2025
Accelerating End-Cloud Collaborative Inference via Near Bubble-free Pipeline Optimization.
CoRR, January, 2025
2024
FedUC: A Unified Clustering Approach for Hierarchical Federated Learning.
IEEE Trans. Mob. Comput., October, 2024
An Asynchronous Transport Protocol for Quantum Data Networks.
IEEE J. Sel. Areas Commun., July, 2024
Enhancing Federated Learning With Server-Side Unlabeled Data by Adaptive Client and Data Selection.
IEEE Trans. Mob. Comput., April, 2024
Segmented Entanglement Establishment With All-Optical Switching in Quantum Networks.
IEEE/ACM Trans. Netw., February, 2024
Steganalysis of AMR Speech Stream Based on Multi-Domain Information Fusion.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
Semi-supervised QIM steganalysis with ladder networks.
J. Inf. Secur. Appl., 2024
Characterization of exact two-query quantum algorithms.
Inf. Comput., 2024
Caesar: A Low-deviation Compression Approach for Efficient Federated Learning.
CoRR, 2024
Enhancing Federated Graph Learning via Adaptive Fusion of Structural and Node Characteristics.
CoRR, 2024
Many Hands Make Light Work: Accelerating Edge Inference via Multi-Client Collaborative Caching.
CoRR, 2024
Top-nσ: Not All Logits Are You Need.
CoRR, 2024
ParallelSFL: A Novel Split Federated Learning Framework Tackling Heterogeneity Issues.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
Routing and Photon Source Provisioning in Quantum Key Distribution Networks.
Proceedings of the IEEE INFOCOM 2024, 2024
Routing and Wavelength Assignment for Entanglement Swapping of Photonic Qubits.
Proceedings of the IEEE INFOCOM 2024, 2024
EPS Placement and Lightweight Entanglement Routing for Quantum Data Networks.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Scalable and Robust East-West Forwarding Framework for Hyperscale Clouds.
IEEE/ACM Trans. Netw., December, 2023
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023
Joint Model Pruning and Topology Construction for Accelerating Decentralized Machine Learning.
IEEE Trans. Parallel Distributed Syst., October, 2023
Accelerating Decentralized Federated Learning in Heterogeneous Edge Computing.
IEEE Trans. Mob. Comput., September, 2023
AFall: Wi-Fi-Based Device-Free Fall Detection System Using Spatial Angle of Arrival.
IEEE Trans. Mob. Comput., August, 2023
AutoProfile: An Intelligent Profile Switching System for Smartphones.
IEEE Trans. Mob. Comput., June, 2023
Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization.
Entropy, January, 2023
Adaptive Batch Size for Federated Learning in Resource-Constrained Edge Computing.
IEEE Trans. Mob. Comput., 2023
Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Integrating All-optical Switching and Entangled Photon Source Placement for Entanglement Routing.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Asynchronous Entanglement Provisioning and Routing for Distributed Quantum Computing.
Proceedings of the IEEE INFOCOM 2023, 2023
Enhancing Decentralized Federated Learning for Non-IID Data on Heterogeneous Devices.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
2022
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks.
IEEE/ACM Trans. Netw., 2022
Attention-Based Gait Recognition and Walking Direction Estimation in Wi-Fi Networks.
IEEE Trans. Mob. Comput., 2022
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data.
IEEE Trans. Knowl. Data Eng., 2022
Public Curb Parking Demand Estimation With POI Distribution.
IEEE Trans. Intell. Transp. Syst., 2022
STBC: A Novel Blockchain-Based Spectrum Trading Solution.
IEEE Trans. Cogn. Commun. Netw., 2022
Segment as Points for Efficient and Effective Online Multi-Object Tracking and Segmentation.
IEEE Trans. Pattern Anal. Mach. Intell., 2022
A Blockchain-Based Protocol for Malicious Price Discrimination.
J. Comput. Sci. Technol., 2022
Federated synthetic data generation with differential privacy.
Neurocomputing, 2022
RoNS: Robust network function services in clouds.
Comput. Networks, 2022
Zeta: A Scalable and Robust East-West Communication Framework in Large-Scale Clouds.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022
AtHom: Two Divergent Attentions Stimulated By Homomorphic Training in Text-to-Image Synthesis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Enhancing Federated Learning with In-Cloud Unlabeled Data.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Against Backdoor Attacks In Federated Learning With Differential Privacy.
Proceedings of the IEEE International Conference on Acoustics, 2022
V2X and Vision Fusion Based Undulating Road Recognition and Intelligent Vehicle Control.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022
Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Offloading Tasks With Dependency and Service Caching in Mobile Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2021
Achieving Fine-Grained Flow Management Through Hybrid Rule Placement in SDNs.
IEEE Trans. Parallel Distributed Syst., 2021
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.
Secur. Commun. Networks, 2021
FedSA: A Semi-Asynchronous Federated Learning Mechanism in Heterogeneous Edge Computing.
IEEE J. Sel. Areas Commun., 2021
Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Real-Time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
DNN Inference Acceleration with Partitioning and Early Exiting in Edge Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Private Frequent Itemset Mining in the Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Design and Implementation of a Real-Time Distributed Precise Point Positioning Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
ABPNet: Adaptive Background Modeling for Generalized Few Shot Segmentation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
AggNet for Self-supervised Monocular Depth Estimation: Go An Aggressive Step Furthe.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture.
Proceedings of the International Joint Conference on Neural Networks, 2021
MDANet: Multi-Modal Deep Aggregation Network for Depth Completion.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021
Continuous Copy-Paste for One-stage Multi-object Tracking and Segmentation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Revealing the Reciprocal Relations between Self-Supervised Stereo and Monocular Depth Estimation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Pointer Networks for Arbitrary-Shaped Text Spotting.
Proceedings of the IEEE International Conference on Acoustics, 2021
Adversarial Attacks on Object Detectors with Limited Perturbations.
Proceedings of the IEEE International Conference on Acoustics, 2021
Mask4D: 4D Convolution Network for Light Field Occlusion Removal.
Proceedings of the IEEE International Conference on Acoustics, 2021
VK-Net: Category-Level Point Cloud Registration with Unsupervised Rotation Invariant Keypoints.
Proceedings of the IEEE International Conference on Acoustics, 2021
Study on Multi-Vehicle Scheduling Problem.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Research on Informatization Forecasting Particulate Matter Using Spatio-Temporal Data.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
2020
Fast and Accurate Traffic Measurement With Hierarchical Filtering.
IEEE Trans. Parallel Distributed Syst., 2020
Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing.
IEEE/ACM Trans. Netw., 2020
Best Bang for the Buck: Cost-Effective Seed Selection for Online Social Networks.
IEEE Trans. Knowl. Data Eng., 2020
Bayesian Co-Clustering Truth Discovery for Mobile Crowd Sensing Systems.
IEEE Trans. Ind. Informatics, 2020
Quality-aware online task assignment mechanisms using latent topic model.
Theor. Comput. Sci., 2020
Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers.
IEEE Trans. Cloud Comput., 2020
Set-valued Data Publication with Local Privacy: Tight Error Bounds and Efficient Mechanisms.
Proc. VLDB Endow., 2020
TransNet: Training Privacy-Preserving Neural Network over Transformed Layer.
Proc. VLDB Endow., 2020
Collaborative Thompson Sampling.
Mob. Networks Appl., 2020
DPDT: A Differentially Private Crowd-Sensed Data Trading Mechanism.
IEEE Internet Things J., 2020
Self-accelerated Thompson sampling with near-optimal regret upper bound.
Neurocomputing, 2020
PointTrack++ for Effective Online Multi-Object Tracking and Segmentation.
CoRR, 2020
Joint Switch Upgrade and VNF Placement for NFV-Based SDNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Offloading Dependent Tasks in Mobile Edge Computing with Service Caching.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNs.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Incremental Server Deployment for Scalable NFV-enabled Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Performance Guaranteed Single Link Failure Recovery in SDN Overlay Networks.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing Network.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Segment as Points for Efficient Online Multi-Object Tracking and Segmentation.
Proceedings of the Computer Vision - ECCV 2020, 2020
GDS: General Distributed Strategy for Functional Dependency Discovery Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2020
PrivGMM: Probability Density Estimation with Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2020
ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Integrating Coflow and Circuit Scheduling for Optical Networks.
IEEE Trans. Parallel Distributed Syst., 2019
Local Differential Private Data Aggregation for Discrete Distribution Estimation.
IEEE Trans. Parallel Distributed Syst., 2019
A Utility-Optimized Framework for Personalized Private Histogram Estimation.
IEEE Trans. Knowl. Data Eng., 2019
Practical quantum Byzantine protocol via nearly optimal entanglement resources.
Quantum Inf. Process., 2019
Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2019
An improved entropy-based approach to steganalysis of compressed speech.
Multim. Tools Appl., 2019
Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones.
IEEE Internet Things J., 2019
Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability.
CoRR, 2019
GAN Generate Adversarial Examples to Fool Deep Networks.
Aust. J. Intell. Inf. Process. Syst., 2019
How Bob in Quantum Private Query Protocol Gets the Element?
IEEE Access, 2019
Contextual Combinatorial Cascading Thompson Sampling.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
SAFE-ME: Scalable and Flexible Middlebox Policy Enforcement with Software Defined Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Online Scheduling Strategy to Minimize Penalty of Tardiness for Real-Time Tasks in Mobile Edge Computing Systems.
Proceedings of the 4th International Conference on Big Data and Computing, 2019
Differentially Private Greedy Decision Forest.
Proceedings of the IEEE International Conference on Acoustics, 2019
Fast Recovery for Single Link Failure with Segment Routing in SDNs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Joint Job Offloading and Resource Allocation for Distributed Deep Learning in Edge Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Collaborative Contextual Combinatorial Cascading Thompson Sampling.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Toward Urban Electric Taxi Systems in Smart Cities: The Battery Swapping Challenge.
IEEE Trans. Veh. Technol., 2018
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs.
IEEE/ACM Trans. Netw., 2018
CountMax: A Lightweight and Cooperative Sketch Measurement for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2018
Achieving High Scalability Through Hybrid Switching in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2018
Minimizing Controller Response Time Through Flow Redirecting in SDNs.
IEEE/ACM Trans. Netw., 2018
Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles.
IEEE Trans. Mob. Comput., 2018
Joint Virtual Switch Deployment and Routing for Load Balancing in SDNs.
IEEE J. Sel. Areas Commun., 2018
Corrections to "Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks".
IEEE J. Sel. Areas Commun., 2018
Hybrid covert channel in LTE-A: Modeling and analysis.
J. Netw. Comput. Appl., 2018
Concealed in web surfing: Behavior-based covert channels in HTTP.
J. Netw. Comput. Appl., 2018
Centralized spectrum leasing via cooperative SU assignment in cognitive radio networks.
Int. J. Commun. Syst., 2018
Optimal channel allocation for multi-PU and multi-SU pairs in underlay cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018
Supervised learning framework for covert channel detection in LTE-A.
IET Inf. Secur., 2018
COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds.
CoRR, 2018
Load-balancing routing in software defined networks with multiple controllers.
Comput. Networks, 2018
A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Smart Device Fingerprinting Based on Webpage Loading.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018
Link Us if You Can: Enabling Unlinkable Communication on the Internet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
PrivSet: Set-Valued Data Analyses with Locale Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Automatic Recognition for Arbitrarily Tilted License Plate.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018
A robust and efficient method for license plate recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Anomalous Trajectory Detection Between Regions of Interest Based on ANPR System.
Proceedings of the Computational Science - ICCS 2018, 2018
COUSTIC: Combinatorial Double Auction for Crowd Sensing Task Assignment in Device-to-Device Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Task Offloading in Edge-Clouds with Budget Constraint.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline.
Proceedings of the Computer Vision - ECCV 2018, 2018
TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud.
Proceedings of the Database Systems for Advanced Applications, 2018
Classification Learning from Private Data in Heterogeneous Settings.
Proceedings of the Database Systems for Advanced Applications, 2018
An Entropy-based Method for Detection of Covert Channels over LTE.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018
Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018
Quality-Aware Online Task Assignment Using Latent Topic Model.
Proceedings of the Algorithmic Aspects in Information and Management, 2018
2017
Price-based resource allocation for revenue maximization with cooperative communication.
Wirel. Networks, 2017
Shared relay assignment in cooperative communications for bandwidth maximization.
Wirel. Networks, 2017
Opportunistic Mobile Data Offloading with Deadline Constraints.
IEEE Trans. Parallel Distributed Syst., 2017
Minimizing Flow Statistics Collection Cost Using Wildcard-Based Requests in SDNs.
IEEE/ACM Trans. Netw., 2017
Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs.
IEEE/ACM Trans. Netw., 2017
Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN.
IEEE/ACM Trans. Netw., 2017
Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks.
IEEE Trans. Mob. Comput., 2017
SOS: Real-time and accurate physical assault detection using smartphone.
Peer-to-Peer Netw. Appl., 2017
Achieving fully privacy-preserving private range queries over outsourced cloud data.
Pervasive Mob. Comput., 2017
Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks.
IEEE J. Sel. Areas Commun., 2017
WiStep: Device-free Step Counting with WiFi Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Joint channel and sink assignment for data collection in cognitive wireless sensor networks.
Int. J. Commun. Syst., 2017
Cooperative topology control for low interference in wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017
FAST: truthful auction with access flexibility for cooperative communications.
IET Commun., 2017
Cost-Effective Seed Selection in Online Social Networks.
CoRR, 2017
Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing.
CoRR, 2017
Auction-based resource allocation for cooperative cognitive radio networks.
Comput. Commun., 2017
Optimizing virtual machine placement in distributed clouds with M/M/1 servers.
Comput. Commun., 2017
Partial flow statistics collection for load-balanced routing in software defined networks.
Comput. Networks, 2017
FTRS: A mechanism for reducing flow table entries in software defined networks.
Comput. Networks, 2017
AIS: An Inaudible Guider in Your Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Load-Balancing Software-Defined Networking Through Hybrid Routing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
SmartMonitoring: Reckoning Traffic Statuses of Road System in Real-Time Based on Scarce Road Surveillance Cameras.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Joint deployment and routing in hybrid SDNs.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Local private ordinal data distribution estimation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Exploiting Cantor Expansion for Covert Channels over LTE-Advanced.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Detect Malicious Attacks from Entire TCP Communication Process.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Deploying default paths by joint optimization of flow table and group table in SDNs.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
On the effect of flow table size and controller capacity on SDN network throughput.
Proceedings of the IEEE International Conference on Communications, 2017
Achieving personalized and privacy-preserving range queries over outsourced cloud data.
Proceedings of the IEEE International Conference on Communications, 2017
Energy-Efficient Cooperative Communications with Shared Relay in Wireless Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A General Fine-Grained Truth Discovery Approach for Crowdsourced Data Aggregation.
Proceedings of the Database Systems for Advanced Applications, 2017
A Classifier Method for Detection of Covert Channels over LTE.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
2016
Joint relay assignment and rate-power allocation for multiple paths in cooperative networks.
Wirel. Networks, 2016
Energy-aware virtual multi-input-multi-output-based routing for wireless ad hoc networks.
Wirel. Commun. Mob. Comput., 2016
Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks.
IEEE Trans. Mob. Comput., 2016
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2016
Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones.
Sensors, 2016
Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption.
J. Web Eng., 2016
A self-adaptive reconfiguration scheme for throughput maximization in municipal WMNs.
J. Parallel Distributed Comput., 2016
Maximum-lifetime data aggregation for wireless sensor networks with cooperative communication.
Int. J. Sens. Networks, 2016
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
Int. J. Netw. Secur., 2016
A scale-independent way for differential estimation in dynamic radio frequency identification systems.
Int. J. Commun. Syst., 2016
Queueing analysis for preemptive transmission in underlay CRNs.
Int. J. Commun. Syst., 2016
Identity-based Signatures from Lattices: Simpler, Faster, Shorter.
Fundam. Informaticae, 2016
Mutual Information Optimally Local Private Discrete Distribution Estimation.
CoRR, 2016
iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Private Weighted Histogram Aggregation in Crowdsourcing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Social Welfare Maximization Auction for Secondary Spectrum Markets: A Long-Term Perspective.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Urban Traffic Condition Estimation: Let WiFi Do It.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016
i-Shield: A System to Protect the Security of Your Smartphone.
Proceedings of the Knowledge Science, Engineering and Management, 2016
High-throughput anycast routing and congestion-free reconfiguration for SDNs.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Efficient and proactive V2V information diffusion using Named Data Networking.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
A decision-tree-based on-line flow table compressing method in Software Defined Networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Truthful incentive mechanism for vehicle-based nondeterministic crowdsensing.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
WiCare: A Synthesized Healthcare Service System Based on WiFi Signals.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016
Real-time update with joint optimization of route selection and update scheduling for SDNs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Deadline-sensitive User Recruitment for mobile crowdsensing with probabilistic collaboration.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
The Development of a Smart Taxicab Scheduling System: A Multi-source Data Fusion Perspective.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016
Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
A Realistic and Optimized V2V Communication System for Taxicabs.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
WiFinger: talk to your smart devices with finger-grained gesture.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Geospatial Streams Publish with Differential Privacy.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
A Secure and Robust Covert Channel Based on Secret Sharing Scheme.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
A Real Time Wireless Interactive Multimedia System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2015
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms.
IEEE Trans. Parallel Distributed Syst., 2015
Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs.
IEEE/ACM Trans. Netw., 2015
Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets.
IEEE Trans. Mob. Comput., 2015
Cooperative optimal pricing for stochastic access control in overlaid radio access networks.
Telecommun. Syst., 2015
On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Secur. Comput., 2015
Certificateless and certificate-based signatures from lattices.
Secur. Commun. Networks, 2015
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Secur. Commun. Networks, 2015
Privacy-preserving LOF outlier detection.
Knowl. Inf. Syst., 2015
Handoff optimization and load balancing in wireless LANs using association control.
Int. J. Commun. Syst., 2015
Selectable sensing period optimisation for energy-constrained cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
Joint relay assignment and bandwidth allocation for all-to-one communication in cooperative networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers.
IET Commun., 2015
Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks.
CoRR, 2015
Distributed Compressed Sensing in Vehicular Ad-hoc Network.
Ad Hoc Sens. Wirel. Networks, 2015
Spectrum Allocation Mechanisms in Wireless Networks with Performance Guarantee.
Ad Hoc Sens. Wirel. Networks, 2015
(Invited) popularity-based content replication scheme for wireless mesh network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
A solution of splittable large flow scheduling based on MCMF in software defined network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
Achieving primary secrecy in energy harvesting CRNs using stackelberg game.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
iProtect: Detecting Physical Assault Using Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Private Range Queries on Outsourced Databases.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Privacy-Preserving Naive Bayes Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2015
Recognizing the Operating Hand from Touchscreen Traces on Smartphones.
Proceedings of the Knowledge Science, Engineering and Management, 2015
Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Secure double spectrum auctions.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Privacy preserving big histogram aggregation for spatial crowdsensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Minimizing response latency via efficient virtual machine placement in cloud systems.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Multi-task assignment for crowdsensing in mobile social networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
ITSEC: An information-theoretically secure framework for truthful spectrum auctions.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Planning Battery Swapping Stations for Urban Electrical Taxis.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
A mechanism for reducing flow tables in software defined network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Rule Anomalies Detecting and Resolving for Software Defined Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Towards Preserving Worker Location Privacy in Spatial Crowdsourcing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Queuing-Theoretical Multi-user Spectrum Sensing and Access in Multi-channel Cognitive Radio Networks.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015
Efficient Privacy-Preserving Aggregation for Mobile Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
Protecting Location Privacy in Spatial Crowdsourcing.
Proceedings of the Web Technologies and Applications, 2015
2014
Providing reliable and real-time delivery in the presence of body shadowing in breadcrumb systems.
ACM Trans. Embed. Comput. Syst., 2014
Community-Aware Opportunistic Routing in Mobile Social Networks.
IEEE Trans. Computers, 2014
A novel distributed covert channel in HTTP.
Secur. Commun. Networks, 2014
SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications.
Pers. Ubiquitous Comput., 2014
Processing Mutliple Requests to Construct Skyline Composite Services.
J. Web Eng., 2014
Improvement of a Lattice-based Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2014
Emerging Applications for Cyber Transportation Systems.
J. Comput. Sci. Technol., 2014
Security Analysis of a fuzzy Identity-Based Encryption Scheme.
J. Circuits Syst. Comput., 2014
One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity.
Int. J. Netw. Secur., 2014
On the security of an enhanced signature scheme.
Int. J. Inf. Commun. Technol., 2014
Practical certificateless short signature scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014
Distributed compressed sensing in wireless local area networks.
Int. J. Commun. Syst., 2014
Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme.
Fundam. Informaticae, 2014
A novel anonymous authentication scheme without cryptography.
Trans. Emerg. Telecommun. Technol., 2014
Efficient Identity-Based Signature from Lattices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Shared relay assignment (SRA) for many-to-one traffic in cooperative wireless transmissions.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Replica placement in content delivery networks with stochastic demands and M/M/1 servers.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
A combinatorial double auction mechanism for cloud resource group-buying.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Enabling efficient access control with dynamic policy updating for big data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Data-driven traffic flow analysis for vehicular communications.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Fairness-aware shared relay assignment for cooperative communications.
Proceedings of the IEEE International Conference on Communications, 2014
Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks.
Proceedings of the IEEE Computers, 2014
A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
Topology Control with vMIMO Communication in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions.
IEEE Trans. Wirel. Commun., 2013
Coalitional Game for Community-Based Autonomous Web Services Cooperation.
IEEE Trans. Serv. Comput., 2013
An incentive energy-efficient routing for data gathering in wireless cooperative networks.
Telecommun. Syst., 2013
Secret sharing based on quantum Fourier transform.
Quantum Inf. Process., 2013
Quantum state sharing against the controller's cheating.
Quantum Inf. Process., 2013
A Fine-grained Hop-count Based Localization Algorithm for Wireless Sensor Networks.
J. Comput., 2013
An energy-efficient opportunistic relay assignment in wireless cooperative networks.
Int. J. Sens. Networks, 2013
Energy-efficient tree-based cooperative data aggregation for wireless sensor networks.
Int. J. Sens. Networks, 2013
Efficient hierarchical identity-based signatures from lattices.
Int. J. Electron. Secur. Digit. Forensics, 2013
Lattice-based message recovery signature schemes.
Int. J. Electron. Secur. Digit. Forensics, 2013
Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
Int. J. Distributed Sens. Networks, 2013
R-MAC: Risk-Aware Dynamic MAC Protocol for Vehicular Cooperative Collision Avoidance System.
Int. J. Distributed Sens. Networks, 2013
Depth Mapping for Stereoscopic Videos.
Int. J. Comput. Vis., 2013
Cryptanalysis of a certificateless signature scheme without pairings.
Int. J. Commun. Syst., 2013
Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets
CoRR, 2013
A Truthful and Capacity-Aware Routing Protocol for Wireless Cooperative Networks.
Ad Hoc Sens. Wirel. Networks, 2013
Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks.
Ad Hoc Sens. Wirel. Networks, 2013
Near optimal scheduling of data aggregation in wireless sensor networks.
Ad Hoc Networks, 2013
Design and implementation of a testbed for WSNs monitoring aquatic environment.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013
A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013
Achieving Handoff Optimization and Throughput Efficiency in Vehicular Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013
Steganalysis of Compressed Speech Based on Markov and Entropy.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Topology and Link quality-aware Geographical opportunistic routing in wireless ad-hoc networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications.
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
On-road ads delivery scheduling and bandwidth allocation in vehicular CPS.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Homing spread: Community home-based multi-copy routing in mobile social networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Bandwidth-Power Aware Cooperative Multipath Routing for Wireless Multimedia Sensor Networks.
IEEE Trans. Wirel. Commun., 2012
Performance Analysis of Wireless Sensor Networks With Mobile Sinks.
IEEE Trans. Veh. Technol., 2012
On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays.
IEEE Trans. Veh. Technol., 2012
Degree-bounded minimum spanning tree for unit disk graph.
Theor. Comput. Sci., 2012
Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.
Quantum Inf. Process., 2012
Privacy-Preserving OLAP for Accurate Answer.
J. Circuits Syst. Comput., 2012
Flow-Based Transmission Scheduling in Constrained Delay Tolerant Networks.
J. Comput., 2012
Cooperative relay assignment for static energy-constrained networks.
Int. J. Sens. Networks, 2012
Security of a Biometric Identity-based Encryption Scheme.
Int. J. Netw. Secur., 2012
A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
Int. J. Netw. Secur., 2012
Breaking A Proxy Signature Scheme From Lattices.
Int. J. Netw. Secur., 2012
Truthful Relay Assignment for Cooperative Communication in Wireless Networks with Selfish Source-Destination Pairs.
Int. J. Distributed Sens. Networks, 2012
Optimal relay assignment for fairness in wireless cooperative networks.
Int. J. Ad Hoc Ubiquitous Comput., 2012
More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis
CoRR, 2012
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions
CoRR, 2012
Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks
CoRR, 2012
On the Security of an identity-based short signature scheme
CoRR, 2012
A new scheme for covert communication via 3G encoded speech.
Comput. Electr. Eng., 2012
An Adaptive Collision-Free MAC protocol based on TDMA for Inter-Vehicular communication.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012
Compressive Sensing based on local regional data in Wireless Sensor Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
A novel system design and implementation for realtime sensing and warning of roadway hazards round-the-clock.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012
Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Capacity of distributed content delivery in large-scale wireless ad hoc networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Shapley Value Based Impression Propagation for Reputation Management in Web Service Composition.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Integrated Traffic-Driving-Networking Simulator: A Unique R&D Tool for Connected Vehicles.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012
An Incremental BP Neural Network Based Spurious Message Filter for VANET.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Fast fourier transform based ip traffic classification system for SIPTO at H(e)NB.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Inf. Process., 2011
Asymmetric multi-party quantum state sharing of an arbitrary <i>m</i>-qubit state.
Quantum Inf. Process., 2011
Detection of substitution-based linguistic steganography by relative frequency analysis.
Digit. Investig., 2011
Steganalysis against substitution-based linguistic steganography based on context clusters.
Comput. Electr. Eng., 2011
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011
Quality Driven Web Services Replication Using Directed Acyclic Graph Coding.
Proceedings of the Web Information System Engineering - WISE 2011, 2011
A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
A Stable Joint Routing and Spectrum Scheduling Scheme for Cognitive Radio Ad Hoc Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS.
Proceedings of IEEE International Conference on Communications, 2011
2010
Joint relay assignment and power allocation for cooperative communications.
Wirel. Networks, 2010
FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services.
IEEE Trans. Serv. Comput., 2010
Energy-efficient cooperative data aggregation for wireless sensor networks.
J. Parallel Distributed Comput., 2010
Efficient protocols for point-convex hull inclusion decision problems.
J. Networks, 2010
Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
J. Comput., 2010
A Survey of Web Services Provision.
Int. J. Syst. Serv. Oriented Eng., 2010
Insurance-Based Business Web Services Composition.
Int. J. Organ. Collect. Intell., 2010
A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010
Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
One-pass key establishment for anonymous wireless roaming.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2010
Efficient Wireless Broadcasting Using Onion Decoding.
Proceedings of the Wireless Algorithms, 2010
A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010
Blind Linguistic Steganalysis against Translation Based Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Joint power allocation and relay assignment for max-min fairness in cooperative networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010
Passive interference measurement in Wireless Sensor Networks.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010
Maximal Lifetime Scheduling for Cooperative Communications in Wireless Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
Interference-Aware Relay Assignment for Cooperative Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
Reputation-Driven Recommendation of Services with Uncertain QoS.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
A Chinese Handwriting Education System with Automatic Error Detection.
J. Softw., 2009
Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks.
J. Comput. Sci. Technol., 2009
Constraints-Aware Scheduling for Transactional Services Composition.
J. Comput. Sci. Technol., 2009
Minimizing transmission time in 802.16-based multi-channel mesh networks.
Int. J. Pervasive Comput. Commun., 2009
Topology control for delay-constraint data collection in wireless sensor networks.
Comput. Commun., 2009
Practical indoor tracking using Wireless Sensor Networks.
Proceedings of the 6th Workshop on Positioning, Navigation and Communication, 2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Privacy Preserving Attribute Reduction Based on Rough Set.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
A fine-grained localization algorithm in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Location-Independent Topology Control and Implementation for Wireless Sensor Networks.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009
Spanner-Aware Relay Node Placement in Wireless Ad Hoc Sensor Networks.
Proceedings of the MSN 2009, 2009
Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Hiding Information by Context-Based Synonym Substitution.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Consistent Message Ordering in Wireless Sensor and Actor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Web services provision: solutions, challenges and opportunities (invited paper).
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
A Transmit Antenna Selection for MIMO Wireless Ad-Hoc Networks in Lossy Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
A Storage Node Placement Algorithm in Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2008
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks.
Comput. Commun., 2008
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links.
Comput. Commun., 2008
A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
QoS-Aware Scheduling of Web Services.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Delay-constraint topology control in wireless sensor networks format.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
A Tracking Range Based Ant-Colony Routing Protocol for Mobile Wireless.
Proceedings of the MSN 2008, 2008
Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks.
Proceedings of the MSN 2008, 2008
Swarm intelligence: Coverage and connectivity control for mobile sensors.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Topology control for minimal path interference in wireless sensor networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008
Energy-Efficient Location-Independent <i>k</i> -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008
Building Profit-Aware Service-Oriented Business Applications.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Building QKD Networks Based On a Novel QKD Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
NBLS: Neighbor-information-based localization system for wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008
Privacy-preserving Protocols for Finding the Convex Hulls.
Proceedings of the The Third International Conference on Availability, 2008
2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007
An efficient synchronisation protocol for wireless sensor network.
Int. J. Sens. Networks, 2007
Centralized Scheduling and Channel Assignment in Multi-Channel Single-Transceiver WiMax Mesh Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Coverage-preserving Data Gathering in Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Privacy-preserving technology and its applications in statistics measurements.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Wireless fire monitoring system for ancient buildings.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Privacy-preserving collision detection of two circles.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
A hybrid range-free localization scheme in wireless sensor networks work in progress.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Privacy-preserving statistical quantitative rules mining.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Quantum Oblivious Transfer Using Tripartite Entangled States.
Proceedings of the Future Generation Communication and Networking, 2007
Wireless Sensor Networks for Intensive Irrigated Agriculture.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies.
J. Supercomput., 2006
Coverage and Exposure Paths in Wireless Sensor Networks.
J. Comput. Sci. Technol., 2006
Fault-Tolerant Orchestration of Transactional Web Services.
Proceedings of the Web Information Systems, 2006
QoS-Aware Web Services Composition Using Transactional Composition Operator.
Proceedings of the Advances in Web-Age Information Management, 2006
Self-organization Data Gathering for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Quantum ANDOS Protocol with Unconditional Security.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data.
Proceedings of the Grid and Cooperative Computing, 2006
Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Localized Algorithm for Coverage in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Accurate Time Synchronization for Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Multimedia object placement for hybrid transparent data replication.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Arm up Administrators: Automated Vulnerability Management.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
2003
Automated Vulnerability Management through Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Common Vulnerability Markup Language.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4.
J. Comput. Sci. Technol., 2002
Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms.
J. Comb. Optim., 2002
2000
A Fast Algorithm for Mining Association Rules.
J. Comput. Sci. Technol., 2000
1996
Experimental Video Database Management System Based on Advanced Object-Oriented Techniques.
Proceedings of the Storage and Retrieval for Still Image and Video Databases IV, 1996
1995
A Dynamic Data Model for a Video Database Management System.
ACM Comput. Surv., 1995