Yi Ren

According to our database1, Yi Ren authored at least 57 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts.
IEEE Access, 2020

On Optimizing Signaling Efficiency of Retransmissions for Voice LTE.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

2019
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data.
IEEE Wirel. Commun. Lett., 2019

Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019

ID-Free Multigroup Cardinality Estimation for Massive RFID Tags in IoT.
Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium, 2019

2018
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis.
IEEE Wirel. Commun. Lett., 2018

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation.
IEEE Trans. Veh. Technol., 2018

Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis.
IEEE Trans. Veh. Technol., 2018

RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Hey! I Have Something for You: Paging Cycle Based Random Access for LTE-A.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

ASA: Adaptive VNF Scaling Algorithm for 5G Mobile Networks.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

2017
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks.
IEEE Trans. Veh. Technol., 2017

Give me a hint: An ID-free small data transmission protocol for dense IoT devices.
Proceedings of the 2017 Wireless Days, Porto, Portugal, March 29-31, 2017, 2017

eHint: An Efficient Protocol for Uploading Small-Size IoT Data.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

r-Hint: A message-efficient random access response for mMTC in 5G networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Analysis of Users' Emotions Through Physiology.
Proceedings of the Genetic and Evolutionary Computing, 2017

Applying machine learning to head gesture recognition using wearables.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

iToy: A LEGO-like solution for small scale IoT applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service.
IEEE Trans. Wirel. Commun., 2016

LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
Int. J. Embed. Syst., 2016

Design and Analysis Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks.
CoRR, 2016

Design and Analysis of Optimal Threshold Offloading (OTO) Algorithm for LTE Femtocell/Macrocell Networks.
CoRR, 2016

Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Congestion Control for Machine-Type Communications in LTE-A Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

From spotting the difference to spotting your difference.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

2014
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Comput. Commun., 2013

Design of a self-portrait application with sensor-assisted guiding for smart devices.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

2012
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Security in Mobile Wireless Sensor Networks - A Survey.
J. Commun., 2011

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digit. Multim. Broadcast., 2011

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
Sci. China Inf. Sci., 2010

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs.
Proceedings of the Global Communications Conference, 2010

2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
J. Commun., 2009

Secure and Efficient Data Storage in Unattended Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
HybridS: A Scheme for Secure Distributed Data Storage in WSNs.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...