default search action
Jin Wang 0009
Person information
- affiliation: Soochow University, Department of Computer Science and Technology, Suzhou, China
- affiliation (PhD 2011): City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation (PhD 2011): University of Science and Technology of China, Department of Computer Science, Hefei, China
Other persons with the same name
- Jin Wang — disambiguation page
- Jin Wang 0001 — Changsha University of Science and Technology, School of Computer and Communication Engineering, China (and 3 more)
- Jin Wang 0002 — The University of Western Australia, Perth, WA, Australia (and 1 more)
- Jin Wang 0003 — Beijing Jiaotong University, State Key Lab of Rail Traffic Control and Safety, China
- Jin Wang 0004 — Wuhan University, School of Electronic Information, China
- Jin Wang 0005 — Nantong University, School of Computer Science and Technology, China
- Jin Wang 0006 — Chongqing University of Posts and Telecommunications, Chongqing Key Laboratory of Computational Intelligence, China (and 1 more)
- Jin Wang 0007 — Megagon Labs (and 2 more)
- Jin Wang 0008 — Yunnan University, School of Information Science and Engineering, China (and 1 more)
- Jin Wang 0010 — Georgia Institute of Technology, School of Electrical and Computer Engineering, Atlanta, GA, USA
- Jin Wang 0012 — Institute of Applied Physics and Computational Mathematics, Beijing, China (and 1 more)
- Jin Wang 0013 — Aeroflex Cambridge Ltd., UK (and 2 more)
- Jin Wang 0015 — Zhejiang University, State Key Laboratory of Fluid Power and Mechatronic Systems, Hangzhou, China
- Jin Wang 0016 — Kyushu University, Research and Development Center for Taste and Odor Sensing, Fukuoka, Japan (and 1 more)
- Jin Wang 0017 — City University of Hong Kong, Department of Systems Engineering and Engineering Management, Hong Kong
- Jin Wang 0018 — Nanyang Technological University, School of Computer Engineering, Singapore
- Jin Wang 0019 — Huazhong University of Science and Technology, Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, Wuhan, China (and 1 more)
- Jin Wang 0020 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China
- Jin Wang 0021 — Southeast University, School of Computer Science and Engineering, Nanjing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Jin Wang, Wei Jiang, Jingya Zhou, Zhaobo Lu, Kejie Lu, Jianping Wang:
Partial Decode and Compare: An Efficient Verification Scheme for Coded Edge Computing. IEEE Trans. Cloud Comput. 12(2): 431-445 (2024) - [j35]Congcong Zhang, Jingya Zhou, Jin Wang, Jianxi Fan, Yingdan Shi:
Fairness-Aware Competitive Bidding Influence Maximization in Social Networks. IEEE Trans. Comput. Soc. Syst. 11(2): 2147-2159 (2024) - 2023
- [j34]Tao Peng, Yiyun Wu, Jing Zhao, Caishan Wang, Jin Wang, Jing Cai:
Ultrasound Prostate Segmentation Using Adaptive Selection Principal Curve and Smooth Mathematical Model. J. Digit. Imaging 36(3): 947-963 (2023) - [j33]Jin Wang, Zhaobo Lu, Mingjia Fu, Jianping Wang, Kejie Lu, Admela Jukan:
Decode-and-Compare: An Efficient Verification Scheme for Coded Distributed Edge Computing. IEEE Trans. Cloud Comput. 11(3): 2784-2802 (2023) - [j32]Yuanchao Dai, Jing Wu, Yuanzhao Fan, Jin Wang, Jianwei Niu, Fei Gu, Shigen Shen:
MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG Signals. ACM Trans. Sens. Networks 19(1): 6:1-6:23 (2023) - [c52]Wei Jiang, Jin Wang, Lingzhi Li, Dongyang Yu, Can Liu:
Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing. ICA3PP (4) 2023: 378-397 - [c51]Dongyang Yu, Jin Wang, Lingzhi Li, Wei Jiang, Can Liu:
RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain. ICA3PP (4) 2023: 398-418 - [i4]Congcong Zhang, Jingya Zhou, Jin Wang, Jianxi Fan, Yingdan Shi:
Fairness-aware Competitive Bidding Influence Maximization in Social Networks. CoRR abs/2308.10209 (2023) - [i3]Dongyang Yu, Jin Wang, Lingzhi Li, Wei Jiang, Can Liu:
RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain. CoRR abs/2311.02582 (2023) - 2022
- [j31]Yuanzhao Fan, Fei Gu, Jin Wang, Jianping Wang, Kejie Lu, Jianwei Niu:
SafeDriving: An Effective Abnormal Driving Behavior Detection System Based on EMG Signals. IEEE Internet Things J. 9(14): 12338-12350 (2022) - [j30]Jin Wang, Chunming Cao, Jianping Wang, Kejie Lu, Admela Jukan, Wei Zhao:
Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices. IEEE Trans. Cloud Comput. 10(4): 2817-2833 (2022) - [c50]Tao Peng, Yiyun Wu, Jing Zhao, Bo Zhang, Jin Wang, Jing Cai:
Explainability-guided Mathematical Model-Based Segmentation of Transrectal Ultrasound Images for Prostate Brachytherapy. BIBM 2022: 1126-1131 - [c49]Xiaotian Zou, Jin Wang, Can Liu, Lingzhi Li, Fei Gu, Guojing Li:
Secure and Private Coding for Edge Computing Against Cooperative Attack with Low Communication Cost and Computational Load. CollaborateCom (1) 2022: 213-232 - [c48]Yingyao Yang, Jin Wang, Fei Gu:
Linear Coded Federated Learning under Multiple Stragglers over Heterogeneous Clients. CSCWD 2022: 1221-1226 - [c47]Guojing Li, Jin Wang, Xiaotian Zou, Lingzhi Li, Fei Gu:
BYEE: Batch Fully Private Scheme for Coded Distributed Matrix Multiplication. HPCC/DSS/SmartCity/DependSys 2022: 645-652 - 2021
- [j29]Jingya Zhou, Jianxi Fan, Jin Wang:
Task scheduling for mobile edge computing enabled crowd sensing applications. Int. J. Sens. Networks 35(2): 88-98 (2021) - [c46]Zhaobo Lu, Jin Wang, Jingya Zhou, Jianping Wang, Kejie Lu:
Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack. ICA3PP (1) 2021: 529-548 - [c45]Yingyao Yang, Jin Wang, Kejie Lu, Jianping Wang, Zhaobo Lu:
Linear Coded Federated Learning. ICA3PP (1) 2021: 627-644 - [c44]Mingyue Cui, Jin Wang, Jingya Zhou, Kejie Lu, Jianping Wang:
The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing. TrustCom 2021: 224-231 - [c43]Cong Cheng, Lingzhi Li, Jin Wang, Fei Gu:
The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing. TrustCom 2021: 250-257 - [c42]Jiqing Chang, Jin Wang, Fei Gu, Kejie Lu, Lingzhi Li, Jianping Wang:
PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge Computing. TrustCom 2021: 339-346 - 2020
- [j28]Ziyao Huang, Weiwei Wu, Feng Shan, Yuxin Bian, Kejie Lu, Zhenjiang Li, Jianping Wang, Jin Wang:
CoUAS: Enable Cooperation for Unmanned Aerial Systems. ACM Trans. Sens. Networks 16(3): 24:1-24:19 (2020) - [c41]Jingya Zhou, Jianxi Fan, Jin Wang, Baolei Cheng:
Representation Learning on Networks for Community Detection. CBD 2020: 157-162 - [c40]Cong Cheng, Huan Dai, Lingzhi Li, Jin Wang, Fei Gu:
The Design and Implementation of Secure Distributed Image Classification Model Training System for Heterogenous Edge Computing. CollaborateCom (1) 2020: 179-198 - [c39]Mengjia Zhai, Fei Gu, Jin Wang, Lingzhi Li, Kejie Lu, Jianping Wang:
PCRec: A Private Coding Computation Scheme Based on Edge Computing for Recommendation System. ISPA/BDCloud/SocialCom/SustainCom 2020: 183-191 - [c38]Tingting Dong, Jin Wang, Fei Gu, Jingya Zhou, Kejie Lu, Jianping Wang:
MCSEC: Secure Coded Matrix Multiplication Scheme for Edge Computing with Minimum Communication Cost. ISPA/BDCloud/SocialCom/SustainCom 2020: 192-199 - [c37]Mingjia Fu, Jin Wang, Jianping Wang, Kejie Lu, Admela Jukan, Fei Gu:
Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing. IWQoS 2020: 1-6 - [c36]Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang:
Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. TrustCom 2020: 547-556 - [i2]Jiqing Chang, Jin Wang, Kejie Lu, Lingzhi Li, Fei Gu, Jianping Wang:
Joint Storage Allocation and Computation Design for Private Edge Computing. CoRR abs/2010.09012 (2020)
2010 – 2019
- 2019
- [j27]Jingya Zhou, Jianxi Fan, Jin Wang, Juncheng Jia:
Dynamic service deployment for budget-constrained mobile edge computing. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j26]Jin Wang, Kejie Lu, Jianping Wang, Chuan Wu, Naijie Gu:
Enhancing the Anonymity in Information Diffusion Based on Obfuscated Coded Data. IEEE Trans. Netw. Sci. Eng. 6(4): 968-982 (2019) - [j25]Jingya Zhou, Jianxi Fan, Jin Wang, Xi Wang, Lingzhi Li:
Cost-efficient viral marketing in online social networks. World Wide Web 22(6): 2355-2378 (2019) - [c35]Jingya Zhou, Jianxi Fan, Jin Wang, Jiahao Zhu:
Task Offloading for Social Sensing Applications in Mobile Edge Computing. CBD 2019: 333-338 - [c34]Ziyao Huang, Weiwei Wu, Feng Shan, Yuxin Bian, Zhengjiang Li, Jianping Wang, Jin Wang:
CoUAS: A Cooperative UAV Fleet Control and Monitoring Platform. GLOBECOM Workshops 2019: 1-6 - [c33]Bin He, Jin Wang, Jingya Zhou, Lingzhi Li, Wei Zhou, Luqi Zhu, Mengjia Zhai:
The Design and Implementation of Multi-Cloud Based Distributed Storage Platform with Random Linear Coding. HPCC/SmartCity/DSS 2019: 1233-1240 - [c32]Chunming Cao, Jin Wang, Jianping Wang, Kejie Lu, Jingya Zhou, Admela Jukan, Wei Zhao:
Optimal Task Allocation and Coding Design for Secure Coded Edge Computing. ICDCS 2019: 1083-1093 - [c31]Mingjia Fu, Jin Wang, Jingya Zhou, Jianping Wang, Kejie Lu, Xiaobo Zhou:
A Null-Space-Based Verification Scheme for Coded Edge Computing against Pollution Attacks. ICPADS 2019: 454-461 - [c30]Yiran Qi, Jin Wang, Jingya Zhou, Lianmin Shi, Lingzhi Li, Xinyue Ge, Yilin Zhang:
The Design and Implementation of Edge Computing-Based Intelligent Ashcan Management System for Smart Community. ICPADS 2019: 717-724 - [c29]Jingya Zhou, Jianxi Fan, Jin Wang:
Cosin: Controllable Social Influence Maximization and Its Distributed Implementation in Large-scale Social Networks. ICPP 2019: 94:1-94:10 - [c28]Wei Zhou, Jin Wang, Lingzhi Li, Jianping Wang, Kejie Lu, Xiaobo Zhou:
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector. ISPA/BDCloud/SocialCom/SustainCom 2019: 100-107 - 2018
- [j24]Weiwei Ding, Jin Wang, Xiumin Wang, Kejie Lu, Ruimin Zhao, Yanqin Zhu:
On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts. Int. J. Commun. Syst. 31(6) (2018) - [j23]Ruimin Zhao, Jin Wang, Kejie Lu, Xiangmao Chang, Juncheng Jia, Shukui Zhang:
Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Virtual-Source Multicast With Integral Link Rates. IEEE Trans. Multim. 20(11): 3069-3083 (2018) - [c27]Bin He, Jin Wang, Jingya Zhou, Kejie Lu, Lingzhi Li, Shukui Zhang:
The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks. ICA3PP (4) 2018: 72-82 - [c26]Yi Ji, Juncheng Jia, Jin Wang, Jingya Zhou, Shukui Zhang:
Group Based Strategy to Accelerate Rendezvous in Cognitive Radio Networks. ICCCN 2018: 1-9 - [c25]Jing Ren, Kejie Lu, Cédric Westphal, Jin Wang, Jinfan Wang, Tongyu Song, Shucheng Liu, Jianping Wang:
JORDAN: A Novel Traffic Engineering Algorithm for Dynamic Adaptive Streaming over HTTP. ICNC 2018: 581-587 - [c24]Ruimin Zhao, Jin Wang, Kejie Lu, Jianping Wang, Xiumin Wang, Jingya Zhou, Chunming Cao:
Weakly Secure Coded Distributed Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 603-610 - 2017
- [j22]Jingya Zhou, Jianxi Fan, Jin Wang, Baolei Cheng, Juncheng Jia:
Towards traffic minimization for data placement in online social networks. Concurr. Comput. Pract. Exp. 29(6) (2017) - [j21]Xiumin Wang, Jin Wang, Xin Wang, Xiaoming Chen:
Energy and Delay Tradeoff for Application Offloading in Mobile Cloud Computing. IEEE Syst. J. 11(2): 858-867 (2017) - [c23]Jingya Zhou, Jianxi Fan, Jin Wang, Xi Wang, Baolei Cheng:
Cost-Efficient Influence Maximization in Online Social Networks. CBD 2017: 232-237 - [c22]Weiwei Ding, Jin Wang, Kejie Lu, Ruimin Zhao, Xiumin Wang, Yanqin Zhu:
Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding. ISPA/IUCC 2017: 267-274 - 2016
- [j20]Yang Sui, Xiumin Wang, Jin Wang, Lusheng Wang, Saihang Hou:
Deadline-aware cooperative data exchange with network coding. Comput. Networks 97: 88-97 (2016) - [j19]Xiangmao Chang, Jin Wang, Jianping Wang, Kejie Lu, Yi Zhuang:
On the optimal design of secure network coding against wiretapping attack. Comput. Networks 99: 82-98 (2016) - [j18]Jin Wang, Jing Ren, Kejie Lu, Jianping Wang, Shucheng Liu, Cédric Westphal:
A minimum cost cache management framework for information-centric networks with network coding. Comput. Networks 110: 1-17 (2016) - [j17]Juncheng Jia, Dajin Wang, Zhengqiu He, Jianxi Fan, Shukui Zhang, Jin Wang, Jianfeng Yan:
In-band bootstrapping in database-driven multi-hop cognitive radio networks. Int. J. Commun. Syst. 29(17): 2542-2554 (2016) - [j16]Lingzhi Li, Zhe Yang, Jin Wang, Shukui Zhang, Yanqin Zhu:
Network coding with crowdsourcing-based trajectory estimation for vehicular networks. J. Netw. Comput. Appl. 64: 204-215 (2016) - [j15]Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, Naijie Gu:
On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming. IEEE Trans. Multim. 18(6): 1149-1162 (2016) - [j14]Jin Wang, Kejie Lu, Jianping Wang, Junda Zhu, Chunming Qiao:
ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks. IEEE Trans. Veh. Technol. 65(9): 7621-7633 (2016) - [c21]Ruimin Zhao, Jin Wang, Kejie Lu, Xiangmao Chang, Lingzhi Li, Yanqin Zhu:
Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Multicast with Integral Link Rates. HPCC/SmartCity/DSS 2016: 967-974 - [c20]Zhengqing Wen, Jin Wang, Kejie Lu, Jingya Zhou, Zhenguo Gao, Yanqin Zhu:
Optimal Rate Allocation and Linear Network Coding Design for Secure Multicast with Multiple Streams. HPCC/SmartCity/DSS 2016: 1037-1044 - [c19]Wen Qi, Jin Wang, Hermine Hovhannisyan, Kejie Lu, Jianping Wang, Junda Zhu:
A Generic Mitigation Framework against Cross-VM Covert Channels. ICCCN 2016: 1-10 - [c18]Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao:
Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design. INFOCOM 2016: 1-9 - [c17]Weiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu:
Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security. Trustcom/BigDataSE/ISPA 2016: 576-583 - [c16]Chengjin Jia, Jin Wang, Yanqin Zhu, Zhengqing Wen, Juncheng Jia:
Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding. Trustcom/BigDataSE/ISPA 2016: 1567-1574 - 2015
- [j13]Jin Wang, Sheng Wang, Shizhong Xu:
Robustness and energy efficiency - a logical multi-topology scheme for time-varying traffic in IP networks. IET Networks 4(3): 169-174 (2015) - [j12]Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu, Baolei Cheng:
An efficient communication relay placement algorithm for content-centric wireless mesh networks. Int. J. Commun. Syst. 28(2): 262-280 (2015) - [j11]Jing Ren, Kejie Lu, Fei Tang, Jin Wang, Jianping Wang, Sheng Wang, Shucheng Liu:
CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network. Int. J. Commun. Syst. 28(17): 2167-2179 (2015) - [j10]Lizhen Wang, Shukui Zhang, Juncheng Jia, Jin Wang:
基于距离和概率的能量相关路由协议 (Energy-aware Protocol Based on Distance and Probability). 计算机科学 42(10): 71-75 (2015) - [c15]Jingya Zhou, Jianxi Fan, Jin Wang, Juncheng Jia:
Traffic-Aware Data Placement for Online Social Networks. CBD 2015: 125-132 - [c14]Chengjin Jia, Jin Wang, Yanqin Zhu, Xin Wang, Kejie Lu, Xiumin Wang, Zhengqing Wen:
On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding. ICA3PP (4) 2015: 506-520 - [c13]Jing Ren, Lemin Li, Huan Chen, Sheng Wang, Shizhong Xu, Gang Sun, Jin Wang, Shucheng Liu:
On the deployment of information-centric network: Programmability and virtualization. ICNC 2015: 690-694 - [c12]Qingyuan Gong, Jiaqi Wang, Dongsheng Wei, Jin Wang, Xin Wang:
Optimal Node Selection for Data Regeneration in Heterogeneous Distributed Storage Systems. ICPP 2015: 390-399 - [i1]Qingyuan Gong, Jiaqi Wang, Yan Wang, Dongsheng Wei, Jin Wang, Xin Wang:
Topology-Aware Node Selection for Data Regeneration in Heterogeneous Distributed Storage Systems. CoRR abs/1506.05579 (2015) - 2014
- [j9]Jin Wang, Kejie Lu:
On the mobile relay placement in hybrid MANETs with secure network coding. Secur. Commun. Networks 7(4): 738-749 (2014) - [c11]Junsheng Wang, Jin Wang, Yanqin Zhu, Chengjin Jia:
An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks. ICoC 2014: 16-31 - [c10]Jin Wang, Jing Ren, Kejie Lu, Jianping Wang, Shucheng Liu, Cédric Westphal:
An optimal Cache management framework for information-centric networks with network coding. Networking 2014: 1-9 - 2013
- [j8]Yan Chang, Shukui Zhang, Yang Zhang, Jianxi Fan, Jin Wang:
Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Baolei Cheng, Jianxi Fan, Xiaohua Jia, Jin Wang:
Dimension-adjacent trees and parallel construction of independent spanning trees on crossed cubes. J. Parallel Distributed Comput. 73(5): 641-652 (2013) - [j6]Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu:
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams. IEEE Trans. Parallel Distributed Syst. 24(10): 2025-2035 (2013) - [c9]Junsheng Wang, Jin Wang, Yanqin Zhu, Kejie Lu:
SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding. HPCC/EUC 2013: 2298-2305 - [c8]Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao:
Untraceability of mobile devices in wireless mesh networks using linear network coding. INFOCOM 2013: 270-274 - 2012
- [j5]Shifang Dai, Xinming Zhang, Jin Wang, Jianping Wang:
An Efficient Coding Scheme Designed for N+k Protection in Wireless Mesh Networks. IEEE Commun. Lett. 16(8): 1266-1269 (2012) - [j4]Xiumin Wang, Jin Wang, Shukui Zhang:
Network Coded Wireless Cooperative Multicast with Minimum Transmission Cost. Int. J. Distributed Sens. Networks 8 (2012) - [j3]Jin Wang, Xiumin Wang, Shukui Zhang, Yanqin Zhu, Juncheng Jia:
An Efficient Reliable Communication Scheme in Wireless Sensor Networks Using Linear Network Coding. Int. J. Distributed Sens. Networks 8 (2012) - [j2]Shukui Zhang, Jianxi Fan, Juncheng Jia, Jin Wang:
An Efficient Clustering Algorithm in Wireless Sensor Networks Using Cooperative Communication. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [j1]Jin Wang, Jianping Wang, Biao Chen, Naijie Gu:
Minimum cost service composition in service overlay networks. World Wide Web 14(1): 75-103 (2011) - [c7]Shifang Dai, Jin Wang, Xinming Zhang, Shiliang Li:
Network coding-based 1+N protection scheme in hybrid wireless-optical broadband access networks. CHINACOM 2011: 1013-1020 - [c6]Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, Bin Xiao, Naijie Gu:
Optimal Design of Linear Network Coding for information theoretically secure unicast. INFOCOM 2011: 757-765 - [c5]Jin Wang, Jianping Wang, Chuan Wu, Kejie Lu, Naijie Gu:
Anonymous communication with network coding against traffic analysis attack. INFOCOM 2011: 1008-1016 - 2010
- [c4]Xiangmao Chang, Jin Wang, Jianping Wang, Victor C. S. Lee, Kejie Lu, Yixian Yang:
On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack. ICDCS 2010: 526-535 - [c3]Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu:
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams. INFOCOM 2010: 2240-2248
2000 – 2009
- 2009
- [c2]Zeyu Zheng, Jianping Wang, Jin Wang:
A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications. ICC 2009: 1-6 - 2008
- [c1]Jin Wang, Jianping Wang, Naijie Gu, Bing Yang:
Fault Tolerant Service Composition in Service Overlay Networks. GLOBECOM 2008: 2442-2446
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint