Yulong Shen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Towards Practical Oblivious Join Processing.
IEEE Trans. Knowl. Data Eng., April, 2024

DSG-BTra: Differentially Semantic-Generalized Behavioral Trajectory for Privacy-Preserving Mobile Internet Services.
IEEE Internet Things J., April, 2024

Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective.
ACM Comput. Surv., March, 2024

Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification.
IEEE Trans. Mob. Comput., February, 2024

A Complete and Comprehensive Semantic Perception of Mobile Traveling for Mobile Communication Services.
IEEE Internet Things J., February, 2024

Federated and Online Dynamic Spectrum Access for Mobile Secondary Users.
IEEE Trans. Wirel. Commun., January, 2024

Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024

Behavioral-Semantic Privacy Protection for Continual Social Mobility in Mobile-Internet Services.
IEEE Internet Things J., January, 2024

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction.
Ad Hoc Networks, January, 2024

2023
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
IEEE Trans. Wirel. Commun., December, 2023

Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023

Numerical variational studies of quantum phase transitions in the sub-Ohmic spin-boson model with multiple polaron ansatz.
Comput. Phys. Commun., December, 2023

A Two-Dimensional Sybil-Proof Mechanism for Dynamic Spectrum Access.
IEEE Trans. Mob. Comput., November, 2023

Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process.
J. Inf. Sci. Eng., November, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

A Performance and Reliability-Guaranteed Predictive Approach to Service Migration Path Selection in Mobile Computing.
IEEE Internet Things J., October, 2023

SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs.
IEEE/ACM Trans. Netw., August, 2023

Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023

Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023

Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee.
IEEE Trans. Computers, June, 2023

IDADET: Iterative Double-Sided Auction-Based Data-Energy Transaction Ecosystem in Internet of Vehicles.
IEEE Internet Things J., June, 2023

FedProc: Prototypical contrastive federated learning on non-IID data.
Future Gener. Comput. Syst., June, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

Time-frequency fusion for enhancement of deep learning-based physical layer identification.
Ad Hoc Networks, April, 2023

A Closed-loop Hybrid Supervision Framework of Cryptocurrency Transactions for Data Trading in IoT.
ACM Trans. Internet Things, February, 2023

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach
Wireless Networks, Springer, ISBN: 978-3-031-38464-6, 2023

Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023

PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023

Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems.
IEEE Trans. Cloud Comput., 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

Edge-Assisted Multi-Layer Offloading Optimization of LEO Satellite-Terrestrial Integrated Networks.
IEEE J. Sel. Areas Commun., 2023

TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks.
IEEE Internet Things J., 2023

SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023

Marriage Matching-based Instant Parking Spot Sharing in Internet of Vehicles.
CoRR, 2023

Covert Communication in Hybrid Microwave/mmWave A2G Systems with Transmission Mode Selection.
CoRR, 2023

Joint Secure and Covert Communication Study in Two-hop Relaying Systems.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Advancing Domain Adaptation of BERT by Learning Domain Term Semantics.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Testing Automated Driving Systems by Breaking Many Laws Efficiently.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

SEBD: Sensor Emulation Based Backdoor for Autopilot.
Proceedings of the 13th International Conference on the Internet of Things, 2023

Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication.
Proceedings of the IEEE Global Communications Conference, 2023

Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Physical layer authentication in MIMO systems: a carrier frequency offset approach.
Wirel. Networks, 2022

Optimizing Task Location Privacy in Mobile Crowdsensing Systems.
IEEE Trans. Ind. Informatics, 2022

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security.
IEEE Trans. Inf. Forensics Secur., 2022

Enhancing Leakage Prevention for MapReduce.
IEEE Trans. Inf. Forensics Secur., 2022

On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System.
IEEE Trans. Commun., 2022

CFHider: Protecting Control Flow Confidentiality With Intel SGX.
IEEE Trans. Computers, 2022

CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases.
IEEE J. Sel. Areas Commun., 2022

Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems.
IEEE Internet Things J., 2022

Privacy-Preserving Asynchronous Grouped Federated Learning for IoT.
IEEE Internet Things J., 2022

Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?
IEEE Internet Things J., 2022

Energy-Efficient and Secure Communication Toward UAV Networks.
IEEE Internet Things J., 2022

Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs.
IEEE Internet Things J., 2022

CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain.
Future Gener. Comput. Syst., 2022

A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022

Graph Analysis in Decentralized Online Social Networks with Fine-Grained Privacy Protection.
CoRR, 2022

Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
CoRR, 2022

Visibility graph entropy based radiometric feature for physical layer identification.
Ad Hoc Networks, 2022

Online machine learning-based physical layer authentication for MmWave MIMO systems.
Ad Hoc Networks, 2022

Fast Detection of Weak Arc Faults Based on Progressive Singular-Value-Decomposition and Empirical Analyses.
IEEE Access, 2022

Fast-Fourier-Transform Enhanced Progressive Singular-Value-Decomposition Algorithm in Double Diagnostic Window Frame for Weak Arc Fault Detection.
IEEE Access, 2022

An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Multi-antenna covert communications in random wireless networks with full-duplex relay.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization.
Proceedings of the International Conference on Networking and Network Applications, 2022

An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation.
Proceedings of the International Conference on Networking and Network Applications, 2022

Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2022

Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVs.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Towards Relational Multi-Agent Reinforcement Learning via Inductive Logic Programming.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas.
IEEE Trans. Wirel. Commun., 2021

QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers.
IEEE Trans. Wirel. Commun., 2021

Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021

Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

Mobility-Aware Privacy-Preserving Mobile Crowdsourcing.
Sensors, 2021

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices.
IEEE J. Sel. Areas Commun., 2021

Incentive Jamming-Based Secure Routing in Decentralized Internet of Things.
IEEE Internet Things J., 2021

Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation.
IEEE Internet Things J., 2021

Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy.
IEEE Internet Things J., 2021

Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics.
IEEE Commun. Lett., 2021

A Survey of Knowledge Enhanced Pre-trained Models.
CoRR, 2021

Wavelet-Analysis-Based Singular-Value-Decomposition Algorithm for Weak Arc Fault Detection via Current Amplitude Normalization.
IEEE Access, 2021

Mobility-Aware Differentially Private Trajectory for Privacy-Preserving Continual Crowdsourcing.
IEEE Access, 2021

A Secure and Fair Double Auction Framework for Cloud Virtual Machines.
IEEE Access, 2021

Research on the Security of Visual Reasoning CAPTCHA.
Proceedings of the 30th USENIX Security Symposium, 2021

Dual-Target Cross-Domain Bundle Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

On covert throughput performance of two-way relay covert wireless communications.
Wirel. Networks, 2020

A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation.
IEEE Trans. Wirel. Commun., 2020

SF-Sketch: A Two-Stage Sketch for Data Streams.
IEEE Trans. Parallel Distributed Syst., 2020

Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems.
IEEE Trans. Commun., 2020

CryptSQLite: SQLite With High Data Security.
IEEE Trans. Computers, 2020

Collaborative online ranking algorithms for multitask learning.
Knowl. Inf. Syst., 2020

Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT.
J. Inf. Sci. Eng., 2020

Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities.
IEEE Internet Things J., 2020

Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication.
CoRR, 2020

Similarities and Evolutionary Relationships of COVID-19 and Related Viruses.
CoRR, 2020

BC-RAN: Cloud radio access network enabled by blockchain for 5G.
Comput. Commun., 2020

On delay performance study for cooperative multicast MANETs.
Ad Hoc Networks, 2020

Covert Outage Analysis for Random Wireless Networks Under Warden Collusion.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Target Privacy Preserving for Social Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Friendship-based cooperative jamming for secure communication in Poisson networks.
Wirel. Networks, 2019

Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

Minimizing Traffic Migration During Network Update in IaaS Datacenters.
IEEE Trans. Serv. Comput., 2019

Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data.
IEEE Trans. Parallel Distributed Syst., 2019

Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Commun., 2019

Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering.
Multim. Tools Appl., 2019

Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast.
IEEE J. Sel. Areas Commun., 2019

Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.
J. Medical Syst., 2019

Smart Contract-Based Access Control for the Internet of Things.
IEEE Internet Things J., 2019

Detecting cyberattacks in industrial control systems using online learning algorithms.
Neurocomputing, 2019

Profit optimization in service-oriented data market: A Stackelberg game approach.
Future Gener. Comput. Syst., 2019

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019

Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019

Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control.
Comput. Networks, 2019

Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

CFHider: Control Flow Obfuscation with Intel SGX.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework.
Wirel. Commun. Mob. Comput., 2018

On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wirel. Commun., 2018

Generalized Cooperative Multicast in Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Serv. Comput., 2018

Practical Verifiable Computation-A MapReduce Case Study.
IEEE Trans. Inf. Forensics Secur., 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

Cutting Long-Tail Latency of Routing Response in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying.
CoRR, 2018

Exact secrecy throughput capacity study in mobile ad hoc networks.
Ad Hoc Networks, 2018

Empowering Sketches with Machine Learning for Network Measurements.
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018

Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Fast OpenFlow Table Lookup with Fast Update.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Diamond sketch: Accurate per-flow measurement for real IP streams.
Proceedings of the IEEE INFOCOM 2018, 2018

Obfuscating program control flow with Intel SGX.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm.
Proceedings of the 2018 International Conference on Computing, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint.
Wirel. Networks, 2017

On Performance Modeling for MANETs Under General Limited Buffer Constraint.
IEEE Trans. Veh. Technol., 2017

A protocol-free detection against cloud oriented reflection DoS attacks.
Soft Comput., 2017

Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst., 2017

Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction.
CoRR, 2017

SF-sketch: slim-fat-sketch with GPU assistance.
CoRR, 2017

Adaptive Traffic Signal Control: Deep Reinforcement Learning Algorithm with Experience Replay and Target Network.
CoRR, 2017

Exploiting Content Delivery Networks for covert channel communications.
Comput. Commun., 2017

Physical layer security-aware routing and performance tradeoffs in ad hoc networks.
Comput. Networks, 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017

On the rate of successful transmissions in finite slotted Aloha MANETs.
Ad Hoc Networks, 2017

Multicast Delivery Delay in General Two-Hop Relay MANETs.
Proceedings of the International Conference on Networking and Network Applications, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

Limits of Covert Communication on Two-Hop AWGN Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.
Proceedings of the International Conference on Networking and Network Applications, 2017

Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework.
Proceedings of the International Conference on Networking and Network Applications, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

D2D Communication for Disaster Recovery in Cellular Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.
Proceedings of the International Conference on Networking and Network Applications, 2017

On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

Improving Database Storage Usability with the Cloud-Based Architecture.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks.
IEEE Trans. Commun., 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans Autom. Sci. Eng., 2016

Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016

Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Gener. Comput. Syst., 2016

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
CoRR, 2016

Physical Layer Security-Aware Routing and Performance Tradeoffs in WANETs.
CoRR, 2016

Multicast Delivery Probability of MANETs with Limited Packet Redundancy.
Proceedings of the International Conference on Networking and Network Applications, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exact Secrecy Throughput of MANETs with Guard Zone.
Proceedings of the International Conference on Networking and Network Applications, 2016

Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Security/QoS-aware route selection in multi-hop wireless ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process.
Wirel. Networks, 2015

Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst., 2015

Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc Sens. Wirel. Networks, 2015

End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach.
Ad Hoc Sens. Wirel. Networks, 2015

Source delay in mobile ad hoc networks.
Ad Hoc Networks, 2015

Modeling the success transmission rate in Aloha MANETs with Binomial point process.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014

Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel.
IEICE Trans. Commun., 2014

Secrecy transmission capacity in noisy wireless ad hoc networks.
Ad Hoc Networks, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Wireless Sensor Networks for the Internet of Things.
Int. J. Distributed Sens. Networks, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013

On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
CoRR, 2013

Source Delay in Mobile Ad Hoc Networks.
CoRR, 2013

Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process.
CoRR, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

2012
The multimedia service session handoff method in heterogeneous wireless networks.
Int. J. Grid Util. Comput., 2012

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Security Information Flow Control Model and Method in MILS.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Efficient security transmission protocol with identity-based encryption in wireless mesh networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2003
Registration and Fusion of Retinal Images - An Evaluation Study.
IEEE Trans. Medical Imaging, 2003


  Loading...