Jiguo Yu

Orcid: 0000-0001-6451-1158

According to our database1, Jiguo Yu authored at least 353 papers between 2007 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2022, "for contributions to data storage and processing in cloud and social environments".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reward-Oriented Task Offloading in Energy Harvesting Collaborative Edge Computing Systems.
IEEE Trans. Mob. Comput., December, 2024

A Collusion Attack Resistance Data Aggregation Scheme in Internet of Things.
IEEE Trans. Ind. Informatics, November, 2024

Secure Ultra-Reliable and Low Latency Communication in UAV-Enabled NOMA Wireless Networks.
IEEE Trans. Veh. Technol., October, 2024

HS-DCell: A Highly Scalable DCell-Based Server-Centric Topology for Data Center Networks.
IEEE/ACM Trans. Netw., October, 2024

A Novel Temporal Privacy-Preserving Model for Social Recommendation.
IEEE Trans. Comput. Soc. Syst., October, 2024

Efficient Deployment and Scheduling of Shared VNF Instances in Mobile Edge Computing Networks.
IEEE Internet Things J., October, 2024

BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things.
IEEE Trans. Netw. Serv. Manag., August, 2024

A Distributed Abstract MAC Layer for Cooperative Learning on Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., August, 2024

An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication.
IEEE Internet Things J., June, 2024

Multi-Agent Collaborative Caching Strategies in Dynamic Heterogeneous D2D Networks.
IEEE Trans. Veh. Technol., May, 2024

Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems.
IEEE Trans. Mob. Comput., May, 2024

MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors.
IEEE Trans. Computers, April, 2024

DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation.
IEEE Internet Things J., April, 2024

A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling.
IEEE/ACM Trans. Netw., February, 2024

A New Measure of Fault-Tolerance for Network Reliability: Double-Structure Connectivity.
IEEE/ACM Trans. Netw., February, 2024

A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse.
IEEE Trans. Consumer Electron., February, 2024

An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT.
IEEE Trans. Computers, January, 2024

Shortest Paths Publishing With Differential Privacy.
IEEE Trans. Sustain. Comput., 2024

A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2024

Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid.
IEEE Trans. Cloud Comput., 2024

Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Wireless Portable Dry Electrode Multi-channel sEMG Acquisition System.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

InceptionNeXt Network with Relative Position Information for Microexpression Recognition.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Dual-Fisheye Image Stitching via Unsupervised Deep Learning.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

Research on Node Cluster Analysis in Brain Connection Data.
Proceedings of the Knowledge Science, Engineering and Management, 2024

FedLRDP: Federated Learning Framework with Local Random Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2024

Improvement of Low-Contrast Objective Detecting Capability for YOLOv5 Based on Receptive Field Enhancement and Redundant Feature Reuse.
Proceedings of the International Joint Conference on Neural Networks, 2024

NVCGAN: Leveraging Generative Adversarial Networks for Robust Voice Conversion.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information Supplementation.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Decentralized Parallel SGD Based on Weight-Balancing for Intelligent IoV.
IEEE Trans. Intell. Transp. Syst., December, 2023

Distributed Age-of-Information optimization in edge computing for Internet of Vehicles.
J. Syst. Archit., November, 2023

DP2-Pub: Differentially Private High-Dimensional Data Publication With Invariant Post Randomization.
IEEE Trans. Knowl. Data Eng., October, 2023

A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management.
IEEE Internet Things J., October, 2023

Cooperative jamming aided securing wireless communications without CSI of eavesdroppers.
Comput. Networks, October, 2023

A Distributed Privacy-Preserving Learning Dynamics in General Social Networks.
IEEE Trans. Knowl. Data Eng., September, 2023

A Minimizing Energy Consumption Scheme for Real-Time Embedded System Based on Metaheuristic Optimization.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2023

A Fast Consensus for Permissioned Wireless Blockchains.
IEEE Internet Things J., July, 2023

The Impact of Mobility on Physical Layer Security of 5G IoT Networks.
IEEE/ACM Trans. Netw., June, 2023

Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data.
IEEE Trans. Netw. Serv. Manag., June, 2023

Massive MIMO and Secrecy Guard Zone Based Improving Physical Layer Security in UAV-Enabled uRLLC Networks.
IEEE Trans. Veh. Technol., April, 2023

Jamming-Resilient Message Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., March, 2023

Efficiency and inefficiency of Nash equilibrium for scheduling games on batching-machines with activation cost.
Theor. Comput. Sci., March, 2023

An Efficient Revocable and Searchable MA-ABE Scheme With Blockchain Assistance for C-IoT.
IEEE Internet Things J., February, 2023

Distributed optimization for intelligent IoT under unstable communication conditions.
Comput. Commun., February, 2023

Delay-Optimized Multicast Tree Packing in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2023

Applications of Differential Privacy in Social Network Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2023

CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

Trustworthy sealed-bid auction with low communication cost atop blockchain.
Inf. Sci., 2023

Secure-ISAC: Secure V2X Communication: An Integrated Sensing and Communication Perspective.
CoRR, 2023

Temporal Feature Mining in Dynamic Graph of Brain Connectivity Data.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Interactive Visualization of Temporal Brain Connectivity Data based-on Frequent Feature Mining (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

SFRSwin: A Shallow Significant Feature Retention Swin Transformer for Fine-Grained Image Classification of Wildlife Species.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial Intelligence.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

BACTDS: Blockchain-Based Fined-Grained Access Control Scheme with Traceablity for IoT Data Sharing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Deep Reinforcement Learning for Delay and Energy-Aware Task Scheduling in Edge Clouds.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

A Multichannel CNN-GRU Hybrid Architecture for sEMG Gesture Recognition.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

The Adaptive Fault-tolerant Routing Based on an Improved Local Security Information Model of the Exchanged Hypercube.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Fault-Tolerant Consensus with NOMA in Mobile Networks.
IEEE Wirel. Commun., 2022

Covert communications with friendly jamming in Internet of vehicles.
Veh. Commun., 2022

Joint Beamforming for IRS-Aided Multi-Cell MISO System: Sum Rate Maximization and SINR Balancing.
IEEE Trans. Wirel. Commun., 2022

Cooperative Communication and Mobility for Securing URLLC of Future Wireless Networks.
IEEE Trans. Veh. Technol., 2022

Adaptive NN-Based Consensus for a Class of Nonlinear Multiagent Systems With Actuator Faults and Faulty Networks.
IEEE Trans. Neural Networks Learn. Syst., 2022

Decentralized Wireless Federated Learning With Differential Privacy.
IEEE Trans. Ind. Informatics, 2022

DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2022

A Deep 1-D CNN and Bidirectional LSTM Ensemble Model With Arbitration Mechanism for LDDoS Attack Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Fast Core Maintenance in Dynamic Graphs.
IEEE Trans. Comput. Soc. Syst., 2022

Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning.
IEEE Trans. Comput. Soc. Syst., 2022

CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA.
IEEE Trans. Computers, 2022

Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE).
IEEE Trans. Computers, 2022

BHE-AC: a blockchain-based high-efficiency access control framework for Internet of Things.
Pers. Ubiquitous Comput., 2022

Lightweight ID-based broadcast signcryption for cloud-fog-assisted IoT.
J. Syst. Archit., 2022

Adaptive seeding for profit maximization in social networks.
J. Glob. Optim., 2022

Aitac: an identity-based traceable anonymous communication model.
J. Ambient Intell. Humaniz. Comput., 2022

Spatial-Temporal Chebyshev Graph Neural Network for Traffic Flow Prediction in IoT-Based ITS.
IEEE Internet Things J., 2022

Deep learning-based transceiver design for multi-user MIMO systems.
Internet Things, 2022

Securing wireless communications from the perspective of physical layer: A survey.
Internet Things, 2022

An FA-SegNet Image Segmentation Model Based on Fuzzy Attention and Its Application in Cardiac MRI Segmentation.
Int. J. Comput. Intell. Syst., 2022

A dense R-CNN multi-target instance segmentation model and its application in medical image processing.
IET Image Process., 2022

Scene classification for remote sensing images with self-attention augmented CNN.
IET Image Process., 2022

Cooperative communication design of physical layer security enhancement with social ties in random networks.
Ad Hoc Networks, 2022

Trust secure data aggregation in WSN-based IIoT with single mobile sink.
Ad Hoc Networks, 2022

Unsupervised Deep Learning-Based Hybrid Beamforming in Massive MISO Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Phishing Frauds Detection Based on Graph Neural Network on Ethereum.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Blockchain-Aided Hierarchical Attribute-Based Encryption for Data Sharing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Visual Representation and Layout Optimization for Comparison of Dynamic Graph.
Proceedings of the IEEE Smartworld, 2022

A Brain Disease Classification Framework with Temporal Attribute and Feature Fusion.
Proceedings of the IEEE Smartworld, 2022

Speech Enhancement Generative Adversarial Network Architecture with Gated Linear Units and Dual-Path Transformers.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

WiFi Sensing for Drastic Activity Recognition with CNN-BiLSTM Architecture.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Intelligent Network Intrusion Detection and Situational Awareness for Cyber-Physical Systems in Smart Cities.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2022

Scene Classification Through Knowledge Distillation Enabled Parameter-Free Attention Model for Remote Sensing Images.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

AIoT Platform Design Based on Front and Rear End Separation Architecture for Smart Agricultural.
Proceedings of the APIT 2022: 4th Asia Pacific Information Technology Conference, Virtual Event, Thailand, January 14, 2022

Security on Ethereum: Ponzi Scheme Detection in Smart Contract.
Proceedings of the Algorithmic Aspects in Information and Management, 2022

2021
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT.
Wirel. Commun. Mob. Comput., 2021

Implementing the Abstract MAC Layer via Inductive Coloring Under the Rayleigh-Fading Model.
IEEE Trans. Wirel. Commun., 2021

wChain: A Fast Fault-Tolerant Blockchain Protocol for Multihop Wireless Networks.
IEEE Trans. Wirel. Commun., 2021

Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks.
IEEE/ACM Trans. Netw., 2021

Distributed Broadcasting in Dynamic Networks.
IEEE/ACM Trans. Netw., 2021

Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading.
IEEE/ACM Trans. Netw., 2021

Achieving Privacy Preservation and Billing via Delayed Information Release.
IEEE/ACM Trans. Netw., 2021

Distributed Social Learning With Imperfect Information.
IEEE Trans. Netw. Sci. Eng., 2021

Implementing The Abstract MAC Layer in Dynamic Networks.
IEEE Trans. Mob. Comput., 2021

Privacy-Aware Data Trading.
IEEE Trans. Inf. Forensics Secur., 2021

Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices.
IEEE Trans. Cogn. Commun. Netw., 2021

A novel distributed Social Internet of Things service recommendation scheme based on LSH forest.
Pers. Ubiquitous Comput., 2021

From edge data to recommendation: A double attention-based deformable convolutional network.
Peer-to-Peer Netw. Appl., 2021

Sentence pair modeling based on semantic feature map for human interaction with IoT devices.
Int. J. Mach. Learn. Cybern., 2021

MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things.
Int. J. Distributed Sens. Networks, 2021

Shortest link scheduling in wireless networks under the Rayleigh fading model.
EURASIP J. Wirel. Commun. Netw., 2021

Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021

Edge-disjoint paths in faulty augmented cubes.
Discret. Appl. Math., 2021

Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example.
CoRR, 2021

BLOWN: A Blockchain Protocol for Single-Hop Wireless Networks under Adversarial SINR.
CoRR, 2021

Pareto-optimal Algorithms for Scheduling Games on Parallel-batching Machines with Activation Cost.
Asia Pac. J. Oper. Res., 2021

Smoothing Approximation to the New Exact Penalty Function with Two Parameters.
Asia Pac. J. Oper. Res., 2021

Distributed Core Decomposition in Probabilistic Graphs.
Asia Pac. J. Oper. Res., 2021

Methods of improving Secrecy Transmission Capacity in wireless random networks.
Ad Hoc Networks, 2021

Blockchain-Based Data Ownership Confirmation Scheme in Industrial Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Node Preference-Aware Delegated Proof of Stake Consensus Algorithm With Reward and Punishment Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Minimizing Energy Consumption with Devices Placement and Scheduling in Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Rewarding and Efficient Data Sharing in EHR System with Coalition Blockchain Assistance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Deep Learning-Based Power Control for Uplink Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Chinese Semantic Matching with Multi-granularity Alignment and Feature Fusion.
Proceedings of the International Joint Conference on Neural Networks, 2021

Sentence Semantic Matching with Hierarchical CNN Based on Dimension-augmented Representation.
Proceedings of the International Joint Conference on Neural Networks, 2021

Poster: Quadratic-Time Algorithms for Optimal Min-Max Barrier Coverage with Mobile Sensors on the Plane.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Budget-Aware Scheduling for Hyperparameter Optimization Process in Cloud Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Query Privacy Preserving for Data Aggregation in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2020

Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.
Wirel. Commun. Mob. Comput., 2020

Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey.
IEEE Wirel. Commun., 2020

Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference.
IEEE Trans. Wirel. Commun., 2020

Faster Parallel Core Maintenance Algorithms in Dynamic Graphs.
IEEE Trans. Parallel Distributed Syst., 2020

Achieving Personalized k-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS.
IEEE Trans. Ind. Informatics, 2020

Batch Processing for Truss Maintenance in Large Dynamic Graphs.
IEEE Trans. Comput. Soc. Syst., 2020

The hardness of resilience for nested aggregation query.
Theor. Comput. Sci., 2020

Interaction-aware influence maximization and iterated sandwich method.
Theor. Comput. Sci., 2020

A Context-Aware Service Evaluation Approach over Big Data for Cloud Applications.
IEEE Trans. Cloud Comput., 2020

Inference Attacks and Controls on Genotypes and Phenotypes for Individual Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy.
Neural Networks, 2020

EUMD: Efficient slot utilization based missing tag detection with unknown tags.
J. Netw. Comput. Appl., 2020

Neighbor product distinguishing total colorings of 2-degenerate graphs.
J. Comb. Optim., 2020

LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT.
IEEE Internet Things J., 2020

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT.
IEEE Internet Things J., 2020

Data Aggregation in Wireless Sensor Networks: From the Perspective of Security.
IEEE Internet Things J., 2020

Energy-efficient privacy-preserving data aggregation protocols based on slicing.
EURASIP J. Wirel. Commun. Netw., 2020

MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors.
CoRR, 2020

Differential Privacy and Its Applications in Social Network Analysis: A Survey.
CoRR, 2020

Privacy-aware Data Trading.
CoRR, 2020

BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme.
Comput. Commun., 2020

Fast skyline community search in multi-valued networks.
Big Data Min. Anal., 2020

PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020

Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading.
IEEE Access, 2020

Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Blockchain-Based Service Recommendation Supporting Data Sharing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Distributed Algorithm for Truss Maintenance in Dynamic Graphs.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2020

Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

A Noise-Suppressing Neural Algorithm for Solving the Time-Varying System of Linear Equations: A Control-Based Approach.
IEEE Trans. Ind. Informatics, 2019

A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies.
IEEE Trans. Ind. Informatics, 2019

Triangle edge deletion on planar glasses-free RGB-digraphs.
Theor. Comput. Sci., 2019

Edge Computing Security: State of the Art and Challenges.
Proc. IEEE, 2019

A Non-linear and Noise-Tolerant ZNN Model and Its Application to Static and Time-Varying Matrix Square Root Finding.
Neural Process. Lett., 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Netw. Comput. Appl., 2019

Network security situation: From awareness to awareness-control.
J. Netw. Comput. Appl., 2019

I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
IEEE Internet Things J., 2019

A Novel Secure and Efficient Data Aggregation Scheme for IoT.
IEEE Internet Things J., 2019

Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering.
IEEE Internet Things J., 2019

Personalised service recommendation process based on service clustering.
Int. J. Comput. Sci. Eng., 2019

A Structure of 1-Planar Graph and Its Applications to Coloring Problems.
Graphs Comb., 2019

Hopping-Proof and Fee-Free Pooled Mining in Blockchain.
CoRR, 2019

Localized and distributed link scheduling algorithms in IoT under rayleigh fading.
Comput. Networks, 2019

Information, knowledge, and semantics for interacting with Internet-of-Things.
Comput. Networks, 2019

An XGBoost-based physical fitness evaluation model using advanced feature selection and Bayesian hyper-parameter optimization for wearable running monitoring.
Comput. Networks, 2019

An upper bound for the choice number of star edge coloring of graphs.
Appl. Math. Comput., 2019

MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks.
IEEE Access, 2019

User Identity De-anonymization Based on Attributes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Energy-Efficient Privacy Preserving Data Aggregation Protocols Based on Slicing.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Distributed Dominating Set and Connected Dominating Set Construction Under the Dynamic SINR Model.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

Fast Distributed Backbone Construction Despite Strong Adversarial Jamming.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Analysis of Antagonistic Dynamics for Rumor Propagation.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Attribute-Enhanced De-anonymization of Online Social Networks.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Distributed Core Decomposition in Probabilistic Graphs.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
N-in-One: A Novel Location-Based Service.
IEEE Trans. Veh. Technol., 2018

Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data.
IEEE Trans. Veh. Technol., 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Veh. Technol., 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Veh. Technol., 2018

Stable Local Broadcast in Multihop Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2018

Regularized Non-Negative Matrix Factorization for Identifying Differentially Expressed Genes and Clustering Samples: A Survey.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Structural Balance Theory-Based E-Commerce Recommendation over Big Rating Data.
IEEE Trans. Big Data, 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.
Secur. Commun. Networks, 2018

CRPD: a novel clustering routing protocol for dynamic wireless sensor networks.
Pers. Ubiquitous Comput., 2018

Advancing researches on IoT systems and intelligent applications.
Pers. Ubiquitous Comput., 2018

Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices.
IEEE Netw., 2018

SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks.
IEEE Netw., 2018

CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018

A survey on key fields of context awareness for mobile devices.
J. Netw. Comput. Appl., 2018

A nonlinear and noise-tolerant ZNN model solving for time-varying linear matrix equation.
Neurocomputing, 2018

Robot manipulator control using neural networks: A survey.
Neurocomputing, 2018

Methods of increasing two-way transmission capacity of wireless ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2018

A novel centralized algorithm for constructing virtual backbones in wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2018

On partitions of K2, 3-free graphs under degree constraints.
Discret. Math., 2018

A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks.
Comput. Networks, 2018

DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data.
IEEE Access, 2018

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Cancer-Drug Interaction Network Construction and Drug Target Prediction Based on Multi-source Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy-Preserving Data Collection in Context-Aware Applications.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Fully Dynamic Broadcasting under SINR.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Exact Implementation of Abstract MAC Layer via Carrier Sensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks.
Proceedings of the 2018 International Conference on Identification, 2018

De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method.
Proceedings of the 2018 International Conference on Identification, 2018

Forecasting of Forex Time Series Data Based on Deep Learning.
Proceedings of the 2018 International Conference on Identification, 2018

Efficient Connected Dominating Set Construction with Maximum Lifetime in the Cognitive Radio Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Preface.
Proceedings of the 2018 International Conference on Identification, 2018

2017
Coverage Contribution Area Based k-Coverage for Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2017

Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model.
IEEE Trans. Veh. Technol., 2017

Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Veh. Technol., 2017

Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks.
IEEE Trans. Veh. Technol., 2017

Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Veh. Technol., 2017

Approximate Holistic Aggregation in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2017

Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2017

Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness.
IEEE/ACM Trans. Netw., 2017

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing.
IEEE Trans. Ind. Informatics, 2017

An Invocation Cost Optimization Method for Web Services in Cloud Environment.
Sci. Program., 2017

Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation.
Secur. Commun. Networks, 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive Mob. Comput., 2017

SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Netw. Comput. Appl., 2017

Maximizing target-temporal coverage of mission-driven camera sensor networks.
J. Comb. Optim., 2017

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems.
IEEE Internet Things J., 2017

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes.
IEEE Internet Things J., 2017

Ultraviolet Radiation Measurement via Smart Devices.
IEEE Internet Things J., 2017

IoT Applications on Secure Smart Shopping System.
IEEE Internet Things J., 2017

Guest Editorial Special Issue on Fog Computing in the Internet of Things.
IEEE Internet Things J., 2017

An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context.
IEEE Internet Things J., 2017

"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
Int. J. Distributed Sens. Networks, 2017

Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Trans. Inf. Syst., 2017

Neighbor Sum (Set) Distinguishing Total Choosability Via the Combinatorial Nullstellensatz.
Graphs Comb., 2017

Influence maximization by probing partial communities in dynamic online social networks.
Trans. Emerg. Telecommun. Technol., 2017

Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.
Complex., 2017

Robust Nonnegative Matrix Factorization via Joint Graph Laplacian and Discriminative Information for Identifying Differentially Expressed Genes.
Complex., 2017

Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A New Greedy Algorithm for Constructing the Minimum Size Connected Dominating Sets in Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Addressing the Threats of Inference Attacks on Traits and Genotypes from Individual Genomic Data.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Modeling and Analysis of Two-tier MIMO Heterogeneous Cellular Network.
Proceedings of the 2017 International Conference on Identification, 2017

Fine-grained Access Control with Privacy Support and Network Service Optimization in Ad hoc Networks.
Proceedings of the 2017 International Conference on Identification, 2017

A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network.
Proceedings of the 2017 International Conference on Identification, 2017

Differential Private Preservation Multi-core DBScan Clustering for Network User Data.
Proceedings of the 2017 International Conference on Identification, 2017

TSQM: Trust-based Secure Query Method in Anonymous Communication System.
Proceedings of the 2017 International Conference on Identification, 2017

ACS-DFP: Anonymous Communication Scheme Based on Decreased Forwarding Probability.
Proceedings of the 2017 International Conference on Identification, 2017

SA Framework based De-anonymization of Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

Energy-efficient adaptive slice-based secure data aggregation scheme in WSN.
Proceedings of the 2017 International Conference on Identification, 2017

2016
An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets.
IEEE Trans. Cogn. Commun. Netw., 2016

On Connected Target <i>k</i>-Coverage in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Connected dominating set construction in cognitive radio networks.
Pers. Ubiquitous Comput., 2016

A novel contention-on-demand design for WiFi hotspots.
Pers. Ubiquitous Comput., 2016

Time-Aware IoE Service Recommendation on Sparse Data.
Mob. Inf. Syst., 2016

Distributed wireless link scheduling in the SINR model.
J. Comb. Optim., 2016

Bounded information dissemination in multi-channel wireless networks.
J. Comb. Optim., 2016

An improved approximation algorithm for the shortest link scheduling in wireless networks under SINR and hypergraph models.
J. Comb. Optim., 2016

Information exchange with collision detection on multiple channels.
J. Comb. Optim., 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
Int. J. Distributed Sens. Networks, 2016

Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

Analysis and optimization of delayed channel access for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

A Novel Delay Analysis for Polling Schemes with Power Management Under Heterogeneous Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Efficient privacy-preserving schemes for dot-product computation in mobile computing.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

Distributed deterministic broadcasting algorithms under the SINR model.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Detecting driver phone calls in a moving vehicle based on voice features.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Data Aggregation Scheduling in Wireless Sensor Networks under SINR.
Proceedings of the International Conference on Identification, 2016

SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR.
Proceedings of the International Conference on Identification, 2016

Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing.
Proceedings of the International Conference on Identification, 2016

IoT Applications on Secure Smart Shopping.
Proceedings of the International Conference on Identification, 2016

Multi-leader Election in Dynamic Sensor Networks.
Proceedings of the International Conference on Identification, 2016

Characteristic gene selection via L2, 1-norm Sparse Principal Component Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Robust graph regularized discriminative nonnegative matrix factorization for characteristic gene selection.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
DS-MAC: An energy efficient demand sleep MAC protocol with low latency for wireless sensor networks.
J. Netw. Comput. Appl., 2015

The r-acyclic chromatic number of planar graphs.
J. Comb. Optim., 2015

A Reliable Broadcast Protocol in Vehicular Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2015

Heuristic Algorithms for One-Slot Link Scheduling in Wireless Sensor Networks under SINR.
Int. J. Distributed Sens. Networks, 2015

IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Routing, spectrum access, and scheduling in multi-hop multi-channel wireless networks with MIMO links.
EURASIP J. Wirel. Commun. Netw., 2015

On the Stable Throughput in Wireless LANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Domatic Partition in Homogeneous Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Impact of a Deterministic Delay in the DCA Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Distributed Algorithms for Maximum Clique in Wireless Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Speedup of information exchange using multiple channels in wireless ad hoc networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Minimum connected dominating set construction in wireless networks under the beeping model.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Connected Dominating Set Construction in Cognitive Radio Networks.
Proceedings of the International Conference on Identification, 2015

On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015

A Novel Scheme for Wireless Hot-Spot Networks.
Proceedings of the International Conference on Identification, 2015

Application of Graph Regularized Non-negative Matrix Factorization in Characteristic Gene Selection.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
A Local Energy Consumption Prediction-Based Clustering Protocol for Wireless Sensor Networks.
Sensors, 2014

Domatic partition in homogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2014

SINR based Maximum Link Scheduling with Uniform Power in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2014

ECDC: An energy and coverage-aware distributed clustering protocol for wireless sensor networks.
Comput. Electr. Eng., 2014

An Improved Approximation Algorithm for the Shortest Link Scheduling Problem in Wireless Networks under SINR and Hypergraph Models.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

2-m-Domatic Partition in Homogeneous Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

IDUC: An Improved Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

S-Disjunct Code Based MAC Protocol for Reliable Broadcast in Vehicular Ad Hoc Networks.
Proceedings of the International Conference on Identification, 2014

2013
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey.
Comput. Commun., 2013

A nonlinear model to generate the winner-take-all competition.
Commun. Nonlinear Sci. Numer. Simul., 2013

Efficient distributed multiple-message broadcasting in unstructured wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Virtual Backbone Construction Algorithms Based on Protocol Interference Model.
Proceedings of the Advances in Wireless Sensor Networks, 2013

An Algorithm for Constructing Strongly Connected Dominating and Absorbing Sets in Wireless Networks with Unidirectional Links.
Proceedings of the Advances in Wireless Sensor Networks, 2013

2012
Constructing minimum extended weakly-connected dominating sets for clustering in ad hoc networks.
J. Parallel Distributed Comput., 2012

E-DPSO Algorithm Design and Demonstration about Dynamic Selection and Merging Process of ac-Service Flow.
J. Comput., 2012

A Stochastic <i>k</i>-Coverage Scheduling Algorithm in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Transforming Area Coverage to Target Coverage to Maintain Coverage and Connectivity for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Clustering-Based Energy-Efficient Broadcast Tree in Wireless Networks.
Int. J. Comput. Commun. Control, 2012

Circular Coloring of Planar Digraphs.
Graphs Comb., 2012

Edge Dominating Capability based Backbone Construction in Wireless Networks
CoRR, 2012

Winner-take-all based on discrete-time dynamic feedback.
Appl. Math. Comput., 2012

2011
An Energy-Aware Distributed Unequal Clustering Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

2010
On the fractional <i>f</i>-chromatic index of a graph.
Int. J. Comput. Math., 2010

Heuristic Algorithms for Constructing Connected Dominating Sets with Minimum Size and Bounded Diameter in Wireless Networks.
Proceedings of the Wireless Algorithms, 2010

2009
A Novel Hierarchical Overlay for Structured Peer-to-Peer Network.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric System.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

An Algorithm with Better Approximation Ratio for Multicast Traffic in Unidirectional SONET/WDM Rings.
Proceedings of the Combinatorial Optimization and Applications, 2009

Approximating the Multicast Traffic Grooming Problem in Unidirectional SONET/WDM Rings.
Proceedings of the Combinatorial Optimization and Applications, 2009

An Efficient Search Algorithm for REIK Overlay Network.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Scale-free Overlay Structures for Unstructured Peer-to-Peer Networks.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Novel P2P Overlay Network Based on Cycloid and Folded Hypercube.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

ERASP: An Efficient and Robust Adaptive Superpeer Overlay Network.
Proceedings of the Progress in WWW Research and Development, 2008

EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networks.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
KZCAN: A Kautz based content-addressable network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem .
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

REIK: A Novel P2P Overlay Network with Byzantine Fault Tolerance.
Proceedings of the Third International Conference on Semantics, 2007

Concept Interconnection Based on Many-Valued Context Analysis.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Note on Factional Extendable Graphs.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Formal Description-Based Approach to Extended Many-Valued Context Analysis.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Notes on Fractional (1, <i>f</i> )-Odd Factors of Graphs.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007


  Loading...