Yi Ren

Orcid: 0000-0001-7423-6719

Affiliations:
  • University of East Anglia, School of Computing Science, Norwich, UK
  • National Chiao Tung University, Department of Computer Science, Hsinchu, Taiwan (2012 - 2017)
  • University of Agder, Department of Information and Communication Technology, Grimstad, Norway (PhD 2012)


According to our database1, Yi Ren authored at least 70 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023

Edge-Cloud Offloading: Knapsack Potential Game in 5G Multi-Access Edge Computing.
IEEE Trans. Wirel. Commun., November, 2023

Design and Analysis of Dynamic Block-Setup Reservation Algorithm for 5G Network Slicing.
IEEE Trans. Mob. Comput., September, 2023

Enabling Dynamic Autoscaling for NFV in a Non-Standalone Virtual EPC: Design and Analysis.
IEEE Trans. Veh. Technol., June, 2023

Deep 2nd-order residual block for image denoising.
Multim. Tools Appl., 2023

An Exchange-based AIoT Platform for Fast AI Application Development.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

2021
Deep-Learned Regularization and Proximal Operator for Image Compressive Sensing.
IEEE Trans. Image Process., 2021

Invariant Deep Compressible Covariance Pooling for Aerial Scene Categorization.
IEEE Trans. Geosci. Remote. Sens., 2021

CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts.
IEEE Access, 2020

On Optimizing Signaling Efficiency of Retransmissions for Voice LTE.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

2019
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data.
IEEE Wirel. Commun. Lett., 2019

Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019

ID-Free Multigroup Cardinality Estimation for Massive RFID Tags in IoT.
Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium, 2019

A watermark-based in situ access-control model for image big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis.
IEEE Wirel. Commun. Lett., 2018

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation.
IEEE Trans. Veh. Technol., 2018

Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis.
IEEE Trans. Veh. Technol., 2018

RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Hey! I Have Something for You: Paging Cycle Based Random Access for LTE-A.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

ASA: Adaptive VNF Scaling Algorithm for 5G Mobile Networks.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

2017
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks.
IEEE Trans. Veh. Technol., 2017

Give me a hint: An ID-free small data transmission protocol for dense IoT devices.
Proceedings of the 2017 Wireless Days, Porto, Portugal, March 29-31, 2017, 2017

eHint: An Efficient Protocol for Uploading Small-Size IoT Data.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

r-Hint: A message-efficient random access response for mMTC in 5G networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Analysis of Users' Emotions Through Physiology.
Proceedings of the Genetic and Evolutionary Computing, 2017

Applying machine learning to head gesture recognition using wearables.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

iToy: A LEGO-like solution for small scale IoT applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service.
IEEE Trans. Wirel. Commun., 2016

LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
Int. J. Embed. Syst., 2016

Design and Analysis Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks.
CoRR, 2016

Design and Analysis of Optimal Threshold Offloading (OTO) Algorithm for LTE Femtocell/Macrocell Networks.
CoRR, 2016

Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Congestion Control for Machine-Type Communications in LTE-A Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

From spotting the difference to spotting your difference.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

2014
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Comput. Commun., 2013

Design of a self-portrait application with sensor-assisted guiding for smart devices.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

2012
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Security in Mobile Wireless Sensor Networks - A Survey.
J. Commun., 2011

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digit. Multim. Broadcast., 2011

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
Sci. China Inf. Sci., 2010

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs.
Proceedings of the Global Communications Conference, 2010

2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
J. Commun., 2009

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing.
Proceedings of the 2nd IFIP Wireless Days, 2009

Secure and Efficient Data Storage in Unattended Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
HybridS: A Scheme for Secure Distributed Data Storage in WSNs.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...