Yonglin Ren

According to our database1, Yonglin Ren authored at least 29 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Identification and diagnosis of whole body and fragments of <i>Trogoderma granarium</i> and <i>Trogoderma variabile</i> using visible near infrared hyperspectral imaging technique coupled with deep learning.
Comput. Electron. Agric., 2020

2019
A Framework & System for Classification of Encrypted Network Traffic using Machine Learning.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2015
Investigating Metaheuristics Applications for Capacitated Location Allocation Problem on Logistics Networks.
Proceedings of the Chaos Modeling and Control Systems Design, 2015

2014
An efficient <i>k</i>-Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks.
Wirel. Commun. Mob. Comput., 2014

2012
An efficient certificate revocation validation scheme with k-means clustering for vehicular ad hoc networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2011
Performance analysis of a selective encryption algorithm for wireless ad hoc networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Outlier detection using naïve bayes in wireless ad hoc networks.
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2011

2010
ARMA: a scalable secure routing protocol with privacy protection for mobile <i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2010

Monitoring patients via a secure and mobile healthcare system.
IEEE Wirel. Commun., 2010

Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness.
Proceedings of the Q2SWinet'10, 2010

A novel framework of secure network management for wireless and mobile networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A secure group management scheme for mobile ad hoc networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

2009
A secure mobile healthcare system using trust-based multicast scheme.
IEEE J. Sel. Areas Commun., 2009

Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

An adaptive computational trust model for mobile ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

2008
A trust-based security system for ubiquitous and pervasive computing environments.
Comput. Commun., 2008

A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks.
Proceedings of the 5th ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2008

The design of a secure key management system for mobile ad hoc networks.
Proceedings of the LCN 2008, 2008

Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

Coverage-Based Sensor Association Rules for Wireless Vehicular Ad Hoc and Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A Web Intelligent System based on Measuring the Effects of Bother.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks.
Proceedings of the Q2SWinet'07, 2007

Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Measuring the Cost of Bothering Users in Intelligent Systems.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

ARMA: An Efficient Secure Ad Hoc Routing Protocol.
Proceedings of the Global Communications Conference, 2007


  Loading...