Abstract is missing.
- Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile EnvironmentsFeng Chen, Hong Zhou, Yuchuan Luo, Yingwen Chen. 1-8 [doi]
- Multi-proxy Multi-signature Binding Positioning ProtocolHuafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou. 9-18 [doi]
- Efficient Network Structure of 5G Mobile CommunicationsKwang-Cheng Chen, Whai-En Chen, Wu-Chun Chung, Yeh-Ching Chung, Qimei Cui, Cheng-Hsin Hsu, Shao-Yu Lien, Zhisheng Niu, Zhigang Tian, Jing Wang, Liqiang Zhao. 19-28 [doi]
- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission PairsLong Chen, Liusheng Huang, Hongli Xu, Hou Deng, Zehao Sun. 29-39 [doi]
- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 NetworksYen Hung Chen, Ching-Neng Lai, Yuan-Cheng Lai, Yang-Chi Li. 40-49 [doi]
- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor NetworksYing Chen, Changying Li, Jiguo Yu, Hongsong Zhu, Yuyan Sun. 50-59 [doi]
- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data StreamsJaime Chon, Ross Raymond, Haiyan Wang, Feng Wang. 60-69 [doi]
- Radio Signal Based Device-Free Velocity RecognitionMingwei Dai, Xiaoxia Huang. 70-82 [doi]
- Minimum-Cost Information Dissemination in Social NetworksDongping Deng, Hongwei Du, Xiaohua Jia, Qiang Ye. 83-93 [doi]
- Finding Overlapping Communities with Random Walks on Line Graph and Attraction IntensityXiaoheng Deng, Genghao Li, Mianxiong Dong. 94-103 [doi]
- Computing an Optimal Path with the Minimum Number of Distinct SensorsChenglin Fan, Qing Yang, Binhai Zhu. 104-113 [doi]
- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile DeviceKai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang. 114-122 [doi]
- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANsBing Feng, Zhen Wang, Chi Zhang, Nenghai Yu, Yuguang Fang. 123-133 [doi]
- Impact of a Deterministic Delay in the DCA ProtocolLi Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang. 134-144 [doi]
- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANETXia Feng, Chun Yan Li, De-xin Chen, Jin Tang. 145-154 [doi]
- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing ImpairedKathryn Grebel, Duy Dang, Liran Ma, Donnell Payne, Brent Cooper. 155-164 [doi]
- Estimation Based Adaptive ACB Scheme for M2M CommunicationsHongliang He, Pinyi Ren, Qinghe Du, Li Sun. 165-174 [doi]
- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference LimitYanfei He, Yuan Wu, Jiachao Chen, Qinglin Zhao, Weidang Lu. 175-189 [doi]
- Adaptive Resource Allocation for Anti-money Laundering Based on SMDPXintao Hong, Hongbin Liang, Zengan Gao. 190-200 [doi]
- Infrastructure Deployment and Optimization for Cloud-Radio Access NetworksXiang Hou, Bin Lin, Rongxi He, Xudong Wang, Tao Yu. 201-211 [doi]
- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor NetworksHuaida Hua, Jian Qiu, Shiwei Song, Xizhe Wang, Guojun Dai. 212-221 [doi]
- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular NetworkJun Huang, Yi Sun, Cong-Cong Xing, Yanxiao Zhao, Qianbin Chen. 222-231 [doi]
- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETsYan Huo, Yuejia Liu, Xiaoshuang Xing, Xiuzhen Cheng, Liran Ma, Tao Jing. 232-242 [doi]
- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-Duplex Wireless LANsZhefeng Jiang, Shiwen Mao. 243-252 [doi]
- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation ClusteringLibin Jiao, Guangzhi Zhang, Shenling Wang, Rashid Mehmood, Rongfang Bie. 253-262 [doi]
- DRL: A New Mobility Model in Mobile Social NetworksTao Jing, Yating Zhang, Zhen Li, Qinghe Gao, Yan Huo, Wei Zhou. 263-273 [doi]
- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical SystemsChengzhe Lai, Rongxing Lu, Dong Zheng. 274-283 [doi]
- A Bidder-Oriented Privacy-Preserving VCG Auction SchemeMaya Larson, Ruinian Li, Chunqiang Hu, Wei Li, Xiuzhen Cheng, Rongfang Bie. 284-294 [doi]
- A Secure Multi-unit Sealed First-Price Auction MechanismMaya Larson, Wei Li, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie. 295-304 [doi]
- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular NetworksLei Lei, Huijian Wang, Xuemin (Sherman) Shen, Zhangdui Zhong, Kan Zheng. 305-314 [doi]
- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc NetworksJi Li, Siyao Cheng, Zhipeng Cai, Qilong Han, Hong Gao. 315-324 [doi]
- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud ComputingJinguo Li, Yaping Lin, Mi Wen, Chunhua Gu, Bo Yin. 325-334 [doi]
- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology ControlLuqun Li. 335-344 [doi]
- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio NetworksYi Li, Lu Zhou, Haojin Zhu, Limin Sun. 345-355 [doi]
- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet CollectionFeilong Lin, Cailian Chen, Cunqing Hua, Xin-Ping Guan. 356-365 [doi]
- On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor NetworksBo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu. 366-376 [doi]
- FFDP: A Full-Load File Delivery Protocol in Satellite Network CommunicationChang Liu, Chunqing Wu, Wanrong Yu, BaoKang Zhao, Zhenqian Feng. 377-385 [doi]
- Energy-Aware Clustering and Routing Scheme in Wireless Sensor NetworkChang Lou, Xiaofeng Gao, Fan Wu, Guihai Chen. 386-395 [doi]
- Serial Number Based Encryption and Its Application for Mobile NetworksRong Ma, Zhenfu Cao. 396-406 [doi]
- Fine-Grained Searchable Encryption over Encrypted Data in Multi-cloudsYinbin Miao, Jiajia Liu, Jianfeng Ma. 407-416 [doi]
- Big-Little-Cell Based "Handprint" Positioning SystemZhonghong Ou, Jun Wu, Antti Ylä-Jääski. 417-426 [doi]
- Spectrum Sublet Game Among Secondary Users in Cognitive Radio NetworksDeming Pang, Ming Zhu, Gang Hu, Ming Xu. 427-436 [doi]
- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social NetworksQifan Qi, Zhou Su, Qichao Xu, Jintian Li, Dongfeng Fang, Bo Han. 437-445 [doi]
- Rogue Access Point Detection in Vehicular EnvironmentsHao Qu, Longjiang Guo, Weiping Zhang, Jinbao Li, Meirui Ren. 446-456 [doi]
- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network ArchitecturePengbo Si, Qiuran Li, Yanhua Zhang, Yuguang Fang. 457-466 [doi]
- A Novel Location Privacy Mining Threat in Vehicular Internet Access ServiceYipin Sun, Shuhui Chen, Biao Han, Bofeng Zhang, Jinshu Su. 467-476 [doi]
- iProtect: Detecting Physical Assault Using SmartphoneZehao Sun, ShaoJie Tang, He Huang, Liusheng Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun. 477-486 [doi]
- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical FrameworkXiao Tang, Pinyi Ren, Qinghe Du, Li Sun. 487-496 [doi]
- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite NetworksZhu Tang, Zhenqian Feng, Wanrong Yu, Wei Han, BaoKang Zhao, Chunqing Wu, Xilong Mao, Feng Chen. 497-507 [doi]
- Domatic Partition in Homogeneous Wireless Sensor NetworksChao Wang, Chuanwen Luo, Lili Jia, Qingbo Zhang, Jiguo Yu. 508-517 [doi]
- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured SparsityHai-xu Wang, Shao-hua Wu, Jing-ran Yang, Chan-juan Ding. 518-527 [doi]
- Influential Spatial Facility Prediction over Dynamic ObjectsHongtao Wang, Qiang Li, Feng Yi, Qi Han, Limin Sun. 528-538 [doi]
- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANsLicheng Wang, Yun Pan, Minzheng Jia, Haseeb Ahmad. 539-549 [doi]
- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor NetworksLixin Wang, C. P. Abubucker, William Washington, Katrina Gilmore. 550-560 [doi]
- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social NetworksRongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian. 561-570 [doi]
- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic NetworksXiaoming Wang, Yaguang Lin, Lichen Zhang, Zhipeng Cai. 571-580 [doi]
- Efficient Line K-Coverage Algorithms in Mobile Sensor NetworkYang Wang, Shuang Wu, Xiaofeng Gao, Fan Wu, Guihai Chen. 581-591 [doi]
- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-FisherYingjie Wang, Yingshu Li, Yang Gao, Xiangrong Tong. 592-601 [doi]
- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel NetworksWei Li, Kai Xing, Jing Xu. 602-611 [doi]
- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in CloudLifei Wei, Lei Zhang, Kai Zhang, Mianxiong Dong. 612-622 [doi]
- Cooperative Spectrum and Infrastructure Leasing on TV BandsXiaoshuang Xing, Hang Liu, Xiuzhen Cheng, Wei Zhou, Dechang Chen. 623-633 [doi]
- Information Security Enhancement with Actual Access Statuses of Users in the Multi-User SystemDatong Xu, Pinyi Ren, Qinghe Du, Li Sun. 634-643 [doi]
- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential MessagesDongyang Xu, Pinyi Ren, Qinghe Du, Li Sun. 644-653 [doi]
- Network Reachability Analysis on Temporally Varying Interaction NetworksZhonghu Xu, Kai Xing. 654-663 [doi]
- Performance of Target Tracking in Radar Network System Under Deception AttackChaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi. 664-673 [doi]
- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory ViewTingting Yang, Chengming Yang, Zhonghua Sun, Hailong Feng, Jiadong Yang, Fan Sun, Ruilong Deng. 674-684 [doi]
- Security and Privacy Issues of Fog Computing: A SurveyShanhe Yi, Zhengrui Qin, Qun Li. 685-695 [doi]
- Mobile Data Gathering with Time-Constraints in Wireless Sensor NetworksXuming Yin, Jinghua Zhu, Yingshu Li, Zhiqiang Wu. 696-705 [doi]
- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR ModelKan Yu, Zhi Li, Qiang Li, Jiguo Yu. 706-714 [doi]
- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social NetworksWenbin Yu, Cailian Chen, Bo Yang, Xin-Ping Guan. 715-724 [doi]
- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device CommunicationsLuke Zhang, Li Wang, Xiaojiang Du. 725-734 [doi]
- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay NetworksYizhen Zhang, Guobing Li, Guomei Zhang, Gangming Lyu. 735-744 [doi]
- On the Stable Throughput in Wireless LANsQinglin Zhao, Taka Sakurai, Jiguo Yu, Limin Sun. 745-755 [doi]
- Antenna Selection in Large-Scale Multiple Antenna SystemsZhongyuan Zhao, Mugen Peng, Li Wang, Wenqi Cai, Yong Li, Hsiao-Hwa Chen. 756-766 [doi]
- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNsZheng Liu, Xinyu Yang, Peng Zhao, Wei Yu. 767-777 [doi]
- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart PhonesXi Zhou, Junqi Guo, Shenling Wang. 778-787 [doi]
- SDN-Based Routing for Efficient Message Propagation in VANETMing Zhu, Jiannong Cao, Deming Pang, Zongjian He, Ming Xu. 788-797 [doi]
- Critical Point Aware Data Acquisition Algorithm in Sensor NetworksTongxin Zhu, Xinrui Wang, Siyao Cheng, Zhipeng Cai, Jianzhong Li. 798-808 [doi]
- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio NetworksWenchao Li, Jiguo Yu, Dongxiao Yu, Baogui Huang. 809-819 [doi]
- A Simplified Attack-Defense Game Model for NSSAXueyan Sun, Xiaowu Liu, Shuwen Zhang. 820-828 [doi]
- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G NetworkShuqiang Wang, Yanyan Shen, Jinxing Hu, Zhe Xuan, Zhe Lu. 829-835 [doi]
- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor NetworksTian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen, Hui Tian, Bineng Zhong. 836-844 [doi]
- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc NetworksJipeng Zhou, Xuefeng Wang, Haisheng Tan, Yuhui Deng. 845-853 [doi]