.
Ars Comb., 2010

Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

A Novel Grid Resource Scheduling Model Based on Extended Second Price Sealed Auction.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Priority-Based Task Scheduling Algorithm in Grid.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

A Low-Level Security Solving Method in Grid.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

An Efficient Trust Mechanism in P2P Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Gabor-Based Kernel Independent Component Analysis for Face Recognition.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A simple image encoding method with data lossless information hiding.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
Journal of Systems and Software, 2009

Modeling Security Bridge Certificate Authority Architecture.
IEICE Transactions, 2009

A New Secret Sharing Scheme Based on the Multi-Dealer.
IEICE Transactions, 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Transactions, 2009

Circumferences and minimum degrees in 3-connected claw-free graphs.
Discrete Mathematics, 2009

A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Proportional Fair Backoff Scheme for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Ant Colony Optimization for Grid Task Scheduling with Multiple QoS Dimensions.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2008
Radius and subpancyclicity in line graphs.
Discrete Mathematics, 2008

Connected even factors in claw-free graphs.
Discrete Mathematics, 2008

Backbone analysis and algorithm design for the quadratic assignment problem.
Science in China Series F: Information Sciences, 2008

A Creditable Subspace Labeling Method Based on D-S Evidence Theory.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Intelligent Security Multi-agent Framework in Grid Computing.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
On the 2-factor index of a graph.
Discrete Mathematics, 2007

Quadrangularly connected claw-free graphs.
Discrete Mathematics, 2007

Linear Polynomial-Time Algorithms To Construct 4-Connected 4-Regular Locally Connected Claw-Free Graphs.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Using Gavish-Grave LP to Formulate the Directed Black and White Traveling Salesman Problem.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Backbone of the p-Median Problem.
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007

2006
Circumferences of regular claw-free graphs.
Discrete Mathematics, 2006

A New Architecture of Grid Security System Construction.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Recovery Mechanism of Online Certification Chain in Grid Computing.
Proceedings of the The First International Conference on Availability, 2006

Recovery Mechanism of Cooperative Process Chain in Grid.
Proceedings of the The First International Conference on Availability, 2006

2005
Hourglasses and Hamilton cycles in 4-connected claw-free graphs.
Journal of Graph Theory, 2005

Circumferences and Minimum Degrees in 3-Connected Claw-Free Graphs.
Electronic Notes in Discrete Mathematics, 2005

On the Connectedness of Peer-to-Peer Overlay Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Hamiltonian Connected Claw-Free Graphs.
Graphs and Combinatorics, 2004

The hamiltonian index of a graph and its branch-bonds.
Discrete Mathematics, 2004

A new object-order volume-rendering algorithm based on two-step lookup tables.
Proceedings of the Visualization and Data Analysis 2004, 2004

Fuzzy weighted average filtering for mixture noises.
Proceedings of the Third International Conference on Image and Graphics, 2004

Image Coherence Based Adaptive Sampling for Image Synthesis.
Proceedings of the Computational Science and Its Applications, 2004

Vision-based navigation in a dynamic environment for virtual human.
Proceedings of the Human Vision and Electronic Imaging IX, 2004

Simple zoom-lens digital camera calibration method based on EXIF.
Proceedings of the Conference on Three-Dimensional Image Capture and Applications VI, 2004

2003
Circumferences of 2-Connected Claw-Free Graphs.
Ars Comb., 2003

2002
Hamiltonian Cycles in N2-Locally Connected Claw-Free Graphs.
Ars Comb., 2002

2001
Hamiltonian Cycles in Almost Claw-Free Graphs.
Graphs and Combinatorics, 2001

2000
Longest Cycles in Almost Claw-Free Graphs.
Graphs and Combinatorics, 2000

On hamiltonian connectedness of K1, 4-free graphs.
Discrete Mathematics, 2000

Pancyclicity and NP-completeness in Planar Graphs.
Discrete Applied Mathematics, 2000

1998
Hamiltonian Connectedness in Claw-Free Graphs.
Graphs and Combinatorics, 1998

Vertex pancyclism in claw-free graphs.
Discrete Mathematics, 1998

On Pancyclic Claw-Free Graphs.
Ars Comb., 1998

1996
Hamiltonian cycles in regular 3-connected claw-free graphs.
Discrete Mathematics, 1996

1995
Longest cycles in regular 2-connected claw-free graphs.
Discrete Mathematics, 1995

1994
Two edge-disjoint hamiltonian cycles in graphs.
Graphs and Combinatorics, 1994

1993
Hamiltonian cycles in 3-connected claw-free graphs.
Journal of Graph Theory, 1993


  Loading...