Huiqiang Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Surgical Strike on 5G Positioning: Selective-PRS-Spoofing Attacks and Its Defence.
IEEE J. Sel. Areas Commun., October, 2024

The Influence of Clutching Mechanism on Object Manipulation Tasks in Virtual Environments.
Int. J. Hum. Comput. Interact., September, 2024

Localization-Oriented Digital Twinning in 6G: A New Indoor-Positioning Paradigm and Proof-of-Concept.
IEEE Trans. Wirel. Commun., August, 2024

A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information.
Int. J. Softw. Eng. Knowl. Eng., July, 2024

Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System.
IEEE Trans. Inf. Forensics Secur., 2024

Simultaneous Estimation of Subcanopy Topography and Forest Height With Single-Baseline Single-Polarization TanDEM-X Interferometric Data Combined With ICESat-2 Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

An online integrated satellite-terrestrial IoT task offloading and service deployment strategy.
Internet Things, 2024

MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension.
Comput. Secur., 2024

Two-timescale joint service caching and resource allocation for task offloading with edge-cloud cooperation.
Comput. Networks, 2024

High-Precision Indoor Positioning via 5G NR: An Interpretable GNN-based Method.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

E-LDAC: A High-Accuracy Method for Predicting Bursty Latency in 5G Networks.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Self-Prompt Mechanism for Few-Shot Image Recognition.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
CHAT: Accurate Network Latency Measurement for 5G E2E Networks.
IEEE/ACM Trans. Netw., December, 2023

A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection.
J. Cloud Comput., December, 2023

Joint mixed-timescale optimization of content caching and delivery policy in NOMA-based vehicular networks.
Comput. Networks, December, 2023

Emergency task offloading strategy based on cloud-edge-end collaboration for smart factories.
Comput. Networks, October, 2023

A joint optimization scheme of task caching and offloading for smart factories.
J. Supercomput., September, 2023

An attention-based automatic vulnerability detection approach with GGNN.
Int. J. Mach. Learn. Cybern., September, 2023

A DL-Based High-Precision Positioning Method in Challenging Urban Scenarios for B5G CCUAVs.
IEEE J. Sel. Areas Commun., June, 2023

A joint strategy for service deployment and task offloading in satellite-terrestrial IoT.
Comput. Networks, April, 2023

TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system.
Clust. Comput., February, 2023

Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Bidformer: A Transformer-Based Model via Bidirectional Sparse Self-Attention Mechanism for Long Sequence Time-Series Forecasting.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Your Locations May Be Lies: Selective-PRS-Spoofing Attacks and Defence on 5G NR Positioning Systems.
Proceedings of the IEEE INFOCOM 2023, 2023

MICN: Multi-scale Local and Global Context Modeling for Long-term Series Forecasting.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Make Active Attention More Active: Using Lipschitz Regularity to Improve Long Sequence Time-Series Forecasting.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

Detformer: Detect the Reliable Attention Index for Ultra-long Time Series Forecasting.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

Hierarchical Contrastive Learning for CSI-Based Fingerprint Localization.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

2022
CSI Dataset towards 5G NR High-Precision Positioning.
Dataset, May, 2022

Evaluating the Effects of Non-Isomorphic Rotation on 3D Manipulation Tasks in Mixed Reality Simulation.
IEEE Trans. Vis. Comput. Graph., 2022

Exploring Sonification Mapping Strategies for Spatial Auditory Guidance in Immersive Virtual Environments.
ACM Trans. Appl. Percept., 2022

Individual Tree Detection in Coal Mine Afforestation Area Based on Improved Faster RCNN in UAV RGB Images.
Remote. Sens., 2022

Toward 5G NR High-Precision Indoor Positioning via Channel Frequency Response: A New Paradigm and Dataset Generation Method.
IEEE J. Sel. Areas Commun., 2022

Split Time Series into Patches: Rethinking Long-term Series Forecasting with Dateformer.
CoRR, 2022

A vertical handoff decision scheme using subjective-objective weighting and grey relational analysis in cognitive heterogeneous networks.
Ad Hoc Networks, 2022

Effects of Clutching Mechanism on Remote Object Manipulation Tasks.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022

2021
Correction of Time-Varying Baseline Errors Based on Multibaseline Airborne Interferometric Data Without High-Precision DEMs.
IEEE Trans. Geosci. Remote. Sens., 2021

Applicable Image Security Based on New Hyperchaotic System.
Symmetry, 2021

An Automatic Source Code Vulnerability Detection Approach Based on KELM.
Secur. Commun. Networks, 2021

From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Parameterized Modeling and Calibration for Orbital Error in TanDEM-X Bistatic SAR Interferometry over Complex Terrain Areas.
Remote. Sens., 2021

SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing.
Peer-to-Peer Netw. Appl., 2021

Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME.
Proceedings of the Knowledge Science, Engineering and Management, 2021

2020
An Attribute-Based Availability Model for Large Scale IaaS Clouds with CARMA.
IEEE Trans. Parallel Distributed Syst., 2020

A near-optimal content placement in D2D underlaid cellular networks.
Peer-to-Peer Netw. Appl., 2020

A multi-user multi-operator computing pricing method for Internet of things based on bi-level optimization.
Int. J. Distributed Sens. Networks, 2020

A method of fingerprint indoor localization based on received signal strength difference by using compressive sensing.
EURASIP J. Wirel. Commun. Netw., 2020

A cognitive wireless networks access selection algorithm based on MADM.
Ad Hoc Networks, 2020

A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Dynamic fault handling and reconfiguration for industrial automation systems.
PhD thesis, 2019

PUEGM: A Method of User Revenue Selection Based on a Publisher-User Evolutionary Game Model for Mobile Crowdsensing.
Sensors, 2019

UAV-assisted wireless relay networks for mobile offloading and trajectory optimization.
Peer-to-Peer Netw. Appl., 2019

A near-optimal cloud offloading under multi-user multi-radio environments.
Peer-to-Peer Netw. Appl., 2019

RealPot: an immersive virtual pottery system with handheld haptic devices.
Multim. Tools Appl., 2019

Modeling and Robust Estimation for the Residual Motion Error in Airborne SAR Interferometry.
IEEE Geosci. Remote. Sens. Lett., 2019

An effective method for service components selection based on micro-canonical annealing considering dependability assurance.
Frontiers Comput. Sci., 2019

A fusion optimization algorithm of network element layout for indoor positioning.
EURASIP J. Wirel. Commun. Netw., 2019

A Near-Optimal Resource Allocation Approach to Computation Offloading Under D2D Communications.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Unsupervised Feature Learning With Distributed Stacked Denoising Sparse Autoencoder for Abnormal Behavior Detection Using Apache Spark.
Proceedings of the IEEE 2nd International Conference on Knowledge Innovation and Invention, 2019

Joint Uplink and Downlink Optimization for Resource Allocation Under D2D Communication Networks.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

A Near-Optimal Heterogeneous Task Allocation Scheme for Mobile Crowdsensing.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

2018
A User Recognition Strategy Under Mobile Cloud Environment.
Wirel. Pers. Commun., 2018

A Wavelet Decomposition and Polynomial Fitting-Based Method for the Estimation of Time-Varying Residual Motion Error in Airborne Interferometric SAR.
IEEE Trans. Geosci. Remote. Sens., 2018

NWBBMP: a novel weight-based buffer management policy for DTN routing protocols.
Peer-to-Peer Netw. Appl., 2018

一种面向室内定位的基站选择优化方法 (Base Station Selection Optimization Method Oriented at Indoor Positioning).
计算机科学, 2018

RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight.
Int. J. Distributed Sens. Networks, 2018

A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment.
Future Gener. Comput. Syst., 2018

A Delay Tolerant Network Routing Policy Based on Optimized Control Information Generation Method.
IEEE Access, 2018

ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes' Selfishness.
IEEE Access, 2018

Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark.
IEEE Access, 2018

Optimal Cooperative Wireless Communication for Mobile User Data Offloading.
IEEE Access, 2018

A joint optimization method for data offloading in D2D-enabled cellular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Abstract: An Indoor Localization Simulation Platform for Localization Accuracy Evaluation.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Cooperative Indoor Localization Method Based on Spatial Analysis.
Proceedings of the Data Science, 2018

A Heuristic Indoor Path Planning Method Based on Hierarchical Indoor Modelling.
Proceedings of the Data Science, 2018

A Non-Cooperative Game-Theoretical Approach to Mobile Data Offloading.
Proceedings of the IEEE Global Communications Conference, 2018

A Collision-Free Path Planning Approach for Multiple Robots Under Warehouse Scenarios.
Proceedings of the Wireless Sensor Networks - 12th China Conference, 2018

An Action Recognition Method Based on Wearable Sensors.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

A Decision Tree Candidate Property Selection Method Based on Improved Manifold Learning Algorithm.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China.
Remote. Sens., 2017

Underlying Topography Estimation over Forest Areas Using High-Resolution P-Band Single-Baseline PolInSAR Data.
Remote. Sens., 2017

Optimizing broadcast duration for layered video streams in cellular networks.
Peer-to-Peer Netw. Appl., 2017

Performance analysis and optimization for chunked network coding based wireless cooperative downloading systems.
Frontiers Inf. Technol. Electron. Eng., 2017

DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks.
Frontiers Inf. Technol. Electron. Eng., 2017

面向移动物联网的可信超网络概念及构架研究 (Concept and Architecture of Trustworthy Super Network for Mobile Internet of Things).
计算机科学, 2017

DCAR: DTN Congestion Avoidance Routing Algorithm Based on Tokens in an Urban Environment.
J. Sensors, 2017

Joint optimization of downlink and D2D transmissions for SVC streaming in cooperative cellular networks.
Neurocomputing, 2017

Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network.
Int. J. Distributed Sens. Networks, 2017

A Cooperative Abnormal Behavior Detection Framework Based on Big Data Analytics.
Proceedings of the Data Science, 2017

A Cooperative Optimization Method for Mobile User Data Offloading.
Proceedings of the Wireless Sensor Networks, 2017

2016
Spatio-Temporal Error Sources Analysis and Accuracy Improvement in Landsat 8 Image Ground Displacement Measurements.
Remote. Sens., 2016

服务器监控技术综述及展望 (Review and Prospect of Server Monitoring Technology).
计算机科学, 2016

An adaptive disorder-avoidance cooperative downloading method.
Comput. Networks, 2016

Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

MM-Sync: A Mobility Built-In Model Based Time Synchronization Approach for Underwater Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

A Dynamic Grouping-Based Trust Model for Mobile P2P Networks.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation.
Frontiers Inf. Technol. Electron. Eng., 2015

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Int. J. Web Serv. Res., 2015

An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An Availability Evaluation Method of Web Services Using Improved Grey Correlation Analysis with Entropy Difference and Weight.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Study on Measuring System of Casing Machine Based on PLC.
J. Networks, 2014

Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks.
J. Networks, 2014

A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks.
J. Commun., 2014

Spectrum Migration Approach Based on Pre-decision Aid and Interval Mamdani Fuzzy Inference in Cognitive Radio Networks.
Int. J. Comput. Commun. Control, 2014

An Adaptive Channel Sensing Approach Based on Sequential Order in Distributed Cognitive Radio Networks.
Proceedings of the Network and Parallel Computing, 2014

A search and summary application for traffic events detection based on Twitter data.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

A Heuristic Method of Attack Graph Analysis for Network Security Hardening.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

An Adaptive Channel Sensing Approach and its Analysis Based on Hierarchical Colored Petri Net in Distributed Cognitive Radio Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Random Network Coding Based Schemes for Perfect Wireless Packet Retransmission Problems in Multiple Channel Networks.
Wirel. Pers. Commun., 2013

Random network coding-based optimal scheme for perfect wireless packet retransmission problems.
Wirel. Commun. Mob. Comput., 2013

Research on Attack Graph Generation for Network Security Situation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach.
Wirel. Pers. Commun., 2012

Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

2011
Boosting video popularity through recommendation systems.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

End-to-end performance of network with coding-aware.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks.
J. Networks, 2010

2009
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus.
Proceedings of the Third International Conference on Network and System Security, 2009

Dynamic Self-configuration of User QoS for Next Generation Network.
Proceedings of the NPC 2009, 2009

Using Hessian Locally Linear Embedding for Autonomic Failure Prediction.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A Self-Recovery Method Based on Mixed Reboot.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

The Research and Design of the Belt Grinder which Based on PLC.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

2008
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.
J. Comput. Sci. Technol., 2008

An Optimization Approach to Restart Tree Based on Mean Failure Frequencies.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Research on Autonomic-Trusted Software Evaluation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Novel Approach of Alarm Classification for Intrusion Detection based upon Dempster-Shafer Theory.
Proceedings of the WEBIST 2007, 2007

An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Novel Situation Awareness Model for Network Systems' Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Experiment of Event Injection Technology for Network Dependability Evaluation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
A Computer Immune System: LAN Immune System Model based on Host (LISMH).
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Novel Quantitative Analysis Method for Network Survivability.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Bio-inspired Multidimensional Network Security Model.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

ERAS - an Emergency Response Algorithm for Survivability of Critical Services.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2006

Analysis of an Intelligent Agent Intrusion Response System.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition.
Proceedings of the Computer Science, 2006

Research and Design on Intelligent Agent Intrusion Response System.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

Mobile Agents for Network Intrusion Resistance.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

A New Bio-inspired Model for Network Security and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

A New Automatic Intrusion Response Taxonomy and Its Application.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Evaluation of Network Dependability Using Event Injection.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
A Comprehensive Bio-inspired Model for Network Security.
Proceedings of the 2005 International Conference on Semantics, 2005

A Holistic Approach to Survivable Distributed Information System for Critical Applications.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
Speech Hiding Based on Auditory Wavelet.
Proceedings of the Computational Science and Its Applications, 2004

IADIDF: A Framework for Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004

A Useful System Prototype for Intrusion Detection - Architecture and Experiments.
Proceedings of the Discovery Science, 7th International Conference, 2004

HMMs for Anomaly Intrusion Detection.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...