default search action
NaNA 2018: Xi'an, China
- International Conference on Networking and Network Applications, NaNA 2018, Xi'an, China, October 12-15, 2018. IEEE 2018, ISBN 978-1-5386-8303-3
- Tao Zhang
, Xingyan Chen
, Changqiao Xu:
Intelligent Routing Algorithm Based on Deep Belief Network for Multimedia Service in Knowledge Centric VANETs. 1-6 - Xuewen Dong, Tao Zhang, Guangxia Li, Di Lu, Balin Tian:
A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing. 7-13 - Baihe Ma
, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. 14-21 - Huanhuan Huang, Tong Ye, Tony Tong Lee:
Gated Slotted Aloha Protocol for Wireless Communication Network. 22-28 - Cong Gao, Zhenzhou Tian, Yanping Chen, Zhongmin Wang:
A Novel Virtual Sensor Management Scheme for Manufacturing Network. 29-35 - Syed Hassan Raza Naqvi, Shahida Jabeen
, Pin-Han Ho:
Low-complexity Optimal Scheduler for LTE Over LAN Cable. 36-41 - Pinchang Zhang, Xiaohong Jiang:
Channel-based Authentication for Dual-Hop Wireless Networks. 42-46 - Ahmed Salem
, Xuening Liao, Shuiguang Zeng, Yulong Shen:
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework. 47-51 - Zeyuan Yang
, Rentao Gu, Tao Dong, Jie Yin, Shu Li, Zhihui Liu, Tingting Zhang, Yuefeng Ji:
An Artificial Neural Network Based Attenuation Tomography in Free Space Optical Network. 52-57 - Wei-Ting Yeh, Chih-Min Chao, Cong-Xiang Wang:
High-Reception-Rate Transmission by Dynamic Scheduling for Wireless Body Area Networks. 58-62 - Raisa O. C. Hirafuji, Ahmad R. Dhaini, Divanilson R. Campelo, Pin-Han Ho, Limei Peng:
Energy Efficiency Analysis of the Watchful Sleep Mode with Delayed Wakeup in PONs. 63-68 - Nannan Sun, Zhi Yu, Xianke Qiao:
Multi-channel Signal Acquisition Algorithm for Multi-beam Satellite Systems in High Dynamic Environment. 69-73 - Yan Gao, Yong Zeng, Zhihong Liu, Jianfeng Ma, Yeqiu Xiao:
Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network. 74-79 - Jianping Wang, Shujing Zhang, Guohong Gao, Lei Cai, Xiangang Zuo, Zhou Yu, Wei Chen:
A Clustering Algorithm of Underwater Acoustic Sensor Networks Based on Hierarchical 3D Mesh. 80-85 - Zhong Yan-Tao:
Lattice Based Authenticated Key Exchange with Universally Composable Security. 86-90 - Ziwei Han, Hai Liu, Zhenqiang Wu:
A Differential Privacy Preserving Framework with Nash Equilibrium in Genome-Wide Association studies. 91-96 - Guangchen Song, Yihui Zhou, Hai Liu, Ge Wen, Ping'an Ren:
A Privacy Inference Model Based on Attribute Graph. 97-101 - Yupan Tian, Jun Yan, Jing Hu, Zhenqiang Wu:
A Privacy Preserving Model in Uncertain Graph Mining. 102-106 - Jun Yan, Lin Zhang, Yupan Tian, Ge Wen, Jing Hu:
An Uncertain Graph Approach for Preserving Privacy in Social Networks Based on Important Nodes. 107-111 - Luo Jing-Tarur, Yao Shi-Ying, Gou Ji-Jun, Xu Qi-Yang:
The Trust-Based Access Control Model in the Wireless Sensor Network. 112-116 - Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. 117-120 - Mubarak Umar, Abdulrashid Sabo, Auwal A. Tata:
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET. 121-126 - Yinghan Peng, Tao Dong, Rentao Gu, Qize Guo, Jie Yin, Zhihui Liu, Tingting Zhang, Yuefeng Ji:
A Review of Dynamic Resource Allocation in Integrated Satellite and Terrestrial Networks. 127-132 - Bin Yang, Zhenqiang Wu, Lisheng Ma, Yuanyuan Fan:
On the Delivery Probability Study in Mobile Ad Hoc Networks. 133-136 - Xufei Li, Shuiguang Zeng, Wei Tong:
Enhancing Carrier Frequency Offset Authentication via Fractal Dimension. 137-142 - Ranran Sun, Shuiguang Zeng, Xinghui Zhu:
Limits of Covert Communication over AWGN Channels in the Presence of Multiple Wardens. 143-146 - Shuiguang Zeng, Xufei Li, Ahmed Salem
, Dongmei Zhao:
Physical Layer Authentication Based on CFO and Visibility Graph. 147-152 - Guoying Qiu, Ke Cheng, Lingtong Liu, Shuiguang Zeng:
TMarkov: LBS Trajectory Prediction for Crowdsourcing Recommendation. 153-158 - Shumaila Javaid
, Zhenqiang Wu, Hamza Fahim
, Farhana Javed, Jiawang Chen:
Analyzing the Impact of Nanonode Density on Biological Tissues in Intrabody Nanonetworks. 159-163 - Wu Wang, Bin Yang, Xin Wang, Yumei She, Shikai Shen:
Capacity of 3D MANETs Under Packet Redundancy and Receiver Probing. 164-168 - Li-Zhuang Tan, Wei Su, Shuai Gao, Peng Cheng:
L4S: Low-Speed Software Synergetic Sampling and Detecting Long Flow for Data Center Network. 169-174 - Guozhu Zhao, Lisheng Ma, Xiaohong Jiang:
Least-Unavailability Path Selecting Algorithm Based on RBF for Disaster-Survivable Software-Defined Optical Networks. 175-181 - Xiaolan Liu, Lisheng Ma, Xiaohong Jiang:
An Optimized Content Uploading Scheme for D2D Communications Underlaying Cellular Networks. 182-186 - Muhib Ahmad Khan Sherwani, Muneeb Ahmed Khan
:
Quality of Services in Warehouse Scale Computers. 187-190 - Krishna Prasad Bhattarai, Bishnu Prasad Gautam
, Kazuhiko Sato:
Authentic Gate Entry System (AuthGES) by Using LBPH for Smart Home Security. 191-196 - Bo She, Zunying Qin, Qiang Wang, Zhe Zhang, Jingru Cui, Guodong Li, Xiaoge Zhong:
A Design and Implementation of Network Billing System on Campus Based on Hadoop and Netflow. 197-200 - Jianfeng Chen, Rui Xu, Chunlin Li:
Research of Security Situational Awareness and Visualization Approach in Cloud Computing. 201-205 - Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. 206-211 - Yihui Zhou, Guangchen Song, Hai Liu, Laifeng Lu:
Privacy-Utility Trade-Off of K-Subset Mechanism. 212-217 - Laifeng Lu, Yanping Li, Yihui Zhou, Feng Tian, Hai Liu:
Adaptive Differential Privacy Interactive Publishing Model Based on Dynamic Feedback. 218-222 - Lisheng Ma, Bin Yang:
Data Backup Against Progressive Disasters in Geo-Distributed Data Center Networks. 223-226 - Wang Shi-Kui, Li Wen:
Technical Research and Platform Implementation of the Protocol Conformance Test of AFDX Network Switch. 227-231 - Shahida Jabeen
, Pin-Han Ho:
Joint User Scheduling for ODFMA-Based Multi-Cell Networks. 232-236 - Xiaoguang Li, Jun Liu
, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang:
TickSEC: A Novel Reconfigurable Platform for WiFi Physical Layer Security. 237-244 - Hui Song, Shuai Han, Zhongmin Wang:
Classification of Mobile Users' Activities Based on Group Similarity Perception Networks. 245-250 - Junjie Su, Naijie Gu, Qilin Bai, Chuanwen Lin:
Parallel Implementation of AES-GCM with High Throughput and Energy Efficiency. 251-256 - Fang Ren, Xuefei Yang, Dong Zheng:
A QC-LDPC Code Based Digital Signature Algorithm. 257-262 - Yao Guo, Zhihong Liu, Yong Zeng, Ruiheng Wang
, Jianfeng Ma:
Preserving Privacy for Hubs and Links in Social Networks. 263-269 - Shujie Yang, Changqiao Xu, Jianfeng Guan, Tao Zhang
:
Event-based Diffusion Kalman Filter Strategy for Clock Synchronization in WSNs. 270-276 - Yuke Liu, Junwei Zhang, Qi Gao:
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control. 277-283 - Jianming Fu, Rui Jin, Yan Lin, Baihe Jiang, Zhengwei Guo:
Function Risk Assessment Under Memory Leakage. 284-291 - Lei Zhang, Zhengjun Zhai, Linting Bai, Yahui Li, Wensheng Niu, Lei Yuan:
Visual-inertial State Estimation for the Civil Aircraft Landing in Low Visibility Conditions. 292-297 - Xiangwen Liu, Liangmin Wang, Yuquan Zhu:
SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing. 298-303 - Pengfei Song, Yong Zeng, Zhihong Liu, Jianfeng Ma, Huichuan Liu:
True Random Number Generation Using Process Scheduling of Android Systems. 304-309 - Sugang Ma, Fuxi Wen, Zhongmin Wang:
An Efficient GPS-Free Vehicle Localization Algorithm Using Single Roadside Unit and Receiver. 310-313 - Nader Shahata:
The Challenges, the Threats and Policy Implications to a Compromised Privacy and Security. 314-317 - Zhao Huang, Chen Zhao, Quan Wang, Zhenyi Wang:
Implementation and Analysis of Improved RO PUFs with Latch Structure. 318-323 - He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:
A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. 324-329 - Yue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei:
Energy Saving Strategy for Task Migration Based on Genetic Algorithm. 330-336 - Futao Zhang, Zhongmin Wang:
Visual Tracking Algorithm Based on Improved Kernelized Correlation Filters. 337-343 - Ruifang Zhang, Li Li, Nana Du, Huanyu Liu:
Epidemic Propagation Control with Limited Temporary Link Removed. 344-349 - Jiawei Zheng, Xuewen Dong, Tao Zhang, Junfeng Chen, Wei Tong, Xiaozhou Yang:
MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing. 350-355 - Chen Zhao, Jungang Han, Yang Jia, Fan Gou:
Lung Nodule Detection via 3D U-Net and Contextual Convolutional Neural Network. 356-361 - Hongxia Lv, Xiaoni Du, Xiaodan Li:
Construction of a Class of Linear Codes with Two Weights. 362-365 - Hong Xia, Jingru Zhao, Xiao Ma, Yanping Chen, Hui Lv, Zhongmin Wang:
Research on Data-Driven Industrial Internet Solutions. 366-371 - Hongli Yu, Bin Yang, Jinjun Liu, Gwo-Jong Yu:
Passive Human Trajectory Tracking Study in Indoor Environment with CSI. 372-377 - Shuyan Wang
, Wentao Wu, Jiaze Sun:
A Method for Test Cases Reduction in Web Application Testing Based on User Session. 378-383 - Bhagawan Rokaha, Dhan Prasad Ghale, Bishnu Prasad Gautam
:
Enhancement of Supermarket Business and Market Plan by Using Hierarchical Clustering and Association Mining Technique. 384-389 - Jianchun Xie, Zhonghua Wang, Yahui Li:
The Distributed Computing Framework Research for Avionics Cloud. 390-393 - Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, WenXin Lei, Aidong Xu:
A Novel Terminal Security Access Method Based on Edge Computing for IoT. 394-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.