Xiaojiang Du

According to our database1, Xiaojiang Du authored at least 284 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT.
Future Generation Comp. Syst., 2019

Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks.
Future Generation Comp. Syst., 2019

2018
Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wireless Commun., 2018

Security in Mobile Edge Caching with Reinforcement Learning.
IEEE Wireless Commun., 2018

Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2018

Chain-based big data access control infrastructure.
The Journal of Supercomputing, 2018

Vehicle Tracking Using Surveillance With Multimodal Data Fusion.
IEEE Trans. Intelligent Transportation Systems, 2018

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Industrial Informatics, 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Information Forensics and Security, 2018

Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud.
IEEE Trans. Cloud Computing, 2018

Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018

AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions.
Sensors, 2018

TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail.
IEEE Network, 2018

Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems.
J. Sensor and Actuator Networks, 2018

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE Journal on Selected Areas in Communications, 2018

Random Access Preamble Design and Detection for Mobile Satellite Communication Systems.
IEEE Journal on Selected Areas in Communications, 2018

A 3-D Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks.
IEEE Internet of Things Journal, 2018

An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Communication Systems, 2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Generation Comp. Syst., 2018

Reinforcement learning-based QoS/QoE-aware service function chaining in software-driven 5G slices.
Trans. Emerging Telecommunications Technologies, 2018

Energy-Efficient Beamforming for 3.5 GHz 5G Cellular Networks based on 3D Spatial Channel Characteristics.
Computer Communications, 2018

Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies.
Computer Communications, 2018

Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks.
Computer Networks, 2018

FPAN: Fine-grained and progressive attention localization network for data retrieval.
Computer Networks, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Communications Magazine, 2018

From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies.
IEEE Communications Magazine, 2018

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Communications Magazine, 2018

Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV.
IEEE Communications Magazine, 2018

Location-Aware Influence Blocking Maximization in Social Networks.
IEEE Access, 2018

Hermes: A Privacy-Preserving Approximate Search Framework for Big Data.
IEEE Access, 2018

Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach.
IEEE Access, 2018

Deciding Your Own Anonymity: User-Oriented Node Selection in I2P.
IEEE Access, 2018

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

Massive Fishing Website URL Parallel Filtering Method.
IEEE Access, 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

LTE-U and Wi-Fi Coexistence Algorithm Based on Q-Learning in Multi-Channel.
IEEE Access, 2018

Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment.
IEEE Access, 2018

Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information.
IEEE Access, 2018

Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings.
IEEE Access, 2018

MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles.
IEEE Access, 2018

PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing.
IEEE Access, 2018

Lclean: A Plausible Approach to Individual Trajectory Data Sanitization.
IEEE Access, 2018

Consortium Blockchain-Based Malware Detection in Mobile Devices.
IEEE Access, 2018

DTW based Authentication for Wireless Medical Device Security.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Online Deadline-Aware Bulk Transfer Over Inter-Datacenter WANs.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

The Identification of Secular Variation in IoT Based on Transfer Learning.
Proceedings of the 2018 International Conference on Computing, 2018

Secure Payment Routing Protocol for Economic Systems Based on Blockchain.
Proceedings of the 2018 International Conference on Computing, 2018

An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology.
Proceedings of the 2018 International Conference on Computing, 2018

PWiG: A Phase-based Wireless Gesture Recognition System.
Proceedings of the 2018 International Conference on Computing, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems.
Proceedings of the 2018 International Conference on Computing, 2018

A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Efficient Anonymous Authentication Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Enabling Fair Spectrum Sharing between Wi-Fi and LTE-Unlicensed.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Envisioning an Information Assurance and Performance Infrastructure for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

2017
Secure Machine-Type Communications toward LTE Heterogeneous Networks.
IEEE Wireless Commun., 2017

FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Vehicular Technology, 2017

Cloud-Based Malware Detection Game for Mobile Devices with Offloading.
IEEE Trans. Mob. Comput., 2017

Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Industrial Informatics, 2017

Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters.
Security and Communication Networks, 2017

P2P-based resource allocation with coalitional game for D2D networks.
Pervasive and Mobile Computing, 2017

Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Network, 2017

Intermittent Fault Diagnosability of Interconnection Networks.
J. Comput. Sci. Technol., 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Access Control Schemes for Implantable Medical Devices: A Survey.
IEEE Internet of Things Journal, 2017

Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid.
IEEE Internet of Things Journal, 2017

Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach.
IEICE Transactions, 2017

A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks.
Computer Networks, 2017

Resource management for future mobile networks: Architecture and technologies.
Computer Networks, 2017

Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid.
IEEE Access, 2017

MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.
IEEE Access, 2017

Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper).
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

A Wideband Spectrum Data Segment Compression Algorithm in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Low-Latency Secure Data Outsourcing Scheme for Cloud-WSN.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance guarantee aware orchestration for service function chains with elastic demands.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A review of security challenges, attacks and resolutions for wireless medical devices.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Provably efficient algorithms for joint placement and allocation of virtual network functions.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

A calculation method for social network user credibility.
Proceedings of the IEEE International Conference on Communications, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

Detection of LSSUAV using hash fingerprint based SVDD.
Proceedings of the IEEE International Conference on Communications, 2017

VDAS: Verifiable data aggregation scheme for Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017

An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

An effective DDoS defense scheme for SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017

Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Performance Analysis Model for TCP over Multiple Heterogeneous Paths in 5G Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

DLRT: Deep Learning Approach for Reliable Diabetic Treatment.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Wii: Device-Free Passive Identity Identification via WiFi Signals.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An Unbalanced Data Hybrid-Sampling Algorithm Based on Multi-Information Fusion.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Control.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Predicting Vulnerable Software Components Using Software Network Graph.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Cuckoo: flexible compute-intensive task offloading in mobile cloud computing.
Wireless Communications and Mobile Computing, 2016

CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing.
Wireless Communications and Mobile Computing, 2016

A multi-channel cooperative clustering-based MAC protocol for V2V communications.
Wireless Communications and Mobile Computing, 2016

Efficient device-to-device discovery and access procedure for 5G cellular network.
Wireless Communications and Mobile Computing, 2016

Theoretical analysis on caching effects in urban vehicular ad hoc networks.
Wireless Communications and Mobile Computing, 2016

Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture.
IEEE Wireless Commun., 2016

Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms.
IEEE Trans. Vehicular Technology, 2016

Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic.
IEEE Trans. Vehicular Technology, 2016

Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks.
IEEE Trans. Vehicular Technology, 2016

Significance Evaluation of Video Data Over Media Cloud Based on Compressed Sensing.
IEEE Trans. Multimedia, 2016

Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning.
Sensors, 2016

Publishing histograms with outliers under data differential privacy.
Security and Communication Networks, 2016

Sink Location Protection Protocols Based on Packet Sending Rate Adjustment.
IJDSN, 2016

Sounding reference signal based timing advance adjustment for LTE-satellite mobile communication systems.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Analysis of discovery and access procedure for D2D communication in 5G cellular network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Secure data access for wireless body sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Quantifying caching effects in urban VANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Energy-efficient cluster management in heterogeneous vehicular networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Network security analyzing and modeling based on Petri net and Attack tree for SDN.
Proceedings of the 2016 International Conference on Computing, 2016

Public scene recognition using mobile phone sensors.
Proceedings of the 2016 International Conference on Computing, 2016

Protecting sink location against global traffic monitoring attacker.
Proceedings of the 2016 International Conference on Computing, 2016

LPPS: Location privacy protection for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Power Optimization for Secure Communications in Full-Duplex System under Residual Self-Interference.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Robust WLAN-Based Indoor Fine-Grained Intrusion Detection.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Analysis of clickjacking attacks and an effective defense scheme for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Interference management for heterogeneous networks with spectral efficiency improvement.
IEEE Wireless Commun., 2015

Toward Vehicle-Assisted Cloud Computing for Smartphones.
IEEE Trans. Vehicular Technology, 2015

Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic.
IEEE Trans. Vehicular Technology, 2015

Multichannel Broadcast Via Channel Hopping in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2015

Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System.
IEEE Trans. Parallel Distrib. Syst., 2015

Achieving data privacy on hybrid cloud.
Security and Communication Networks, 2015

Virtual machine placement in cloud systems through migration process.
IJPEDS, 2015

Processing geo-dispersed big data in an advanced mapreduce framework.
IEEE Network, 2015

Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial].
IEEE Network, 2015

Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks.
IJDSN, 2015

Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Improving QoS on high-speed vehicle by multipath transmission based on practical experiment.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation Framework.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Application of text mining for customer evaluations in commercial banking.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

An effective access control scheme for preventing permission leak in Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A practical approach to the attestation of computational integrity in hybrid cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

CLPP: Context-aware location privacy protection for location-based social network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Effective task scheduling in proximate mobile device based communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A novel stochastic-encryption-based P2P Digital Rights Management scheme.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Face Recognition with Environment Tolerance on a Mobile Device.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wireless Communications and Mobile Computing, 2014

Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic Perspective.
IEEE Trans. Vehicular Technology, 2014

Verifying cloud service-level agreement by a third-party auditor.
Security and Communication Networks, 2014

Group-based key array authentication protocol in radio frequency identification systems.
IET Information Security, 2014

Aligning Guard Zones of Massive MIMO in Cognitive Femtocell Networks.
IEEE Communications Letters, 2014

Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Communications Magazine, 2014

Poster: near field communication based access control for wireless medical devices.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A lightweight access control mechanism for mobile cloud computing.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Achieving big data privacy via hybrid cloud.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A light-weight certificate-less public key cryptography scheme based on ECC.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

MobiFish: A lightweight anti-phishing scheme for mobile phones.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

An effective online scheme for detecting Android malware.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Permission-combination-based scheme for Android mobile malware detection.
Proceedings of the IEEE International Conference on Communications, 2014

Auditing cloud service level agreement on VM CPU speed.
Proceedings of the IEEE International Conference on Communications, 2014

Contention-based adaptive position update for intermittently connected VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

Modeling Leechers attack in BitTorrent.
Proceedings of the IEEE Global Communications Conference, 2014

Analyzing mobile phone vulnerabilities caused by camera.
Proceedings of the IEEE Global Communications Conference, 2014

A lightweight dynamic multicast authentication scheme.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
Security for Wireless Implantable Medical Devices.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7153-0, 2013

Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage.
IEEE Wireless Commun., 2013

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention.
IEEE Network, 2013

Preventing Piracy Content Propagation in Peer-to-Peer Networks.
IEEE Journal on Selected Areas in Communications, 2013

A Measurement Study on the Topologies of BitTorrent Networks.
IEEE Journal on Selected Areas in Communications, 2013

Distributed precoder design for inter-cell interference suppressing in multi-cell MU-MIMO systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Stable multiuser channel allocations in opportunistic spectrum access.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Auditing CPU Performance in Public Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

A Task Scheduling Algorithm for Multi-core Processors.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Prometheus: Privacy-aware data retrieval on hybrid cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

PPBD: A piracy preventing system for BT DHT networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A performance prediction scheme for computation-intensive applications on cloud.
Proceedings of IEEE International Conference on Communications, 2013

Efficiently secure data privacy on hybrid cloud.
Proceedings of IEEE International Conference on Communications, 2013

Two vulnerabilities in Android OS kernel.
Proceedings of IEEE International Conference on Communications, 2013

Dynamic cache cleaning on Android.
Proceedings of IEEE International Conference on Communications, 2013

Practical and privacy-assured data indexes for outsourced cloud data.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Protecting private cloud located within public cloud.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Performance bound of ad hoc Device-to-Device communications using cognitive radio.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
An efficient anonymous communication protocol for wireless sensor networks.
Wireless Communications and Mobile Computing, 2012

Self-protecting networking using dynamic p-cycle construction within link capacity constraint.
Security and Communication Networks, 2012

Channel switching control policy for wireless mesh networks.
J. Parallel Distrib. Comput., 2012

DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense.
Proceedings of IEEE International Conference on Communications, 2012

A distributed login framework for semi-structured Peer-to-Peer networks.
Proceedings of IEEE International Conference on Communications, 2012

Two matrices for Blakley's secret sharing scheme.
Proceedings of IEEE International Conference on Communications, 2012

Base station location protection in wireless sensor networks: Attacks and defense.
Proceedings of IEEE International Conference on Communications, 2012

Verifying cloud Service Level Agreement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Understanding the topologies of BitTorrent networks: A measurement view.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Efficient communications in Mobile Hybrid Wireless Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An effective auditing scheme for cloud computing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Efficient resource allocation in Hybrid Wireless Networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Biometric-based two-level secure access control for Implantable Medical Devices during emergencies.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Secure Key Management Scheme in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

Lightweight Source Anonymity in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Weaving a proper net to catch large objects in wireless sensor networks.
IEEE Trans. Wireless Communications, 2010

On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks.
IJDSN, 2010

Securing multi-tiered web applications.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Near-Minimum-Energy Routing in Heterogeneous Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Defending Resource Depletion Attacks on Implantable Medical Devices.
Proceedings of the Global Communications Conference, 2010

Defending Malicious Collision Attacks in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks.
IEEE Trans. Wireless Communications, 2009

Stream-based cipher feedback mode in wireless error channel.
IEEE Trans. Wireless Communications, 2009

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks.
IEEE Trans. Wireless Communications, 2009

Efficient rekeying algorithms for WiMAX networks.
Security and Communication Networks, 2009

Ad hoc systems backboned by fibres: limitation and solutions.
IJSNet, 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Computer Networks, 2009

Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint.
Proceedings of IEEE International Conference on Communications, 2009

An Optimal Sensor Network for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2009

Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Load balance and energy efficient data gathering in wireless sensor networks.
Wireless Communications and Mobile Computing, 2008

Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks.
Wireless Communications and Mobile Computing, 2008

Security in wireless sensor networks.
IEEE Wireless Commun., 2008

Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks.
IEEE Trans. Vehicular Technology, 2008

Designing fault tolerant networks to prevent poison message failure.
Security and Communication Networks, 2008

A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Weaving a Proper Net to Catch Large Objects.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Security in wireless mobile ad hoc and sensor networks [Guest Editorial].
IEEE Wireless Commun., 2007

Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.
IEEE Trans. Wireless Communications, 2007

Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems.
IEEE Trans. Vehicular Technology, 2007

Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks.
MONET, 2007

Self-healing sensor networks with distributed decision making.
IJSNet, 2007

A survey of key management schemes in wireless sensor networks.
Computer Communications, 2007

On efficient deployment of sensors on planar grid.
Computer Communications, 2007

Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet.
IEEE Communications Magazine, 2007

An effective key management scheme for heterogeneous sensor networks.
Ad Hoc Networks, 2007

Simulating MPEG-4 over the IEEE 802.11 WLANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Paging Schemes Performance for Wireless Systems.
Proceedings of the Global Communications Conference, 2007

A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme.
Proceedings of the Global Communications Conference, 2007

2006
Secure cell relay routing protocol for sensor networks.
Wireless Communications and Mobile Computing, 2006

Multiclass routing and medium access control for heterogeneous mobile ad hoc networks.
IEEE Trans. Vehicular Technology, 2006

Adaptive cell relay routing protocol for mobile ad hoc networks.
IEEE Trans. Vehicular Technology, 2006

Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method.
J. Network Syst. Manage., 2006

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs.
IJWMC, 2006

Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks.
IJWMC, 2006

Load Balance and Energy Efficient Data Gathering in Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Distributed Decision Making Algorithm for Self-Healing Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Challenges and Futuristic Perspective of CDMA Technologies: OCC-CDMA/OS for 4G Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2006

Channel Allocation Algorithms for Three-tier Wireless Local Loops.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Efficient Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Secure Routing Protocol for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Architecture, mobility management, and quality of service for integrated 3G and WLAN networks.
Wireless Communications and Mobile Computing, 2005

Maintaining Differentiated Coverage in Heterogeneous Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2005

Efficient multi-class routing protocol for heterogeneous mobile ad hoc networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
QoS routing based on multi-class nodes for mobile ad hoc networks.
Ad Hoc Networks, 2004

Toward efficient distributed network monitoring.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Using k-nearest neighbor method to identify poison message failure.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004

2003
Using Neural Networks to Identify Control and Management Plane Poison Messages.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2001
Implementation and Performance Analysis of SNMP on a TLS/TCP Base.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001


  Loading...