Limin Sun
Orcid: 0000-0003-2745-7521Affiliations:
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Chinese Academy of Sciences, Institute of Software, Beijing, China (former)
- National University of Defense Technology, Changsha, China (PhD 1998)
According to our database1,
Limin Sun
authored at least 310 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning.
Comput. Secur., 2025
SFACIF: A safety function attack and anomaly industrial condition identified framework.
Comput. Networks, 2025
2024
IEEE Trans. Mob. Comput., December, 2024
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers.
ACM Trans. Softw. Eng. Methodol., May, 2024
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach.
IEEE Internet Things J., May, 2024
RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
Expert Syst. Appl., March, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
ACM Trans. Sens. Networks, January, 2024
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge.
ACM Trans. Softw. Eng. Methodol., January, 2024
Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning.
Proc. ACM Softw. Eng., 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests.
Proceedings of the IEEE International Conference on Communications, 2024
Log-Based Anomaly Detection with Transformers Pre-Trained on Large-Scale Unlabeled Data.
Proceedings of the IEEE International Conference on Communications, 2024
A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023
IEEE Netw., November, 2023
J. Inf. Sci. Eng., November, 2023
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.
Comput. Secur., September, 2023
Physical-Layer Secret Key Generation Based on Bidirectional Convergence Feature Learning Convolutional Network.
IEEE Internet Things J., August, 2023
Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023
Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.
Trans. Emerg. Telecommun. Technol., July, 2023
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router.
Comput. Secur., May, 2023
IEEE/ACM Trans. Netw., April, 2023
IEEE Internet Things J., April, 2023
Comput. Secur., March, 2023
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023
A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023
A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security.
IEEE Commun. Surv. Tutorials, 2023
Comput. Secur., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation.
Proceedings of the International Neural Network Society Workshop on Deep Learning Innovations and Applications, 2023
User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023
FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control.
J. Syst. Archit., 2022
Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction.
IEEE Internet Things J., 2022
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques.
CoRR, 2022
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022
Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE International Performance, 2022
ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021
IEEE Internet Things J., 2021
Future Gener. Comput. Syst., 2021
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
Cybersecur., 2021
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021
SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks.
CoRR, 2021
Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods.
IEEE Access, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the Science of Cyber Security - Third International Conference, 2021
Proceedings of the IEEE International Performance, 2021
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems.
Proceedings of the ICC 2021, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting.
IEEE J. Sel. Areas Commun., 2020
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020
Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service.
IEEE Commun. Mag., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
2019
IEEE Trans. Serv. Comput., 2019
Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019
Cybersecur., 2019
Comput. Networks, 2019
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018
Intell. Syst. Account. Finance Manag., 2018
IEEE Internet Things J., 2018
Int. J. Distributed Sens. Networks, 2018
Expert Syst. Appl., 2018
IEEE Access, 2018
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Wirel. Commun. Mob. Comput., 2017
IEEE Trans. Veh. Technol., 2017
ViMediaNet: an emulation system for interactive multimedia based telepresence services.
J. Supercomput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Sensors, 2017
J. Sensors, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
MOSTPC: Performance of a Massive Oblique Space-Time-Polarization Precoding System over Ricean-K Fading Channel.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
IEEE Trans. Mob. Comput., 2016
An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Netw. Appl., 2016
J. Commun. Inf. Networks, 2016
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016
Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city.
EURASIP J. Wirel. Commun. Netw., 2016
EURASIP J. Wirel. Commun. Netw., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
IEEE Trans. Veh. Technol., 2015
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015
IEEE Trans. Mob. Comput., 2015
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerg. Top. Comput., 2015
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks.
Int. J. Inf. Secur. Priv., 2015
IEEE Commun. Mag., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Disseminating real-time messages in opportunistic mobile social networks: A ranking perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Computer Vision - CCF Chinese Conference, 2015
2014
ACM Trans. Sens. Networks, 2014
ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery.
IEEE Trans. Mob. Comput., 2014
Performance monitoring and evaluation in dance teaching with mobile sensing technology.
Pers. Ubiquitous Comput., 2014
Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution.
Pers. Ubiquitous Comput., 2014
Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks.
Pers. Ubiquitous Comput., 2014
Peer-to-Peer Netw. Appl., 2014
IEEE Internet Things J., 2014
Int. J. Distributed Sens. Networks, 2014
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework.
Proceedings of the IEEE International Conference on Communication Systems, 2014
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014
Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014
Quantifying individual communication capability in opportunistic mobile social networks.
Proceedings of the IEEE Computers, 2014
2013
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wirel. Commun., 2013
Int. J. Distributed Sens. Networks, 2013
Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective.
Int. J. Distributed Sens. Networks, 2013
Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs.
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
A cooperation incentive scheme based on coalitional game theory for sparse and dense VANETs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the 19th IEEE International Conference on Networks, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
J. Softw., 2012
J. Networks, 2012
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Int. J. Bifurc. Chaos, 2012
GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
2011
A case study on REST-style architecture for cyber-physical systems: Restful smart gateway.
Comput. Sci. Inf. Syst., 2011
A game based routing algorithm for congestion control of multimedia transmission in VANETs.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011
Design and Implementation of Network Management System for Large-Scale Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the Global Communications Conference, 2011
RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
EURASIP J. Wirel. Commun. Netw., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010
Frequency-hopping/M-ary frequency-shift keying for wireless sensor networks: Noncoherent detection and performance.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2010
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
2009
Int. J. Sens. Networks, 2009
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
2008
J. Signal Process. Syst., 2008
THTA: Triangle-Shaped Hierarchy Aggregation Time Allocation Algorithm for Wireless Sensor Network.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
2007
HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2007
Comput. Commun., 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the IEEE 17th International Symposium on Personal, 2006
Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006
ESTS: An Error Statistic Based Time Synchronization Protocol for Wireless Sensor Networks.
Proceedings of the Computational Intelligence, 2006
Proceedings of IEEE International Conference on Communications, 2006
2005
Proceedings of the Advances in Intelligent Computing, 2005
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
2003
Proceedings of the Mobile and Wireless Communications Networks, 2003