Maode Ma

Orcid: 0000-0003-1438-7018

According to our database1, Maode Ma authored at least 407 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments.
J. Supercomput., September, 2024

A secure location management scheme in an LEO-satellite network with dual-mobility.
Peer Peer Netw. Appl., September, 2024

EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V.
Sensors, August, 2024

Achieving Privacy-Preserving Location Management in LEO-Satellite Integrated Vehicular Network With Dense Ground Stations.
IEEE Trans. Veh. Technol., April, 2024

A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks.
Sensors, April, 2024

Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center.
IEEE Internet Things J., April, 2024

ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.
Sensors, February, 2024

Reinventing Multi-User Authentication Security From Cross-Chain Perspective.
IEEE Trans. Inf. Forensics Secur., 2024

An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks.
J. Netw. Comput. Appl., 2024

Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks.
Eng. Appl. Artif. Intell., 2024

DM-CIFA: Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNs.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Design of a Blockchain-Based Trust Model for Detecting Cache Poisoning Attakcs in NDN.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing.
Proceedings of the IEEE World AI IoT Congress, 2024

EAIA: An Efficient and Anonymous Identity Authentication Protocol for V2V Communications in Internet of Vehicles.
Proceedings of the IEEE World AI IoT Congress, 2024

2023
A watermark detection scheme based on non-parametric model applied to mute machine voice.
Multim. Tools Appl., December, 2023

A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid.
Computing, November, 2023

MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge.
IEEE Trans. Netw. Serv. Manag., June, 2023

An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids.
Algorithms, June, 2023

PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.
Trans. Emerg. Telecommun. Technol., May, 2023

Efficient Group Handover Authentication for Secure 5G-Based Communications in Platoons.
IEEE Trans. Intell. Transp. Syst., March, 2023

Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter.
Clust. Comput., February, 2023

Federated Deep Reinforcement Learning-Based Spectrum Access Algorithm With Warranty Contract in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking.
J. Netw. Syst. Manag., 2023

Edge intelligence-enabled cyber-physical systems.
Concurr. Comput. Pract. Exp., 2023

ILL-IDS: An incremental lifetime learning IDS for VANETs.
Comput. Secur., 2023

Efficient-Lightweight CRL Distribution in VANETs: A Multilayer Coded Caching Methodology.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

DQN based Blockchain Data Storage in Resource-constrained IoT System.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

An Efficient Multi-Blockchain Approach Towards Secure Platoon Management.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDNs.
Proceedings of the 24th IEEE International Conference on High Performance Switching and Routing, 2023

Preserving Data-Privacy Cooperative Control of Discrete-Time Multi-Agent Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
Active Computing Toward 5G Internet of Things.
IEEE Wirel. Commun., 2022

A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022

GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2022

FS-MOEA: A Novel Feature Selection Algorithm for IDSs in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

Competitive teaching-learning-based optimization for multimodal optimization problems.
Soft Comput., 2022

Secure Vehicular Platoon Management against Sybil Attacks.
Sensors, 2022

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.
Sensors, 2022

A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery.
Multim. Tools Appl., 2022

A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022

A misbehavior detection system to detect novel position falsification attacks in the Internet of Vehicles.
Eng. Appl. Artif. Intell., 2022

A FeedForward-Convolutional Neural Network to Detect Low-Rate DoS in IoT.
Eng. Appl. Artif. Intell., 2022

A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks.
Comput. Secur., 2022

Real-time cooperative data routing and scheduling in software defined vehicular networks.
Comput. Commun., 2022

A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT.
Comput. Networks, 2022

A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

Federated Learning for Heterogeneous Mobile Edge Device: A Client Selection Game.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons.
Proceedings of the 17th International Conference on Control, 2022

Novel Position Falsification Attacks Detection in the Internet of Vehicles using Machine Learning.
Proceedings of the 17th International Conference on Control, 2022

Self-Adaptive IDS in VANETs: A Game Theory and Deep Q-Learning Network Based Generic Scheme.
Proceedings of the IEEE Global Communications Conference, 2022

Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

2021
Data Forwarding Scheme for Vehicle Tracking in Named Data Networking.
IEEE Trans. Veh. Technol., 2021

Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework.
IEEE Trans. Netw. Serv. Manag., 2021

Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking.
IEEE Trans. Netw. Sci. Eng., 2021

Smart healthcare in smart cities: wireless patient monitoring system using IoT.
J. Supercomput., 2021

Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain.
IEEE Trans. Intell. Transp. Syst., 2021

ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Compact E-Cash with Efficient Coin-Tracing.
IEEE Trans. Dependable Secur. Comput., 2021

CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

A lightweight and secure handover authentication scheme for 5G network using neighbour base stations.
J. Netw. Comput. Appl., 2021

A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system.
J. Intell. Fuzzy Syst., 2021

Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks.
IEEE Internet Things J., 2021

Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher.
IEICE Trans. Commun., 2021

Research on DoS Attacks Intrusion Detection Model Based on Multi-Dimensional Space Feature Vector Expansion K-Means Algorithm.
IEICE Trans. Commun., 2021

OIDPR: Optimized insulin dosage via privacy-preserving reinforcement learning.
Trans. Emerg. Telecommun. Technol., 2021

An enhanced handover authentication solution for 6LoWPAN networks.
Comput. Secur., 2021

Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking.
IEEE Commun. Mag., 2021

A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks.
Comput. Electr. Eng., 2021

IEEE Access Special Section Editorial: Urban Computing and Intelligence.
IEEE Access, 2021

Ieee Access Special Section Editorial: Human-Driven Edge Computing.
IEEE Access, 2021

A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities.
Proceedings of the IEEE Region 10 Conference, 2021

Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks.
Proceedings of the IEEE Region 10 Conference, 2021

Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

Low Rate DoS Attack Detection in IoT - SDN using Deep Learning.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

A Secure Authentication Protocol with Performance Enhancements for 4G LTE/LTE-A Wireless Networks.
Proceedings of the IECC 2021: 3rd International Electronics Communication Conference, Ho Chi Minh City, Vietnam, July 8, 2021

A LSTM-Based Channel Fingerprinting Method for Intrusion Detection.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

NSEHA: A Neighbor-based Secure and Efficient Handover Authentication Mechanism for 5G Networks.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks.
Proceedings of the ICC 2021, 2021

An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme.
Proceedings of the ICC 2021, 2021

Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNs.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

2020
An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios.
Wirel. Pers. Commun., 2020

BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon.
Wirel. Commun. Mob. Comput., 2020

A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks.
IEEE Trans. Wirel. Commun., 2020

Multi-access edge computing enabled internet of things: advances and novel applications.
Neural Comput. Appl., 2020

Storage and access optimization scheme based on correlation probabilities in the internet of vehicles.
J. Intell. Transp. Syst., 2020

WiDIGR: Direction-Independent Gait Recognition System Using Commercial Wi-Fi Devices.
IEEE Internet Things J., 2020

DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT.
IEEE Internet Things J., 2020

Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11ah networks.
Int. J. Commun. Syst., 2020

Cognitive-inspired Computing: Advances and Novel Applications.
Future Gener. Comput. Syst., 2020

Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks.
Future Gener. Comput. Syst., 2020

Blockchain-based mobility management for 5G.
Future Gener. Comput. Syst., 2020

Backtracking search algorithm with competitive learning for identification of unknown parameters of photovoltaic systems.
Expert Syst. Appl., 2020

Selection of the optimal embedding positions of digital audio watermarking in wavelet domain.
CoRR, 2020

A Survey on Security Aspects for 3GPP 5G Networks.
IEEE Commun. Surv. Tutorials, 2020

FKR: An efficient authentication scheme for IEEE 802.11ah networks.
Comput. Secur., 2020

Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

Privacy-preserving Intelligent Traffic Light Control.
Proceedings of the IEEE Global Communications Conference, 2020

Incremental Database Based on Distributed Ledger Technology for IDSs.
Proceedings of the IEEE Global Communications Conference, 2020

An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2019
Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Veh. Technol., 2019

Fog-Based Pub/Sub Index With Boolean Expressions in the Internet of Industrial Vehicles.
IEEE Trans. Ind. Informatics, 2019

Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm.
Soft Comput., 2019

Minimum Connected Dominating Set Algorithms for Ad Hoc Sensor Networks.
Sensors, 2019

A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol.
Sensors, 2019

Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks.
IEEE Netw., 2019

Concentration-based demodulation scheme for mobile receiver in molecular communication.
Nano Commun. Networks, 2019

A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology.
Knowl. Based Syst., 2019

Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019

Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet Things J., 2019

LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019

A privacy-preserving sensory data sharing scheme in Internet of Vehicles.
Future Gener. Comput. Syst., 2019

An accurate partially attracted firefly algorithm.
Computing, 2019

Connectivity aware tribrid routing framework for a generalized software defined vehicular network.
Comput. Networks, 2019

Markovian model based indoor location tracking for Internet of Things (IoT) applications.
Clust. Comput., 2019

A Hybrid Authentication Protocol for LTE/LTE-A Network.
IEEE Access, 2019

Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics.
IEEE Access, 2019

DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET.
IEEE Access, 2019

ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks.
IEEE Access, 2019

Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol.
IEEE Access, 2019

Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory.
IEEE Access, 2019

Secure and Efficient Fast Initial Link Setup Scheme Design.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

CETVSP: Cost Efficient Trust-Based Vehicle Selection for Platoon.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Efficient Handover Authentication Mechanism for 5G Wireless Network.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Blockchain-Based Mobility Management for LTE and Beyond.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

BAVPM: Practical Autonomous Vehicle Platoon Management Supported by Blockchain Technique.
Proceedings of the 4th International Conference on Intelligent Transportation Engineering, 2019

Design and Development of Smart Home Sensing Supported by Blockchain Technology.
Proceedings of the ICIT 2019, 2019

Securing 5G HetNets Using Mutual Physical Layer Authentication.
Proceedings of the ICIT 2019, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks.
Wirel. Commun. Mob. Comput., 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V.
KSII Trans. Internet Inf. Syst., 2018

Secure Group Mobility Support for 6LoWPAN Networks.
IEEE Internet Things J., 2018

A Novel Receiver Design for HACO-OFDM by Time-Domain Clipping Noise Elimination.
IEEE Commun. Lett., 2018

Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data.
Future Gener. Comput. Syst., 2018

Controller placement optimization in hierarchical distributed software defined vehicular networks.
Comput. Networks, 2018

EBTCOR: an Energy-Balanced 3D Topology Control Algorithm Based on Optimally Rigid Graph in UWSNs.
Ad Hoc Sens. Wirel. Networks, 2018

Distributed Power Saving for Large-Scale Software-Defined Data Center Networks.
IEEE Access, 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs.
IEEE Access, 2018

A Novel Mechanism for Fast Detection of Transformed Data Leakage.
IEEE Access, 2018

The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs.
IEEE Access, 2018

Modeling and analysis on double-tiered device-to-device communications in vehicle networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Cooperative Data Routing & Scheduling In Software Defined Vehicular Networks.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

A Sustainable Marriage of Telcos and Transp in the Era of Big Data: Are We Ready?
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

Temporary Internet Access for Authentication and Key Agreement for LTE Networks.
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

Privacy Preserving for Location-Based IoT Services.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

A Bio-Inspired and User-Experience Preferred Load-Balance Algorithm for Heterogeneous Networks.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Balance-Based SDN Controller Placement and Assignment with Minimum Weight Matching.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Link Stability Based Hybrid Routing Protocol for Software Defined Vehicular Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Weighted Context Graph Model for Fast Data Leak Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Proximity Testing for Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks.
Wirel. Pers. Commun., 2017

Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC).
Wirel. Pers. Commun., 2017

Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm.
Wirel. Pers. Commun., 2017

A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wirel. Pers. Commun., 2017

Resource Matching in Carrier Aggregation Enabling 5G Networks.
Wirel. Pers. Commun., 2017

Resource management for symmetrical applications over heterogeneous services in IEEE 802.16.
Wirel. Networks, 2017

G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017

Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels.
IEEE Trans. Circuits Syst. Video Technol., 2017

Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks.
IEEE Trans. Commun., 2017

Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.
Sensors, 2017

Design of a novel dynamic trust model for spectrum management in WRANs of TV white space.
J. Netw. Comput. Appl., 2017

A proxy signature-based handover authentication scheme for LTE wireless networks.
J. Netw. Comput. Appl., 2017

A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks.
J. Commun., 2017

Delay guaranteed MDP scheduling scheme for HCCA based on 802.11p protocol in V2R environments.
Int. J. Commun. Syst., 2017

An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space.
Int. J. Commun. Syst., 2017

A non-biased trust model for wireless mesh networks.
Int. J. Commun. Syst., 2017

Adaptive fuzzy multiple attribute decision routing in VANETs.
Int. J. Commun. Syst., 2017

Time Synchronization for Molecular Communication With Drift.
IEEE Commun. Lett., 2017

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks.
CoRR, 2017

Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks.
Complex., 2017

An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems.
Comput. Networks, 2017

A Special Section in IEEE Access: Cooperative and Intelligent Sensing.
IEEE Access, 2017

A Novel Efficient Address Mutation Scheme for IPv6 Networks.
IEEE Access, 2017

An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space.
IEEE Access, 2017

Multi-Population Ant Colony Algorithm for Virtual Machine Deployment.
IEEE Access, 2017

Advanced Perceptive Forwarding in Content-Centric Networks.
IEEE Access, 2017

Parameterized Spatio-Textual Publish/Subscribe in Road Sensor Networks.
IEEE Access, 2017

Scalable protection scheme for the H.264/SVC video streaming.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Efficient Flow Instantiation via Source Routing in Software Defined Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Fast and efficient physical layer authentication for 5G HetNet handover.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Achievable rate for a mobile molecular communication system invited paper.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

A Framework of Real-time Wandering Management for Person with Dementia.
Proceedings of the 8th International Conference on Computer Modeling and Simulation, 2017

A secure PMIPv6-based group mobility scheme for 6L0WPAN networks.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

GAKAV: Group Authentication and Key Agreement for LTE/LTE-A Vehicular Networks.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

An Efficient EAP-Based Pre-Authentication Scheme for Handovers in WRANs over TVWS.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Link Dynamics Based Packet Routing Framework for Software Defined Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Utility-Based Network Bandwidth Allocation in the Hybrid SDNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

DC and CoMP Authentication in LTE-Advanced 5G HetNet.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks.
Wirel. Pers. Commun., 2016

Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems.
Wirel. Networks, 2016

Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems.
EAI Endorsed Trans. Ubiquitous Environ., 2016

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks.
IEEE Trans. Veh. Technol., 2016

Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks.
IEEE Trans. Mob. Comput., 2016

A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.
J. Supercomput., 2016

A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks.
IEEE Trans. Ind. Informatics, 2016

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds.
IEEE Trans. Inf. Forensics Secur., 2016

Special Issue on Cognitive-Inspired Network Systems.
IEEE Syst. J., 2016

Security enhancement for dynamic key refreshment in neighborhood area network of smart grid.
Secur. Commun. Networks, 2016

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Secur. Commun. Networks, 2016

Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era.
J. Inf. Sci. Eng., 2016

A Load Balance Mechanism in Heterogeneous Network Based on Utility Function.
J. Commun., 2016

Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm.
J. Commun., 2016

Efficient Deployment of Base Stations in Wireless Communication Networks.
J. Commun., 2016

Secure delegation of services through proxy signature with revocation.
Int. J. Trust. Manag. Comput. Commun., 2016

H-LCFST: a hash lowest cost first search tree for flexible packet classification.
Int. J. Netw. Manag., 2016

Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems.
IET Commun., 2016

E<sup>3</sup>MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks.
IEEE Access, 2016

Offset estimation for clock synchronization in mobile molecular communication system.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Delay efficient software defined networking based architecture for vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

An efficient authentication framework over heterogeneous vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Reference broadcast synchronization scheme for nanomachines.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2016

A PMIPv6-Based Secured Mobility Scheme for 6LoWPAN.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A unified grid-based wandering pattern detection algorithm.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015

CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs.
Sensors, 2015

Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks.
Sensors, 2015

An enhanced authentication protocol for WRANs in TV white space.
Secur. Commun. Networks, 2015

GBAAM: group-based access authentication for MTC in LTE networks.
Secur. Commun. Networks, 2015

QoS provisioning by power control for video communication via satellite links.
Int. J. Satell. Commun. Netw., 2015

Collaborative Wireless Sensor Networks and Applications.
Int. J. Distributed Sens. Networks, 2015

TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs.
Int. J. Distributed Sens. Networks, 2015

Performance improvements of HCCA scheduling in V2R environments.
Int. J. Commun. Syst., 2015

Novel Frequency-Domain Oversampling Receiver for CP MC-CDMA Systems.
IEEE Commun. Lett., 2015

Secure Public Key Regime (SPKR) in vehicular networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

TR-SDTN: Trust based efficient routing in hostile social DTNs.
Proceedings of the IEEE International Conference on Communication, 2015

An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs.
Proceedings of the IEEE International Conference on Communication, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Provable secure protected designated proxy signature with revocation.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

A Lightweight Secure VANET-Based Navigation System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Perceptive Forwarding Strategy in Content-Centric Network.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Neighborhood area network security in smart grid using security enhanced key updating.
Proceedings of the 10th International Conference on Information, 2015

Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting.
Proceedings of the 10th International Conference on Information, 2015

Pareto efficient resource matching for LTE-A system.
Proceedings of the 10th International Conference on Information, 2015

2014
Resource Management and QoS Provisioning for Duplex Services in IEEE 802.16.
Wirel. Pers. Commun., 2014

A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple.
Wirel. Pers. Commun., 2014

Optimal Relay Placement in Cellular Networks.
IEEE Trans. Wirel. Commun., 2014

Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart Comput. Rev., 2014

A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks.
Sensors, 2014

Network selection and resource allocation for multicast in HetNets.
J. Netw. Comput. Appl., 2014

An ultralightweight RFID authentication protocol with CRC and permutation.
J. Netw. Comput. Appl., 2014

Scalable and efficient key management for Mobile WiMAX networks.
Int. J. Commun. Syst., 2014

Iterative frequency-domain fractionally spaced receiver for zero-padded multi-carrier code division multiple access systems.
IET Commun., 2014

SNR Improvement for Energy Detection of Narrow Band Signal in OFDM System.
IEEE Commun. Lett., 2014

A Survey on MAC Protocols for Underwater Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Commun. Surv. Tutorials, 2014

Sustainable mobile computing.
Computing, 2014

A geometrical approach for power optimization in relay-based cellular networks.
Proceedings of the Twentieth National Conference on Communications, 2014

Performance measurements for symmetrical services in wireless networks.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

An improved transport algorithm over DCCP in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Fuzzy Multiple Attribute Decision Routing in VANETs.
Proceedings of the IEEE International Conference on Communication Systems, 2014

A novel authenticated multi-party key agreement for private cloud.
Proceedings of the IEEE International Conference on Communications, 2014

Bandwidth efficient multicast in HetNets.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An Energy-Efficient Self-Adaptive Duty Cycle MAC Protocol for Traffic-Dynamic Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme.
Wirel. Pers. Commun., 2013

SIR Estimation in Hexagonal Cellular Networks with Best Server Policy.
Wirel. Pers. Commun., 2013

Protecting Satellite Systems from Disassociation DoS Attacks.
Wirel. Pers. Commun., 2013

A Cross-Layer Cognitive Radio-Based Framework and CAC Scheme in WiMAX Networks.
Wirel. Pers. Commun., 2013

A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems.
Wirel. Pers. Commun., 2013

Proactive load balancing with admission control for heterogeneous overlay networks.
Wirel. Commun. Mob. Comput., 2013

A novel authenticated encryption scheme with convertibility.
Math. Comput. Model., 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Netw. Comput. Appl., 2013

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013

Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Comput. Networks, 2013

A fluid approach for performance analysis of LTE-A networks with relays.
Proceedings of the IEEE 24th International Symposium on Personal, 2013

CCS-DTN: Efficient routing in social DTNs based on clustering and network coding.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Achieving Faster Handovers in Mobile WiMAX Networks.
Wirel. Pers. Commun., 2012

A MAC-Layer QoS Provisioning Protocol for Cognitive Radio Networks.
Wirel. Pers. Commun., 2012

Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks.
IEEE Trans. Wirel. Commun., 2012

An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wirel. Commun., 2012

A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks.
IEEE Trans. Parallel Distributed Syst., 2012

A Server Independent Authentication Scheme for RFID Systems.
IEEE Trans. Ind. Informatics, 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Secur. Commun. Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012

Cryptanalysis of some conference schemes for mobile communications.
Secur. Commun. Networks, 2012

Investigation of a large-scale P2P VoD overlay network by measurements.
Peer-to-Peer Netw. Appl., 2012

Differentiated service provisioning in the MAC layer of cognitive radio mesh networks.
Int. J. Commun. Networks Distributed Syst., 2012

A survey and projection on medium access control protocols for wireless sensor networks.
ACM Comput. Surv., 2012

Securing wireless mesh networks in a unified security framework with corruption-resilience.
Comput. Networks, 2012

Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels.
Comput. Networks, 2012

An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors.
Comput. Networks, 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Comput. Networks, 2012

Hybrid multimedia broadcast encryption schemes.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks.
Proceedings of IEEE International Conference on Communications, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

QoS guaranteed resource block allocation algorithm in LTE downlink.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Cross-Layer MAC Protocol and Holistic Opportunistic Scheduling with Adaptive Power Control for QoS in WiMAX.
Wirel. Pers. Commun., 2011

UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
IEEE Trans. Smart Grid, 2011

A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis.
J. Netw. Syst. Manag., 2011

Design of parameter tunable robust controller for active queue management based on H<sub>∞</sub> control theory.
J. Netw. Comput. Appl., 2011

Group mobility support in mobile WiMAX networks.
J. Netw. Comput. Appl., 2011

Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system.
J. Netw. Comput. Appl., 2011

A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks.
J. Netw. Comput. Appl., 2011

A performance model for differentiated service over single-hop passive star coupled WDM optical networks.
J. Netw. Comput. Appl., 2011

Quality of service provisioning in worldwide interoperability for microwave access networks based on cooperative game theory.
IET Commun., 2011

A strong user authentication scheme with smart cards for wireless communications.
Comput. Commun., 2011

Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX.
Comput. Networks, 2011

Routing and QoS provisioning in cognitive radio networks.
Comput. Networks, 2011

Performance benchmarking for wireless body area networks at 2.4 GHz.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

A Batch Authentication Protocol for V2G Communications.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Unified Security Framework for Multi-domain Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2011

Matrix-tree based hybrid broadcast encryption.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

A cross-layer selfishness Avoidance Routing Protocol for the dynamic Cognitive Radio Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Understanding link-level characterization of long-distance 802.11g semi-urban links.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Scalable Rekeying Algorithm in IEEE 802.16e.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

An efficient and secured multi-server authentication scheme.
Proceedings of the 8th International Conference on Information, 2011

An untraceable and server-independent RFID authentication scheme.
Proceedings of the 8th International Conference on Information, 2011

Study of effect of timeout settings on energy saving of lighting systems using queuing model.
Proceedings of the 8th International Conference on Information, 2011

Delay Tolerant Networking.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
Narrowband Interference Mitigation in DS-UWB Systems.
IEEE Signal Process. Lett., 2010

Network lifetime optimization in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

Hierarchical scheduling framework for QoS service in WiMAX point-to-multi-point networks.
IET Commun., 2010

QoS-aware cooperative medium access control for MIMO ad-hoc networks.
IEEE Commun. Lett., 2010

An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks.
Comput. Commun., 2010

A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX.
Comput. Networks, 2010

Decoding of QOSTBC concatenates RS code using parallel interference cancellation.
Proceedings of the Second International Conference on Digital Image Processing, 2010

Cross-Layer Self-Optimizing Temporal-Spectrum Block Scheduling for QoS Provisioning in WiMAX.
Proceedings of the Global Communications Conference, 2010

An Opportunistic Service Differentiation Routing Protocol for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

2009
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks.
Wirel. Pers. Commun., 2009

Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks.
Wirel. Pers. Commun., 2009

Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009

A utility-based joint power and rate adaptive algorithm in wireless ad hoc networks.
IEEE Trans. Commun., 2009

WLAN Traffic Prediction Using Support Vector Machine.
IEICE Trans. Commun., 2009

A hybrid load balancing strategy of sequential tasks for grid computing environments.
Future Gener. Comput. Syst., 2009

An energy-efficient MAC protocol with Adaptive Scheduling for wireless sensor networks.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

A QoS-Based Vertical Handoff Scheme for Interworking of WLAN and WiMAX.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Network lifetime maximization with cross-layer design in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2008

Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks.
IEEE Trans. Commun., 2008

Providing differentiated services in CDMA wireless networks.
IET Commun., 2008

Providing delay guaranteed service in CDMA wireless networks.
Comput. Commun., 2008

Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks.
Sci. China Ser. F Inf. Sci., 2008

Intelligent MAC model for traffic scheduling in IEEE 802.11e wireless LANs.
Appl. Math. Comput., 2008

A Queue Based Scheduling Approach for WMAN with Adaptive Augmentation.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Analysis of K-Connectivity in Shadowing and Nakagami Fading Wireless Multi-Hop Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Experimental evaluation of an adaptive PI rate controller for congestion control.
Proceedings of the IEEE International Conference on Systems, 2008

Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

An analysis and implementation study on a robust congestion controller for the internet.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

An iterated channel estimation and tracking scheme for space-time code systems.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

Fluid-Based Modeling of TCP Veno.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

AOA Cooperative Position Localization.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Task scheduling by Mean Field Annealing algorithm in grid computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Providing Real-Time Service in CDMA Wireless Networks.
Wirel. Pers. Commun., 2007

Call Completion in Wireless Networks Over Lossy Link.
IEEE Trans. Veh. Technol., 2007

A Link Adaptation Algorithm in MIMO-based WiMAX Systems.
J. Commun., 2007

Performance Study of Packing Aggregation in Wireless Sensor Networks.
IEICE Trans. Commun., 2007

A Rehearsal-Assisted Distributed MAC Protocol for TDD-CDMA Based Multihop Networks.
IEEE Commun. Lett., 2007

Wireless Broadband Access: WiMAX and Beyond [Guest Editorial].
IEEE Commun. Mag., 2007

Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks.
Proceedings of the 2007 IEEE International Conference on Research, 2007

Adaptive Rate Selection Scheme Based on Intelligent Learning Algorithm in Wireless LANs.
Proceedings of the Advances in Computation and Intelligence, 2007

Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Backup Routing for Multimedia Transmissions over Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2007

Theoretical Lower Bound for UWB TDOA Positioning.
Proceedings of the Global Communications Conference, 2007

Network Lifetime Global Optimization by Duality Approach in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Supporting Differentiated Services with Fairness by an Urgency Fair Queuing Scheduling Scheme in EPONs.
Photonic Netw. Commun., 2006

Adaptive polling interval scheduling to support real-time service in Bluetooth networks.
Int. J. Wirel. Mob. Comput., 2006

Supporting Real-Time Service in Packet-Switched Wireless Networks.
Int. J. Bus. Data Commun. Netw., 2006

Modeling location management in wireless networks with generally distributed parameters.
Comput. Commun., 2006

Hierarchical scheduling to support differentiated services in Ethernet passive optical networks.
Comput. Networks, 2006

Dynamic admission control in hybrid QoS networks with WiFi access.
Sci. China Ser. F Inf. Sci., 2006

An efficient solution for mitigating light-load penalty in EPONs.
Comput. Electr. Eng., 2006

Providing integrated service in CDMA wireless networks.
Comput. Electr. Eng., 2006

Ubiquitous Mobility in Next Generation Networks.
Proceedings of the 14th IEEE International Conference on Networks, 2006

SVM-Based Models for Predicting WLAN Traffic.
Proceedings of IEEE International Conference on Communications, 2006

A Power-Controlled Rate-Adaptive MAC Protocol to Support Differentiated Service in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Task Scheduling by Neural Network with Mean Field Annealing Improvement in Grid Computing.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Message scheduling in WDM optical networks with reduced transmitter tuning overhead.
IEEE Commun. Lett., 2005

An urgency fair queuing scheduling to support differentiated services in EPONs.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Efficient message scheduling for WDM optical networks with minimizing flow time.
J. Commun. Networks, 2004

An adaptive scheduling algorithm for differentiated services on WDM optical networks.
Comput. Commun., 2004

Adaptive scheduling for integrated traffic on WDM optical networks.
Comput. Networks, 2004

An efficient multiple access control scheme to support differentiated services in EPONS.
Proceedings of the 12th IEEE International Conference on Networks, 2004

An efficient scheduling algorithm with reduced message delay for WDM optical networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2003
A cost-based scheduling algorithm for differentiated service on WDM optical networks.
IEEE Commun. Lett., 2003

A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

A novel multiple access scheme for Ethernet passive optical networks.
Proceedings of the Global Telecommunications Conference, 2003

2000
Providing deterministic quality-of-service guarantees on WDM optical networks.
IEEE J. Sel. Areas Commun., 2000

A Systematic Scheme for Guaranteed Deterministic Performance Service on WDM Optical Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

Providing guaranteed deterministic performance service to multimedia applications on WDM optical networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
Efficient Scheduling Algorithms for Real-Time Service on WDM Optical Networks.
Photonic Netw. Commun., 1999

An Efficient Message Scheduling Algorithm for WDM Lightwave Networks.
Comput. Networks, 1999

1996
A Fault-tolerant Strategy for Real-time Task Scheduling on Multiprocessor System.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996


  Loading...