Yulong Shen

According to our database1, Yulong Shen authored at least 98 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Minimizing Traffic Migration During Network Update in IaaS Datacenters.
IEEE Trans. Services Computing, 2019

Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Communications, 2019

Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering.
Multimedia Tools Appl., 2019

Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast.
IEEE Journal on Selected Areas in Communications, 2019

Smart Contract-Based Access Control for the Internet of Things.
IEEE Internet of Things Journal, 2019

Profit optimization in service-oriented data market: A Stackelberg game approach.
Future Generation Comp. Syst., 2019

Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

CFHider: Control Flow Obfuscation with Intel SGX.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework.
Wireless Communications and Mobile Computing, 2018

On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wireless Communications, 2018

Generalized Cooperative Multicast in Mobile Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Services Computing, 2018

Practical Verifiable Computation-A MapReduce Case Study.
IEEE Trans. Information Forensics and Security, 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

Cutting Long-Tail Latency of Routing Response in Software Defined Networks.
IEEE Journal on Selected Areas in Communications, 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed and Parallel Databases, 2018

Exact secrecy throughput capacity study in mobile ad hoc networks.
Ad Hoc Networks, 2018

Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Fast OpenFlow Table Lookup with Fast Update.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Diamond sketch: Accurate per-flow measurement for real IP streams.
Proceedings of the IEEE INFOCOM 2018, 2018

Obfuscating program control flow with Intel SGX.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm.
Proceedings of the 2018 International Conference on Computing, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint.
Wireless Networks, 2017

On Performance Modeling for MANETs Under General Limited Buffer Constraint.
IEEE Trans. Vehicular Technology, 2017

A protocol-free detection against cloud oriented reflection DoS attacks.
Soft Comput., 2017

Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mobile Information Systems, 2017

Exploiting Content Delivery Networks for covert channel communications.
Computer Communications, 2017

Physical layer security-aware routing and performance tradeoffs in ad hoc networks.
Computer Networks, 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Communications Magazine, 2017

On the rate of successful transmissions in finite slotted Aloha MANETs.
Ad Hoc Networks, 2017

Multicast Delivery Delay in General Two-Hop Relay MANETs.
Proceedings of the International Conference on Networking and Network Applications, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

Limits of Covert Communication on Two-Hop AWGN Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.
Proceedings of the International Conference on Networking and Network Applications, 2017

Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

D2D Communication for Disaster Recovery in Cellular Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.
Proceedings of the International Conference on Networking and Network Applications, 2017

On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

Improving Database Storage Usability with the Cloud-Based Architecture.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks.
IEEE Trans. Communications, 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans. Automation Science and Engineering, 2016

Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Comm. Inform. Networks, 2016

Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Generation Comp. Syst., 2016

Multicast Delivery Probability of MANETs with Limited Packet Redundancy.
Proceedings of the International Conference on Networking and Network Applications, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exact Secrecy Throughput of MANETs with Guard Zone.
Proceedings of the International Conference on Networking and Network Applications, 2016

Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Security/QoS-aware route selection in multi-hop wireless ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process.
Wireless Networks, 2015

Secure service composition with information flow control in service clouds.
Future Generation Comp. Syst., 2015

Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc & Sensor Wireless Networks, 2015

End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach.
Ad Hoc & Sensor Wireless Networks, 2015

Source delay in mobile ad hoc networks.
Ad Hoc Networks, 2015

Modeling the success transmission rate in Aloha MANETs with Binomial point process.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Information Systems, 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014

Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel.
IEICE Transactions, 2014

Secrecy transmission capacity in noisy wireless ad hoc networks.
Ad Hoc Networks, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Wireless Sensor Networks for the Internet of Things.
IJDSN, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
IJDSN, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

2012
The multimedia service session handoff method in heterogeneous wireless networks.
IJGUC, 2012

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
IJDSN, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Security Information Flow Control Model and Method in MILS.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Efficient security transmission protocol with identity-based encryption in wireless mesh networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2003
Registration and Fusion of Retinal Images - An Evaluation Study.
IEEE Trans. Med. Imaging, 2003


  Loading...