Maode Ma
Orcid: 0000-0003-1438-7018
According to our database1,
Maode Ma
authored at least 407 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments.
J. Supercomput., September, 2024
Peer Peer Netw. Appl., September, 2024
Sensors, August, 2024
Achieving Privacy-Preserving Location Management in LEO-Satellite Integrated Vehicular Network With Dense Ground Stations.
IEEE Trans. Veh. Technol., April, 2024
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks.
Sensors, April, 2024
IEEE Internet Things J., April, 2024
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.
Sensors, February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks.
J. Netw. Comput. Appl., 2024
Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks.
Eng. Appl. Artif. Intell., 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing.
Proceedings of the IEEE World AI IoT Congress, 2024
EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles.
Proceedings of the IEEE World AI IoT Congress, 2024
2023
A watermark detection scheme based on non-parametric model applied to mute machine voice.
Multim. Tools Appl., December, 2023
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid.
Computing, November, 2023
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge.
IEEE Trans. Netw. Serv. Manag., June, 2023
An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids.
Algorithms, June, 2023
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.
Trans. Emerg. Telecommun. Technol., May, 2023
Efficient Group Handover Authentication for Secure 5G-Based Communications in Platoons.
IEEE Trans. Intell. Transp. Syst., March, 2023
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter.
Clust. Comput., February, 2023
Federated Deep Reinforcement Learning-Based Spectrum Access Algorithm With Warranty Contract in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking.
J. Netw. Syst. Manag., 2023
Efficient-Lightweight CRL Distribution in VANETs: A Multilayer Coded Caching Methodology.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023
ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDNs.
Proceedings of the 24th IEEE International Conference on High Performance Switching and Routing, 2023
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
2022
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022
GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
Competitive teaching-learning-based optimization for multimodal optimization problems.
Soft Comput., 2022
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.
Sensors, 2022
A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery.
Multim. Tools Appl., 2022
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022
A misbehavior detection system to detect novel position falsification attacks in the Internet of Vehicles.
Eng. Appl. Artif. Intell., 2022
Eng. Appl. Artif. Intell., 2022
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks.
Comput. Secur., 2022
Real-time cooperative data routing and scheduling in software defined vehicular networks.
Comput. Commun., 2022
A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT.
Comput. Networks, 2022
A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 17th International Conference on Control, 2022
Novel Position Falsification Attacks Detection in the Internet of Vehicles using Machine Learning.
Proceedings of the 17th International Conference on Control, 2022
Self-Adaptive IDS in VANETs: A Game Theory and Deep Q-Learning Network Based Generic Scheme.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Netw. Serv. Manag., 2021
Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking.
IEEE Trans. Netw. Sci. Eng., 2021
J. Supercomput., 2021
Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain.
IEEE Trans. Intell. Transp. Syst., 2021
ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
A lightweight and secure handover authentication scheme for 5G network using neighbour base stations.
J. Netw. Comput. Appl., 2021
A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system.
J. Intell. Fuzzy Syst., 2021
Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks.
IEEE Internet Things J., 2021
Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher.
IEICE Trans. Commun., 2021
Research on DoS Attacks Intrusion Detection Model Based on Multi-Dimensional Space Feature Vector Expansion K-Means Algorithm.
IEICE Trans. Commun., 2021
Trans. Emerg. Telecommun. Technol., 2021
Comput. Secur., 2021
Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking.
IEEE Commun. Mag., 2021
A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks.
Comput. Electr. Eng., 2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the IEEE Region 10 Conference, 2021
Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks.
Proceedings of the IEEE Region 10 Conference, 2021
Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
A Secure Authentication Protocol with Performance Enhancements for 4G LTE/LTE-A Wireless Networks.
Proceedings of the IECC 2021: 3rd International Electronics Communication Conference, Ho Chi Minh City, Vietnam, July 8, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
NSEHA: A Neighbor-based Secure and Efficient Handover Authentication Mechanism for 5G Networks.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks.
Proceedings of the ICC 2021, 2021
An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme.
Proceedings of the ICC 2021, 2021
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021
2020
An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios.
Wirel. Pers. Commun., 2020
BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon.
Wirel. Commun. Mob. Comput., 2020
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks.
IEEE Trans. Wirel. Commun., 2020
Multi-access edge computing enabled internet of things: advances and novel applications.
Neural Comput. Appl., 2020
Storage and access optimization scheme based on correlation probabilities in the internet of vehicles.
J. Intell. Transp. Syst., 2020
WiDIGR: Direction-Independent Gait Recognition System Using Commercial Wi-Fi Devices.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11ah networks.
Int. J. Commun. Syst., 2020
Future Gener. Comput. Syst., 2020
Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks.
Future Gener. Comput. Syst., 2020
Backtracking search algorithm with competitive learning for identification of unknown parameters of photovoltaic systems.
Expert Syst. Appl., 2020
Selection of the optimal embedding positions of digital audio watermarking in wavelet domain.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. Secur., 2020
Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities.
Proceedings of the 3rd IEEE 5G World Forum, 2020
2019
Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks.
IEEE Trans. Veh. Technol., 2019
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Veh. Technol., 2019
Fog-Based Pub/Sub Index With Boolean Expressions in the Internet of Industrial Vehicles.
IEEE Trans. Ind. Informatics, 2019
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm.
Soft Comput., 2019
Sensors, 2019
Sensors, 2019
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks.
IEEE Netw., 2019
Concentration-based demodulation scheme for mobile receiver in molecular communication.
Nano Commun. Networks, 2019
A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology.
Knowl. Based Syst., 2019
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet Things J., 2019
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019
Future Gener. Comput. Syst., 2019
Connectivity aware tribrid routing framework for a generalized software defined vehicular network.
Comput. Networks, 2019
Markovian model based indoor location tracking for Internet of Things (IoT) applications.
Clust. Comput., 2019
Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics.
IEEE Access, 2019
IEEE Access, 2019
ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks.
IEEE Access, 2019
Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol.
IEEE Access, 2019
Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory.
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
BAVPM: Practical Autonomous Vehicle Platoon Management Supported by Blockchain Technique.
Proceedings of the 4th International Conference on Intelligent Transportation Engineering, 2019
Proceedings of the ICIT 2019, 2019
Proceedings of the ICIT 2019, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018
A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V.
KSII Trans. Internet Inf. Syst., 2018
IEEE Commun. Lett., 2018
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data.
Future Gener. Comput. Syst., 2018
Controller placement optimization in hierarchical distributed software defined vehicular networks.
Comput. Networks, 2018
EBTCOR: an Energy-Balanced 3D Topology Control Algorithm Based on Optimally Rigid Graph in UWSNs.
Ad Hoc Sens. Wirel. Networks, 2018
IEEE Access, 2018
Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018
The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs.
IEEE Access, 2018
Modeling and analysis on double-tiered device-to-device communications in vehicle networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018
A Bio-Inspired and User-Experience Preferred Load-Balance Algorithm for Heterogeneous Networks.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018
Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Link Stability Based Hybrid Routing Protocol for Software Defined Vehicular Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Resource management for symmetrical applications over heterogeneous services in IEEE 802.16.
Wirel. Networks, 2017
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017
Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels.
IEEE Trans. Circuits Syst. Video Technol., 2017
Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks.
IEEE Trans. Commun., 2017
Design of a novel dynamic trust model for spectrum management in WRANs of TV white space.
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks.
J. Commun., 2017
Delay guaranteed MDP scheduling scheme for HCCA based on 802.11p protocol in V2R environments.
Int. J. Commun. Syst., 2017
An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
IEEE Commun. Lett., 2017
TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks.
CoRR, 2017
Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks.
Complex., 2017
An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems.
Comput. Networks, 2017
IEEE Access, 2017
IEEE Access, 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Efficient Flow Instantiation via Source Routing in Software Defined Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017
Proceedings of the 8th International Conference on Computer Modeling and Simulation, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Link Dynamics Based Packet Routing Framework for Software Defined Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks.
Wirel. Pers. Commun., 2016
Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems.
Wirel. Networks, 2016
Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems.
EAI Endorsed Trans. Ubiquitous Environ., 2016
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Mob. Comput., 2016
A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.
J. Supercomput., 2016
A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks.
IEEE Trans. Ind. Informatics, 2016
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds.
IEEE Trans. Inf. Forensics Secur., 2016
Security enhancement for dynamic key refreshment in neighborhood area network of smart grid.
Secur. Commun. Networks, 2016
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
J. Commun., 2016
Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm.
J. Commun., 2016
J. Commun., 2016
Int. J. Trust. Manag. Comput. Commun., 2016
Int. J. Netw. Manag., 2016
Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems.
IET Commun., 2016
E<sup>3</sup>MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks.
IEEE Access, 2016
Offset estimation for clock synchronization in mobile molecular communication system.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Delay efficient software defined networking based architecture for vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016
2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015
Sensors, 2015
Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks.
Sensors, 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Int. J. Satell. Commun. Netw., 2015
Int. J. Distributed Sens. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
Int. J. Commun. Syst., 2015
IEEE Commun. Lett., 2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
Proceedings of the IEEE International Conference on Communication, 2015
An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs.
Proceedings of the IEEE International Conference on Communication, 2015
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Neighborhood area network security in smart grid using security enhanced key updating.
Proceedings of the 10th International Conference on Information, 2015
Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting.
Proceedings of the 10th International Conference on Information, 2015
Proceedings of the 10th International Conference on Information, 2015
2014
Wirel. Pers. Commun., 2014
A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple.
Wirel. Pers. Commun., 2014
Smart Comput. Rev., 2014
A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks.
Sensors, 2014
J. Netw. Comput. Appl., 2014
J. Netw. Comput. Appl., 2014
Int. J. Commun. Syst., 2014
Iterative frequency-domain fractionally spaced receiver for zero-padded multi-carrier code division multiple access systems.
IET Commun., 2014
IEEE Commun. Lett., 2014
IEEE Commun. Surv. Tutorials, 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Twentieth National Conference on Communications, 2014
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014
Proceedings of the IEEE International Conference on Communication Systems, 2014
Proceedings of the IEEE International Conference on Communication Systems, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
An Energy-Efficient Self-Adaptive Duty Cycle MAC Protocol for Traffic-Dynamic Wireless Sensor Networks.
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems.
Wirel. Pers. Commun., 2013
Wirel. Commun. Mob. Comput., 2013
Math. Comput. Model., 2013
J. Netw. Comput. Appl., 2013
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Comput. Networks, 2013
Proceedings of the IEEE 24th International Symposium on Personal, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A dynamic-encryption authentication scheme for M2M security in cyber-physical systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Wirel. Pers. Commun., 2012
Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks.
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Ind. Informatics, 2012
Secur. Commun. Networks, 2012
A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Peer-to-Peer Netw. Appl., 2012
Differentiated service provisioning in the MAC layer of cognitive radio mesh networks.
Int. J. Commun. Networks Distributed Syst., 2012
A survey and projection on medium access control protocols for wireless sensor networks.
ACM Comput. Surv., 2012
Securing wireless mesh networks in a unified security framework with corruption-resilience.
Comput. Networks, 2012
Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels.
Comput. Networks, 2012
An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors.
Comput. Networks, 2012
Comput. Networks, 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012
An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks.
Proceedings of IEEE International Conference on Communications, 2012
Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
2011
Cross-Layer MAC Protocol and Holistic Opportunistic Scheduling with Adaptive Power Control for QoS in WiMAX.
Wirel. Pers. Commun., 2011
IEEE Trans. Smart Grid, 2011
J. Netw. Syst. Manag., 2011
Design of parameter tunable robust controller for active queue management based on H<sub>∞</sub> control theory.
J. Netw. Comput. Appl., 2011
Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system.
J. Netw. Comput. Appl., 2011
A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks.
J. Netw. Comput. Appl., 2011
A performance model for differentiated service over single-hop passive star coupled WDM optical networks.
J. Netw. Comput. Appl., 2011
Quality of service provisioning in worldwide interoperability for microwave access networks based on cooperative game theory.
IET Commun., 2011
Comput. Commun., 2011
Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX.
Comput. Networks, 2011
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
A cross-layer selfishness Avoidance Routing Protocol for the dynamic Cognitive Radio Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011
Proceedings of the 8th International Conference on Information, 2011
Proceedings of the 8th International Conference on Information, 2011
Study of effect of timeout settings on energy saving of lighting systems using queuing model.
Proceedings of the 8th International Conference on Information, 2011
Delay Tolerant Networking.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
IEEE Signal Process. Lett., 2010
IEEE J. Sel. Areas Commun., 2010
Hierarchical scheduling framework for QoS service in WiMAX point-to-multi-point networks.
IET Commun., 2010
IEEE Commun. Lett., 2010
An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks.
Comput. Commun., 2010
A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX.
Comput. Networks, 2010
Proceedings of the Second International Conference on Digital Image Processing, 2010
Cross-Layer Self-Optimizing Temporal-Spectrum Block Scheduling for QoS Provisioning in WiMAX.
Proceedings of the Global Communications Conference, 2010
An Opportunistic Service Differentiation Routing Protocol for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010
2009
Wirel. Pers. Commun., 2009
Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks.
Wirel. Pers. Commun., 2009
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE Trans. Commun., 2009
A hybrid load balancing strategy of sequential tasks for grid computing environments.
Future Gener. Comput. Syst., 2009
An energy-efficient MAC protocol with Adaptive Scheduling for wireless sensor networks.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Commun., 2008
Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks.
Sci. China Ser. F Inf. Sci., 2008
Appl. Math. Comput., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
An Analysis of K-Connectivity in Shadowing and Nakagami Fading Wireless Multi-Hop Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008
Proceedings of the IEEE International Conference on Systems, 2008
Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008
An analysis and implementation study on a robust congestion controller for the internet.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the IEEE Congress on Evolutionary Computation, 2008
2007
IEEE Trans. Veh. Technol., 2007
IEICE Trans. Commun., 2007
IEEE Commun. Lett., 2007
IEEE Commun. Mag., 2007
Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks.
Proceedings of the 2007 IEEE International Conference on Research, 2007
Adaptive Rate Selection Scheme Based on Intelligent Learning Algorithm in Wireless LANs.
Proceedings of the Advances in Computation and Intelligence, 2007
Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Network Lifetime Global Optimization by Duality Approach in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007
2006
Supporting Differentiated Services with Fairness by an Urgency Fair Queuing Scheduling Scheme in EPONs.
Photonic Netw. Commun., 2006
Adaptive polling interval scheduling to support real-time service in Bluetooth networks.
Int. J. Wirel. Mob. Comput., 2006
Int. J. Bus. Data Commun. Netw., 2006
Modeling location management in wireless networks with generally distributed parameters.
Comput. Commun., 2006
Hierarchical scheduling to support differentiated services in Ethernet passive optical networks.
Comput. Networks, 2006
Sci. China Ser. F Inf. Sci., 2006
Comput. Electr. Eng., 2006
Proceedings of the 14th IEEE International Conference on Networks, 2006
Proceedings of IEEE International Conference on Communications, 2006
A Power-Controlled Rate-Adaptive MAC Protocol to Support Differentiated Service in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Task Scheduling by Neural Network with Mean Field Annealing Improvement in Grid Computing.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
IEEE Commun. Lett., 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
J. Commun. Networks, 2004
An adaptive scheduling algorithm for differentiated services on WDM optical networks.
Comput. Commun., 2004
Comput. Networks, 2004
An efficient multiple access control scheme to support differentiated services in EPONS.
Proceedings of the 12th IEEE International Conference on Networks, 2004
An efficient scheduling algorithm with reduced message delay for WDM optical networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004
2003
A cost-based scheduling algorithm for differentiated service on WDM optical networks.
IEEE Commun. Lett., 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Proceedings of the Global Telecommunications Conference, 2003
2000
IEEE J. Sel. Areas Commun., 2000
A Systematic Scheme for Guaranteed Deterministic Performance Service on WDM Optical Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000
Providing guaranteed deterministic performance service to multimedia applications on WDM optical networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000
1999
Photonic Netw. Commun., 1999
Comput. Networks, 1999
1996
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996