Guojun Wang
Orcid: 0000-0001-9875-4182Affiliations:
- Guangzhou University, School of Computer Science and Technology, China
- Hong Kong Polytechnic University (former)
- Central South University, Changsha, China (PhD 2002)
According to our database1,
Guojun Wang
authored at least 507 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Int. J. Inf. Sec., February, 2025
EAOS: Exposing attacks in smart contracts through analyzing opcode sequences with operands.
Comput. Networks, 2025
2024
A smart contract vulnerability detection method based on deep learning with opcode sequences.
Peer Peer Netw. Appl., September, 2024
IEEE Trans. Knowl. Data Eng., July, 2024
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024
IEEE Internet Things J., July, 2024
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning.
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Mob. Comput., May, 2024
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases.
IEEE Trans. Knowl. Data Eng., May, 2024
IEEE Trans. Netw. Serv. Manag., April, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation.
Multim. Tools Appl., March, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments.
IEEE Trans. Dependable Secur. Comput., 2024
Efficient task offloading with swarm intelligence evolution for edge-cloud collaboration in vehicular edge computing.
Softw. Pract. Exp., 2024
CLFLDP: Communication-efficient layer clipping federated learning with local differential privacy.
J. Syst. Archit., 2024
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing.
J. Netw. Comput. Appl., 2024
Connect. Sci., 2024
Comput. Commun., 2024
Comput. Commun., 2024
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model.
Comput. Electr. Eng., 2024
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
J. Syst. Archit., November, 2023
Prediction of Parkinson's disease based on artificial neural networks using speech datasets.
J. Ambient Intell. Humaniz. Comput., October, 2023
Future Gener. Comput. Syst., August, 2023
Inf. Sci., April, 2023
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Dependable Secur. Comput., 2023
PeerJ Comput. Sci., 2023
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse.
J. Syst. Archit., 2023
IEEE Internet Things J., 2023
Concurr. Comput. Pract. Exp., 2023
A new federated learning-based wireless communication and client scheduling solution for combating COVID-19.
Comput. Commun., 2023
Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and U<sup>EN</sup>-PDNet.
IEEE Access, 2023
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory.
IEEE Access, 2023
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Ubiquitous Security, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
FL-HSDP: Client-Side Defense for Federated Learning via Hessian Optimization and Shuffled Differential Privacy.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
2022
IEEE Trans. Serv. Comput., 2022
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search.
IEEE Trans. Serv. Comput., 2022
ACM Trans. Internet Techn., 2022
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking.
J. Supercomput., 2022
Multim. Tools Appl., 2022
Cognitive population initialization for swarm intelligence and evolutionary computing.
J. Ambient Intell. Humaniz. Comput., 2022
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating.
IEEE Internet Things J., 2022
Research on Ni<sub>3</sub>Sn<sub>4</sub> intermetallic compound for 5μm diameter Cu/Ni/Sn-3.0Ag micro bumps.
IEICE Electron. Express, 2022
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications.
Future Gener. Comput. Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
Concurr. Comput. Pract. Exp., 2022
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks.
Ad Hoc Networks, 2022
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing.
Wirel. Pers. Commun., 2021
Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer's View.
ACM Trans. Web, 2021
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios.
ACM Trans. Web, 2021
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2021
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services.
IEEE Trans. Netw. Sci. Eng., 2021
Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level.
ACM Trans. Knowl. Discov. Data, 2021
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
In-network generalized trustworthy data collection for event detection in cyber-physical systems.
PeerJ Comput. Sci., 2021
J. Syst. Archit., 2021
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021
Maximizing positive influence in competitive social networks: A trust-based solution.
Inf. Sci., 2021
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities.
Neurocomputing, 2021
Future Gener. Comput. Syst., 2021
Comput. Stand. Interfaces, 2021
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system.
Concurr. Comput. Pract. Exp., 2021
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage.
Comput. Commun., 2021
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
Wirel. Pers. Commun., 2020
Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations.
Wirel. Pers. Commun., 2020
SDN based communications privacy-preserving architecture for VANETs using fog computing.
Veh. Commun., 2020
ACM Trans. Internet Techn., 2020
Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications.
IEEE Trans. Ind. Informatics, 2020
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020
IEEE Trans. Big Data, 2020
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks.
Sci. Program., 2020
Fast curvelet transform through genetic algorithm for multimodal medical image fusion.
Soft Comput., 2020
J. Parallel Distributed Comput., 2020
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones.
J. Netw. Comput. Appl., 2020
J. Intell. Fuzzy Syst., 2020
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020
Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications.
Inf. Sci., 2020
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Cloud-based service oriented architecture for social vehicular ad hoc network communications.
Int. J. Commun. Networks Distributed Syst., 2020
CoRR, 2020
Detecting Straggler MapReduce Tasks in Big Data Processing Infrastructure by Neural Network.
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Concurr. Comput. Pract. Exp., 2020
An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City.
Comput. Electr. Eng., 2020
IEEE Access, 2020
Service Composition and Optimal Selection in Cloud Manufacturing: State-of-the-Art and Research Challenges.
IEEE Access, 2020
Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering.
IEEE Access, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020
Prediction of Parkinson's Disease using Principal Component Analysis and the Markov Chains.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020
Proceedings of the 18th IEEE International Conference on Embedded and Ubiquitous Computing, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020
Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020
2019
Veh. Commun., 2019
IEEE Trans. Sustain. Comput., 2019
Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing.
ACM Trans. Sens. Networks, 2019
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling.
IEEE Trans. Dependable Secur. Comput., 2019
A channel-aware expected energy consumption minimization strategy in wireless networks.
Soft Comput., 2019
Generic attribute revocation systems for attribute-based encryption in cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019
J. Parallel Distributed Comput., 2019
Influence maximization by leveraging the crowdsensing data in information diffusion network.
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
Int. J. Comput. Sci. Eng., 2019
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019
An adaptive and configurable protection framework against android privilege escalation threats.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking.
Comput. Secur., 2019
A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues.
Ad Hoc Sens. Wirel. Networks, 2019
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019
Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures.
IEEE Access, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier Transform.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing.
IEEE Trans. Emerg. Top. Comput. Intell., 2018
A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018
Secur. Commun. Networks, 2018
IEEE Internet Things J., 2018
Int. J. Embed. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Commun. Mag., 2018
IEEE Access, 2018
Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators.
IEEE Access, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph.
Proceedings of the 2018 IEEE SmartWorld, 2018
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.
Proceedings of the 2018 IEEE SmartWorld, 2018
A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
A Survey of Modern Gene Expression Based Techniques for Cancer Detection and Diagnosis.
Proceedings of the Soft Computing Applications, 2018
Proceedings of the Soft Computing Applications, 2018
"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors.
Proceedings of the Soft Computing Applications, 2018
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the International Conference on Data Processing and Applications, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distributed Syst., 2017
Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks.
IEEE Trans. Ind. Informatics, 2017
IEEE Trans. Dependable Secur. Comput., 2017
Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities.
ACM Trans. Cyber Phys. Syst., 2017
e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems.
ACM Trans. Auton. Adapt. Syst., 2017
IEEE Syst. J., 2017
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges.
IEEE Netw., 2017
J. Netw. Comput. Appl., 2017
Inf. Sci., 2017
Int. J. High Perform. Comput. Netw., 2017
Int. J. Distributed Sens. Networks, 2017
Int. J. Comput. Sci. Eng., 2017
A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments.
Int. J. Auton. Adapt. Commun. Syst., 2017
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017
Comput. Sci. Eng., 2017
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures.
Concurr. Comput. Pract. Exp., 2017
Comput. Methods Programs Biomed., 2017
Comput. Electr. Eng., 2017
Acta Informatica, 2017
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Proceedings of the 14th International Symposium on Pervasive Systems, 2017
Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Wirel. Commun. Mob. Comput., 2016
Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring.
IEEE Trans. Ind. Informatics, 2016
IEEE Trans. Computers, 2016
Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics.
IEEE Trans. Computers, 2016
Int. J. Parallel Emergent Distributed Syst., 2016
Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks.
IEEE Internet Things J., 2016
An efficient spatial query processing algorithm in multi-sink wireless sensor networks.
Int. J. Sens. Networks, 2016
Int. J. Auton. Adapt. Commun. Syst., 2016
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Commun. Lett., 2016
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph.
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges.
ACM Comput. Surv., 2016
Decentralized group key management for hierarchical access control using multilinear forms.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the 9th International Symposium on Visual Information Communication and Interaction, 2016
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016
Proceedings of the 45th International Conference on Parallel Processing Workshops, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Advances in Services Computing, 2016
Proceedings of the Advances in Services Computing, 2016
Proceedings of the Advances in Services Computing, 2016
Proceedings of the Advances in Services Computing, 2016
Proceedings of the Advances in Services Computing, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
ACM Trans. Internet Techn., 2015
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring.
IEEE Trans. Computers, 2015
κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph.
Inf. Sci., 2015
Int. J. Sens. Networks, 2015
Int. J. High Perform. Comput. Netw., 2015
Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring.
Int. J. Embed. Syst., 2015
Int. J. Distributed Sens. Networks, 2015
A weighted throttled load balancing approach for virtual machines in cloud environment.
Int. J. Comput. Sci. Eng., 2015
Int. J. Auton. Adapt. Commun. Syst., 2015
Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Streaming Computing Technology for Android Applications: Design Model and Case Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 12th Web Information System and Application Conference, 2015
2014
Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming.
Wirel. Commun. Mob. Comput., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
ACM Trans. Sens. Networks, 2014
IEEE Trans. Netw. Serv. Manag., 2014
Peer-to-Peer Netw. Appl., 2014
J. Comput. Syst. Sci., 2014
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014
A distributed resource conservation multicast and spectrum allocation algorithm in cognitive wireless mesh networks.
Int. J. Embed. Syst., 2014
Int. J. Embed. Syst., 2014
Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks.
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Comput. Secur., 2014
Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Comput. Secur., 2014
Comput. Networks, 2014
Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the 11th Web Information System and Application Conference, 2014
2013
J. Supercomput., 2013
J. Comput. Syst. Sci., 2013
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013
IET Inf. Secur., 2013
Concurr. Comput. Pract. Exp., 2013
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
IEEE Trans. Netw. Serv. Manag., 2012
J. Netw. Comput. Appl., 2012
Fault tolerance analysis of mesh networks with uniform versus nonuniform node failure probability.
Inf. Process. Lett., 2012
Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012
Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2011
Secur. Commun. Networks, 2011
Future Gener. Comput. Syst., 2011
Concurr. Comput. Pract. Exp., 2011
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks.
J. Supercomput., 2010
IEICE Trans. Inf. Syst., 2010
Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2010
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
J. Supercomput., 2009
J. Comput. Sci. Technol., 2009
J. Comput., 2009
Int. J. Ad Hoc Ubiquitous Comput., 2009
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
Int. J. Ad Hoc Ubiquitous Comput., 2009
IEICE Trans. Inf. Syst., 2009
Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Square region-based coverage and connectivity probability model in wireless sensor networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks.
IEEE Trans. Computers, 2007
J. Parallel Distributed Comput., 2007
Energy-Efficient Dual Prediction-Based Data Gathering for Environmental Monitoring Applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007
A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
Scalable key management for secure multicast communication in the mobile environment.
Pervasive Mob. Comput., 2006
A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks.
Comput. Commun., 2006
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of IEEE International Conference on Communications, 2006
A Proxy-based Mobile Group Membership Protocol for Large Scale and Highly Dynamic Groups.
Proceedings of IEEE International Conference on Communications, 2006
2005
Wirel. Commun. Mob. Comput., 2005
Parallel Algorithms Appl., 2005
J. Interconnect. Networks, 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2005
2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004
Proceedings of the 33rd International Conference on Parallel Processing (ICPP 2004), 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003
2002
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results.
IEEE Trans. Computers, 2002
2001
J. Interconnect. Networks, 2001