2024
Giant Could Be Tiny: Efficient Inference of Giant Models on Resource-Constrained UAVs.
IEEE Internet Things J., June, 2024
2023
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network.
Comput. Secur., 2023
perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic Traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
2022
A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing.
IEEE Trans. Intell. Transp. Syst., 2022
The Story of 1/e: ALOHA-based and Reinforcement-Learning-based Random Access for Delay-Constrained Communications.
CoRR, 2022
2021
Clustering-Learning-Based Long-Term Predictive Localization in 5G-Envisioned Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
Estimating Sentiment in Social Media - a Case Study of the Migrant Caravans News on Twitter.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021
2020
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks.
IEEE Trans. Dependable Secur. Comput., 2020
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Cooperative Game for Multiple Chargers with Dynamic Network Topology.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020
2019
On the Secret Key Capacity of Sibling Hidden Markov Models.
IEEE Trans. Inf. Forensics Secur., 2019
Geography Still Matters: Examine the Role of Location in Online Markets for Foreign Branded Products.
Decis. Sci., 2019
Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019
Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
LSTM-Based Detection for Timing Attacks in Named Data Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks.
IEEE Trans. Veh. Technol., 2018
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Veh. Technol., 2018
Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
J. Syst. Softw., 2018
MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks.
Proceedings of the 25th International Conference on Telecommunications, 2018
The Propagation of Counteracting Information in Online Social Networks: A Case Study.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
On the Asymptotic Performance of Delay-Constrained Slotted ALOHA.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
P<sup>2</sup>S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Veh. Technol., 2017
Successive synthesis of latent Gaussian trees.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Asymptotic converse bound for secret key capacity in hidden Markov model.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Origin Location Advantages in Online Markets for Foreign Branded Products.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Secure Routing Based on Social Similarity in Opportunistic Networks.
IEEE Trans. Wirel. Commun., 2016
Overhead Control With Reliable Transmission of Popular Packets in Ad-Hoc Social Networks.
IEEE Trans. Veh. Technol., 2016
Secret Common Randomness From Routing Metadata in Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2016
Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.
IEEE Trans. Inf. Forensics Secur., 2016
Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings.
IEEE Trans Autom. Sci. Eng., 2016
A low-cost node capture attack algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2016
Layered Synthesis of Latent Gaussian Trees.
CoRR, 2016
Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks.
Proceedings of the Fifth International Conference on Network, Communication and Computing, 2016
Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
2015
Online Price Dispersion Revisited: How Do Transaction Prices Differ from Listing Prices?
J. Manag. Inf. Syst., 2015
KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs.
CoRR, 2015
Classifying Unrooted Gaussian Trees under Privacy Constraints.
CoRR, 2015
Protecting source-location privacy based on multirings in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015
A-CACHE: An anchor-based public key caching scheme in large wireless networks.
Comput. Networks, 2015
A Trust Routing for Multimedia Social Networks.
Comput. J., 2015
Evaluation of security robustness against information leakage in Gaussian polytree graphical models.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
ROBE - Knitting a Tight Hub for Shortest Path Discovery in Large Social Graphs.
Proceedings of the ICEIS 2015, 2015
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Efficient Link Cuts in Online Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Revisiting optimal power control: Dual effects of SNR and contention.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014
Fast authentication in multi-hop infrastructure-based mobile communication.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise.
IEEE Trans. Commun., 2013
Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?
IEEE J. Sel. Areas Commun., 2013
Cooperative secret delivery in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013
Revisiting Optimal Power Control: its Dual Effect on SNR and Contention.
CoRR, 2013
Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Stealthy pre-attacks against random key pre-distribution security.
Proceedings of IEEE International Conference on Communications, 2012
2011
Parallel Importation: An Empirical Investigation of Online Unauthorized Distribution Channels for Luxury Fashion Goods.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011
Efficient decoding over power-line channels.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011
2010
Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks.
Comput. Commun., 2010
Detection of Fabricated CTS Packet Attacks in Wireless LANs.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010
Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
A Distributed Public Key Caching Scheme in Large Wireless Networks.
Proceedings of the Global Communications Conference, 2010
2009
Can multiple subchannels improve the delay performance of RTS/CTS-based MAC schemes?
IEEE Trans. Wirel. Commun., 2009
Multihop/Direct Forwarding (MDF) for static wireless sensor networks.
ACM Trans. Sens. Networks, 2009
Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009
Fairness Index Based on Variational Distance.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Broadcast Scheduling in Interference Environment.
IEEE Trans. Mob. Comput., 2008
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission.
IEEE Trans. Dependable Secur. Comput., 2008
On search sets of expanding ring search in wireless networks.
Ad Hoc Networks, 2008
Key Establishment in Multi-core Parallel Systems.
Proceedings of the MSN 2008, 2008
Jamming ACK Attack to Wireless Networks and a Mitigation Approach.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks.
IEEE Trans. Veh. Technol., 2007
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs.
IEEE Trans. Mob. Comput., 2007
Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency.
IEEE Trans. Commun., 2007
A fault tolerant and energy efficient routing protocol for urban sensor networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007
2006
Analyzing multi-channel medium access control schemes with ALOHA reservation.
IEEE Trans. Wirel. Commun., 2006
Analyzing split channel medium access control schemes.
IEEE Trans. Wirel. Commun., 2006
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge.
IEEE Trans. Dependable Secur. Comput., 2006
Medium Access Control protocols for ad hoc wireless networks: A survey.
Ad Hoc Networks, 2006
Methods for restoring MAC layer fairness in IEEE 802.11 networks with physical layer capture.
Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality, 2006
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur., 2005
Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks.
Mob. Networks Appl., 2005
Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks.
Comput. Commun., 2005
A state-free data delivery protocol for multihop wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
TWOACK: preventing selfishness in mobile ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
On the forwarding area of contention-based geographic forwarding for ad hoc and sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Using MDS Codes for the Key Establishment of Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
GB: distributed reachability-tunable broadcast algorithms for wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
2004
Optimum transmission range for wireless ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Tuning the carrier sensing range of IEEE 802.11 MAC.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
On optimizing the backoff interval for random access schemes.
IEEE Trans. Commun., 2003
A witness-based approach for data fusion assurance in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003
A pairwise key pre-distribution scheme for wireless sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003
2002
Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks.
IEEE Trans. Commun., 2002
Elective participation in ad hoc networks based on energy consumption.
Proceedings of the Global Telecommunications Conference, 2002
1999
Dual busy tone multiple access (DBTMA)-performance results.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999