Ruchuan Wang

Affiliations:
  • Nanjing University of Posts and Telecommunications, College of Computer, Jiangsu, China
  • Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China


According to our database1, Ruchuan Wang authored at least 218 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Transmission for Wireless Communication Systems With Friendly Jammers.
IEEE Trans. Veh. Technol., December, 2023

Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5.
Remote. Sens., July, 2023

A classifier based on multiple feature extraction blocks for gait authentication using smartphone sensors.
Comput. Electr. Eng., May, 2023

Fault-Tolerant Routing With Load Balancing in LeTQ Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Type of Recharging Scheduling Strategy based on Adjustable Request Threshold in WRSNs.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

2022
Power Splitting and Source-Relay Selection in Energy Harvesting Wireless Network.
Wirel. Pers. Commun., 2022

Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors.
IEEE Trans. Commun., 2022

Intelligent Jamming Strategies for Secure Spectrum Sharing Systems.
IEEE Trans. Commun., 2022

RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm.
J. Sensors, 2022

Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems.
IET Commun., 2022

Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting.
IET Commun., 2022

Lane marking detection algorithm based on high-precision map and multisensor fusion.
Concurr. Comput. Pract. Exp., 2022

Parallel compression for large collections of genomes.
Concurr. Comput. Pract. Exp., 2022

A polynomial-time algorithm for simple undirected graph isomorphism.
Concurr. Comput. Pract. Exp., 2022

2021
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes.
Frontiers Comput. Sci., February, 2021

Coarse-to-Fine Speech Emotion Recognition Based on Multi-Task Learning.
J. Signal Process. Syst., 2021

Dynamic Virtual Network Embedding of Mobile Cloud System Based on Global Resources in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021

Computer Vision-Assisted 3D Object Localization via COTS RFID Devices and a Monocular Camera.
IEEE Trans. Mob. Comput., 2021

Fault-tolerant routing algorithm based on disjoint paths in 3-ary n-cube networks with structure faults.
J. Supercomput., 2021

GT-Bidding: Group Trust Model of P2P Network Based on Bidding.
Secur. Commun. Networks, 2021

Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.
Secur. Commun. Networks, 2021

Spectrum-aware discriminative deep feature learning for multi-spectral face recognition.
Pattern Recognit., 2021

Semi-supervised Heterogeneous Defect Prediction with Open-source Projects on GitHub.
Int. J. Softw. Eng. Knowl. Eng., 2021

A polynomial-time algorithm for simple undirected graph isomorphism.
Concurr. Comput. Pract. Exp., 2021

Dynamic spatio-temporal logic based on RCC-8.
Concurr. Comput. Pract. Exp., 2021

2020
Load Balance and Trajectory Design in Multi-UAV Aided Large-Scale Wireless Rechargeable Networks.
IEEE Trans. Veh. Technol., 2020

Privacy-Preserving Approach PBCN in Social Network With Differential Privacy.
IEEE Trans. Netw. Serv. Manag., 2020

VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things.
IEEE Trans. Emerg. Top. Comput., 2020

SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing.
IEEE Trans. Emerg. Top. Comput., 2020

Intraspectrum Discrimination and Interspectrum Correlation Analysis Deep Network for Multispectral Face Recognition.
IEEE Trans. Cybern., 2020

A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems.
Sensors, 2020

SKINNY-Based RFID Lightweight Authentication Protocol.
Sensors, 2020

Modality-specific and shared generative adversarial network for cross-modal retrieval.
Pattern Recognit., 2020

Speech emotion recognition based on hierarchical attributes using feature nets.
Int. J. Parallel Emergent Distributed Syst., 2020

Gesture Recognition Through sEMG with Wearable Device Based on Deep Learning.
Mob. Networks Appl., 2020

高性能计算与天文大数据研究综述 (High Performance Computing and Astronomical Data: A Survey).
计算机科学, 2020

Privacy preserving classification on local differential privacy in data centers.
J. Parallel Distributed Comput., 2020

Reconfigurable Fault-tolerance mapping of ternary N-cubes onto chips.
Concurr. Comput. Pract. Exp., 2020

Intelligent Resource Scheduling Based on Locality Principle in Data Center Networks.
IEEE Commun. Mag., 2020

RF-Mirror: Mitigating Mutual Coupling Interference in Two-Tag Array Labeled RFID Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

A Fuzzy Theory Based Topological Distance Measurement for Undirected Multigraphs.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

2019
A Live Migration Algorithm for Containers Based on Resource Locality.
J. Signal Process. Syst., 2019

An efficient algorithm for embedding exchanged hypercubes into grids.
J. Supercomput., 2019

Distributed Soft Fault Detection for Interval Type-2 Fuzzy-Model-Based Stochastic Systems With Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embed. Comput. Syst., 2019

A Lightweight RFID Mutual Authentication Protocol with PUF.
Sensors, 2019

A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT.
Sensors, 2019

Adaptive Data Acquisition with Energy Efficiency and Critical-Sensing Guarantee for Wireless Sensor Networks.
Sensors, 2019

Privacy Protection of Social Networks Based on Classified Attribute Encryption.
Secur. Commun. Networks, 2019

抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack).
计算机科学, 2019

Anomaly-Tolerant Network Traffic Estimation via Noise-Immune Temporal Matrix Completion Model.
IEEE J. Sel. Areas Commun., 2019

Optimally Embedding 3-Ary n-Cubes into Grids.
J. Comput. Sci. Technol., 2019

RF-Focus: Computer Vision-assisted Region-of-interest RFID Tag Recognition and Localization in Multipath-prevalent Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019

Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey.
Intell. Data Anal., 2019

Data fusion-oriented cluster routing protocol for multimedia sensor networks based on the degree of image difference.
CCF Trans. Netw., 2019

Movements Classification of Multi-Channel sEMG Based on CNN and Stacking Ensemble Learning.
IEEE Access, 2019

In-Air Gesture Interaction: Real Time Hand Posture Recognition Using Passive RFID Tags.
IEEE Access, 2019

Semi-supervised Multi-view Individual and Sharable Feature Learning for Webpage Classification.
Proceedings of the World Wide Web Conference, 2019

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Cooperative Calibration Scheme for Mobile Wireless Sensor Network.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Motion Classification Based on sEMG Signals Using Deep Learning.
Proceedings of the Machine Learning and Intelligent Communications, 2019

Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure Faults.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Lane Marking Detection Algorithm Based on High-Precision Map.
Proceedings of the Data Science - 6th International Conference, 2019

Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Speech Emotion Recognition Based on Multi-Task Learning.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Transfer Learning for Speech Emotion Recognition.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Virtual region based data gathering method with mobile sink for sensor networks.
Wirel. Networks, 2018

Noise-Tolerant Wireless Sensor Networks Localization via Multinorms Regularized Matrix Completion.
IEEE Trans. Veh. Technol., 2018

One More Tag Enables Fine-Grained RFID Localization and Tracking.
IEEE/ACM Trans. Netw., 2018

Noise Tolerant Localization for Sensor Networks.
IEEE/ACM Trans. Netw., 2018

A See-through-Wall System for Device-Free Human Motion Sensing Based on Battery-Free RFID.
ACM Trans. Embed. Comput. Syst., 2018

An RFID Indoor Positioning Algorithm Based on Support Vector Regression.
Sensors, 2018

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018

The Shared Bicycle and Its Network - Internet of Shared Bicycle (IoSB): A Review and Survey.
Sensors, 2018

A High-Efficiency Data Collection Method Based on Maximum Recharging Benefit in Sensor Networks.
Sensors, 2018

A Type of Annulus-Based Energy Balanced Data Collection Method in Wireless Rechargeable Sensor Networks.
Sensors, 2018

A type of energy-efficient data gathering method based on single sink moving along fixed points.
Peer-to-Peer Netw. Appl., 2018

An Evaluation Model and Benchmark for Parallel Computing Frameworks.
Mob. Inf. Syst., 2018

"Like charges repulsion and opposite charges attraction" law based multilinear subspace analysis for face recognition.
Knowl. Based Syst., 2018

Self-adaptive implicit contention window adjustment mechanism for QoS optimization in wireless sensor networks.
J. Netw. Comput. Appl., 2018

Node Localization Based on Improved PSO and Mobile Nodes for Environmental Monitoring WSNs.
Int. J. Wirel. Inf. Networks, 2018

Edge computing-based security authentication algorithm for multiple RFID tags.
Int. J. Intell. Inf. Database Syst., 2018

An improved SMURF scheme for cleaning RFID data.
Int. J. Grid Util. Comput., 2018

SHMO: A seniors health monitoring system based on energy-free sensing.
Comput. Networks, 2018

Indoor Anti-Collision Alarm System Based on Wearable Internet of Things for Smart Healthcare.
IEEE Commun. Mag., 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

RF-MVO: Simultaneous 3D Object Localization and Camera Trajectory Recovery Using RFID Devices and a 2D Monocular Camera.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Emotion recognition of human physiological signals based on recursive quantitative analysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Speech emotion features selection based on BBO-SVM.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Embedding Exchanged Hypercubes into Rings and Ladders.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

The Study on the Botnet and its Prevention Policies in the Internet of Things.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

VC-TWJoin: A Stream Join Algorithm Based on Variable Update Cycle Time Window.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

A Survey on Automatic Emotion Recognition Using Audio Big Data and Deep Learning Architectures.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Transferring Age and Gender Attributes for Dimensional Emotion Prediction from Big Speech Data Using Hierarchical Deep Learning.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Research on Security Public Opinion Based on Declining Value of Big Data.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Method of Maintaining Data Consistency in Microservice Architecture.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

A Locality Live Migration Strategy Based on Docker Containers.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes.
Wirel. Pers. Commun., 2017

Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System.
IEEE Trans. Ind. Informatics, 2017

A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks.
Sensors, 2017

An RFID Indoor Positioning Algorithm Based on Bayesian Probability and <i>K</i>-Nearest Neighbor.
Sensors, 2017

Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks.
Sensors, 2017

An energy-efficient data transmission protocol for mobile crowd sensing.
Peer-to-Peer Netw. Appl., 2017

An energy-efficient data gathering method based on compressive sensing for pervasive sensor networks.
Pervasive Mob. Comput., 2017

一种基于非均匀分簇的混合无线传感网数据收集方法 (Type of Data Gathering Algorithm Based on Uneven Clustering for Hybrid Wireless Sensor Networks).
计算机科学, 2017

R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi.
IEEE J. Sel. Areas Commun., 2017

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017

Multi-Path Data Distribution Mechanism Based on RPL for Energy Consumption and Time Delay.
Inf., 2017

Practical deployment of an in-field wireless sensor network in date palm orchard.
Int. J. Distributed Sens. Networks, 2017

Energy optimization of ant colony algorithm in wireless sensor network.
Int. J. Distributed Sens. Networks, 2017

Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags.
Int. J. Bus. Data Commun. Netw., 2017

TagCare: Using RFIDs to Monitor the Status of the Elderly Living Alone.
IEEE Access, 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Research on Concept Drift Detection for Decision Tree Algorithm in the Stream of Big Data.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Robust passive static human detection with commodity WiFi devices.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

AmpN: Real-time LOS/NLOS identification with WiFi.
Proceedings of the IEEE International Conference on Communications, 2017

An Online Prediction Algorithm of Traffic in Big Data Based on the Storm.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A Type of Low-Latency Data Gathering Method with Multi-Sink for Sensor Networks.
Sensors, 2016

Utility-aware data transmission scheme for delay tolerant networks.
Peer-to-Peer Netw. Appl., 2016

一种基于矩阵补全的室内指纹定位算法 (Fingerprint-based Indoor Localization via Matrix Completion).
计算机科学, 2016

A Review of the Topologies Used in Smart Water Meter Networks: A Wireless Sensor Network Application.
J. Sensors, 2016

Vehicle trajectory prediction based on Hidden Markov Model.
KSII Trans. Internet Inf. Syst., 2016

A Method for Traffic Congestion Clustering Judgment Based on Grey Relational Analysis.
ISPRS Int. J. Geo Inf., 2016

Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Type of Energy Hole Avoiding Method Based on Synchronization of Nodes in Adjacent Annuluses for Sensor Network.
Int. J. Distributed Sens. Networks, 2016

A hidden Markov model combined with RFID-based sensors for accurate vehicle route prediction.
Int. J. Ad Hoc Ubiquitous Comput., 2016

A method of cleaning RFID data streams based on Naive Bayes classifier.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Performance analysis and simulation verification of S-MAC for wireless sensor networks.
Comput. Electr. Eng., 2016

TrackT: Accurate tracking of RFID tags with mm-level accuracy using first-order taylor series approximation.
Ad Hoc Networks, 2016

A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TA3C: Teaching-Oriented Adaptive Wi-Fi Authorized Access Control Based on CSI.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

The hybrid encryption algorithm of lightweight data in cloud storage.
Proceedings of the 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, 2016

Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Privacy-preserving k-NN computation over encrypted cloud data without key sharing.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Novel Cloud Computing Architecture Oriented Internet of Vehicles.
Proceedings of the Advances on P2P, 2016

2015
A Method of Vehicle Route Prediction Based on Social Network Analysis.
J. Sensors, 2015

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
J. Commun., 2015

Energy-Balanced Uneven Clustering Protocol Based on Regional Division for Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
Int. J. Distributed Sens. Networks, 2015

Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Invisible Cloak Fails: CSI-based Passive Human Detection.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

Vector Localization Algorithm Based on Signal Strength in Wireless Sensor Network.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Research of a Novel Flash P2P Network Traffic Prediction Algorithm.
Proceedings of the Third International Conference on Information Technology and Quantitative Management, 2015

R-PMD: robust passive motion detection using PHY information with MIMO.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Noise-tolerant localization from incomplete range measurements for wireless sensor networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Distributed Face Recognition in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A Multicast Algorithm for Wireless Sensor Networks Based on Network Coding.
Int. J. Distributed Sens. Networks, 2014

An Exact Top-k Query Algorithm with Privacy Protection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

An image information hiding algorithm based on grey system theory.
Int. J. Commun. Syst., 2014

Measuring the similarity of PML documents with RFID-based sensors.
Int. J. Ad Hoc Ubiquitous Comput., 2014

A QoS-aware routing algorithm based on ant-cluster in wireless multimedia sensor networks.
Sci. China Inf. Sci., 2014

Agent-based Multi-Service Routing for Polar-orbit LEO broadband satellite networks.
Ad Hoc Networks, 2014

Channel Estimation Algorithm Based on Compressed Sensing for Underwater Acoustic OFDM Communication System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Node Localization Based on Optimized Genetic Algorithm in Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

An Individual Service Recommendation Model Based on Social Network and Location Awareness.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

A Three-Dimensional Localization Algorithm Based on DV-Hop in Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2013
Adaptive edge detection with distributed behaviour-based agents in WSNs.
Int. J. Sens. Networks, 2013

Peer Selection Strategy Using Mobile Agent and Trust in Peer-to-Peer Streaming Media System.
Int. J. Distributed Sens. Networks, 2013

Optimal Joint Expected Delay Forwarding in Delay Tolerant Networks.
Int. J. Distributed Sens. Networks, 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
Int. J. Distributed Sens. Networks, 2013

A Data Transmission Scheme Based on Time-Evolving Meeting Probability for Opportunistic Social Network.
Int. J. Distributed Sens. Networks, 2013

A Sociability-Based Spray and Forward Scheme for Opportunistic Network.
Int. J. Distributed Sens. Networks, 2013

A Type of Node Deployment Strategy Based on Variable Acceleration Motion for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A Type of Localization Method Using Mobile Beacons Based on Spiral-Like Moving Path for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Face Recognition in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Weight-Based Clustering Decision Fusion Algorithm for Distributed Target Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Research on Migration Strategy of Mobile Agent in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Security Analysis of Lightweight Authentication Protocol from WISTP 2013.
IACR Cryptol. ePrint Arch., 2013

Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things.
Proceedings of the Advances in Wireless Sensor Networks, 2013

2012
(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks.
J. Networks, 2012

A Cross-layer and Multipath based Video Transmission Scheme for Wireless Multimedia Sensor Networks.
J. Networks, 2012

Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes.
J. Netw. Comput. Appl., 2012

Novel Node Localization Algorithm Based on Nonlinear Weighting Least Square for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

A Novel Coverage Enhancement Algorithm for Image Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern.
Int. J. Distributed Sens. Networks, 2012

A Camera Nodes Correlation Model Based on 3D Sensing in Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Dynamic Web Services Selection Algorithm Based on Trust Model for Grid Environment.
Proceedings of the Advances in Wireless Sensor Networks, 2012

R-AODV: A Cognitive AODV Routing Algorithm in Wireless Network.
Proceedings of the Advances in Wireless Sensor Networks, 2012

AR-HS: Ant Routing Optimized Algorithm on HAPs-Satellite Integrated Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Energy-Efficient Multi-hop Routing Algorithm Based on LEACH.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A New TCP Design for Satellite-HAP Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

The Research of Routing Forwarding Strategies in DTNs Based on Convergence Point.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Mobile Agent Based Coding Aware Multipath Routing for Wireless Sensor Network.
Proceedings of the Advances in Wireless Sensor Networks, 2012

TFA: A Scale-Free Network Approach to Topology Formation in Underwater Acoustic Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Low-Cost VR System Based on Wireless Accelerometer Sensor.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Novel Clustering Ant-Based QoS-aware Routing Algorithm in Large Scale Wireless Multimedia Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012

2011
Design and Implementation of an OpenGL Based 3D First Person Shooting Game.
Trans. Edutainment, 2011

Particle swarm optimisation based on Monte Carlo localisation for mobile sensor network.
Int. J. Model. Identif. Control., 2011

An Anti-collusion Trust Model in P2P Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Adaptive Load-Balanced Routing Algorithm.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace.
Wirel. Sens. Netw., 2010

Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks.
Sensors, 2010

An energy-saving strategy based on sleep scheduling and block transmission for wireless multimedia sensor networks.
Int. J. Pervasive Comput. Commun., 2010

Agent-based load balancing routing for LEO satellite networks.
Comput. Networks, 2010

Research of P2P traffic identification based on naive Bayes and decision tables combination algorithm.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
An Application of Context Middleware Based on Fuzzy Logic for Wireless Sensor Networks.
Wirel. Sens. Netw., 2009

Voronoi-Based Coverage Optimization for Directional Sensor Networks.
Wirel. Sens. Netw., 2009

Fuzzy Logic Based Middleware Approach for Context Processing.
J. Digit. Content Technol. its Appl., 2009

A Multipath Routing Algorithm Based on Traffic Prediction in Wireless Mesh Networks.
Commun. Netw., 2009

Intrusion Detection Method Using Protocol Classification and Rough.
Comput. Inf. Sci., 2009

An Improved Quantum Genetic Algorithm.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Improving Gene Expression Programming Using Parallel Taboo Search.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Multipath Routing Algorithm Based on Traffic Prediction in Wireless Mesh Networks.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Replica Placement Algorithm in Mobile Grid Environments.
Proceedings of the International Conference on Embedded Software and Systems, 2009

2008
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network.
J. Comput., 2008

Dynamic Level Task Scheduling Algorithm based on Risk Estimation Model in Grid Computing.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Colony Algorithm for Wireless Sensor Networks Adaptive Data Aggregation Routing Schema.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

2006
Automatic Traffic Balance Algorithm Based on Traffic Engineering.
J. Netw. Syst. Manag., 2006

2005
A CBR Engine Adapting to IDS.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Multi-Mobile Agents' Separation Scheme in Java Card Application for Mobile Agent's Security.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004


  Loading...