default search action
Xiaohong Jiang 0001
Person information
- affiliation: Future University Hakodate, Japan
- affiliation: Tohoku University, Department of Graduate School of Information Sciences, Japan
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
- affiliation (PhD 1999): Xidian University, China
Other persons with the same name
- Xiaohong Jiang (aka: Xiao-hong Jiang, Xiao-Hong Jiang) — disambiguation page
- Xiaohong Jiang 0002 (aka: Xiao-hong Jiang 0002, Xiao-Hong Jiang 0002) — Zhejiang University, School of Computer Science and Technology, Hangzhou, China
- Xiaohong Jiang 0003 — Nanjing Forestry University, College of Automobile and Traffic Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j185]Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang:
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection. Comput. Commun. 219: 216-228 (2024) - [j184]Junjun Wang, Zhao Huang, Lirong Zhou, Jinhui Liu, Xiaohong Jiang, Yin Chen, Yuan Cao, Quan Wang:
A new entropy source design based on NAND-XOR ring oscillators for resource-efficient and ultra-high throughput TRNG. IEICE Electron. Express 21(14): 20240259 (2024) - [j183]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. IEEE Internet Things J. 11(2): 3233-3249 (2024) - [j182]Zeyu Li, Yan Wang, Zhao Huang, Junjie Wang, Quan Wang, Xiaohong Jiang:
Ada-FA: A Comprehensive Framework for Adaptive Fault Tolerance and Aging Mitigation in FPGAs. IEEE Internet Things J. 11(10): 17688-17699 (2024) - [j181]Xiaolan Liu, Bin Yang, Jianming Liu, Lintao Xian, Xiaohong Jiang, Tarik Taleb:
Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint. IEEE Internet Things J. 11(23): 38704-38718 (2024) - [j180]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks. IEEE Syst. J. 18(3): 1504-1515 (2024) - [j179]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems. IEEE Trans. Commun. 72(2): 1020-1032 (2024) - [j178]Yulin Teng, Pinchang Zhang, Xiao Chen, Xiaohong Jiang, Fu Xiao:
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems. IEEE Trans. Inf. Forensics Secur. 19: 4642-4657 (2024) - [j177]Yu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming. IEEE Trans. Inf. Forensics Secur. 19: 5696-5711 (2024) - [j176]Chengyan Ma, Di Lu, Chaoyue Lv, Ning Xi, Xiaohong Jiang, Yulong Shen, Jianfeng Ma:
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems. IEEE Trans. Knowl. Data Eng. 36(9): 4472-4485 (2024) - [j175]Xufei Li, Yin Chen, Jinxiao Zhu, Shuiguang Zeng, Yulong Shen, Xiaohong Jiang, Daqing Zhang:
Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification. IEEE Trans. Mob. Comput. 23(2): 1416-1430 (2024) - [j174]Ranran Sun, Huihui Wu, Bin Yang, Yulong Shen, Weidong Yang, Xiaohong Jiang, Tarik Taleb:
On Covert Rate in Full-Duplex D2D-Enabled Cellular Networks With Spectrum Sharing and Power Control. IEEE Trans. Mob. Comput. 23(10): 9931-9945 (2024) - [j173]Yong-Feng Ge, Hua Wang, Jinli Cao, Yanchun Zhang, Xiaohong Jiang:
Privacy-preserving data publishing: an information-driven distributed genetic algorithm. World Wide Web (WWW) 27(1): 1 (2024) - [c132]Meiyun Xie, Xin Liu, Shuangrui Zhao, Yeqiu Xiao, Xiaohong Jiang:
A New Secrecy Metric for Relay-Eavesdropper Channel. NaNA 2024: 42-47 - [i26]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay. CoRR abs/2404.05983 (2024) - [i25]He Zhu, Huihui Wu, Wei Su, Xiaohong Jiang:
Enhancing Covert Communication in Relay Systems Using Multi-Antenna Technique. CoRR abs/2407.11882 (2024) - 2023
- [j172]Yan Liu, Huihui Wu, Xiaohong Jiang:
Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems. Ad Hoc Networks 148: 103207 (2023) - [j171]Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. IET Inf. Secur. 2023: 1-15 (2023) - [j170]Ranran Sun, Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks. IEEE Internet Things J. 10(1): 17-30 (2023) - [j169]Depeng Chen, Xiaohong Jiang, Hong Zhong, Jie Cui:
Building Trusted Federated Learning: Key Technologies and Challenges. J. Sens. Actuator Networks 12(1): 13 (2023) - [j168]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems. IEEE Trans. Cloud Comput. 11(3): 2770-2783 (2023) - [j167]Pinchang Zhang, Yulin Teng, Yulong Shen, Xiaohong Jiang, Fu Xiao:
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems. IEEE Trans. Dependable Secur. Comput. 20(6): 4778-4792 (2023) - [j166]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems. IEEE Trans. Inf. Forensics Secur. 18: 4059-4074 (2023) - [j165]Bin Yang, Yongchao Dang, Tarik Taleb, Shikai Shen, Xiaohong Jiang:
Sum Rate and Max-Min Rate for Cellular-Enabled UAV Swarm Networks. IEEE Trans. Veh. Technol. 72(1): 1073-1083 (2023) - [j164]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. IEEE Trans. Wirel. Commun. 22(12): 9907-9922 (2023) - [c131]Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen, Xiaohong Jiang:
3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication. GLOBECOM 2023: 7586-7591 - [c130]Yin Chen, Zhen Jia, Zeiwei Guo, Jinxiao Zhu, Xiaohong Jiang:
A Review on Feature, Problem Formulation and Application of Radio Frequency Fingerprinting. IoT 2023: 260-264 - [c129]Sibo Wang, Bin Yang, Wu Wang, Shikai Shen, Xiaohong Jiang:
On UAV-IRS-Aided Covert Communication of D2D-Enabled Cellular Networks. NaNA 2023: 58-63 - [c128]He Zhu, Huihui Wu, Xiaohong Jiang:
Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO Systems. NaNA 2023: 122-126 - [c127]Xinzhe Pi, Bin Yang, Xiaohong Jiang:
Covert Terahertz Communication for UAV-Aided Wireless Relay Systems. NaNA 2023: 127-132 - [c126]Ranran Sun, Bin Yang, Jingsen Jiao, Yanchun Zuo, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Joint Secure and Covert Communication Study in Two-hop Relaying Systems. VTC Fall 2023: 1-7 - [i24]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications. CoRR abs/2303.07770 (2023) - [i23]Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang:
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark. CoRR abs/2307.06123 (2023) - 2022
- [j163]Yangyang Liu, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Online machine learning-based physical layer authentication for MmWave MIMO systems. Ad Hoc Networks 131: 102864 (2022) - [j162]Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j161]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang, Zhiwei Zhang:
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity. Future Gener. Comput. Syst. 135: 85-94 (2022) - [j160]Jia Liu, Yang Xu, Yulong Shen, Hiroki Takakura, Xiaohong Jiang, Tarik Taleb:
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? IEEE Internet Things J. 9(13): 10961-10977 (2022) - [j159]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems. IEEE Internet Things J. 9(14): 12783-12798 (2022) - [j158]Ji He, Jia Liu, Wei Su, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System. IEEE Trans. Commun. 70(8): 5451-5468 (2022) - [j157]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 17: 99-114 (2022) - [j156]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. IEEE Trans. Inf. Forensics Secur. 17: 2920-2935 (2022) - [j155]Lisheng Ma, Wei Su, Bin Wu, Bin Yang, Xiaohong Jiang:
Joint Emergency Data and Service Evacuation in Cloud Data Centers Against Early Warning Disasters. IEEE Trans. Netw. Serv. Manag. 19(2): 1306-1320 (2022) - [j154]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Physical layer authentication in MIMO systems: a carrier frequency offset approach. Wirel. Networks 28(5): 1909-1921 (2022) - [c125]Jiaqing Bai, Ji He, Xiaohong Jiang:
Covert Communication in NOMA Systems with Decision-Assisted Q-learning. CANDARW 2022: 283-287 - [c124]Zhen Jia, Lisheng Ma, Shigen Shen, Xiaohong Jiang:
Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver. NaNA 2022: 23-28 - [c123]Yan Liu, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Multi-antenna covert communications in random wireless networks with full-duplex relay. SAC 2022: 1960-1966 - [c122]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. SciSec 2022: 276-284 - 2021
- [j153]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime. Ad Hoc Networks 121: 102580 (2021) - [j152]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems. Comput. Networks 199: 108456 (2021) - [j151]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j150]Yang Xu, Jia Liu, Yulong Shen, Jun Liu, Xiaohong Jiang, Tarik Taleb:
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things. IEEE Internet Things J. 8(4): 3000-3013 (2021) - [j149]Chan Gao, Bin Yang, Xiaohong Jiang, Hiroshi Inamura, Masaru Fukushi:
Covert Communication in Relay-Assisted IoT Systems. IEEE Internet Things J. 8(8): 6313-6323 (2021) - [j148]Xuening Liao, Zhen Jia, Zhenqiang Wu, Bo Liu, Xinlei Wang, Xiaohong Jiang:
Modulation and Signal Detection for Diffusive-Drift Molecular Communication with a Mobile Receiver. Mob. Inf. Syst. 2021: 9656465:1-9656465:17 (2021) - [j147]Lisheng Ma, Wei Su, Bin Wu, Xiaohong Jiang:
Real-time data backup in Geo-distributed data center networks against progressive disaster. Photonic Netw. Commun. 41(3): 211-221 (2021) - [j146]Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j145]Ranran Sun, Bin Yang, Siqi Ma, Yulong Shen, Xiaohong Jiang:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j144]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 16: 3371-3386 (2021) - [j143]Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Trans. Inf. Forensics Secur. 16: 4265-4279 (2021) - [j142]Bin Yang, Tarik Taleb, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas. IEEE Trans. Wirel. Commun. 20(4): 2383-2397 (2021) - [j141]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Yusheng Ji, Norio Shiratori:
QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers. IEEE Trans. Wirel. Commun. 20(8): 4902-4916 (2021) - [c121]He Zhu, Huihui Wu, Xiaohong Jiang:
Covert MIMO Communication in Two-hop Relay Systems. NaNA 2021: 63-68 - [c120]Ahmed Salem, Huihui Wu, Xiaohong Jiang:
Exact Evaluation of Total Variation Distance in Covert Communications. NaNA 2021: 119-124 - [c119]Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen:
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI. NaNA 2021: 206-211 - 2020
- [j140]Zhao Huang, Quan Wang, Yin Chen, Xiaohong Jiang:
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges. IEEE Access 8: 10796-10826 (2020) - [j139]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Xiaohong Jiang:
Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper. Ad Hoc Networks 98 (2020) - [j138]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Shikai Shen:
On delay performance study for cooperative multicast MANETs. Ad Hoc Networks 102: 102117 (2020) - [j137]Xiaolan Liu, Bin Yang, Xiaohong Jiang, Lisheng Ma, Shikai Shen:
On social-aware data uploading study of D2D-enabled cellular networks. Comput. Networks 166 (2020) - [j136]Lisheng Ma, Wei Su, Bin Wu, Bin Yang, Xiaohong Jiang:
Early warning disaster-aware service protection in geo-distributed data centers. Comput. Networks 180: 107419 (2020) - [j135]Xiaochen Li, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol. IET Commun. 14(22): 4135-4141 (2020) - [j134]Pinchang Zhang, Jun Liu, Yulong Shen, Hewu Li, Xiaohong Jiang:
Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 7(5): 3977-3990 (2020) - [j133]Pinchang Zhang, Yulong Shen, Xiaohong Jiang, Bin Wu:
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 68(4): 2446-2458 (2020) - [j132]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. IEEE Trans. Inf. Forensics Secur. 15: 1347-1362 (2020) - [j131]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 15: 3775-3790 (2020) - [j130]Pinchang Zhang, Tarik Taleb, Xiaohong Jiang, Bin Wu:
Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments. IEEE Trans. Wirel. Commun. 19(3): 1563-1576 (2020) - [j129]Huihui Wu, Yuanyu Zhang, Xuening Liao, Yulong Shen, Xiaohong Jiang:
On covert throughput performance of two-way relay covert wireless communications. Wirel. Networks 26(5): 3275-3289 (2020) - [j128]Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang:
Editorial: Special issue on security and privacy in network computing. World Wide Web 23(2): 951-957 (2020) - [c118]Guozhu Zhao, Pinchang Zhang, Xiaohong Jiang:
On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT Scenarios. NaNA 2020: 124-129 - [c117]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang:
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion. NaNA 2020: 193-197 - [i22]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication. CoRR abs/2008.00147 (2020) - [i21]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. CoRR abs/2009.01988 (2020)
2010 – 2019
- 2019
- [j127]Yeqiu Xiao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective. IEEE Access 7: 3371-3382 (2019) - [j126]Pinchang Zhang, Jinxiao Zhu, Yin Chen, Xiaohong Jiang:
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks. IEEE Access 7: 38322-38336 (2019) - [j125]Bin Yang, Zhenqiang Wu, Yuanyuan Fan, Xiaohong Jiang, Shikai Shen:
Non-Asymptotic Capacity Study in Multicast Mobile Ad Hoc Networks. IEEE Access 7: 115109-115121 (2019) - [j124]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang:
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Comput. Networks 161: 150-161 (2019) - [j123]Xiaolan Liu, Lisheng Ma, Xiaohong Jiang:
A Generalized Data Uploading Scheme for D2D-Enhanced Cellular Networks. IEICE Trans. Commun. 102-B(9): 1914-1923 (2019) - [j122]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 6(2): 1594-1605 (2019) - [j121]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. IEEE Trans. Commun. 67(1): 623-638 (2019) - [j120]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Friendship-based cooperative jamming for secure communication in Poisson networks. Wirel. Networks 25(7): 4077-4095 (2019) - [c116]Yutaka Musaka, Yoshitaka Nakamura, Hiroshi Inamura, Xiaohong Jiang:
Relay UE Selection Scheme in an Emergency Warning System Integrating Proximity Services. CCNC 2019: 1-2 - [c115]Ji He, Jia Liu, Yang Xu, Xiaohong Jiang:
Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime. HPSR 2019: 1-7 - [c114]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang:
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains. ICC 2019: 1-6 - [c113]Yutaka Musaka, Yoshitaka Nakamura, Hiroshi Inamura, Xiaohong Jiang:
Transmission Reduction Scheme in an Emergency Warning System with LTE D2D. ICMU 2019: 1-6 - [c112]Xiaoban Wu, Peilong Li, Timothy Miskell, Liang-Min Wang, Yan Luo, Xiaohong Jiang:
Ripple: An Efficient Runtime Reconfigurable P4 Data Plane for Multicore Systems. NaNA 2019: 142-148 - [c111]Wenhao Zhang, Lisheng Ma, Xiaohong Jiang:
Disaster-Aware Dynamic Routing for SDN-Based Active-Active Data Center Networks. NaNA 2019: 160-165 - [c110]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems. WCNC 2019: 1-6 - 2018
- [j119]Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen:
On the packet delivery delay study for three-dimensional mobile ad hoc networks. Ad Hoc Networks 69: 38-48 (2018) - [j118]Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:
Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018) - [j117]Lisheng Ma, Wei Su, Xiaozhou Li, Bin Wu, Xiaohong Jiang:
Heterogeneous Data Backup Against Early Warning Disasters in Geo-Distributed Data Center Networks. JOCN 10(4): 376-385 (2018) - [j116]Junjie Xie, Deke Guo, Xiaozhou Li, Yulong Shen, Xiaohong Jiang:
Cutting Long-Tail Latency of Routing Response in Software Defined Networks. IEEE J. Sel. Areas Commun. 36(3): 384-396 (2018) - [j115]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - [j114]Lisheng Ma, Xiaohong Jiang, Achille Pattavina:
Blocking Probability Analysis for Optical Banyan Networks With Link Failure. IEEE Trans. Commun. 66(9): 4074-4086 (2018) - [j113]Yongzhi Wang, Yulong Shen, Xiaohong Jiang:
Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Inf. Forensics Secur. 13(6): 1376-1391 (2018) - [j112]Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:
On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Serv. Comput. 11(2): 318-328 (2018) - [j111]Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 67(3): 2631-2643 (2018) - [j110]Kechen Zheng, Ying Cui, Xiaoying Liu, Xinbing Wang, Xiaohong Jiang, Jun Tian:
Asymptotic Analysis of Inhomogeneous Information-Centric Wireless Networks With Infrastructure Support. IEEE Trans. Veh. Technol. 67(6): 5245-5259 (2018) - [j109]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wirel. Commun. 17(3): 1893-1906 (2018) - [j108]Pin-Han Ho, Limei Peng, Xiaohong Jiang, Anwar Haque:
Special Issue on Secure and privacy-preserving Autonomous Vehicle Networks (AVNs). Veh. Commun. 11: 32 (2018) - [j107]