


default search action
NaNA 2021: Lijiang City, China
- 2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021. IEEE 2021, ISBN 978-1-6654-4158-2

- Wendi Sun, Xiaoying Liu

, Kechen Zheng
, Yang Xu, Jia Liu:
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting. 1-7 - Yuanyu Zhang, Ji He

, Qianyue Qu, Zhiwei Zhang:
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. 8-14 - Ranran Sun, Bin Yang, Shenghui Zhao:

Covert Communication in D2D Underlaying Cellular Network. 15-22 - Wentao Du, Xinyu Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun:

Calibrating Privacy Budgets for Locally Private Graph Neural Networks. 23-29 - Yangyang Liu, Pinchang Zhang, Xufei Li:

Physical Layer Authentication Using MmWave Channel State Information. 30-33 - Yanwen Liu, Wei Su, Lizhuang Tan:

Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol. 34-40 - Xufei Li, Shuiguang Zeng, Yangyang Liu:

Covert Authentication at the Physical Layer. 41-46 - Shiyi Zou, Lingge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang:

Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI. 47-51 - Ze Yang, Youliang Tian:

Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory. 52-58 - Muhammad Fawad Khan, Limei Peng:

Energy-efficient UAV Trajectory Planning Based On Flexible Data Rate. 59-62 - He Zhu, Huihui Wu, Xiaohong Jiang:

Covert MIMO Communication in Two-hop Relay Systems. 63-68 - Cheng Zhang, Xuening Liao, Zhenqiang Wu, Guoyong Qiu:

Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays. 69-74 - Hui Wang, Yani Han, Shaojing Yang, Anxiao Song, Tao Zhang:

Privacy-Preserving Federated Generative Adversarial Network for IoT. 75-80 - Mubarak Umar

, Xuening Liao, Jiawang Chen:
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics. 81-87 - Yu He, Youliang Tian, Hua Xu:

Random verifiable multi-server searchable encryption scheme. 88-93 - Dalia Nashat, S. Khairy:

Detecting Http Flooding Attacks Based on Uniform Model. 94-98 - Chen Yang, Zhen Jia, Shundong Li:

Privacy-Preserving Proximity Detection Framework for Location-Based Services. 99-106 - Alibek Nurgaliyev, Hua Wang

:
Comparative study of symmetric cryptographic algorithms. 107-112 - Tianyi Liang, Huijie Zhu:

Research on PDCCH Channel in 5G NR System. 113-118 - Ahmed Salem

, Huihui Wu, Xiaohong Jiang:
Exact Evaluation of Total Variation Distance in Covert Communications. 119-124 - Yuanhang He, Lei Chen, Yi Ni, Yuyao Wang, Jiangtao Li, Yufeng Li:

Privacy protection scheme for edge computing based on function encryption. 131-135 - Jingping She, Ne Wang, Ruiting Zhou, Chen Tian:

Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks. 136-143 - Zhonghua Xie, Tao Tao, Lisheng Ma:

Emergency Virtual Machine Online Migration in Cloud Data Centers. 144-149 - Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao:

Energy-saving mechanism based on tidal characteristic in computing power network. 150-154 - Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:

Petri net modeling and vulnerability analysis of the Heartbleed. 155-160 - Guiling Zhang, Yaling Zhang

, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. 161-167 - Zichen Feng, Changqiao Xu, Han Xiao, Yongpu Jia, Zhongyi Ding, Zhaoyang Liu:

Dynamic Overhead Queue-based Efficient Service Delivery at Edge for Adaptive Live Streaming. 168-173 - Gaofeng Hong, Qili Wen, Wei Su:

A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing. 174-180 - Pin Chen, Naijie Gu:

A Game Theory Perspective on IP Routing Protocols Evaluation. 181-185 - Yuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao:

Research on Data Security of Unmanned Aerial Vehicles. 186-193 - Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Ming-Ze Wang:

CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift. 194-199 - Guozhu Zhao, Pinchang Zhang, Lisheng Ma:

On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios. 200-205 - Jiaqing Bai

, Ji He
, Xiaohong Jiang, Lijun Chen:
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI. 206-211 - Yue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu:

The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems. 212-216 - Yanchun Kong, Weibin Su, Gang Xu

:
Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing. 217-221 - Mingbo Pan, Weibin Su, Yikai Wang:

Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing. 222-226 - Yanxia Tan, Yong Zhang, Yanlei Zheng, Yacheng Liu, Guangquan Wang, Yuefeng Ji:

Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound API. 227-230 - Zhi Qiao, Bo Liu, Bo Tian, Yu Liu:

Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet Network. 231-235 - Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:

A Method for Fast Outlier Detection in High Dimensional Database Log. 236-241 - Liumei Zhang, Xi Deng, Yichuan Wang:

Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net. 242-247 - Wu Wang, Yuejuan Liu, Shikai Shen:

Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic Fluid. 248-253 - Aiguo Wang

, Yue Meng, Jinjun Liu, Shenghui Zhao, Guilin Chen:
Multi-domain Feature Extraction for Human Activity Recognition Using Wearable Sensors. 254-259 - Hong Xia, Jianguo Li, Yanping Chen, Ning Lv, Zhongmin Wang, Qingyi Dong:

CLSDRL: A routing optimization method for traffic feature extraction. 260-264 - Yusuke Noda

, Bishnu Prasad Gautam
:
A Proposal of Large Scale Network Route Optimization Technique Based on Genetic Algorithm. 265-271 - Junjie Lu, Chao Qi:

Fatigue Detection Technology for Online Learning. 272-277 - Xu An Wang

, Yunxuan Su, Jindan Zhang:
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. 278-281 - Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Zhiqiang Hou:

Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network. 282-287 - Guorong Zhang, Lingge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He:

A Modified K-means User Grouping Design for HAP Massive MIMO Systems. 288-292 - Fang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou:

A New Symmetric Information Hiding Scheme Based on Cover Randomness. 293-300 - Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang:

Network Traffic Oriented Malware Detection in IoT (Internet-of-Things). 301-307 - Kaijun Wu, Wanli Dong

, Yunfei Cao, Xue Wang, Qi Zhao:
An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection. 308-312 - Qingyi Ye, Tingting Zhao, Guo Sun, Xia Feng:

A Recommendation Scheme with Reputation-Based Incentive Mechanism on Consortium Blockchain. 313-318 - Junpeng Zhang

, Mengqian Li, Shuiguang Zeng, Bin Xie, Dongmei Zhao:
A survey on security and privacy threats to federated learning. 319-326 - Yuanqing Liu, Ning Xi, Yongbo Zhi:

NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android. 327-333 - Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu:

Research on A Vulnerability Detection Technology for Network Topology Security. 334-337 - Zhang Lin:

Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data. 338-344 - Xiaoguo Lin, Pujie Jing, Chuntang Yu, Xia Feng:

TPLI: A Traceable Privacy-preserving Logistics Information Scheme via Blockchain. 345-350 - Chen Chong, Zou Ping:

Network application vulnerability detection based on fuzzing technology. 351-355 - Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng:

An efficient authentication scheme based on Zero Trust for UAV swarm. 356-360 - Xue Wang, Hao Zhang, Kaijun Wu:

Expression Tree-based Policy Conflict Detection Algorithm. 361-366 - Xiaoteng Yang, Wenbo Zhang, Bo Liu, Hong Su:

On the Robustness of Complex System With Percolation Theory Under Node Attack. 367-372 - Mengqian Li, Youliang Tian, Junpeng Zhang

, Dandan Fan, Dongmei Zhao:
The Trade-off Between Privacy and Utility in Local Differential Privacy. 373-378 - Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen:

Access Control Scheme Supporting Attribute Revocation in Cloud Computing. 379-384 - Rui Li, Zilan Yang:

The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance. 385-389 - Yu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu:

Implementation and Analysis of Hybrid DRAM PUFs on FPGA. 390-394 - Sisong Ru, Bingbing Zhang, Yixin Jie, Chi Zhang, Lingbo Wei, Chengjie Gu:

Graph Neural Networks for Privacy-Preserving Recommendation with Secure Hardware. 395-400 - Yue He, Hui Li, Yiming Li, Qiang Wu, Yuefeng Ji, Rentao Gu, Shaobin Fan:

Exploration of Simulation Teaching Mode for Intelligent Information Network Course. 401-407 - Zhihui Wang, Jianrui Chen, Peijie Wang, Tingting Zhu:

Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal Recommendation. 408-413 - Zhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, Kui Liu, Bin Wang, Xinghui Zhu, Jiadong Chen:

You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens. 414-419 - Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:

Chinese named entity recognition method for the field of network security based on RoBERTa. 420-425 - Yan Jiao, Pin-Han Ho:

Design of Binocular Stereo Vision System Via CNN-based Stereo Matching Algorithm. 426-431 - Chun Jen Lin, Yan Luo, Liang-Min Wang:

Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment. 432-436 - Xiangyi Lu, Qing Ren, Feng Tian:

A Fine-tuning-based Adversarial Network for Member Privacy Preserving. 437-442 - Jiahui Sun, Ningchun Liu, Shuai Gao, Wei Su:

A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier Network. 437-442 - Yaling Zhang

, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. 443-448 - Yubaraj Gautam, Kazuhiko Sato, Bishnu Prasad Gautam

, Norio Shiratori:
Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network. 449-455 - Ke Zhao, Limei Peng:

UAV Deployment with Flexible Height Under SINR Constraint. 456-460 - Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li:

Cold-start Recommendation Method Based on Homomorphic Encryption. 461-465 - Lingling An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma:

Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network. 466-471 - Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu:

Network Construction Using Overlapping Histogram under Local Differential Privacy. 472-479 - Kenan Qin, Yihui Zhou, Bo Tian, Rui Wang:

AttentionAE: Autoencoder for Anomaly Detection in Attributed Networks. 480-484 - You Wu, Xinfeng Dong, Jin Bo Wang, Wen-zheng Zhang:

Construction of MDS Matrices Based on the Primitive Elements of the Finite Field. 485-488 - Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu:

Privacy-Preserving and Efficient Range Counting in IoT Networks. 489-494 - Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:

A permission generation and configuration method based on Rules and FP-Growth algorithm. 495-500 - Yongchao Dang, Chafika Benzaïd

, Bin Yang, Tarik Taleb:
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems. 501-506 - Mingyi You, Binhua Shi, Yunxia Ye, Kai Huang:

Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase Interferometers. 507-512 - Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. 513-519 - Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. 520-526 - Ruizhi Zhai, Deshun Yin, Jianping Wang, Lili Yuan, Ziheng Shangguan

:
Wet Aggregate Stability Predicting of Soil in Multiple Land-Uses Based on Support Vector Machine. 527-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














