Xiaoyan Hong

Orcid: 0000-0002-3843-0837

According to our database1, Xiaoyan Hong authored at least 127 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AI-powered interpretable imaging phenotypes noninvasively characterize tumor microenvironment associated with diverse molecular signatures and survival in breast cancer.
Comput. Methods Programs Biomed., January, 2024

CSM-H-R: A Context Modeling Framework in Supporting Reasoning Automation for Interoperable Intelligent Systems and Privacy Protection.
IEEE Access, 2024

An Ad-Hoc Communication Based Distributed Particle Swarm Optimization Scheme for Cooperative AUVs Underwater Search Task.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

An Enhancing VBF Protocol for AUVs: Integrating Uncertainty Management and Energy Efficiency.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
CSM-H-R: An Automatic Context Reasoning Framework for Interoperable Intelligent Systems and Privacy Protection.
CoRR, 2023

DQN for Smart Transportation Supporting V2V Mobile Edge Computing.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023

Efficient Vehicle-Centric Networking for Ultra Dense Vehicle Communication in 5G Access.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
Synchronizing tasks for distributed learning in connected and autonomous vehicles.
J. Commun. Networks, August, 2022

2021
First Step Towards μNet: Open-Access Aquatic Testbeds and Robotic Ecosystem.
Proceedings of the WUWNet'21: The 15th International Conference on Underwater Networks & Systems, Shenzhen, Guangdong, China, November 22, 2021

A Fog-Based IOV for Distributed Learning in Autonomous Vehicles.
Proceedings of the Mobile Networks and Management - 11th EAI International Conference, 2021

2020
A Deadline-Aware Offloading Scheme for Vehicular Fog Computing at Signalized Intersection.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

2019
Parallel Closed-Loop Connected Vehicle Simulator for Large-Scale Transportation Network Management: Challenges, Issues, and Solution Approaches.
IEEE Intell. Transp. Syst. Mag., 2019

Delay-tolerant forwarding strategy for named data networking in vehicular environment.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking.
Future Internet, 2019

P4SC: A High Performance and Flexible Framework for Service Function Chain.
IEEE Access, 2019

A Named Data Networking Architecture Implementation to Internet of Underwater Things.
Proceedings of the WUWNET'19: International Conference on Underwater Networks & Systems, 2019

Transit Prediction in a College Setting.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

RL-Sketch: Scaling Reinforcement Learning for Adaptive and Automate Anomaly Detection in Network Data Streams.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

2018
Easy Path Programming: Elevate Abstraction Level for Network Functions.
IEEE/ACM Trans. Netw., 2018

Analysis of a High-Performance TSP Solver on the GPU.
ACM J. Exp. Algorithmics, 2018

Sustain Vehicle-Crowds via Traffic Signal Adjustments.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

2017
Streaming Video Identification for Caching and Sharing.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

Discovering Meaningful Mobility Behaviors of Campus Life from User-Centric WiFi Traces.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

V2I Communication-Enabled Real-Time Intersection Traffic Signal Scheduling.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Reliable Forwarding Strategy in Vehicular Networks Using NDN.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Density-Aware Delay-Tolerant Interest Forwarding in Vehicular Named Data Networking.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Engineering traffic uncertainty in the OpenFlow data plane.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
<i>X</i>-Region: A framework for location privacy preservation in mobile peer-to-peer networks.
Int. J. Commun. Syst., 2015

A Named-Data Networking Approach to Underwater Monitoring Systems.
Proceedings of the 10th International Conference on Underwater Networks & Systems, 2015

Quantify Self-Organized Storage Capacity in Supporting Infrastructure-less Transportation Operation.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Efficient multi-hop connectivity analysis in urban vehicular networks.
Veh. Commun., 2014

Prototype for customized multicast services in software defined networks.
Proceedings of the 22nd International Conference on Software, 2014

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Programming network via Distributed Control in Software-Defined Networks.
Proceedings of the IEEE International Conference on Communications, 2014

Evaluating Interest Broadcast in Vehicular Named Data Networking.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

2013
Analysis for bio-inspired thrown-box assisted message dissemination in delay tolerant networks.
Telecommun. Syst., 2013

ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study.
IEEE Syst. J., 2013

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks.
J. Zhejiang Univ. Sci. C, 2013

THUNDER: helping underfunded NPO's distribute electronic resources.
J. Cloud Comput., 2013

Feasibility analysis of multi-radio in DSRC vehicular networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

2012
Transition phase of connectivity for wireless networks with growing process.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Routing with bridging nodes for drifting mobility.
Proceedings of the Conference on Under Water Networks, 2012

A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Analysis of mobility patterns for urban taxi cabs.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

BioStaR: A Bio-inspired Stable Routing for Cognitive Radio Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Constructing time-varying contact graphs for heterogeneous delay tolerant networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks.
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems, 2012

2011
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks.
IACR Cryptol. ePrint Arch., 2011

Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad.
Proceedings of the Global Communications Conference, 2011

Capacity-Aware Routing Using Throw-Boxes.
Proceedings of the Global Communications Conference, 2011

Experiences with CS2 and data structures in the 100 problems format.
Proceedings of the 2011 Frontiers in Education Conference, 2011

A caching strategy in mobile ad hoc named data network.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Optimal routing strategy in throw-box based delay tolerant network.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Practical exploitation on system vulnerability of ProtoGENI.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Exploring multiple radios and multiple channels in wireless mesh networks.
IEEE Wirel. Commun., 2010

Agenda driven mobility modelling.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Situation-aware trust architecture for vehicular networks.
IEEE Commun. Mag., 2010

Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

Handshake time and transmission rate of 802.11g measurement in vehicular networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Delay analysis of Wireless Ad Hoc networks: Single vs. multiple radio.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Latency Analysis for Thrown Box Based Message Dissemination.
Proceedings of the Global Communications Conference, 2010

Critical Phase of Connectivity in Wireless Network Expansion.
Proceedings of the Global Communications Conference, 2010

Establishing Email-Based Social Network Trust for Vehicular Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes.
IEEE Trans. Veh. Technol., 2009

Using camouflaging mobility to protect privacy in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2009

A survey of anonymity in wireless communication systems.
Secur. Commun. Networks, 2009

Selective Message Forwarding in Delay Tolerant Networks.
Mob. Networks Appl., 2009

An online energy-efficient routing protocol with traffic load prospects in wireless sensor networks.
Int. J. Sens. Networks, 2009

Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks.
Int. J. Interdiscip. Telecommun. Netw., 2009

Articulation Node Based Routing in Delay Tolerant Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Efficient Support of Range Queries over DHTs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Modeling Worm Propagation through Hidden Wireless Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A mobility camouflaging evaluation tool.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

Effects of multiple collaborated data streams in wireless sensor networks.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
Anonymous Geo-Forwarding in MANETs through Location Cloaking.
IEEE Trans. Parallel Distributed Syst., 2008

Privacy-preserving secure relative localization in vehicular networks.
Secur. Commun. Networks, 2008

Delay management in delay-tolerant networks.
Int. J. Netw. Manag., 2008

An on-line replication strategy to increase availability in Data Grids.
Future Gener. Comput. Syst., 2008

Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks.
Proceedings of the MSN 2008, 2008

A locally-optimizing approach for multichannel assignment and routing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Trooper Selection Strategy on a Milepost Network.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Collaborated Camouflaging Mobility for Mobile Privacy.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Investigating the Impact of Real-World Factors on Internet Worm Propagation.
Proceedings of the Information Systems Security, Third International Conference, 2007

A Secure Data Transmission Scheme for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the Global Communications Conference, 2007

SMART: A selective controlled-flooding routing for delay tolerant networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Integrity and its applications.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Mobility changes anonymity: new passive threats in mobile ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Resource allocation for restoration of compromised systems.
J. Comb. Optim., 2006

Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Performance evaluation of anonymous routing protocols in MANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Secure Relative Location Determination in Vehicular Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Privacy-Preserving Quick Authentication in Fast Roaming Networks.
Proceedings of the LCN 2006, 2006

Nonlinear Resource Allocation in Restoration of Compromised Systems.
Proceedings of IEEE International Conference on Communications, 2006

A Dynamic Data Grid Replication Strategy to Minimize the Data Missed.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

An Agenda Based Mobility Model21.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

A secure ad-hoc routing approach using localized self-healing communities.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Hybrid landmark routing in ad hoc networks with heterogeneous group mobility.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Distributed Naming System for Mobile Ad Hoc Network.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
Recent advances in mobility modeling for mobile ad hoc network research.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

2003
Landmark routing in ad hoc networks with mobile backbones.
J. Parallel Distributed Comput., 2003

ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

2002
Scalable routing protocols for mobile ad hoc networks.
IEEE Netw., 2002

Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

Dynamic group support in LANMAR routing ad hoc networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

An ad hoc network with mobile backbones.
Proceedings of the IEEE International Conference on Communications, 2002

Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Contradictory relationship between Hurst parameter and queueing performance (extended version).
Telecommun. Syst., 2001

A Mobility Framework for Ad Hoc Wireless Networks.
Proceedings of the Mobile Data Management, Second International Conference, 2001

2000
UAV aided intelligent routing for ad-hoc wireless network in single-area theater.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

Landmark routing for large ad hoc wireless networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
A wireless hierarchical routing protocol with group mobility.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

A group mobility model for ad hoc wireless networks.
Proceedings of the 2nd ACM International Workshop on Modeling, 1999

1992
An approach for analyzing the traces of moving objects.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992

1990
A new clustering approach and its application to BBL placement.
Proceedings of the European Design Automation Conference, 1990


  Loading...