


default search action
NaNA 2018: Xi'an, China
- International Conference on Networking and Network Applications, NaNA 2018, Xi'an, China, October 12-15, 2018. IEEE 2018, ISBN 978-1-5386-8303-3

- Tao Zhang

, Xingyan Chen
, Changqiao Xu:
Intelligent Routing Algorithm Based on Deep Belief Network for Multimedia Service in Knowledge Centric VANETs. 1-6 - Xuewen Dong, Tao Zhang, Guangxia Li, Di Lu, Balin Tian:

A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing. 7-13 - Baihe Ma

, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. 14-21 - Huanhuan Huang, Tong Ye, Tony Tong Lee:

Gated Slotted Aloha Protocol for Wireless Communication Network. 22-28 - Cong Gao, Zhenzhou Tian, Yanping Chen, Zhongmin Wang:

A Novel Virtual Sensor Management Scheme for Manufacturing Network. 29-35 - Syed Hassan Raza Naqvi, Shahida Jabeen

, Pin-Han Ho:
Low-complexity Optimal Scheduler for LTE Over LAN Cable. 36-41 - Pinchang Zhang, Xiaohong Jiang:

Channel-based Authentication for Dual-Hop Wireless Networks. 42-46 - Ahmed Salem

, Xuening Liao, Shuiguang Zeng, Yulong Shen:
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework. 47-51 - Zeyuan Yang

, Rentao Gu, Tao Dong, Jie Yin, Shu Li, Zhihui Liu, Tingting Zhang, Yuefeng Ji:
An Artificial Neural Network Based Attenuation Tomography in Free Space Optical Network. 52-57 - Wei-Ting Yeh, Chih-Min Chao, Cong-Xiang Wang:

High-Reception-Rate Transmission by Dynamic Scheduling for Wireless Body Area Networks. 58-62 - Raisa O. C. Hirafuji, Ahmad R. Dhaini, Divanilson R. Campelo, Pin-Han Ho, Limei Peng:

Energy Efficiency Analysis of the Watchful Sleep Mode with Delayed Wakeup in PONs. 63-68 - Nannan Sun, Zhi Yu, Xianke Qiao:

Multi-channel Signal Acquisition Algorithm for Multi-beam Satellite Systems in High Dynamic Environment. 69-73 - Yan Gao, Yong Zeng, Zhihong Liu, Jianfeng Ma, Yeqiu Xiao:

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network. 74-79 - Jianping Wang, Shujing Zhang, Guohong Gao, Lei Cai, Xiangang Zuo, Zhou Yu, Wei Chen:

A Clustering Algorithm of Underwater Acoustic Sensor Networks Based on Hierarchical 3D Mesh. 80-85 - Zhong Yan-Tao:

Lattice Based Authenticated Key Exchange with Universally Composable Security. 86-90 - Ziwei Han, Hai Liu, Zhenqiang Wu:

A Differential Privacy Preserving Framework with Nash Equilibrium in Genome-Wide Association studies. 91-96 - Guangchen Song, Yihui Zhou, Hai Liu, Ge Wen, Ping'an Ren:

A Privacy Inference Model Based on Attribute Graph. 97-101 - Yupan Tian, Jun Yan, Jing Hu, Zhenqiang Wu:

A Privacy Preserving Model in Uncertain Graph Mining. 102-106 - Jun Yan, Lin Zhang, Yupan Tian, Ge Wen, Jing Hu:

An Uncertain Graph Approach for Preserving Privacy in Social Networks Based on Important Nodes. 107-111 - Luo Jing-Tarur, Yao Shi-Ying, Gou Ji-Jun, Xu Qi-Yang:

The Trust-Based Access Control Model in the Wireless Sensor Network. 112-116 - Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. 117-120 - Mubarak Umar

, Abdulrashid Sabo, Auwal A. Tata:
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET. 121-126 - Yinghan Peng, Tao Dong, Rentao Gu, Qize Guo, Jie Yin, Zhihui Liu, Tingting Zhang, Yuefeng Ji:

A Review of Dynamic Resource Allocation in Integrated Satellite and Terrestrial Networks. 127-132 - Bin Yang, Zhenqiang Wu, Lisheng Ma, Yuanyuan Fan:

On the Delivery Probability Study in Mobile Ad Hoc Networks. 133-136 - Xufei Li, Shuiguang Zeng, Wei Tong:

Enhancing Carrier Frequency Offset Authentication via Fractal Dimension. 137-142 - Ranran Sun, Shuiguang Zeng, Xinghui Zhu:

Limits of Covert Communication over AWGN Channels in the Presence of Multiple Wardens. 143-146 - Shuiguang Zeng, Xufei Li, Ahmed Salem

, Dongmei Zhao:
Physical Layer Authentication Based on CFO and Visibility Graph. 147-152 - Guoying Qiu, Ke Cheng, Lingtong Liu, Shuiguang Zeng:

TMarkov: LBS Trajectory Prediction for Crowdsourcing Recommendation. 153-158 - Shumaila Javaid

, Zhenqiang Wu, Hamza Fahim
, Farhana Javed, Jiawang Chen:
Analyzing the Impact of Nanonode Density on Biological Tissues in Intrabody Nanonetworks. 159-163 - Wu Wang, Bin Yang, Xin Wang, Yumei She, Shikai Shen:

Capacity of 3D MANETs Under Packet Redundancy and Receiver Probing. 164-168 - Li-Zhuang Tan, Wei Su, Shuai Gao, Peng Cheng:

L4S: Low-Speed Software Synergetic Sampling and Detecting Long Flow for Data Center Network. 169-174 - Guozhu Zhao, Lisheng Ma, Xiaohong Jiang:

Least-Unavailability Path Selecting Algorithm Based on RBF for Disaster-Survivable Software-Defined Optical Networks. 175-181 - Xiaolan Liu, Lisheng Ma, Xiaohong Jiang:

An Optimized Content Uploading Scheme for D2D Communications Underlaying Cellular Networks. 182-186 - Muhib Ahmad Khan Sherwani, Muneeb Ahmed Khan

:
Quality of Services in Warehouse Scale Computers. 187-190 - Krishna Prasad Bhattarai, Bishnu Prasad Gautam

, Kazuhiko Sato:
Authentic Gate Entry System (AuthGES) by Using LBPH for Smart Home Security. 191-196 - Bo She, Zunying Qin, Qiang Wang, Zhe Zhang, Jingru Cui, Guodong Li, Xiaoge Zhong:

A Design and Implementation of Network Billing System on Campus Based on Hadoop and Netflow. 197-200 - Jianfeng Chen, Rui Xu, Chunlin Li:

Research of Security Situational Awareness and Visualization Approach in Cloud Computing. 201-205 - Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:

Anomalies Detection of Routers Based on Multiple Information Learning. 206-211 - Yihui Zhou, Guangchen Song, Hai Liu, Laifeng Lu:

Privacy-Utility Trade-Off of K-Subset Mechanism. 212-217 - Laifeng Lu, Yanping Li, Yihui Zhou, Feng Tian, Hai Liu:

Adaptive Differential Privacy Interactive Publishing Model Based on Dynamic Feedback. 218-222 - Lisheng Ma, Bin Yang:

Data Backup Against Progressive Disasters in Geo-Distributed Data Center Networks. 223-226 - Wang Shi-Kui, Li Wen:

Technical Research and Platform Implementation of the Protocol Conformance Test of AFDX Network Switch. 227-231 - Shahida Jabeen

, Pin-Han Ho:
Joint User Scheduling for ODFMA-Based Multi-Cell Networks. 232-236 - Xiaoguang Li, Jun Liu

, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang:
TickSEC: A Novel Reconfigurable Platform for WiFi Physical Layer Security. 237-244 - Hui Song, Shuai Han, Zhongmin Wang:

Classification of Mobile Users' Activities Based on Group Similarity Perception Networks. 245-250 - Junjie Su, Naijie Gu, Qilin Bai, Chuanwen Lin:

Parallel Implementation of AES-GCM with High Throughput and Energy Efficiency. 251-256 - Fang Ren, Xuefei Yang, Dong Zheng:

A QC-LDPC Code Based Digital Signature Algorithm. 257-262 - Yao Guo, Zhihong Liu, Yong Zeng, Ruiheng Wang

, Jianfeng Ma:
Preserving Privacy for Hubs and Links in Social Networks. 263-269 - Shujie Yang, Changqiao Xu, Jianfeng Guan, Tao Zhang

:
Event-based Diffusion Kalman Filter Strategy for Clock Synchronization in WSNs. 270-276 - Yuke Liu, Junwei Zhang, Qi Gao:

A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control. 277-283 - Jianming Fu, Rui Jin, Yan Lin, Baihe Jiang, Zhengwei Guo:

Function Risk Assessment Under Memory Leakage. 284-291 - Lei Zhang, Zhengjun Zhai, Linting Bai, Yahui Li, Wensheng Niu, Lei Yuan:

Visual-inertial State Estimation for the Civil Aircraft Landing in Low Visibility Conditions. 292-297 - Xiangwen Liu, Liangmin Wang, Yuquan Zhu:

SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing. 298-303 - Pengfei Song, Yong Zeng, Zhihong Liu, Jianfeng Ma, Huichuan Liu:

True Random Number Generation Using Process Scheduling of Android Systems. 304-309 - Sugang Ma, Fuxi Wen, Zhongmin Wang:

An Efficient GPS-Free Vehicle Localization Algorithm Using Single Roadside Unit and Receiver. 310-313 - Nader Shahata:

The Challenges, the Threats and Policy Implications to a Compromised Privacy and Security. 314-317 - Zhao Huang, Chen Zhao, Quan Wang, Zhenyi Wang:

Implementation and Analysis of Improved RO PUFs with Latch Structure. 318-323 - He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:

A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. 324-329 - Yue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei:

Energy Saving Strategy for Task Migration Based on Genetic Algorithm. 330-336 - Futao Zhang, Zhongmin Wang:

Visual Tracking Algorithm Based on Improved Kernelized Correlation Filters. 337-343 - Ruifang Zhang, Li Li, Nana Du, Huanyu Liu:

Epidemic Propagation Control with Limited Temporary Link Removed. 344-349 - Jiawei Zheng, Xuewen Dong, Tao Zhang, Junfeng Chen, Wei Tong, Xiaozhou Yang:

MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing. 350-355 - Chen Zhao, Jungang Han, Yang Jia, Fan Gou:

Lung Nodule Detection via 3D U-Net and Contextual Convolutional Neural Network. 356-361 - Hongxia Lv, Xiaoni Du, Xiaodan Li:

Construction of a Class of Linear Codes with Two Weights. 362-365 - Hong Xia, Jingru Zhao, Xiao Ma, Yanping Chen, Hui Lv, Zhongmin Wang:

Research on Data-Driven Industrial Internet Solutions. 366-371 - Hongli Yu, Bin Yang, Jinjun Liu, Gwo-Jong Yu:

Passive Human Trajectory Tracking Study in Indoor Environment with CSI. 372-377 - Shuyan Wang

, Wentao Wu, Jiaze Sun:
A Method for Test Cases Reduction in Web Application Testing Based on User Session. 378-383 - Bhagawan Rokaha, Dhan Prasad Ghale, Bishnu Prasad Gautam

:
Enhancement of Supermarket Business and Market Plan by Using Hierarchical Clustering and Association Mining Technique. 384-389 - Jianchun Xie, Zhonghua Wang, Yahui Li:

The Distributed Computing Framework Research for Avionics Cloud. 390-393 - Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, WenXin Lei, Aidong Xu:

A Novel Terminal Security Access Method Based on Edge Computing for IoT. 394-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














