Xiaojiang Du
Orcid: 0000-0003-4235-9671
According to our database1,
Xiaojiang Du
authored at least 673 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2020, "for contributions to wireless security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Wirel. Commun., October, 2024
IEEE Trans. Green Commun. Netw., September, 2024
IEEE Netw., September, 2024
Sparsity-Aware Intelligent Massive Random Access Control for Massive MIMO Networks: A Reinforcement Learning Based Approach.
IEEE Trans. Wirel. Commun., August, 2024
Integrated Sensing, Communication, and Computing for Cost-effective Multimodal Federated Perception.
ACM Trans. Multim. Comput. Commun. Appl., August, 2024
IEEE Trans. Netw. Serv. Manag., June, 2024
RPMDA: Robust and Privacy-Enhanced Multidimensional Data Aggregation Scheme for Fog-Assisted Smart Grids.
IEEE Internet Things J., May, 2024
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Automated and Controlled Patch Generation for Enhanced Fixing of Communication Software Vulnerabilities.
Intell. Converged Networks, 2024
A prototype-assisted clustered federated learning for big data security and privacy preservation.
Future Gener. Comput. Syst., 2024
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles.
Digit. Commun. Networks, 2024
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications.
Digit. Commun. Networks, 2024
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks.
Digit. Commun. Networks, 2024
Identify As A Human Does: A Pathfinder of Next-Generation Anti-Cheat Framework for First-Person Shooter Games.
CoRR, 2024
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
NetReach: Guaranteed Network Availability and Reachability to enable Resilient Networks for Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Visible Light Integrated Positioning and Communication: A Multi-Task Federated Learning Framework.
IEEE Trans. Mob. Comput., December, 2023
A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system.
Neural Comput. Appl., November, 2023
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023
IEEE Trans. Veh. Technol., October, 2023
Construction of node- and link-fault-tolerant virtual backbones in wireless networks.
J. Supercomput., August, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
Green Heterogeneous Computing Powers Allocation Using Reinforcement Learning in SDN-IoV.
IEEE Trans. Green Commun. Netw., June, 2023
Black-box attacks on image classification model with advantage actor-critic algorithm in latent space.
Inf. Sci., May, 2023
User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks.
Future Gener. Comput. Syst., April, 2023
Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023
Integrated Sensing, Communication, and Computing for Cost-effective Multimodal Federated Perception.
CoRR, 2023
Sparsity-Aware Intelligent Massive Random Access Control in Open RAN: A Reinforcement Learning Based Approach.
CoRR, 2023
Concurr. Comput. Pract. Exp., 2023
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Proceedings of the 32nd USENIX Security Symposium, 2023
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Enhancing Edge Multipath Data Security Offloading Efficiency via Sequential Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
5G-IoT-IDS: Intrusion Detection System for CIoT as Network Function in 5G Core Network.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023
2022
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems.
Int. J. Intell. Syst., December, 2022
IEEE Wirel. Commun., 2022
Veh. Commun., 2022
IEEE Trans. Wirel. Commun., 2022
Auction-Promoted Trading for Multiple Federated Learning Services in UAV-Aided Networks.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Sustain. Comput., 2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Internet Techn., 2022
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Softw. Pract. Exp., 2022
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022
Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis.
IEEE Netw., 2022
Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.
IEEE Netw., 2022
QoS provision for vehicle big data by parallel transmission based on heterogeneous network characteristics prediction.
J. Parallel Distributed Comput., 2022
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Resource Management for Edge Intelligence (EI)-Assisted IoV Using Quantum-Inspired Reinforcement Learning.
IEEE Internet Things J., 2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Neurocomputing, 2022
Trans. Emerg. Telecommun. Technol., 2022
Hybrid Architectures for Distributed Machine Learning in Heterogeneous Wireless Networks.
CoRR, 2022
CoRR, 2022
Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks.
Comput. Commun., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
ADSA: A Multi-path Transmission Scheduling Algorithm based on Deep Reinforcement Learning in Vehicle Networks.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
IEEE Wirel. Commun., 2021
Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks.
IEEE Trans. Netw. Sci. Eng., 2021
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV With Fog Computing Architecture.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021
Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021
Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021
IEEE Trans. Green Commun. Netw., 2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC.
Phys. Commun., 2021
Pervasive Mob. Comput., 2021
IEEE Open J. Commun. Soc., 2021
The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021
IEEE Netw., 2021
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum.
IEEE Netw., 2021
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021
IEEE J. Sel. Areas Commun., 2021
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS.
J. Parallel Distributed Comput., 2021
Inf. Process. Manag., 2021
IEEE Internet Things J., 2021
Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities.
IEEE Internet Things J., 2021
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems.
IEEE Internet Things J., 2021
PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services.
IEEE Internet Things J., 2021
Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach.
IEEE Internet Things J., 2021
A Two-Tier Collection and Processing Scheme for Fog-Based Mobile Crowdsensing in the Internet of Vehicles.
IEEE Internet Things J., 2021
Optimal Cooperative Relaying and Power Control for IoUT Networks With Reinforcement Learning.
IEEE Internet Things J., 2021
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
ACM Comput. Surv., 2021
Computing, 2021
Comput. Networks, 2021
IEEE Consumer Electron. Mag., 2021
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation.
Appl. Soft Comput., 2021
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
BMDS: A Blockchain-based Medical Data Sharing Scheme with Attribute-Based Searchable Encryption.
Proceedings of the ICC 2021, 2021
Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain.
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
False Data Injection Attack Detection Based on Wavelet Packet Decomposition and Random Forest in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020
IEEE Wirel. Commun., 2020
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020
Veh. Commun., 2020
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2020
Hierarchical and Hybrid: Mobility-Compatible Database-Assisted Framework for Dynamic Spectrum Access.
IEEE Trans. Netw. Sci. Eng., 2020
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2020
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Comput. Soc. Syst., 2020
ACM Trans. Cyber Phys. Syst., 2020
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G.
IEEE Trans. Cogn. Commun. Netw., 2020
Market-Based Model in CR-IoT: A Q-Probabilistic Multi-Agent Reinforcement Learning Approach.
IEEE Trans. Cogn. Commun. Netw., 2020
A Graph Convolutional Network-Based Deep Reinforcement Learning Approach for Resource Allocation in a Cognitive Radio Network.
Sensors, 2020
An Adaptive Network Coding Scheme for Multipath Transmission in Cellular-Based Vehicular Networks.
Sensors, 2020
A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs.
Sensors, 2020
An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks.
Sensors, 2020
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning.
Peer-to-Peer Netw. Appl., 2020
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data.
Pervasive Mob. Comput., 2020
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020
Green Communications for Future Vehicular Networks: Data Compression Approaches, Opportunities, and Challenges.
IEEE Netw., 2020
Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020
Intelligence-Sharing Vehicular Networks with Mobile Edge Computing and Spatiotemporal Knowledge Transfer.
IEEE Netw., 2020
IEEE Netw., 2020
Structured Bayesian Compression for Deep Models in Mobile-Enabled Devices for Connected Healthcare.
IEEE Netw., 2020
Neural Comput. Appl., 2020
Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.
IEEE J. Sel. Areas Commun., 2020
IEEE J. Sel. Areas Commun., 2020
Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020
IEEE J. Sel. Areas Commun., 2020
IEEE Internet Things J., 2020
Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN.
Future Gener. Comput. Syst., 2020
Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach.
Future Gener. Comput. Syst., 2020
Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking.
Future Gener. Comput. Syst., 2020
CompRess: Composing overlay service resources for end-to-end network slices using semantic user intents.
Trans. Emerg. Telecommun. Technol., 2020
Space-Ground Integrated Information Network Enabled Internet of Vehicles: Architecture and Key Mechanisms.
IEEE Commun. Stand. Mag., 2020
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020
A differentially private greedy decision forest classification algorithm with high utility.
Comput. Secur., 2020
Comput. Commun., 2020
The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry.
Comput. Commun., 2020
Joint user association and resource allocation in HetNets based on user mobility prediction.
Comput. Networks, 2020
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020
Sci. China Inf. Sci., 2020
Comput. Electr. Eng., 2020
Network Traffic Sampling System Based on Storage Compression for Application Classification Detection.
IEEE Access, 2020
BEMPAS: A Decentralized Employee Performance Assessment System Based on Blockchain for Smart City Governance.
IEEE Access, 2020
IEEE Access, 2020
A Differentially Private Classification Algorithm With High Utility for Wireless Body Area Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission.
Proceedings of the International Conference on Computing, Networking and Communications, 2020
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Coexistence of Cellular V2X and Wi-Fi over Unlicensed Spectrum with Reinforcement Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis.
IEEE Wirel. Commun., 2019
Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks.
IEEE Wirel. Commun., 2019
IEEE Wirel. Commun., 2019
IEEE Wirel. Commun., 2019
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture.
IEEE Wirel. Commun., 2019
IEEE Trans. Veh. Technol., 2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Ind. Informatics, 2019
Multi-Modal Data Semantic Localization With Relationship Dependencies for Efficient Signal Processing in EH CRNs.
IEEE Trans. Cogn. Commun. Netw., 2019
Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks.
IEEE Syst. J., 2019
Sensors, 2019
Sensors, 2019
Sensors, 2019
An Anti-Interference Scheme for UAV Data Links in Air-Ground Integrated Vehicular Networks.
Sensors, 2019
A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices.
Sensors, 2019
Sensors, 2019
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective.
Secur. Commun. Networks, 2019
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Netw., 2019
Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019
Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things.
J. Parallel Distributed Comput., 2019
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019
IEEE Internet Things J., 2019
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design.
IEEE Internet Things J., 2019
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019
A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.
IEEE Internet Things J., 2019
VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks.
Future Gener. Comput. Syst., 2019
Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet.
Future Gener. Comput. Syst., 2019
Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications.
Future Gener. Comput. Syst., 2019
Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach.
Future Gener. Comput. Syst., 2019
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations.
Future Gener. Comput. Syst., 2019
Trans. Emerg. Telecommun. Technol., 2019
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access.
CoRR, 2019
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019
CoRR, 2019
When Energy Trading meets Blockchain in Electrical Power System: The State of the Art.
CoRR, 2019
Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019
Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach.
Concurr. Comput. Pract. Exp., 2019
Cogn. Syst. Res., 2019
IEEE Commun. Mag., 2019
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment.
Comput. Electr. Eng., 2019
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks.
IEEE Access, 2019
Multi-User MAC Protocol for WLANs in MmWave Massive MIMO Systems With Mobile Edge Computing.
IEEE Access, 2019
Dual-Polarized Spatial-Temporal Propagation Measurement and Modeling in UMa O2I Scenario at 3.5 GHz.
IEEE Access, 2019
Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks.
IEEE Access, 2019
BNNC: Improving Performance of Multipath Transmission in Heterogeneous Vehicular Networks.
IEEE Access, 2019
IEEE Access, 2019
Resource Allocation in Information-Centric Wireless Networking With D2D-Enabled MEC: A Deep Reinforcement Learning Approach.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants.
IEEE Access, 2019
Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems.
IEEE Access, 2019
An Optimizing and Differentially Private Clustering Algorithm for Mixed Data in SDN-Based Smart Grid.
IEEE Access, 2019
Interest-Related Item Similarity Model Based on Multimodal Data for Top-N Recommendation.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Super-Resolution of Brain MRI Images Using Overcomplete Dictionaries and Nonlocal Similarity.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things.
IEEE Access, 2019
Infrared Small Target Detection Through Multiple Feature Analysis Based on Visual Saliency.
IEEE Access, 2019
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019
Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Novel Chaos-Based Physical Layer Security Transmission Scheme for Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
IEEE Wirel. Commun., 2018
IEEE Wirel. Commun., 2018
Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Intell. Transp. Syst., 2018
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Cloud Comput., 2018
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018
AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions.
Sensors, 2018
Sensors, 2018
Vehicle-Type Detection Based on Compressed Sensing and Deep Learning in Vehicular Networks.
Sensors, 2018
SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail.
IEEE Netw., 2018
Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems.
J. Sens. Actuator Networks, 2018
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018
Random Access Preamble Design and Detection for Mobile Satellite Communication Systems.
IEEE J. Sel. Areas Commun., 2018
PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Int. J. Distributed Sens. Networks, 2018
An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Commun. Syst., 2018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018
Reinforcement learning-based QoS/QoE-aware service function chaining in software-driven 5G slices.
Trans. Emerg. Telecommun. Technol., 2018
Radio resource coordination and scheduling scheme in ultra-dense cloud-based small cell networks.
EURASIP J. Wirel. Commun. Netw., 2018
CoRR, 2018
When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018
Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid.
CoRR, 2018
Social Vehicle Swarms: A Novel Perspective on Social-aware Vehicular Communication Architecture.
CoRR, 2018
CoRR, 2018
Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018
CoRR, 2018
A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services.
CoRR, 2018
CoRR, 2018
FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval.
CoRR, 2018
CoRR, 2018
CoRR, 2018
CoRR, 2018
Energy-Efficient Beamforming for 3.5 GHz 5G Cellular Networks based on 3D Spatial Channel Characteristics.
Comput. Commun., 2018
Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies.
Comput. Commun., 2018
Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks.
Comput. Networks, 2018
FPAN: Fine-grained and progressive attention localization network for data retrieval.
Comput. Networks, 2018
IEEE Commun. Mag., 2018
From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies.
IEEE Commun. Mag., 2018
Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
Ad Hoc Networks, 2018
IEEE Access, 2018
Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach.
IEEE Access, 2018
IEEE Access, 2018
Congestion Game With Link Failures for Network Selection in High-Speed Vehicular Networks.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack.
Proceedings of the IEEE Global Communications Conference, 2018
Envisioning an Information Assurance and Performance Infrastructure for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
2017
IEEE Wirel. Commun., 2017
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Mob. Comput., 2017
Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017
Secur. Commun. Networks, 2017
Pervasive Mob. Comput., 2017
J. Comput. Sci. Technol., 2017
Inf. Sci., 2017
IEEE Internet Things J., 2017
Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid.
IEEE Internet Things J., 2017
IEICE Trans. Inf. Syst., 2017
A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks.
Comput. Networks, 2017
Comput. Networks, 2017
IEEE Access, 2017
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.
IEEE Access, 2017
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper).
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017
Proceedings of the Wireless Internet - 10th International Conference, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Performance guarantee aware orchestration for service function chains with elastic demands.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
A review of security challenges, attacks and resolutions for wireless medical devices.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Provably efficient algorithms for joint placement and allocation of virtual network functions.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the IEEE International Conference on Communications, 2017
AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A Performance Analysis Model for TCP over Multiple Heterogeneous Paths in 5G Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Control.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Wirel. Commun. Mob. Comput., 2016
Wirel. Commun. Mob. Comput., 2016
Wirel. Commun. Mob. Comput., 2016
Wirel. Commun. Mob. Comput., 2016
Wirel. Commun. Mob. Comput., 2016
Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture.
IEEE Wirel. Commun., 2016
IEEE Trans. Veh. Technol., 2016
Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic.
IEEE Trans. Veh. Technol., 2016
Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks.
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Multim., 2016
Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning.
Sensors, 2016
Secur. Commun. Networks, 2016
Int. J. Distributed Sens. Networks, 2016
Sounding reference signal based timing advance adjustment for LTE-satellite mobile communication systems.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016
Analysis of discovery and access procedure for D2D communication in 5G cellular network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Power Optimization for Secure Communications in Full-Duplex System under Residual Self-Interference.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Analysis of clickjacking attacks and an effective defense scheme for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Interference management for heterogeneous networks with spectral efficiency improvement.
IEEE Wirel. Commun., 2015
IEEE Trans. Veh. Technol., 2015
IEEE Trans. Veh. Technol., 2015
IEEE Trans. Veh. Technol., 2015
Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System.
IEEE Trans. Parallel Distributed Syst., 2015
Secur. Commun. Networks, 2015
Int. J. Parallel Emergent Distributed Syst., 2015
IEEE Netw., 2015
Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial].
IEEE Netw., 2015
Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Improving QoS on high-speed vehicle by multipath transmission based on practical experiment.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015
WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation Framework.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the Seventh International Conference on Digital Image Processing, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014
Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic Perspective.
IEEE Trans. Veh. Technol., 2014
Secur. Commun. Networks, 2014
Group-based key array authentication protocol in radio frequency identification systems.
IET Inf. Secur., 2014
IEEE Commun. Lett., 2014
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Commun. Mag., 2014
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 9th International Conference on Communications and Networking in China, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7153-0, 2013
Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage.
IEEE Wirel. Commun., 2013
Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention.
IEEE Netw., 2013
IEEE J. Sel. Areas Commun., 2013
IEEE J. Sel. Areas Commun., 2013
Distributed precoder design for inter-cell interference suppressing in multi-cell MU-MIMO systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Self-protecting networking using dynamic <i>p</i>-cycle construction within link capacity constraint.
Secur. Commun. Networks, 2012
J. Parallel Distributed Comput., 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Biometric-based two-level secure access control for Implantable Medical Devices during emergencies.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
2010
IEEE Trans. Wirel. Commun., 2010
On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks.
IEEE Trans. Wirel. Commun., 2009
IEEE Trans. Wirel. Commun., 2009
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks.
IEEE Trans. Wirel. Commun., 2009
Int. J. Sens. Networks, 2009
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Comput. Networks, 2009
Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint.
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Wirel. Commun. Mob. Comput., 2008
Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks.
Wirel. Commun. Mob. Comput., 2008
IEEE Trans. Veh. Technol., 2008
Secur. Commun. Networks, 2008
A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEEE Wirel. Commun., 2007
IEEE Trans. Wirel. Commun., 2007
Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems.
IEEE Trans. Veh. Technol., 2007
Mob. Networks Appl., 2007
Int. J. Sens. Networks, 2007
Comput. Commun., 2007
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet.
IEEE Commun. Mag., 2007
Ad Hoc Networks, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
2006
Wirel. Commun. Mob. Comput., 2006
Multiclass routing and medium access control for heterogeneous mobile ad hoc networks.
IEEE Trans. Veh. Technol., 2006
IEEE Trans. Veh. Technol., 2006
Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method.
J. Netw. Syst. Manag., 2006
Int. J. Wirel. Mob. Comput., 2006
Int. J. Wirel. Mob. Comput., 2006
Proceedings of IEEE International Conference on Communications, 2006
Challenges and Futuristic Perspective of CDMA Technologies: OCC-CDMA/OS for 4G Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Architecture, mobility management, and quality of service for integrated 3G and WLAN networks.
Wirel. Commun. Mob. Comput., 2005
EURASIP J. Wirel. Commun. Netw., 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005
2004
Ad Hoc Networks, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004
2003
Using Neural Networks to Identify Control and Management Plane Poison Messages.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001