default search action
13th MSN 2017: Beijing, China
- Liehuang Zhu, Sheng Zhong:
Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 747, Springer 2018, ISBN 978-981-10-8889-6 - Xiaoli Zeng, Min Hu, Nuo Yu, Xiaohua Jia:
An Efficient and Secure Range Query Scheme for Encrypted Data in Smart Grid. 1-18 - Jiangping Han, Kaiping Xue, Hao Yue, Peilin Hong, Nenghai Yu, Fenghua Li:
Receive Buffer Pre-division Based Flow Control for MPTCP. 19-31 - Cheng Wang, Jing Luo, Bo Yang, Changjun Jiang:
On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks. 32-44 - Qi Wang, Mingwei Liu, Kaiqu Chen, Yu Zhang, Jing Zheng:
A Hierarchical Framework for Evaluation of Cloud Service Qualities. 45-54 - Rixin Xu, Zijian Zhang, Jiamou Liu, Nathan Situ, Jun Ho Jin:
Facility Location Selection Using Community-Based Single Swap: A Case Study. 55-69 - Ying Cai, Linqing Hou, Yanfang Fan, Ruoyu Chen:
Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks. 70-83 - Yang Du, Zhaoxia Yin, Xinpeng Zhang:
An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping. 84-98 - Zhengchao Lei, Weiyan Chai, Sanyuan Zhao, Hongmei Song, Fengxia Li:
Co-saliency Detection Based on Siamese Network. 99-109 - Mengxuan Sun, Xiaoju Dong, Fan Wu, Guihai Chen:
An Efficient Privacy-Preserving Fingerprint-Based Localization Scheme Employing Oblivious Transfer. 110-132 - Dongshu Wang, Jialing He, Mussadiq Abdul Rahim, Zijian Zhang, Liehuang Zhu:
An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid. 133-145 - Zijian Zhang, Chongxi Shen, Liehuang Zhu, Chen Xu, Salabat Khan Wazir, Chuyi Chen:
Achieving Communication Effectiveness of Web Authentication Protocol with Key Update. 146-162 - Bo Wang, Fan Wu, Guihai Chen:
Placement Fraud Detection on Smart Phones: A Joint Crowdsourcing and Data Analyzing Based Approach. 163-179 - Pengfei Zhu, Lejian Liao, Xin Li:
A Reinforcement Learning Approach of Data Forwarding in Vehicular Networks. 180-194 - Zhenkui Shi:
Privacy-Assured Large-Scale Navigation from Encrypted Approximate Shortest Path Recommendation. 195-211 - Mengjie Duan, Shunrong Jiang, Liangmin Wang:
An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle. 212-226 - Juan Fang, Mengxuan Wang, Hao Sun:
Research of Task Scheduling Mechanism Based on Prediction of Memory Utilization. 227-236 - Zezhong Wang, Ye Yuan, Guoren Wang, Hongchao Qin, Yuliang Ma:
An Effective Method for Community Search in Large Directed Attributed Graphs. 237-251 - Fei Wang, Yifan Du, Yongjun Xu, Tan Cheng, Xiaoli Pan:
EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANET. 252-270 - Chuangui Yang, Zhu Wang, Botao Wang, Shizhuo Deng, Guangxin Liu, Yuru Kang, Huichao Men:
CHAR-HMM: An Improved Continuous Human Activity Recognition Algorithm Based on Hidden Markov Model. 271-282 - Shaofeng Geng, Xiaoxi Guo, Jia Zhang, Yongheng Wang, Renfa Li, Binghua Song:
A Prediction Method Based on Complex Event Processing for Cyber Physical System. 283-292 - Xing Yin, Liangmin Wang:
A Fast Handover Scheme for SDN Based Vehicular Network. 293-302 - Xiangyi Chen, Liangmin Wang:
Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks. 303-317 - Rui Zhang, Wenjie Ma, Luo Zhong, Peng Xie, Hongbo Jiang:
Understanding Trajectory Data Based on Heterogeneous Information Network Using Visual Analytics. 318-327 - Rui Zhang, Nuofei Li, Siyuan Huang, Peng Xie, Hongbo Jiang:
Automatic Prediction of Traffic Flow Based on Deep Residual Networks. 328-337 - Muhammad Sohail, Liangmin Wang, Bushra Yamin:
Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network. 338-349 - Shijie Dai, Minghui Liwang, Yang Liu, Zhibin Gao, Lianfen Huang, Xiaojiang Du:
Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things. 350-364 - Li Wei, Mingwei Xu:
Enhancing Software Reliability Against Soft Error Using Critical Data Model. 365-376 - XinDi Ma, Jianfeng Ma, Sheng Gao, Qingsong Yao:
APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices. 377-390 - Jiaoyan Chen, Bang Wang, Wenyu Liu:
Barrier Coverage Lifetime Maximization in a Randomly Deployed Bistatic Radar Network. 391-401 - Yeqiu Xiao, Jia Liu, Jiao Quan, Yulong Shen, Xiaohong Jiang:
On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users. 402-412 - Xuan Wang, Xin Kou, Zifan Wang, Lanqing Wang, Baoying Liu, Feng Chen:
Gesture Recognition System Based on RFID. 413-425 - Juan Fang, Huanhuan Chen, Junjie Mao:
Understanding Data Partition for Applications on CPU-GPU Integrated Processors. 426-434 - Yue Zhang, Zhitao Guan:
Privacy-Preserving and Traceable Data Aggregation in Energy Internet. 435-449 - Juan Fang, Zeeshan Shaukat, Saqib Ali, Abdul Ahad Zulfiqar:
Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS). 450-460 - Shijie Ni, Zhuorui Yong, Ruipeng Gao:
Modeling and Evaluation of the Incentive Scheme in "E-photo". 461-472 - Wenjuan Song, Bing Zhou, Shijie Ni:
Intelligent Environment Monitoring and Control System for Plant Growth. 473-482 - Zheng Liu, Mingwei Xu, Jiahao Cao, Qi Li:
TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN. 483-496 - Zohaib Latif, Kashif Sharif, Maria K. Alvi, Fan Li:
Simulation Standardization: Current State and Cross-Platform System for Network Simulators. 497-508 - Xing Liu, Songtao Guo, Yuanyuan Yang:
Task Offloading with Execution Cost Minimization in Heterogeneous Mobile Cloud Computing. 509-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.