Yi Ren

According to our database1, Yi Ren authored at least 49 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data.
IEEE Wireless Commun. Letters, 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Generation Comp. Syst., 2019

2018
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis.
IEEE Wireless Commun. Letters, 2018

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation.
IEEE Trans. Vehicular Technology, 2018

Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis.
IEEE Trans. Vehicular Technology, 2018

RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Inform., 2018

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Generation Comp. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Generation Comp. Syst., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Hey! I Have Something for You: Paging Cycle Based Random Access for LTE-A.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

ASA: Adaptive VNF Scaling Algorithm for 5G Mobile Networks.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

2017
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks.
IEEE Trans. Vehicular Technology, 2017

Give me a hint: An ID-free small data transmission protocol for dense IoT devices.
Proceedings of the 2017 Wireless Days, Porto, Portugal, March 29-31, 2017, 2017

eHint: An Efficient Protocol for Uploading Small-Size IoT Data.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

r-Hint: A message-efficient random access response for mMTC in 5G networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Analysis of Users' Emotions Through Physiology.
Proceedings of the Genetic and Evolutionary Computing, 2017

Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

iToy: A LEGO-like solution for small scale IoT applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service.
IEEE Trans. Wireless Communications, 2016

LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
IJES, 2016

Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Congestion Control for Machine-Type Communications in LTE-A Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

From spotting the difference to spotting your difference.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

2014
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
IJDSN, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
IJDSN, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
IJDSN, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
IJDSN, 2013

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Computer Communications, 2013

Design of a self-portrait application with sensor-assisted guiding for smart devices.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

2012
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Security in Mobile Wireless Sensor Networks - A Survey.
JCM, 2011

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digital Multimedia Broadcasting, 2011

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
SCIENCE CHINA Information Sciences, 2010

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs.
Proceedings of the Global Communications Conference, 2010

2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
JCM, 2009

Secure and Efficient Data Storage in Unattended Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
HybridS: A Scheme for Secure Distributed Data Storage in WSNs.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...