Yonglin Ren
According to our database1,
Yonglin Ren
authored at least 30 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Maxent modelling combined with fuzzy logic provides new insights into Predicting the distribution of potato cyst nematodes with limited data.
Comput. Electron. Agric., 2024
2020
Identification and diagnosis of whole body and fragments of <i>Trogoderma granarium</i> and <i>Trogoderma variabile</i> using visible near infrared hyperspectral imaging technique coupled with deep learning.
Comput. Electron. Agric., 2020
2019
A Framework & System for Classification of Encrypted Network Traffic using Machine Learning.
Proceedings of the 15th International Conference on Network and Service Management, 2019
2015
Investigating Metaheuristics Applications for Capacitated Location Allocation Problem on Logistics Networks.
Proceedings of the Chaos Modeling and Control Systems Design, 2015
2014
An efficient <i>k</i>-Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks.
Wirel. Commun. Mob. Comput., 2014
2012
An efficient certificate revocation validation scheme with k-means clustering for vehicular ad hoc networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012
2011
Performance analysis of a selective encryption algorithm for wireless ad hoc networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2011
2010
ARMA: a scalable secure routing protocol with privacy protection for mobile <i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2010
IEEE Wirel. Commun., 2010
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness.
Proceedings of the Q2SWinet'10, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010
2009
IEEE J. Sel. Areas Commun., 2009
Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009
2008
Comput. Commun., 2008
A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks.
Proceedings of the 5th ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2008
Proceedings of the LCN 2008, 2008
Proceedings of IEEE International Conference on Communications, 2008
Coverage-Based Sensor Association Rules for Wireless Vehicular Ad Hoc and Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks.
Proceedings of the Q2SWinet'07, 2007
Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
Measuring the Cost of Bothering Users in Intelligent Systems.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007
Proceedings of the Global Communications Conference, 2007