Xiaohong Jiang

Orcid: 0000-0001-9739-1930

Affiliations:
  • Future University Hakodate, Japan
  • Tohoku University, Department of Graduate School of Information Sciences, Japan
  • Nanjing University, State Key Laboratory for Novel Software Technology, China
  • Xidian University, China (PhD 1999)


According to our database1, Xiaohong Jiang authored at least 329 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint.
IEEE Internet Things J., December, 2024

On Covert Rate in Full-Duplex D2D-Enabled Cellular Networks With Spectrum Sharing and Power Control.
IEEE Trans. Mob. Comput., October, 2024

BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
IEEE Trans. Knowl. Data Eng., September, 2024

RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks.
IEEE Syst. J., September, 2024

Ada-FA: A Comprehensive Framework for Adaptive Fault Tolerance and Aging Mitigation in FPGAs.
IEEE Internet Things J., May, 2024

Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification.
IEEE Trans. Mob. Comput., February, 2024

Privacy-preserving data publishing: an information-driven distributed genetic algorithm.
World Wide Web (WWW), January, 2024

Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks.
IEEE Internet Things J., January, 2024

Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming.
IEEE Trans. Inf. Forensics Secur., 2024

PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems.
IEEE Trans. Inf. Forensics Secur., 2024

Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems.
IEEE Trans. Commun., 2024

A new entropy source design based on NAND-XOR ring oscillators for resource-efficient and ultra-high throughput TRNG.
IEICE Electron. Express, 2024

Enhancing Covert Communication in Relay Systems Using Multi-Antenna Technique.
CoRR, 2024

On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay.
CoRR, 2024

Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection.
Comput. Commun., 2024

A New Secrecy Metric for Relay-Eavesdropper Channel.
Proceedings of the International Conference on Networking and Network Applications, 2024

2023
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks.
IEEE Trans. Wirel. Commun., December, 2023

Building Trusted Federated Learning: Key Technologies and Challenges.
J. Sens. Actuator Networks, February, 2023

Sum Rate and Max-Min Rate for Cellular-Enabled UAV Swarm Networks.
IEEE Trans. Veh. Technol., 2023

Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems.
IEEE Trans. Cloud Comput., 2023

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks.
IEEE Internet Things J., 2023

A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security.
IET Inf. Secur., 2023

SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023

Cooperative Jamming and Relay Selection for Covert Communications.
CoRR, 2023

Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems.
Ad Hoc Networks, 2023

Joint Secure and Covert Communication Study in Two-hop Relaying Systems.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO Systems.
Proceedings of the International Conference on Networking and Network Applications, 2023

On UAV-IRS-Aided Covert Communication of D2D-Enabled Cellular Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Covert Terahertz Communication for UAV-Aided Wireless Relay Systems.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Review on Feature, Problem Formulation and Application of Radio Frequency Fingerprinting.
Proceedings of the 13th International Conference on the Internet of Things, 2023

3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Physical layer authentication in MIMO systems: a carrier frequency offset approach.
Wirel. Networks, 2022

Joint Emergency Data and Service Evacuation in Cloud Data Centers Against Early Warning Disasters.
IEEE Trans. Netw. Serv. Manag., 2022

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security.
IEEE Trans. Inf. Forensics Secur., 2022

On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System.
IEEE Trans. Commun., 2022

Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems.
IEEE Internet Things J., 2022

Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?
IEEE Internet Things J., 2022

CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain.
Future Gener. Comput. Syst., 2022

A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022

Online machine learning-based physical layer authentication for MmWave MIMO systems.
Ad Hoc Networks, 2022

Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Multi-antenna covert communications in random wireless networks with full-duplex relay.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2022

Covert Communication in NOMA Systems with Decision-Assisted Q-learning.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas.
IEEE Trans. Wirel. Commun., 2021

QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers.
IEEE Trans. Wirel. Commun., 2021

Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control.
IEEE Trans. Commun., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

Real-time data backup in Geo-distributed data center networks against progressive disaster.
Photonic Netw. Commun., 2021

Modulation and Signal Detection for Diffusive-Drift Molecular Communication with a Mobile Receiver.
Mob. Inf. Syst., 2021

Incentive Jamming-Based Secure Routing in Decentralized Internet of Things.
IEEE Internet Things J., 2021

Covert Communication in Relay-Assisted IoT Systems.
IEEE Internet Things J., 2021

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021

Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems.
Comput. Networks, 2021

Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime.
Ad Hoc Networks, 2021

Covert MIMO Communication in Two-hop Relay Systems.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Exact Evaluation of Total Variation Distance in Covert Communications.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Editorial: Special issue on security and privacy in network computing.
World Wide Web, 2020

On covert throughput performance of two-way relay covert wireless communications.
Wirel. Networks, 2020

Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments.
IEEE Trans. Wirel. Commun., 2020

Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems.
IEEE Trans. Commun., 2020

Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities.
IEEE Internet Things J., 2020

Secrecy transmission capacity in mobile <i>ad hoc</i> networks with security-aware Aloha protocol.
IET Commun., 2020

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication.
CoRR, 2020

Early warning disaster-aware service protection in geo-distributed data centers.
Comput. Networks, 2020

On social-aware data uploading study of D2D-enabled cellular networks.
Comput. Networks, 2020

On delay performance study for cooperative multicast MANETs.
Ad Hoc Networks, 2020

Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper.
Ad Hoc Networks, 2020

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges.
IEEE Access, 2020

On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT Scenarios.
Proceedings of the International Conference on Networking and Network Applications, 2020

Covert Outage Analysis for Random Wireless Networks Under Warden Collusion.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Friendship-based cooperative jamming for secure communication in Poisson networks.
Wirel. Networks, 2019

Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective.
IEEE Trans. Commun., 2019

Smart Contract-Based Access Control for the Internet of Things.
IEEE Internet Things J., 2019

A Generalized Data Uploading Scheme for D2D-Enhanced Cellular Networks.
IEICE Trans. Commun., 2019

Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control.
Comput. Networks, 2019

End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks.
IEEE Access, 2019

Non-Asymptotic Capacity Study in Multicast Mobile Ad Hoc Networks.
IEEE Access, 2019

Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective.
IEEE Access, 2019

Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Disaster-Aware Dynamic Routing for SDN-Based Active-Active Data Center Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Ripple: An Efficient Runtime Reconfigurable P4 Data Plane for Multicore Systems.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Transmission Reduction Scheme in an Emergency Warning System with LTE D2D.
Proceedings of the Twelfth International Conference on Mobile Computing and Ubiquitous Network, 2019

A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019

Relay UE Selection Scheme in an Emergency Warning System Integrating Proximity Services.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework.
Wirel. Commun. Mob. Comput., 2018

SEGM: A secure group management framework in integrated VANET-cellular networks.
Veh. Commun., 2018

Special Issue on Secure and privacy-preserving Autonomous Vehicle Networks (AVNs).
Veh. Commun., 2018

On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection.
IEEE Trans. Wirel. Commun., 2018

Asymptotic Analysis of Inhomogeneous Information-Centric Wireless Networks With Infrastructure Support.
IEEE Trans. Veh. Technol., 2018

Generalized Cooperative Multicast in Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Serv. Comput., 2018

Practical Verifiable Computation-A MapReduce Case Study.
IEEE Trans. Inf. Forensics Secur., 2018

Blocking Probability Analysis for Optical Banyan Networks With Link Failure.
IEEE Trans. Commun., 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

Cutting Long-Tail Latency of Routing Response in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018

Heterogeneous Data Backup Against Early Warning Disasters in Geo-Distributed Data Center Networks.
JOCN, 2018

Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying.
CoRR, 2018

On the packet delivery delay study for three-dimensional mobile ad hoc networks.
Ad Hoc Networks, 2018

Exact secrecy throughput capacity study in mobile ad hoc networks.
Ad Hoc Networks, 2018

Empowering Sketches with Machine Learning for Network Measurements.
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018

Least-Unavailability Path Selecting Algorithm Based on RBF for Disaster-Survivable Software-Defined Optical Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Channel-based Authentication for Dual-Hop Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

An Optimized Content Uploading Scheme for D2D Communications Underlaying Cellular Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint.
Wirel. Networks, 2017

Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships.
IEEE Trans. Veh. Technol., 2017

On Performance Modeling for MANETs Under General Limited Buffer Constraint.
IEEE Trans. Veh. Technol., 2017

Performance Analysis of f-Cast Crosstalk-Free Optical Banyan Networks.
IEEE Trans. Commun., 2017

Practical Performance of MANETs Under Limited Buffer and Packet Lifetime.
IEEE Syst. J., 2017

Nonblocking conditions for -cast Clos networks under balanced traffic.
Opt. Switch. Netw., 2017

Challenges and Opportunities of Network Virtualization over Wireless Mobile Networks.
Mob. Inf. Syst., 2017

ϵ-Time Early Warning Data Backup in Disaster-Aware Optical Inter-Connected Data Center Networks.
JOCN, 2017

Special Section on Mobile Content Delivery Networks.
Comput. Commun., 2017

Physical layer security-aware routing and performance tradeoffs in ad hoc networks.
Comput. Networks, 2017

Connecting a City by Wireless Backhaul: 3D Spatial Channel Characterization and Modeling Perspectives.
IEEE Commun. Mag., 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017

On the rate of successful transmissions in finite slotted Aloha MANETs.
Ad Hoc Networks, 2017

SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Limits of Covert Communication on Two-Hop AWGN Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Trust-Aware Data Uploading Based on Device-to-Device Communications.
Proceedings of the International Conference on Networking and Network Applications, 2017

Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.
Proceedings of the International Conference on Networking and Network Applications, 2017

On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
End-to-End Delay Modeling in Buffer-Limited MANETs: A General Theoretical Framework.
IEEE Trans. Wirel. Commun., 2016

On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks.
IEEE Trans. Commun., 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans Autom. Sci. Eng., 2016

Green Communication for Mobile and Wireless Networks.
Mob. Inf. Syst., 2016

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
CoRR, 2016

Physical Layer Security-Aware Routing and Performance Tradeoffs in WANETs.
CoRR, 2016

Probabilistic region failure-aware data center network and content placement.
Comput. Networks, 2016

On throughput capacity for a class of buffer-limited MANETs.
Ad Hoc Networks, 2016

Delivery Probability of 3D MANETs with Packet Replication.
Proceedings of the International Conference on Networking and Network Applications, 2016

An Improved Amorphous Localization Algorithm for Wireless Sensor Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Data Collection Scheme Based on Wake-Up in Body Area Nanonetworks.
Proceedings of the International Conference on Networking and Network Applications, 2016

The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exact Secrecy Throughput of MANETs with Guard Zone.
Proceedings of the International Conference on Networking and Network Applications, 2016

Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Security/QoS-aware route selection in multi-hop wireless ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Cost-efficient data backup for data center networks against ε-time early warning disaster.
Proceedings of the 17th IEEE International Conference on High Performance Switching and Routing, 2016

2015
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process.
Wirel. Networks, 2015

Packet Delivery Ratio/Cost in MANETs With Erasure Coding and Packet Replication.
IEEE Trans. Veh. Technol., 2015

Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015

Green and Friendly Communication for Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Location-Related Challenges and Strategies in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Throughput Capacity Study for MANETs with Erasure Coding and Packet Replication.
IEICE Trans. Commun., 2015

Cost-Efficient Data Backup for Data Center Networks against ε-Time Early Warning Disaster.
CoRR, 2015

Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead.
Comput. Networks, 2015

Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming.
Ad Hoc Sens. Wirel. Networks, 2015

End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach.
Ad Hoc Sens. Wirel. Networks, 2015

On the exact multicast delay in mobile ad hoc networks with f-cast relay.
Ad Hoc Networks, 2015

Source delay in mobile ad hoc networks.
Ad Hoc Networks, 2015

Interference-aware spectral-and-energy efficiency tradeoff in heterogeneous networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Outage performance of secure multicasting in the presence of multiple eavesdroppers.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

Modeling the success transmission rate in Aloha MANETs with Binomial point process.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

Delivery Delay in 3D MANETs with Packet Redundancy.
Proceedings of the Third International Symposium on Computing and Networking, 2015

An Efficient Localization Algorithm in Wireless Sensor Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

An Energy-Efficient Data Collection Scheme in Body Area Nanonetworks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Probabilistic region failure-aware data center network placement.
Proceedings of the 16th IEEE International Conference on High Performance Switching and Routing, 2015

2014
Delay control in MANETs with erasure coding and f-cast relay.
Wirel. Networks, 2014

Energy-Efficient Prefix-Free Codes for Wireless Nano-Sensor Networks Using OOK Modulation.
IEEE Trans. Wirel. Commun., 2014

Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology".
Telecommun. Syst., 2014

Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks.
IEEE Trans. Commun., 2014

Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks.
IEEE J. Sel. Areas Commun., 2014

Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks.
JOCN, 2014

A Novel QoS-Based Framework for Cloud Computing Service Provider Selection.
Int. J. Cloud Appl. Comput., 2014

Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel.
IEICE Trans. Commun., 2014

Practical throughput analysis for two-hop wireless network coding.
Comput. Networks, 2014

Secrecy transmission capacity in noisy wireless ad hoc networks.
Ad Hoc Networks, 2014

Throughput capacity of two-hop relay MANETs under finite buffers.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Multicast Delay of Mobile Ad Hoc Networks.
Proceedings of the Second International Symposium on Computing and Networking, 2014

End-to-End Delay in Two Hop Relay MANETs with Limited Buffer.
Proceedings of the Second International Symposium on Computing and Networking, 2014

On Capacity Studies for Mobile Ad Hoc Networks.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Blocking probability of f-cast optical banyan networks on vertical stacking.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

On Delivery Delay-Constrained Throughput and End-to-End Delay in MANETs.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Throughput Capacity of MANETs with Power Control and Packet Redundancy.
IEEE Trans. Wirel. Commun., 2013

On the Delivery Probability of Two-Hop Relay MANETs with Erasure Coding.
IEEE Trans. Commun., 2013

Optimal coding for transmission energy minimization in wireless nanosensor networks.
Nano Commun. Networks, 2013

Performance Modeling for Relay Cooperation in Delay Tolerant Networks.
Mob. Networks Appl., 2013

Effects of Channel Correlation on Outage Secrecy Capacity.
J. Inf. Process., 2013

Throughput Capacity of MANETs with Group-Based Scheduling and General Transmission Range.
IEICE Trans. Commun., 2013

Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013

On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
CoRR, 2013

Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process.
CoRR, 2013

Block-level packet recovery with network coding for wireless reliable multicast.
Comput. Networks, 2013

RFID-based localization with Non-Blocking tag scanning.
Ad Hoc Networks, 2013

Throughput analysis in mobile ad hoc networks with directional antennas.
Ad Hoc Networks, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Energy optimal coding for wireless nanosensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

Throughput analysis for two-hop relay mobile ad hoc networks with receiver probing.
Proceedings of IEEE International Conference on Communications, 2013

Packet Delivery Probability in Two-Hop Relay MANETs with Hybrid Routing.
Proceedings of the First International Symposium on Computing and Networking, 2013

Cost and delay tradeoff in three-stage switch architecture for data center networks.
Proceedings of the IEEE 14th International Conference on High Performance Switching and Routing, 2013

A Delay Constrained Two-Hop Relay Algorithm for Transparent Computing in MANETs.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Data center network placement and service protection in all-optical mesh networks.
Proceedings of the 9th International Conference on the Design of Reliable Communication Networks, 2013

Fast connection recovery against region failures with landmark-based source routing.
Proceedings of the 9th International Conference on the Design of Reliable Communication Networks, 2013

2012
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC).
IEEE Wirel. Commun. Lett., 2012

Capacity and Delay of Probing-Based Two-Hop Relay in MANETs.
IEEE Trans. Wirel. Commun., 2012

Generalized two-hop relay for flexible delay control in MANETs.
IEEE/ACM Trans. Netw., 2012

Constructing N-to-N Shared Optical Queues With Switches and Fiber Delay Lines.
IEEE Trans. Inf. Theory, 2012

Optimal Forwarding Games in Mobile Ad Hoc Networks with Two-Hop f-cast Relay.
IEEE J. Sel. Areas Commun., 2012

Acknowledgment Mechanisms for Network-Coding-Based Reliable Wireless Multicast.
IEICE Trans. Commun., 2012

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012

End-to-end delay in mobile ad hoc networks with generalized transmission range and limited packet redundancy.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Multicast capacity, delay and delay jitter in intermittently connected mobile networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exact throughput capacity under power control in mobile ad hoc networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exact capacity study for a class of MANETs.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Delivery ratio in two-hop relay MANETs with limited message lifetime and redundancy.
Proceedings of IEEE International Conference on Communications, 2012

Capacity vs. delivery delay in MANETs with power control and f-cast relay.
Proceedings of IEEE International Conference on Communications, 2012

Assessing physical network vulnerability under random line-segment failure model.
Proceedings of the 13th IEEE International Conference on High Performance Switching and Routing, 2012

Probing-based two-hop relay with limited packet redundancy.
Proceedings of the 13th IEEE International Conference on High Performance Switching and Routing, 2012

Throughput capacity of the group-based two-hop relay algorithm in MANETs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Message delivery probability of two-hop relay with erasure coding in MANETs.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

Secrecy capacity of correlated rayleigh fading channels.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

Exact throughput capacity in MANETs with directional antenna and transmission power constraint.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
Delay and Capacity in Ad Hoc Mobile Networks with f-cast Relay Algorithms.
IEEE Trans. Wirel. Commun., 2011

Reliability Assessment for Wireless Mesh Networks Under Probabilistic Region Failure Model.
IEEE Trans. Veh. Technol., 2011

Efficient Designs of Optical LIFO Buffer with Switches and Fiber Delay Lines.
IEEE Trans. Commun., 2011

Node Aggregation Degree-Aware Random Routing for Non-uniform Wireless Sensor Networks.
IEICE Trans. Commun., 2011

Flow-oriented network coding architecture for multihop wireless networks.
Comput. Networks, 2011

Performance modeling for two-hop relay with node selfishness in delay tolerant networks.
Proceedings of the IEEE Online Conference on Green Communications, 2011

Non-blocking tag scanning for passive RFID localization.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

A General Sharing Model Based on Proxy Re-encryption.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

High Performance Tag Singulation for Memory-Less RFID Systems.
Proceedings of IEEE International Conference on Communications, 2011

Delay and Capacity in Ad Hoc Mobile Networks with ??-Cast Relay Algorithms.
Proceedings of IEEE International Conference on Communications, 2011

Assessing network vulnerability under probabilistic region failure model.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

An improved design of optical LIFO buffer with switched delay lines.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

Group-based two-hop relay with redundancy in MANETs.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

Performance Modeling for Two-Hop Relay with Erasure Coding in MANETs.
Proceedings of the Global Communications Conference, 2011

A general model for store-carry-forward routing schemes with multicast in delay tolerant networks.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Distributed Approximation Algorithms for Longest-Lived Multicast in WANETs with Directional Antennas.
IEEE Trans. Wirel. Commun., 2010

Joint Design of Network Coding and Transmission Rate Selection for Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2010

Opportunistic link overbooking for resource efficiency under per-flow service guarantee.
IEEE Trans. Commun., 2010

WiMAX-VPON: A Framework of Layer-2 VPNs for Next-Generation Access Networks.
JOCN, 2010

Analysis of random sleep scheme for wireless sensor networks.
Int. J. Sens. Networks, 2010

Group Testing Based Detection of Web Service DDoS Attackers.
IEICE Trans. Commun., 2010

Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks.
IEICE Trans. Commun., 2010

Network coding-based reliable multicast in wireless networks.
Comput. Networks, 2010

Probabilistic proactive routing with active route trace-back for MANETs.
Ad Hoc Networks, 2010

Burst Loss Probability Model for Hybrid Deflection and Retransmission Routing in OBS Networks.
Proceedings of the 2010 IEEE RIVF International Conference on Computing & Communication Technologies, 2010

Packet loss process under bounded delay.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

Performance Analysis of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks.
Proceedings of the Global Communications Conference, 2010

A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Wireless Access Point Voice Capacity Analysis and Enhancement Based on Clients' Spatial Distribution.
IEEE Trans. Veh. Technol., 2009

A construction of 1-to-2 shared optical buffer queue with switched delay lines.
IEEE Trans. Commun., 2009

Robust Node Positioning in Wireless Sensor Networks.
IEICE Trans. Commun., 2009

New Bounds on the Feedforward Design of Optical Output Buffer Multiplexers and Switches.
IEICE Trans. Commun., 2009

Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2009

Self-Routing Nonblocking WDM Switches Based on Arrayed Waveguide Grating.
IEICE Trans. Commun., 2009

A More Efficient COPE Architecture for Network Coding in Multihop Wireless Networks.
IEICE Trans. Commun., 2009

Fair Scheduling for Delay-Sensitive VoIP Traffic.
IEICE Trans. Commun., 2009

Network Performance of Pruned Hierarchical Torus Network.
Proceedings of the NPC 2009, 2009

Reliable multicast with network coding.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

On the Detection of DDoS Attackers for Large-Scale Networks.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

2008
Topology Design of Network-Coding-Based Multicast Networks.
IEEE Trans. Parallel Distributed Syst., 2008

Strictly nonblocking f-cast photonic networks.
IEEE/ACM Trans. Netw., 2008

Rearrangeable f-cast multi-log<sub>2</sub> N networks.
IEEE Trans. Commun., 2008

Redundant Vias Insertion for Performance Enhancement in 3D ICs.
IEICE Trans. Electron., 2008

Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch.
IEICE Trans. Commun., 2008

Routing Algorithms for Packet/Circuit Switching in Optical Multi-log<sub>2</sub><i>N</i> Networks.
IEICE Trans. Commun., 2008

Recursive Formula for the Moments of Queue Length in the M/M/1 Queue.
IEEE Commun. Lett., 2008

Network CodingOpportunity Analysis of COPE in Multihop Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Voice Capacity Analysis and Enhancement in Wireless LAN.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Improved Bounds on the Feedfoward Design of Optical Multiplexers.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

Detecting SYN Flooding Agents under Any Type of IP Spoofing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Strictly Nonblocking Function-Cast d-Ary Multi-Log Networks under Fanout and Crosstalk Constraints.
Proceedings of IEEE International Conference on Communications, 2008

Efficient Scheduling Schemes for Sabotage-Tolerance in Volunteer Computing Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Restoration Probability Modelling for Active Restoration-Based Optical Networks with Correlation Among Backup Routes.
IEEE Trans. Parallel Distributed Syst., 2007

Variant X-Tree Clock Distribution Network and Its Performance Evaluations.
IEICE Trans. Electron., 2007

CBX-1 Switch: An Effective Load Balanced Switch.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

On the Routing Algorithms for Optical Multi-log<sub>2</sub> <i>N</i> Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Efficient Scheduler for the Growing VoIP Traffic.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

An Improved Topology Design Algorithm for Network Coding-Based Multicast Networks.
Proceedings of IEEE International Conference on Communications, 2007

A General Packet Coding Scheme for Multi-Hop Wireless Networks.
Proceedings of the Global Communications Conference, 2007

2006
Overall Blocking Behavior Analysis of General Banyan-Based Optical Switching Networks.
IEEE Trans. Parallel Distributed Syst., 2006

Ant-based survivable routing in dynamic WDM networks with shared backup paths.
J. Supercomput., 2006

An Ant-Based Approach for Dynamic RWA in Optical WDM Networks.
Photonic Netw. Commun., 2006

A novel dynamic survivable routing in WDM optical networks with/without sparse wavelength conversion.
Opt. Switch. Netw., 2006

Performance modelling for vertically stacked optical banyan networks with extra stage.
Int. J. Comput. Sci. Eng., 2006

Lower-Bound on Blocking Probability of a Class of Crosstalk-Free Optical Cross-Connects (OXCs).
IEICE Trans. Inf. Syst., 2006

Ant-Based Alternate Routing in All-Optical WDM Networks.
IEICE Trans. Commun., 2006

A Class of Benes-Based Optical Multistage Interconnection Networks for Crosstalk-Free Realization of Permutations.
IEICE Trans. Commun., 2006

BAIMD: A Responsive Rate Control for TCP over Optical Burst Switched (OBS) Networks.
Proceedings of IEEE International Conference on Communications, 2006

Performance Analysis for Active Restoration-Based Optical Networks Incorporating the Correlation Among Backup Routes.
Proceedings of IEEE International Conference on Communications, 2006

A non-orthogonal clock distribution network and its performance evaluation in presence of process variations and inductive effects.
Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30, 2006

On Modeling the Restoration Probability of Active Restoration-Based Optical Networks with Correlation Among Backup Routes.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Network-coding Based Topology Design for Multicast Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Design of Optical Rearrangeable Nonblocking MINs Under Various Crosstalk Constraints.
Photonic Netw. Commun., 2005

Models of Restoration Probability in WDM Networks Employing Active Restoration.
Photonic Netw. Commun., 2005

Performance Modeling for All-Optical Photonic Switches Based on the Vertical Stacking of Banyan Network Structures.
IEEE J. Sel. Areas Commun., 2005

Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion.
IEICE Trans. Inf. Syst., 2005

A Hybrid Algorithm for Dynamic Lightpath Protection in Survivable WDM Optical Networks.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithm in WDM Networks with Sparse Wavelength Conversion.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Fast Parallel DNA-Based Algorithms for Molecular Computation: Determining a Prime Number.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Blocking probability modeling of distensible optical banyan networks.
Proceedings of IEEE International Conference on Communications, 2005

Dynamic Lightpath Protection in WDM optical Networks Using Ant-based Mobile Agents.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

A New Hybrid Architecture for Optical Burst Switching Networks.
Proceedings of the High Performance Computing and Communications, 2005

Optical flooding cluster switching (OFCS).
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Performance of Fast Routing Algorithms in Large Optical Switches Built on the Vertical Stacking of Banyan Structures.
Clust. Comput., 2004

A Genetic Algorithm for Dynamic Routing and Wavelength Assignment in WDM Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A New Scheme for Lightpath Restoration in WDM Networks.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Adaptive routing and wavelength assignment using ant-based algorithm.
Proceedings of the 12th IEEE International Conference on Networks, 2004

A novel distributed control architecture for shared protection.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Dynamic Routing and Wavelength Assignment in WDM Networks with Ant-Based Agents.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
Blocking behaviors of crosstalk-free optical Banyan networks on vertical stacking.
IEEE/ACM Trans. Netw., 2003

A New Scheme to Realize Crosstalk-Free Permutation in Vertically Stacked Optical MINs.
Photonic Netw. Commun., 2003

Blocking probability of vertically stacked optical banyan networks under random routing.
Proceedings of the Global Telecommunications Conference, 2003

2002
A new approach for critical area estimation in VLSI.
J. Syst. Archit., 2002

A New Scheme to Realize Crosstalk-free Permutations in Optical MINs with Vertical Stacking.
Proceedings of the International Symposium on Parallel Architectures, 2002

Vertically Stacked Benes Networks for Crosstalk-Free Permutation.
Proceedings of the 1st International Symposium on Cyber Worlds (CW 2002), 2002

2001
Statistical skew modeling for general clock distribution networks in presence of process variations.
IEEE Trans. Very Large Scale Integr. Syst., 2001

A New Architecture for Nonblocking Optical Switching Networks.
Photonic Netw. Commun., 2001

2000
Predicting the Yield Efficacy of a Defect-Tolerant Embedded Core.
Proceedings of the 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 2000

Optimization of Wafer Scale H-Tree Clock Distribution Network Based on a New Statistical Skew Model.
Proceedings of the 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 2000


  Loading...