Fangming Zhao

Orcid: 0000-0003-4000-3428

According to our database1, Fangming Zhao authored at least 19 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Energy-Aware Random Access Networks: Connection-Based Versus Packet-Based.
IEEE Commun. Lett., September, 2024

Optimizing Information Freshness in Mobile Networks with Age-Threshold ALOHA.
Proceedings of the IEEE International Symposium on Information Theory, 2024

The Correlation Analysis Between Cybersickness and Postural Behavior in Immersive VR Experience.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Age-Threshold Slotted ALOHA for Optimizing Information Freshness in Mobile Networks.
CoRR, 2023

2022
Age-Energy Tradeoff in Random-Access Poisson Networks.
IEEE Trans. Green Commun. Netw., 2022

Optimizing Age of Information in Random-Access Poisson Networks.
IEEE Internet Things J., 2022

AoI-Constrained Energy Efficiency Optimization in Random-Access Poisson Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Information Freshness in Random-Access Poisson Network: Average AoI versus Peak AoI.
Proceedings of the 96th Vehicular Technology Conference, 2022

2016
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage.
IEICE Trans. Inf. Syst., 2016

Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.
Proceedings of the Network and System Security - 10th International Conference, 2016

2014
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search.
IEICE Trans. Inf. Syst., 2014

2012
Secure authenticated key exchange with revocation for smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.
Proceedings of the International Conference on IT Convergence and Security, 2012

2011
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2011

Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Analysis of Existing Privacy-Preserving Protocols in Domain Name System.
IEICE Trans. Inf. Syst., 2010

Channel borrowing based channel allocation scheme and performance analysis for wireless overlay networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

2007
Analysis of Privacy Disclosure in DNS Query.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007


  Loading...