Ruchuan Wang

According to our database1, Ruchuan Wang authored at least 140 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An efficient algorithm for embedding exchanged hypercubes into grids.
The Journal of Supercomputing, 2019

Distributed Soft Fault Detection for Interval Type-2 Fuzzy-Model-Based Stochastic Systems With Wireless Sensor Networks.
IEEE Trans. Industrial Informatics, 2019

Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embedded Comput. Syst., 2019

A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT.
Sensors, 2019

Anomaly-Tolerant Network Traffic Estimation via Noise-Immune Temporal Matrix Completion Model.
IEEE Journal on Selected Areas in Communications, 2019

Optimally Embedding 3-Ary n-Cubes into Grids.
J. Comput. Sci. Technol., 2019

RF-Focus: Computer Vision-assisted Region-of-interest RFID Tag Recognition and Localization in Multipath-prevalent Environments.
IMWUT, 2019

Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
IJICS, 2019

In-Air Gesture Interaction: Real Time Hand Posture Recognition Using Passive RFID Tags.
IEEE Access, 2019

Semi-supervised Multi-view Individual and Sharable Feature Learning for Webpage Classification.
Proceedings of the World Wide Web Conference, 2019

2018
Virtual region based data gathering method with mobile sink for sensor networks.
Wireless Networks, 2018

Noise-Tolerant Wireless Sensor Networks Localization via Multinorms Regularized Matrix Completion.
IEEE Trans. Vehicular Technology, 2018

One More Tag Enables Fine-Grained RFID Localization and Tracking.
IEEE/ACM Trans. Netw., 2018

Noise Tolerant Localization for Sensor Networks.
IEEE/ACM Trans. Netw., 2018

A See-through-Wall System for Device-Free Human Motion Sensing Based on Battery-Free RFID.
ACM Trans. Embedded Comput. Syst., 2018

An RFID Indoor Positioning Algorithm Based on Support Vector Regression.
Sensors, 2018

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018

The Shared Bicycle and Its Network - Internet of Shared Bicycle (IoSB): A Review and Survey.
Sensors, 2018

A type of energy-efficient data gathering method based on single sink moving along fixed points.
Peer-to-Peer Networking and Applications, 2018

An Evaluation Model and Benchmark for Parallel Computing Frameworks.
Mobile Information Systems, 2018

"Like charges repulsion and opposite charges attraction" law based multilinear subspace analysis for face recognition.
Knowl.-Based Syst., 2018

Node Localization Based on Improved PSO and Mobile Nodes for Environmental Monitoring WSNs.
IJWIN, 2018

Edge computing-based security authentication algorithm for multiple RFID tags.
IJIIDS, 2018

An improved SMURF scheme for cleaning RFID data.
IJGUC, 2018

SHMO: A seniors health monitoring system based on energy-free sensing.
Computer Networks, 2018

Indoor Anti-Collision Alarm System Based on Wearable Internet of Things for Smart Healthcare.
IEEE Communications Magazine, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

RF-MVO: Simultaneous 3D Object Localization and Camera Trajectory Recovery Using RFID Devices and a 2D Monocular Camera.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Emotion recognition of human physiological signals based on recursive quantitative analysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Speech emotion features selection based on BBO-SVM.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Embedding Exchanged Hypercubes into Rings and Ladders.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

The Study on the Botnet and its Prevention Policies in the Internet of Things.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

VC-TWJoin: A Stream Join Algorithm Based on Variable Update Cycle Time Window.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes.
Wireless Personal Communications, 2017

Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System.
IEEE Trans. Industrial Informatics, 2017

A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks.
Sensors, 2017

An RFID Indoor Positioning Algorithm Based on Bayesian Probability and K-Nearest Neighbor.
Sensors, 2017

Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks.
Sensors, 2017

An energy-efficient data transmission protocol for mobile crowd sensing.
Peer-to-Peer Networking and Applications, 2017

An energy-efficient data gathering method based on compressive sensing for pervasive sensor networks.
Pervasive and Mobile Computing, 2017

R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi.
IEEE Journal on Selected Areas in Communications, 2017

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017

Multi-Path Data Distribution Mechanism Based on RPL for Energy Consumption and Time Delay.
Information, 2017

Energy optimization of ant colony algorithm in wireless sensor network.
IJDSN, 2017

Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags.
IJBDCN, 2017

TagCare: Using RFIDs to Monitor the Status of the Elderly Living Alone.
IEEE Access, 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Research on Concept Drift Detection for Decision Tree Algorithm in the Stream of Big Data.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Robust passive static human detection with commodity WiFi devices.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

AmpN: Real-time LOS/NLOS identification with WiFi.
Proceedings of the IEEE International Conference on Communications, 2017

An Online Prediction Algorithm of Traffic in Big Data Based on the Storm.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A Type of Low-Latency Data Gathering Method with Multi-Sink for Sensor Networks.
Sensors, 2016

Utility-aware data transmission scheme for delay tolerant networks.
Peer-to-Peer Networking and Applications, 2016

A Review of the Topologies Used in Smart Water Meter Networks: A Wireless Sensor Network Application.
J. Sensors, 2016

Vehicle trajectory prediction based on Hidden Markov Model.
TIIS, 2016

A Method for Traffic Congestion Clustering Judgment Based on Grey Relational Analysis.
ISPRS Int. J. Geo-Information, 2016

A Type of Energy Hole Avoiding Method Based on Synchronization of Nodes in Adjacent Annuluses for Sensor Network.
IJDSN, 2016

A hidden Markov model combined with RFID-based sensors for accurate vehicle route prediction.
IJAHUC, 2016

A method of cleaning RFID data streams based on Naive Bayes classifier.
IJAHUC, 2016

TrackT: Accurate tracking of RFID tags with mm-level accuracy using first-order taylor series approximation.
Ad Hoc Networks, 2016

A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TA3C: Teaching-Oriented Adaptive Wi-Fi Authorized Access Control Based on CSI.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

The hybrid encryption algorithm of lightweight data in cloud storage.
Proceedings of the 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, 2016

Privacy-preserving k-NN computation over encrypted cloud data without key sharing.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Novel Cloud Computing Architecture Oriented Internet of Vehicles.
Proceedings of the Advances on P2P, 2016

2015
A Method of Vehicle Route Prediction Based on Social Network Analysis.
J. Sensors, 2015

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
JCM, 2015

Energy-Balanced Uneven Clustering Protocol Based on Regional Division for Sensor Networks.
IJDSN, 2015

Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks.
IJDSN, 2015

Invisible Cloak Fails: CSI-based Passive Human Detection.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

Vector Localization Algorithm Based on Signal Strength in Wireless Sensor Network.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Research of a Novel Flash P2P Network Traffic Prediction Algorithm.
Proceedings of the Third International Conference on Information Technology and Quantitative Management, 2015

R-PMD: robust passive motion detection using PHY information with MIMO.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Noise-tolerant localization from incomplete range measurements for wireless sensor networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Distributed Face Recognition in Wireless Sensor Networks.
IJDSN, 2014

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks.
IJDSN, 2014

A Multicast Algorithm for Wireless Sensor Networks Based on Network Coding.
IJDSN, 2014

An Exact Top-k Query Algorithm with Privacy Protection in Wireless Sensor Networks.
IJDSN, 2014

An image information hiding algorithm based on grey system theory.
Int. J. Communication Systems, 2014

Measuring the similarity of PML documents with RFID-based sensors.
IJAHUC, 2014

A QoS-aware routing algorithm based on ant-cluster in wireless multimedia sensor networks.
SCIENCE CHINA Information Sciences, 2014

Node Localization Based on Optimized Genetic Algorithm in Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

An Individual Service Recommendation Model Based on Social Network and Location Awareness.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2013
Adaptive edge detection with distributed behaviour-based agents in WSNs.
IJSNet, 2013

Peer Selection Strategy Using Mobile Agent and Trust in Peer-to-Peer Streaming Media System.
IJDSN, 2013

Optimal Joint Expected Delay Forwarding in Delay Tolerant Networks.
IJDSN, 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
IJDSN, 2013

A Data Transmission Scheme Based on Time-Evolving Meeting Probability for Opportunistic Social Network.
IJDSN, 2013

A Sociability-Based Spray and Forward Scheme for Opportunistic Network.
IJDSN, 2013

A Type of Node Deployment Strategy Based on Variable Acceleration Motion for Wireless Sensor Networks.
IJDSN, 2013

A Type of Localization Method Using Mobile Beacons Based on Spiral-Like Moving Path for Wireless Sensor Networks.
IJDSN, 2013

Face Recognition in Mobile Wireless Sensor Networks.
IJDSN, 2013

Weight-Based Clustering Decision Fusion Algorithm for Distributed Target Detection in Wireless Sensor Networks.
IJDSN, 2013

Research on Migration Strategy of Mobile Agent in Wireless Sensor Networks.
IJDSN, 2013

Security Analysis of Lightweight Authentication Protocol from WISTP 2013.
IACR Cryptology ePrint Archive, 2013

2012
(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks.
JNW, 2012

A Cross-layer and Multipath based Video Transmission Scheme for Wireless Multimedia Sensor Networks.
JNW, 2012

Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes.
J. Network and Computer Applications, 2012

Novel Node Localization Algorithm Based on Nonlinear Weighting Least Square for Wireless Sensor Networks.
IJDSN, 2012

A Novel Coverage Enhancement Algorithm for Image Sensor Networks.
IJDSN, 2012

Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks.
IJDSN, 2012

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern.
IJDSN, 2012

A Camera Nodes Correlation Model Based on 3D Sensing in Wireless Multimedia Sensor Networks.
IJDSN, 2012

A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Dynamic Web Services Selection Algorithm Based on Trust Model for Grid Environment.
Proceedings of the Advances in Wireless Sensor Networks, 2012

R-AODV: A Cognitive AODV Routing Algorithm in Wireless Network.
Proceedings of the Advances in Wireless Sensor Networks, 2012

AR-HS: Ant Routing Optimized Algorithm on HAPs-Satellite Integrated Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Energy-Efficient Multi-hop Routing Algorithm Based on LEACH.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A New TCP Design for Satellite-HAP Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

The Research of Routing Forwarding Strategies in DTNs Based on Convergence Point.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Mobile Agent Based Coding Aware Multipath Routing for Wireless Sensor Network.
Proceedings of the Advances in Wireless Sensor Networks, 2012

TFA: A Scale-Free Network Approach to Topology Formation in Underwater Acoustic Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Low-Cost VR System Based on Wireless Accelerometer Sensor.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Novel Clustering Ant-Based QoS-aware Routing Algorithm in Large Scale Wireless Multimedia Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012

2011
Design and Implementation of an OpenGL Based 3D First Person Shooting Game.
Trans. Edutainment, 2011

Particle swarm optimisation based on Monte Carlo localisation for mobile sensor network.
IJMIC, 2011

An Anti-collusion Trust Model in P2P Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Adaptive Load-Balanced Routing Algorithm.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace.
Wireless Sensor Network, 2010

Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks.
Sensors, 2010

P2P Replica-tree based Consistency Maintenance Strategy.
JDCTA, 2010

Rough Set and A* based Tasks Scheduling in Gird Environment.
JDCTA, 2010

An energy-saving strategy based on sleep scheduling and block transmission for wireless multimedia sensor networks.
Int. J. Pervasive Computing and Communications, 2010

Research of P2P traffic identification based on naive Bayes and decision tables combination algorithm.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
An Application of Context Middleware Based on Fuzzy Logic for Wireless Sensor Networks.
Wireless Sensor Network, 2009

Voronoi-Based Coverage Optimization for Directional Sensor Networks.
Wireless Sensor Network, 2009

Fuzzy Logic Based Middleware Approach for Context Processing.
JDCTA, 2009

Intrusion Detection Method Using Protocol Classification and Rough.
Computer and Information Science, 2009

An Improved Quantum Genetic Algorithm.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

A Replica Placement Algorithm in Mobile Grid Environments.
Proceedings of the International Conference on Embedded Software and Systems, 2009

2008
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network.
JCP, 2008

Dynamic Level Task Scheduling Algorithm based on Risk Estimation Model in Grid Computing.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Colony Algorithm for Wireless Sensor Networks Adaptive Data Aggregation Routing Schema.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

2006
Automatic Traffic Balance Algorithm Based on Traffic Engineering.
J. Network Syst. Manage., 2006

2005
A CBR Engine Adapting to IDS.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Multi-Mobile Agents' Separation Scheme in Java Card Application for Mobile Agent's Security.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004


  Loading...