Shouling Ji

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, China
  • Georgia Institute of Technology, Atlanta, GA, USA (PhD 2016)


According to our database1, Shouling Ji authored at least 196 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
ACM Trans. Knowl. Discov. Data, 2022

2021
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response.
IEEE Trans. Mob. Comput., 2021

Deep Graph Matching and Searching for Semantic Code Retrieval.
ACM Trans. Knowl. Discov. Data, 2021

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning.
IEEE Trans. Image Process., 2021

A Practical Black-Box Attack on Source Code Authorship Identification Classifiers.
IEEE Trans. Inf. Forensics Secur., 2021

OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2021

Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining.
IEEE Trans. Cybern., 2021

ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021

Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval.
Neurocomputing, 2021

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction.
CoRR, 2021

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
CoRR, 2021

NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks.
CoRR, 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
CoRR, 2021

Backdoor Pre-trained Models Can Transfer to All.
CoRR, 2021

Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

On the Security Risks of AutoML.
CoRR, 2021

GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network.
CoRR, 2021

Constructing Contrastive samples via Summarization for Text Classification with limited annotations.
CoRR, 2021

EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild.
CoRR, 2021

Progressive Localization Networks for Language-based Moment Localization.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

Graph Backdoor.
Proceedings of the 30th USENIX Security Symposium, 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Detecting Adversarial Samples with Graph-Guided Testing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Hierarchical Similarity Learning for Language-Based Product Image Retrieval.
Proceedings of the IEEE International Conference on Acoustics, 2021

Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation.
Proceedings of the IEEE International Conference on Acoustics, 2021

Multi-Order Adversarial Representation Learning for Composed Query Image Retrieval.
Proceedings of the IEEE International Conference on Acoustics, 2021

Trojaning Language Models for Fun and Profit.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Constructing contrastive samples via summarization for text classification with limited annotations.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Deep Dual Consecutive Network for Human Pose Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Aggregated Multi-GANs for Controlled 3D Human Motion Prediction.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds.
IEEE Trans. Parallel Distributed Syst., 2020

Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020

AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020

Fast and parameter-light rare behavior detection in maritime trajectories.
Inf. Process. Manag., 2020

THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020

Adversarial examples detection through the sensitivity in space mappings.
IET Comput. Vis., 2020

TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020

Privacy Leakage of Real-World Vertical Federated Learning.
CoRR, 2020

Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
CoRR, 2020

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
CoRR, 2020

Text-based price recommendation system for online rental houses.
Big Data Min. Anal., 2020

Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN).
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Interpretable Deep Learning under Fire.
Proceedings of the 29th USENIX Security Symposium, 2020

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Proceedings of the 29th USENIX Security Symposium, 2020

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Privacy Risks of General-Purpose Language Models.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

AdvMind: Inferring Adversary Intent of Black-Box Attacks.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Attention with Long-Term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors.
Proceedings of the Database Systems for Advanced Applications, 2020

PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
An I/O Efficient Distributed Approximation Framework Using Cluster Sampling.
IEEE Trans. Parallel Distributed Syst., 2019

Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack.
IEEE/ACM Trans. Netw., 2019

Video Big Data Retrieval Over Media Cloud: A Context-Aware Online Learning Approach.
IEEE Trans. Multim., 2019

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data.
IEEE Trans. Dependable Secur. Comput., 2019

Corrections to "A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid".
IEEE Syst. J., 2019

A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid.
IEEE Syst. J., 2019

Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019

Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing.
IEEE Internet Things J., 2019

Attend to count: Crowd counting with adaptive capacity multi-scale CNNs.
Neurocomputing, 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019

FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing.
CoRR, 2019

Adversarial CAPTCHAs.
CoRR, 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors.
Proceedings of the World Wide Web Conference, 2019

MOPT: Optimized Mutation Scheduling for Fuzzers.
Proceedings of the 28th USENIX Security Symposium, 2019

DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TextBugger: Generating Adversarial Text Against Real-world Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Efficient Global String Kernel with Random Features: Beyond Counting Substructures.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index.
Proceedings of the Data Science, 2019

CATS: Cross-Platform E-Commerce Fraud Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Dual Encoding for Zero-Example Video Retrieval.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

DeT: Defending Against Adversarial Examples via Decreasing Transferability.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
DPPG: A Dynamic Password Policy Generation System.
IEEE Trans. Inf. Forensics Secur., 2018

Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too.
IEEE Secur. Priv., 2018

Interpretable Deep Learning under Fire.
CoRR, 2018

Dual Dense Encoding for Zero-Example Video Retrieval.
CoRR, 2018

Rapido: A Layer2 Payment System for Decentralized Currencies.
CoRR, 2018

SmartSeed: Smart Seed Generation for Efficient Fuzzing.
CoRR, 2018

Differentially Private Releasing via Deep Generative Model.
CoRR, 2018

Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Model-Reuse Attacks on Deep Learning Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Blind De-anonymization Attacks using Social Networks.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017

HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
Proceedings of the Security and Privacy in Communication Networks, 2017

Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

PBUF: Sharing Buffer to Mitigate Flooding Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

How to Quantify Graph De-anonymization Risks.
Proceedings of the Information Systems Security and Privacy, 2017

Quantification of De-anonymization Risks in Social Networks.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Private, Yet Practical, Multiparty Deep Learning.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Influence Spread in Social Networks with both Positive and Negative Influences.
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017

Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Evaluating the security of anonymized big graph/structural data.
PhD thesis, 2016

Structural Data De-Anonymization: Theory and Practice.
IEEE/ACM Trans. Netw., 2016

Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2016

General Graph Data De-Anonymization: From Mobility Traces to Social Networks.
ACM Trans. Inf. Syst. Secur., 2016

Seed-Based De-Anonymizability Quantification of Social Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling.
Proc. VLDB Endow., 2016

On the relative de-anonymizability of graph data: Quantification and evaluation.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards a Framework to Facilitate the Mobile Advertising Ecosystem.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015

Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks.
Ad Hoc Networks, 2015

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015

Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Primary social behavior aware routing and scheduling for Cognitive Radio Networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

PARS: A Uniform and Open-source Password Analysis and Research System.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Multi-regional query scheduling in wireless sensor networks with minimum latency.
Wirel. Commun. Mob. Comput., 2014

Greedy construction of load-balanced virtual backbones in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration.
IEEE Trans. Parallel Distributed Syst., 2014

Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Strengthen nodal cooperation for data dissemination in mobile social networks.
Pers. Ubiquitous Comput., 2014

Neighborhood-based uncertainty generation in social networks.
J. Comb. Optim., 2014

A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Data aggregation scheduling in wireless networks with Cognitive Radio capability.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Proceedings of the Information Security - 17th International Conference, 2014

Structural Data De-anonymization: Quantification, Practice, and Implications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks Under the Generalized Physical Interference Model.
IEEE/ACM Trans. Netw., 2013

Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks.
Theor. Comput. Sci., 2013

Continuous data aggregation and capacity in probabilistic wireless sensor networks.
J. Parallel Distributed Comput., 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Time efficient data aggregation scheduling in Cognitive Radio Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Generating Uncertain Networks Based on Historical Network Snapshots.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

2012
Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Load-balanced CDS construction in wireless sensor networks via genetic algorithm.
Int. J. Sens. Networks, 2012

Data caching-based query processing in multi-sink wireless sensor networks.
Int. J. Sens. Networks, 2012

Distributed data collection and its capacity in asynchronous wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Constructing a load-balanced virtual backbone in Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks.
Proceedings of the Combinatorial Optimization and Applications, 2012

2011
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor Networks.
Proceedings of the MILCOM 2011, 2011

Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Generalized broadcast scheduling in duty-cycle multi-hop wireless networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

RCS: A Random Channel Selection with Probabilistic Backoff for Multi-Channel MAC Protocols in WSNs.
Proceedings of the Global Communications Conference, 2010

2009
Data Caching Based Queries in Multi-sink Sensor Networks.
Proceedings of the MSN 2009, 2009

2008
Routing in Multi-Sink Sensor Networks Based on Gravitational Field.
Proceedings of the International Conference on Embedded Software and Systems, 2008


  Loading...