Abstract is missing.
- Intelligent Routing Algorithm Based on Deep Belief Network for Multimedia Service in Knowledge Centric VANETsTao Zhang, Xingyan Chen, Changqiao Xu. 1-6 [doi]
- A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum SensingXuewen Dong, Tao Zhang, Guangxia Li, Di Lu, Balin Tian. 7-13 [doi]
- Cooperative Jamming for Secrecy of Wireless CommunicationsBaihe Ma, Zhihong Liu, Yong Zeng, Jianfeng Ma. 14-21 [doi]
- Gated Slotted Aloha Protocol for Wireless Communication NetworkHuanhuan Huang, Tong Ye, Tony T. Lee. 22-28 [doi]
- A Novel Virtual Sensor Management Scheme for Manufacturing NetworkCong Gao, Zhenzhou Tian, Yanping Chen, Zhongmin Wang. 29-35 [doi]
- Low-complexity Optimal Scheduler for LTE Over LAN CableSyed Hassan Raza Naqvi, Shahida Jabeen, Pin-Han Ho. 36-41 [doi]
- Channel-based Authentication for Dual-Hop Wireless NetworksPinchang Zhang, Xiaohong Jiang. 42-46 [doi]
- Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical FrameworkAhmed Salem, Xuening Liao, Shuiguang Zeng, Yulong Shen. 47-51 [doi]
- An Artificial Neural Network Based Attenuation Tomography in Free Space Optical NetworkZeyuan Yana, Rentao Gu, Tao Dong, Jie Yin, Shu Li, Zhihui Liu, Tingting Zhang, Yuefeng Ji. 52-57 [doi]
- High-Reception-Rate Transmission by Dynamic Scheduling for Wireless Body Area NetworksWei-Ting Yeh, Chih-Min Chao, Cong-Xiang Wang. 58-62 [doi]
- Energy Efficiency Analysis of the Watchful Sleep Mode with Delayed Wakeup in PONsRaisa O. C. Hirafuji, Ahmad R. Dhaini, Divanilson R. Campelo, Pin-Han Ho, Limei Peng. 63-68 [doi]
- Multi-channel Signal Acquisition Algorithm for Multi-beam Satellite Systems in High Dynamic EnvironmentNannan Sun, Zhi Yu, Xianke Qiao. 69-73 [doi]
- Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer NetworkYan Gao, Yong Zeng, Zhihong Liu, Jianfeng Ma, Yeqiu Xiao. 74-79 [doi]
- A Clustering Algorithm of Underwater Acoustic Sensor Networks Based on Hierarchical 3D MeshJianping Wang, Shujing Zhang, Guohong Gao, Lei Cai, Xiangang Zuo, Zhou Yu, Wei Chen. 80-85 [doi]
- Lattice Based Authenticated Key Exchange with Universally Composable SecurityZhong Yan-Tao. 86-90 [doi]
- A Differential Privacy Preserving Framework with Nash Equilibrium in Genome-Wide Association studiesZiwei Han, Hai Liu, Zhenqiang Wu. 91-96 [doi]
- A Privacy Inference Model Based on Attribute GraphGuangchen Song, Yihui Zhou, Hai Liu, Ge Wen, Ping'an Ren. 97-101 [doi]
- A Privacy Preserving Model in Uncertain Graph MiningYupan Tian, Jun Yan, Jing Hu, Zhenqiang Wu. 102-106 [doi]
- An Uncertain Graph Approach for Preserving Privacy in Social Networks Based on Important NodesJun Yan, Lin Zhang, Yupan Tian, Ge Wen, Jing Hu. 107-111 [doi]
- The Trust-Based Access Control Model in the Wireless Sensor NetworkLuo Jing-Tarur, Yao Shi-Ying, Gou Ji-Jun, Xu Qi-Yang. 112-116 [doi]
- Analysis and Protection of DDOS Attack Based on RSSP-II ProtocolZhongdi Liang, Xinhong Hei 0001, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang. 117-120 [doi]
- Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANETMubarak Umar, Abdulrashid Sabo, Auwal A. Tata. 121-126 [doi]
- A Review of Dynamic Resource Allocation in Integrated Satellite and Terrestrial NetworksYinghan Peng, Tao Dong, Rentao Gu, Qize Guo, Jie Yin, Zhihui Liu, Tingting Zhang, Yuefeng Ji. 127-132 [doi]
- On the Delivery Probability Study in Mobile Ad Hoc NetworksBin Yang, Zhenqiang Wu, Lisheng Ma, Yuanyuan Fan. 133-136 [doi]
- Enhancing Carrier Frequency Offset Authentication via Fractal DimensionXufei Li, Shuiguang Zeng, Wei Tong. 137-142 [doi]
- Limits of Covert Communication over AWGN Channels in the Presence of Multiple WardensRanran Sun, Shuiguang Zeng, Xinghui Zhu. 143-146 [doi]
- Physical Layer Authentication Based on CFO and Visibility GraphShuiguang Zeng, Xufei Li, Ahmed Salem, Dongmei Zhao. 147-152 [doi]
- TMarkov: LBS Trajectory Prediction for Crowdsourcing RecommendationGuoying Qiu, Ke Cheng, Lingtong Liu, Shuiguang Zeng. 153-158 [doi]
- Analyzing the Impact of Nanonode Density on Biological Tissues in Intrabody NanonetworksShumaila Javaid, Zhenqiang Wu, Hamza Fahim, Farhana Javed, Jiawang Chen. 159-163 [doi]
- Capacity of 3D MANETs Under Packet Redundancy and Receiver ProbingWu Wang, Bin Yang, Xin Wang, Yumei She, Shikai Shen. 164-168 [doi]
- L4S: Low-Speed Software Synergetic Sampling and Detecting Long Flow for Data Center NetworkLi-Zhuang Tan, Wei Su, Shuai Gao, Peng Cheng 0001. 169-174 [doi]
- Least-Unavailability Path Selecting Algorithm Based on RBF for Disaster-Survivable Software-Defined Optical NetworksGuozhu Zhao, Lisheng Ma, Xiaohong Jiang. 175-181 [doi]
- An Optimized Content Uploading Scheme for D2D Communications Underlaying Cellular NetworksXiaolan Liu, Lisheng Ma, Xiaohong Jiang. 182-186 [doi]
- Quality of Services in Warehouse Scale ComputersMuhib Ahmad Khan Sherwani, Muneeb Ahmed Khan. 187-190 [doi]
- Authentic Gate Entry System (AuthGES) by Using LBPH for Smart Home SecurityKrishna Prasad Bhattarai, Bishnu Prasad Gautam, Kazuhiko Sato. 191-196 [doi]
- A Design and Implementation of Network Billing System on Campus Based on Hadoop and NetflowBo She, Zunying Qin, Qiang Wang, Zhe Zhang, Jingru Cui, Guodong Li, Xiaoge Zhong. 197-200 [doi]
- Research of Security Situational Awareness and Visualization Approach in Cloud ComputingJianfeng Chen, Rui Xu, ChunLin Li. 201-205 [doi]
- Anomalies Detection of Routers Based on Multiple Information LearningTeng Li 0003, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun 0001. 206-211 [doi]
- Privacy-Utility Trade-Off of K-Subset MechanismYihui Zhou, Guangchen Song, Hai Liu, Laifeng Lu. 212-217 [doi]
- Adaptive Differential Privacy Interactive Publishing Model Based on Dynamic FeedbackLaifeng Lu, Yanping Li, Yihui Zhou, Feng Tian 0004, Hai Liu. 218-222 [doi]
- Data Backup Against Progressive Disasters in Geo-Distributed Data Center NetworksLisheng Ma, Bin Yang. 223-226 [doi]
- Technical Research and Platform Implementation of the Protocol Conformance Test of AFDX Network SwitchWang Shi-Kui, Li Wen. 227-231 [doi]
- Joint User Scheduling for ODFMA-Based Multi-Cell NetworksShahida Jabeen, Pin-Han Ho. 232-236 [doi]
- TickSEC: A Novel Reconfigurable Platform for WiFi Physical Layer SecurityXiaoguang Li, Jun Liu, Boyan Ding, Zhiwei Li, Haoyang Wu, Tao Wang. 237-244 [doi]
- Classification of Mobile Users' Activities Based on Group Similarity Perception NetworksHui Song, Shuai Han, Zhongmin Wang. 245-250 [doi]
- Parallel Implementation of AES-GCM with High Throughput and Energy EfficiencyJunjie Su, Naijie Gu, Qilin Bai, Chuanwen Lin. 251-256 [doi]
- A QC-LDPC Code Based Digital Signature AlgorithmFang Ren, Xuefei Yang, Dong Zheng 0001. 257-262 [doi]
- Preserving Privacy for Hubs and Links in Social NetworksYao Guo, Zhihong Liu, Yong Zeng, Ruiheng Wang, Jianfeng Ma. 263-269 [doi]
- Event-based Diffusion Kalman Filter Strategy for Clock Synchronization in WSNsShujie Yang, Changqiao Xu, Jianfeng Guan, Tao Zhang. 270-276 [doi]
- A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access ControlYuke Liu, Junwei Zhang, Qi Gao. 277-283 [doi]
- Function Risk Assessment Under Memory LeakageJianming Fu, Rui Jin, Yan Lin 0003, Baihe Jiang, Zhengwei Guo. 284-291 [doi]
- Visual-inertial State Estimation for the Civil Aircraft Landing in Low Visibility ConditionsLei Zhang, Zhengjun Zhai, Linting Bai, YaHui Li, Wensheng Niu, Lei Yuan. 292-297 [doi]
- SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory PublishingXiangwen Liu, Liangmin Wang, Yuquan Zhu. 298-303 [doi]
- True Random Number Generation Using Process Scheduling of Android SystemsPengfei Song, Yong Zeng, Zhihong Liu, Jianfeng Ma, Huichuan Liu. 304-309 [doi]
- An Efficient GPS-Free Vehicle Localization Algorithm Using Single Roadside Unit and ReceiverSugang Ma, Fuxi Wen, Zhongmin Wang. 310-313 [doi]
- The Challenges, the Threats and Policy Implications to a Compromised Privacy and SecurityNader Shahata. 314-317 [doi]
- Implementation and Analysis of Improved RO PUFs with Latch StructureZhao Huang, Chen Zhao, Quan Wang, Zhenyi Wang. 318-323 [doi]
- A Blockchain-Based Decentralized Cloud Resource Scheduling ArchitectureHe Zhu, Yichuan Wang, Xinhong Hei 0001, Wenjiang Ji, Li Zhang. 324-329 [doi]
- Energy Saving Strategy for Task Migration Based on Genetic AlgorithmYue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei 0001. 330-336 [doi]
- Visual Tracking Algorithm Based on Improved Kernelized Correlation FiltersFutao Zhang, Zhongmin Wang. 337-343 [doi]
- Epidemic Propagation Control with Limited Temporary Link RemovedRuifang Zhang, Li Li, Nana Du, Huanyu Liu. 344-349 [doi]
- MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data ShareingJiawei Zheng, Xuewen Dong, Tao Zhang, Junfeng Chen, Wei Tong, Xiaozhou Yang. 350-355 [doi]
- Lung Nodule Detection via 3D U-Net and Contextual Convolutional Neural NetworkChen Zhao, Jungang Han, Yang Jia, Fan Gou. 356-361 [doi]
- Construction of a Class of Linear Codes with Two WeightsHongxia Lv, Xiaoni Du, Xiaodan Li. 362-365 [doi]
- Research on Data-Driven Industrial Internet SolutionsHong Xia, Jingru Zhao, Xiao Ma, Yanping Chen, Hui Lv, Zhongmin Wang. 366-371 [doi]
- Passive Human Trajectory Tracking Study in Indoor Environment with CSIHongli Yu, Bin Yang, Jinjun Liu, Gwo-Jong Yu. 372-377 [doi]
- A Method for Test Cases Reduction in Web Application Testing Based on User SessionShuyan Wang, Wentao Wu, Jiaze Sun. 378-383 [doi]
- Enhancement of Supermarket Business and Market Plan by Using Hierarchical Clustering and Association Mining TechniqueBhagawan Rokaha, Dhan Prasad Ghale, Bishnu Prasad Gautam. 384-389 [doi]
- The Distributed Computing Framework Research for Avionics CloudJianchun Xie, Zhonghua Wang, YaHui Li. 390-393 [doi]
- A Novel Terminal Security Access Method Based on Edge Computing for IoTSonglin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, WenXin Lei, Aidong Xu. 394-398 [doi]