Abstract is missing.
- Simultaneous Wireless Information and Power Transfer for Multi-hop Energy-Constrained Wireless NetworkShiming He, Kun Xie, Weiwei Chen, Dafang Zhang, Jigang Wen. 1-12 [doi]
- Leveraging Scheduling to Minimize the Tardiness of Video Packets Transmission in Maritime Wideband CommunicationTingting Yang, Zhengqi Cui, Rui Wang, Zhou Su, Ying Wang. 13-22 [doi]
- Optimal Power Scheduling for SIC-Based Uplink Wireless Networks with Guaranteed Real-Time PerformanceChaonong Xu, Kaichi Ma, Yida Xu, Yongjun Xu. 23-36 [doi]
- A Novel Collision Analysis for Multiple-Subcarrier Frequency-Domain ContentionYu Zeng, Qinglin Zhao. 37-46 [doi]
- Wi-Dog: Monitoring School Violence with Commodity WiFi DevicesQizhen Zhou, Chenshu Wu, Jianchun Xing, Juelong Li, Zheng Yang, Qiliang Yang. 47-59 [doi]
- Energy-Efficient Contact Detection Model in Mobile Opportunistic NetworksYueyue Dou, Feng Zeng, Wenjia Li. 60-70 [doi]
- Modeling of Random Dense CSMA NetworksYuhong Sun, Tianyi Song, Honglu Jiang, Jianchao Zheng. 71-82 [doi]
- Throughput Maximization in Multi-User Cooperative Cognitive Radio NetworksLei Lu, Wei Li 0059, Shengling Wang 0001, Rongfang Bie, Bowu Zhang. 83-95 [doi]
- Load-Balancing Software-Defined Networking Through Hybrid RoutingGongming Zhao, Liusheng Huang, Ziqiang Li, Hongli Xu. 96-108 [doi]
- A New Greedy Algorithm for Constructing the Minimum Size Connected Dominating Sets in Wireless NetworksChuanwen Luo, Yongcai Wang, Jiguo Yu, Wenping Chen, Deying Li. 109-114 [doi]
- Study on the Impulse Radio mmWave for 5G-Based Vehicle PositionXue-rong Cui, Juan Li. 115-123 [doi]
- Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom FilterMingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu. 124-135 [doi]
- On Enhancing Energy Efficiency via Elastic Cell-Zooming Algorithm in Three-Tier Heterogeneous Wireless NetworksZhu Xiao, Shuangchun Li, Tong Li, Dong Wang. 136-150 [doi]
- Cooperative Downlink Resource Allocation in 5G Wireless Backhaul NetworkYuan Gao, Hong Ao, Quan Zhou, Weigui Zhou, Xiangyang Li, Yunchuan Sun, Su Hu, Yi Li. 151-160 [doi]
- Spectral Partitioning and Fuzzy C-Means Based Clustering Algorithm for Wireless Sensor NetworksJianji Hu, Songtao Guo, Defang Liu, Yuanyuan Yang. 161-174 [doi]
- Regionalization Compressive Sensing for Optimizing Lifetime of Sensor NetworksHao Yang, Hua Xu, Xiwei Wang. 175-184 [doi]
- IEA: An Intermittent Energy Aware Platform for Ultra-Low Powered Energy Harvesting WSNYang Zhang, Hong Gao, Siyao Cheng, Zhipeng Cai, Jianzhong Li. 185-197 [doi]
- Scheduling for MU-MIMO Wireless Industrial Sensor NetworksChangqing Xia, Xi Jin, Jintao Wang, Linghe Kong, Peng Zeng. 198-209 [doi]
- Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor NetworksKai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian. 210-219 [doi]
- A Genetic Algorithm Based Mechanism for Scheduling Mobile Sensors in Hybrid WSNs ApplicationsYaqiang Zhang, ZhangBing Zhou, Deng Zhao, Yunchuan Sun, Xiao Xue. 220-231 [doi]
- SSD: Signal-Based Signature Distance Estimation and Localization for Sensor NetworksPengpeng Chen, Yuqing Yin, Shouwan Gao, Qiang Niu. 232-243 [doi]
- An Adaptive MAC Protocol for Wireless Rechargeable Sensor NetworksPing Zhong, Yiwen Zhang, Shuaihua Ma, Jianliang Gao, Yingwen Chen. 244-252 [doi]
- Fair Multi-influence Maximization in Competitive Social NetworksYing Yu, Jinglan Jia, Deying Li, Yuqing Zhu. 253-265 [doi]
- Communities Mining and Recommendation for Large-Scale Mobile Social NetworksRuiguo Yu, Jianrong Wang, Tianyi Xu, Jie Gao, Kunyu Cao, Mei Yu. 266-277 [doi]
- Community Verification with Topic ModelingFeng Wang, Ken Orton. 278-288 [doi]
- M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of ThingsBoubakr Nour, Kashif Sharif, Fan Li, Hassine Moungla, Yang Liu. 289-301 [doi]
- Multidimensional Trust-Based Anomaly Detection System in Internet of ThingsFangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang. 302-313 [doi]
- Social D2D Communications Based on Fog Computing for IoT ApplicationsJunjie Yan, Dapeng Wu 0002, Honggang Wang, Dalei Wu, Ruyan Wang. 314-325 [doi]
- Defense Against Advanced Persistent Threats with Expert System for Internet of ThingsQing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao. 326-337 [doi]
- QoE Enhancement of Task Scheduling Algorithm for VANET ApplicationsNan Ding, Shuaihang Nie, Huaiwei Si, Huanbo Gao. 338-343 [doi]
- Ratee-Based Trust Management System for Internet of VehiclesFangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang. 344-355 [doi]
- Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular NetworksChengzhe Lai, Rongxing Lu, Dong Zheng. 356-368 [doi]
- An Efficient Distributed Randomized Data Replication Algorithm in VANETsJunyu Zhu, Chuanhe Huang, Xiying Fan, Bin Fu. 369-380 [doi]
- Preserving Privacy in Social Networks Against Label Pair AttacksChenyang Liu, Dan Yin, Hao Li, Wei Wang, Wu Yang. 381-392 [doi]
- Preserving Local Differential Privacy in Online Social NetworksTianchong Gao, Feng Li, Yu Chen, Xukai Zou. 393-405 [doi]
- Pricing Privacy Leakage in Location-Based ServicesFengHua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li 0006. 406-418 [doi]
- MAIS: Multiple Activity Identification System Using Channel State Information of WiFi SignalsChunhai Feng, Sheheryar Ali Arshad, Yonghe Liu. 419-432 [doi]
- Differentially Private Frequent Itemset Mining from Smart Devices in Local SettingXinyuan Zhang, Liusheng Huang, Peng Fang, Shaowei Wang, Zhenyu Zhu, Hongli Xu. 433-444 [doi]
- 3P Framework: Customizable Permission Architecture for Mobile ApplicationsSujit Biswas, Kashif Sharif, Fan Li, Yang Liu. 445-456 [doi]
- A Bitcoin Based Incentive Mechanism for Distributed P2P ApplicationsYunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Limin Sun. 457-468 [doi]
- An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart GridsChunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng. 469-482 [doi]
- Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State InformationXin Fan, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian, Jin Qian. 483-495 [doi]
- Breakdown by Rumors: Vulnerability of D2D Communications from Online Social NetworksTianyi Pan, Md Abdul Alim, Xiang Li, My T. Thai. 496-508 [doi]
- Security Enhancement via Dynamic Fountain Code for Wireless MulticastQinghe Du, Wanyu Li, Houbing Song. 509-521 [doi]
- Accurate Indoor Localization with Multiple Feature FusionYalong Xiao, Jianxin Wang, Shigeng Zhang, Haodong Wang, Jiannong Cao. 522-533 [doi]
- A Power-Efficient Scheme for Outdoor LocalizationKang Yao, Hongwei Du, Qiang Ye, Wen Xu. 534-545 [doi]
- Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning MethodWeiqing Huang, Chang Ding, Siye Wang, Junyu Lin, Shao-yi Zhu, Yue Cui. 546-558 [doi]
- A Study on the Second Order Statistics of \kappa κ - \mu μ Fading ChannelsChangfang Chen, Minglei Shu, Yinglong Wang, Nuo Wei. 559-571 [doi]
- Effective Influence Maximization Based on the Combination of Multiple SelectorsJiaxing Shang, Hongchun Wu, Shangbo Zhou, Lianchen Liu, Hongbin Tang. 572-583 [doi]
- A Simpler Method to Obtain a PTAS for Connected k-Path Vertex Cover in Unit Disk GraphZhao Zhang, Xiaohui Huang, Lina Chen. 584-592 [doi]
- Maximum-Weighted λ-Colorable Subgraph: Revisiting and ApplicationsPeng-Jun Wan, Huaqiang Yuan, Xufei Mao, Jiliang Wang, Zhu Wang. 593-604 [doi]
- Wireless Image Relay: Prioritized QoE Scheduling with Simplified Space-Time Coding Mode SelectionShuan He, Wei Wang 0015. 605-616 [doi]
- Software Defined Routing SystemXianming Gao, Baosheng Wang, Wenping Deng. 617-628 [doi]
- Towards Efficient Multimedia Data Disseminating in Mobile Opportunistic NetworksPeng Liu, Yue Ding, Jia Xu, Tingting Fu. 629-640 [doi]
- Job Scheduling Under Differential Pricing: Hardness and Approximation AlgorithmsQiuyuan Huang, Jing Zhao, Haohua Du, Jiahui Hou, Xiang-Yang Li. 641-652 [doi]
- Distributing Negative Messages in VANET Based on Meet-Table and Cloud ComputingBaohua Huang, Wei Cheng. 653-664 [doi]
- CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS CloudsWeijuan Zhang, Xiaoqi Jia, Jianwei Tai, Mingsheng Wang. 665-677 [doi]
- Measuring the Declared SDK Versions and Their Consistency with API Calls in Android AppsDaoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, Debin Gao. 678-690 [doi]
- Employing Smartwatch for Enhanced Password AuthenticationBing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang. 691-703 [doi]
- AIS: An Inaudible Guider in Your SmartphoneXing Zhou, Liusheng Huang, Yang Xu, Wei Yang. 704-715 [doi]
- A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing KeyboardZhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001. 716-728 [doi]
- Detecting Flooding DDoS Under Flash Crowds Based on Mondrian ForestDegang Sun, Kun Yang, Zhixin Shi, Yan Wang. 729-740 [doi]
- A 3-Layer Method for Analysis of Cooperative Behaviors of Physical Devices in Cyber-Physical SystemsGang Ren, Pan Deng, Chao Yang. 741-754 [doi]
- A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing SystemsXinyu Yang, Cong Zhao, Wei Yu 0002, Xianghua Yao, Xinwen Fu. 755-767 [doi]
- You Can Charge over the Road: Optimizing Charging Tour in Urban AreaXunpeng Rao, Panlong Yang, Yubo Yan. 768-779 [doi]
- A HCI Motion Recognition System Based on Channel State Information with Fine GranularityHao Yang, Licai Zhu, Weipeng Lv. 780-790 [doi]
- Broadband Communications for High Speed Trains via NDN Wireless Mesh NetworkFan Wu, Yang Wang, Runtong Chen, Xinfang Xie. 791-803 [doi]
- Phishing Website Detection Based on Effective CSS Features of Web PagesJian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang. 804-815 [doi]
- A Neural Network Model Based Adaptive Flight Control SystemJiaqi Liang, Wenwen Du, Kai Xing, Chunlin Zhong. 816-828 [doi]
- Supporting Producer Mobility via Named Data Networking in Space-Terrestrial Integrated NetworksDi Liu, Chuanhe Huang, Xi Chen, Xiaohua Jia. 829-841 [doi]
- Development and Performance Evaluation of Filterbank Multicarrier SystemsSu Hu, Yixuan Huang, Chuanxue Jin, Qu Luo, Jin Zhang, Yuan Gao, Xiangyang Li. 842-853 [doi]
- A Location Prediction-based Physical Layer Security Scheme for Suspicious EavesdroppersYuqi Tian, Yan Huo, Chunqiang Hu, Qinghe Gao, Tao Jing. 854-859 [doi]
- Structural Holes Theory-Based Influence Maximization in Social NetworkJinghua Zhu, Xuming Yin, Yake Wang, Jinbao Li, Yingli Zhong, Yingshu Li. 860-864 [doi]
- Layout Optimization for a Long Distance Wireless Mesh Network: An Industrial Case StudyJintao Wang, Xi Jin, Peng Zeng, Zhaowei Wang, Changqing Xia. 865-870 [doi]
- Mobility Intention-Based Relationship Inference from Spatiotemporal DataFeng Yi, Hong Li, Hongtao Wang, Hui-Wen, Limin Sun. 871-876 [doi]
- TACD: A Three-Stage Auction Scheme for Cloudlet Deployment in Wireless Access NetworkGangqiang Zhou, Jigang Wu, Long Chen. 877-882 [doi]
- Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind DeconvolutionShanjing Yang, Jianlin Hu, Weiqing Huang. 883-889 [doi]
- A Novel On-Line Association Algorithm in Multiple-AP Wireless LANLiang Sun, Lei Wang 0005, Zhenquan Qin, Zehao Ma, Zhuxiu Yuan. 890-902 [doi]
- Near-Field Localization Algorithm Based on Sparse Reconstruction of the Fractional Lower Order Correlation VectorSen Li, Bin Lin 0001, Bing Li, Rongxi He. 903-908 [doi]