Xiaoyan Hong

According to our database1, Xiaoyan Hong
  • authored at least 97 papers between 1990 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Reliable Forwarding Strategy in Vehicular Networks Using NDN.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Density-Aware Delay-Tolerant Interest Forwarding in Vehicular Named Data Networking.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Engineering traffic uncertainty in the OpenFlow data plane.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks.
Int. J. Communication Systems, 2015

A Named-Data Networking Approach to Underwater Monitoring Systems.
Proceedings of the 10th International Conference on Underwater Networks & Systems, 2015

Quantify Self-Organized Storage Capacity in Supporting Infrastructure-less Transportation Operation.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Efficient multi-hop connectivity analysis in urban vehicular networks.
Vehicular Communications, 2014

Prototype for customized multicast services in software defined networks.
Proceedings of the 22nd International Conference on Software, 2014

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Programming network via Distributed Control in Software-Defined Networks.
Proceedings of the IEEE International Conference on Communications, 2014

Evaluating Interest Broadcast in Vehicular Named Data Networking.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

2013
Analysis for bio-inspired thrown-box assisted message dissemination in delay tolerant networks.
Telecommunication Systems, 2013

ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study.
IEEE Systems Journal, 2013

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks.
Journal of Zhejiang University - Science C, 2013

THUNDER: helping underfunded NPO's distribute electronic resources.
J. Cloud Computing, 2013

Feasibility analysis of multi-radio in DSRC vehicular networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

2012
Transition phase of connectivity for wireless networks with growing process.
IJAHUC, 2012

Routing with bridging nodes for drifting mobility.
Proceedings of the Conference on Under Water Networks, 2012

A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Analysis of mobility patterns for urban taxi cabs.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

BioStaR: A Bio-inspired Stable Routing for Cognitive Radio Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Constructing time-varying contact graphs for heterogeneous delay tolerant networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks.
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems, 2012

2011
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks.
IACR Cryptology ePrint Archive, 2011

Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad.
Proceedings of the Global Communications Conference, 2011

Capacity-Aware Routing Using Throw-Boxes.
Proceedings of the Global Communications Conference, 2011

Experiences with CS2 and data structures in the 100 problems format.
Proceedings of the 2011 Frontiers in Education Conference, 2011

A caching strategy in mobile ad hoc named data network.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Optimal routing strategy in throw-box based delay tolerant network.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Practical exploitation on system vulnerability of ProtoGENI.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Agenda driven mobility modelling.
IJAHUC, 2010

Situation-aware trust architecture for vehicular networks.
IEEE Communications Magazine, 2010

Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

Handshake time and transmission rate of 802.11g measurement in vehicular networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Delay analysis of Wireless Ad Hoc networks: Single vs. multiple radio.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Latency Analysis for Thrown Box Based Message Dissemination.
Proceedings of the Global Communications Conference, 2010

Critical Phase of Connectivity in Wireless Network Expansion.
Proceedings of the Global Communications Conference, 2010

2009
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes.
IEEE Trans. Vehicular Technology, 2009

Using camouflaging mobility to protect privacy in mobile ad hoc networks.
Security and Communication Networks, 2009

A survey of anonymity in wireless communication systems.
Security and Communication Networks, 2009

Selective Message Forwarding in Delay Tolerant Networks.
MONET, 2009

An online energy-efficient routing protocol with traffic load prospects in wireless sensor networks.
IJSNet, 2009

Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks.
IJITN, 2009

Articulation Node Based Routing in Delay Tolerant Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Efficient Support of Range Queries over DHTs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Modeling Worm Propagation through Hidden Wireless Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A mobility camouflaging evaluation tool.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

Effects of multiple collaborated data streams in wireless sensor networks.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
Anonymous Geo-Forwarding in MANETs through Location Cloaking.
IEEE Trans. Parallel Distrib. Syst., 2008

Privacy-preserving secure relative localization in vehicular networks.
Security and Communication Networks, 2008

Delay management in delay-tolerant networks.
Int. Journal of Network Management, 2008

An on-line replication strategy to increase availability in Data Grids.
Future Generation Comp. Syst., 2008

Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks.
Proceedings of the MSN 2008, 2008

A locally-optimizing approach for multichannel assignment and routing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Trooper Selection Strategy on a Milepost Network.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Collaborated Camouflaging Mobility for Mobile Privacy.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Investigating the Impact of Real-World Factors on Internet Worm Propagation.
Proceedings of the Information Systems Security, Third International Conference, 2007

A Secure Data Transmission Scheme for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the Global Communications Conference, 2007

SMART: A selective controlled-flooding routing for delay tolerant networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Integrity and its applications.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Mobility changes anonymity: new passive threats in mobile ad hoc networks.
Wireless Communications and Mobile Computing, 2006

Resource allocation for restoration of compromised systems.
J. Comb. Optim., 2006

Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Performance evaluation of anonymous routing protocols in MANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Secure Relative Location Determination in Vehicular Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Privacy-Preserving Quick Authentication in Fast Roaming Networks.
Proceedings of the LCN 2006, 2006

Nonlinear Resource Allocation in Restoration of Compromised Systems.
Proceedings of IEEE International Conference on Communications, 2006

A Dynamic Data Grid Replication Strategy to Minimize the Data Missed.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

An Agenda Based Mobility Model21.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

A secure ad-hoc routing approach using localized self-healing communities.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Distributed Naming System for Mobile Ad Hoc Network.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
Recent advances in mobility modeling for mobile ad hoc network research.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

2003
Landmark routing in ad hoc networks with mobile backbones.
J. Parallel Distrib. Comput., 2003

ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

2002
Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

Dynamic group support in LANMAR routing ad hoc networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

An ad hoc network with mobile backbones.
Proceedings of the IEEE International Conference on Communications, 2002

Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Contradictory relationship between Hurst parameter and queueing performance (extended version).
Telecommunication Systems, 2001

A Mobility Framework for Ad Hoc Wireless Networks.
Proceedings of the Mobile Data Management, Second International Conference, 2001

2000
UAV aided intelligent routing for ad-hoc wireless network in single-area theater.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

Landmark routing for large ad hoc wireless networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
A wireless hierarchical routing protocol with group mobility.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

1990
A new clustering approach and its application to BBL placement.
Proceedings of the European Design Automation Conference, 1990


  Loading...