Xiaojian Tian

Orcid: 0000-0002-0641-0161

According to our database1, Xiaojian Tian authored at least 16 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Fine-Grained Distributed Routing and Data Scheduling for Interplanetary Data Transfers.
IEEE Trans. Netw. Serv. Manag., February, 2024

2023
Planning of Survivable Wavelength-Switched Optical Networks Based on P2MP Transceivers.
IEEE Trans. Netw. Serv. Manag., September, 2023

On the Topology Scaling of Interplanetary Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Multi-Agent DRL for Distributed Routing and Data Scheduling in Interplanetary Networks.
Proceedings of the IEEE Global Communications Conference, 2023

2022
On the Distributed Routing and Data Scheduling in Interplanetary Networks.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Multi-Agent and Cooperative Deep Reinforcement Learning for Scalable Network Automation in Multi-Domain SD-EONs.
IEEE Trans. Netw. Serv. Manag., 2021

Reconfiguring multicast sessions in elastic optical networks adaptively with graph-aware deep reinforcement learning.
JOCN, 2021

2012
E-mail protocols with perfect forward secrecy.
Int. J. Secur. Networks, 2012

2011
Chirp extraction of wave-breaking-free soliton in a passively mode-locked Yb-doped fiber laser based on STFT and WVD.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

Simulation experimental analysis of PZT driver circuit.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2007
Improved Efficient Remote User Authentication Schemes.
Int. J. Netw. Secur., 2007

2006
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.
Proceedings of the Topics in Cryptology, 2006

2005
Analysis and improvement of an authenticated key exchange protocol for sensor networks.
IEEE Commun. Lett., 2005

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange.
IACR Cryptol. ePrint Arch., 2005

2004
Three Constructions of Authentication Codes with Perfect Secrecy.
Des. Codes Cryptogr., 2004

2003
Three Constructions of Authentication/Secrecy Codes.
Proceedings of the Applied Algebra, 2003


  Loading...