-
1
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy
-
Apr.
-
K. Kumar and Y. Lu, "Cloud computing for mobile users: Can offloading computation save energy," IEEE Trans. Computers, vol. 43, pp. 51-56, Apr. 2010.
-
(2010)
IEEE Trans. Computers
, vol.43
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.2
-
2
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
-
Oct.
-
A. Mukherjee and A. L. Swindlehurst, "Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels," in Proc. IEEE Military Commun. Conf., pp. 1695-1700, Oct. 2010.
-
(2010)
Proc. IEEE Military Commun. Conf.
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
3
-
-
84954235490
-
Dynamic defense strategy against advanced persistent threat with insiders
-
P. Hu, H. Li, H. Fu, D. Cansever, and P. Mohapatra, "Dynamic defense strategy against advanced persistent threat with insiders," in Proc. IEEE Int'l Conf. on Computer Commun. (INFOCOM), 2015.
-
(2015)
Proc. IEEE Int'l Conf. on Computer Commun. (INFOCOM)
-
-
Hu, P.1
Li, H.2
Fu, H.3
Cansever, D.4
Mohapatra, P.5
-
4
-
-
84947461262
-
Offloading in mobile cloudlet systems with intermittent connectivity
-
Dec.
-
Z. Yang, D. Niyato, and P. Wang, "Offloading in mobile cloudlet systems with intermittent connectivity," IEEE Trans. Mobile Computing, vol. 14, pp. 2516-2529, Dec. 2015.
-
(2015)
IEEE Trans. Mobile Computing
, vol.14
, pp. 2516-2529
-
-
Yang, Z.1
Niyato, D.2
Wang, P.3
-
5
-
-
84880914068
-
A nested two stage game-based optimization framework in mobile cloud computing system
-
Mar.
-
Y. Wang, X. Lin, and M. Pedram, "A nested two stage game-based optimization framework in mobile cloud computing system," in Proc. IEEE Int'l Symposium on Service Oriented System Engineering (SOSE), pp. 494-502, Mar. 2013.
-
(2013)
Proc. IEEE Int'l Symposium on Service Oriented System Engineering (SOSE)
, pp. 494-502
-
-
Wang, Y.1
Lin, X.2
Pedram, M.3
-
6
-
-
84991625536
-
Computation offloading to save energy on handheld devices: A partition scheme
-
Z. Li, C. Wang, and R. Xu, "Computation offloading to save energy on handheld devices: A partition scheme," in Proc. ACM int'l conf. on Compilers, Architecture, and Synthesis for Embedded Systems, pp. 238-246, 2001.
-
(2001)
Proc. ACM Int'l Conf. on Compilers, Architecture, and Synthesis for Embedded Systems
, pp. 238-246
-
-
Li, Z.1
Wang, C.2
Xu, R.3
-
7
-
-
84925130442
-
Decentralized computation offloading game for mobile cloud computing
-
Apr.
-
X. Chen, "Decentralized computation offloading game for mobile cloud computing," IEEE Trans. Parallel and Distributed Systems, vol. 26, pp. 974-983, Apr. 2015.
-
(2015)
IEEE Trans. Parallel and Distributed Systems
, vol.26
, pp. 974-983
-
-
Chen, X.1
-
8
-
-
35248878770
-
Mobile jamming attack and its countermeasure in wireless sensor networks
-
May
-
H. Sun, S. Hsu, and C. Chen, "Mobile jamming attack and its countermeasure in wireless sensor networks," in Proc. IEEE Int'l Conf. on Advanced Information Networking and Applications Workshops, vol. 1, pp. 457-462, May 2007.
-
(2007)
Proc. IEEE Int'l Conf. on Advanced Information Networking and Applications Workshops
, vol.1
, pp. 457-462
-
-
Sun, H.1
Hsu, S.2
Chen, C.3
-
9
-
-
84962170678
-
Mobile crowdsensing game in vehicular networks
-
invited talk Nov
-
L. Xiao, T. Chen, C. Xie, and J. Liu, "Mobile crowdsensing game in vehicular networks," in Proc. IEEE Region 10 Conference (TENCON), invited talk, pp. 1-6, Nov. 2015.
-
(2015)
Proc. IEEE Region 10 Conference (TENCON)
, pp. 1-6
-
-
Xiao, L.1
Chen, T.2
Xie, C.3
Liu, J.4
-
10
-
-
84943272411
-
Mobile cloud offloading for malware detections with learning
-
Apr
-
Y. Li, J. Liu, Q. Li, and L. Xiao, "Mobile cloud offloading for malware detections with learning," in Proc. IEEE Int'l Conf. on Computer Communications (INFOCOM),-BigSecurity Workshop, pp. 197-201, Apr. 2015.
-
(2015)
Proc. IEEE Int'l Conf. on Computer Communications (INFOCOM),-BigSecurity Workshop
, pp. 197-201
-
-
Li, Y.1
Liu, J.2
Li, Q.3
Xiao, L.4
-
11
-
-
84938723202
-
A distributed ADMM approach for mobile data offloading in software defined network
-
Mar.
-
L. Liu, X. Chen, M. Bennis, G. Xue, and Z. Han, "A distributed ADMM approach for mobile data offloading in software defined network," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), pp. 1748-1752, Mar. 2015.
-
(2015)
Proc. IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 1748-1752
-
-
Liu, L.1
Chen, X.2
Bennis, M.3
Xue, G.4
Han, Z.5
-
12
-
-
84944733602
-
Security and performance tradeoff analysis of mobile offloading systems under timing attacks
-
Springer, Aug.
-
T. Meng, K. Wolter, and Q. Wang, "Security and performance tradeoff analysis of mobile offloading systems under timing attacks," in Computer Performance Engineering, vol. 9272, pp. 32-46, Springer, Aug. 2015.
-
(2015)
Computer Performance Engineering
, vol.9272
, pp. 32-46
-
-
Meng, T.1
Wolter, K.2
Wang, Q.3
-
13
-
-
81255210704
-
SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
-
Springer, Nov.
-
J. Park, K. Yi, and J. Park, "SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing," in IT Convergence and Services, vol. 107, pp. 165-172, Springer, Nov. 2011.
-
(2011)
IT Convergence and Services
, vol.107
, pp. 165-172
-
-
Park, J.1
Yi, K.2
Park, J.3
-
14
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan
-
A. Mukherjee and A. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Processing, vol. 61, pp. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Processing
, vol.61
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
15
-
-
84943235784
-
To eavesdrop or jam, that is the question
-
Springer, Jan.
-
A. Garnaev and W. Trappe, "To eavesdrop or jam, that is the question," in Ad Hoc Networks, pp. 146-161, Springer, Jan. 2014.
-
(2014)
Ad Hoc Networks
, pp. 146-161
-
-
Garnaev, A.1
Trappe, W.2
-
16
-
-
84959202314
-
User-centric view of jamming games in cognitive radio networks
-
Dec.
-
L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Information Forensics and Security, vol. 10, pp. 2578-2590, Dec. 2015.
-
(2015)
IEEE Trans. Information Forensics and Security
, vol.10
, pp. 2578-2590
-
-
Xiao, L.1
Liu, J.2
Li, Q.3
Mandayam, N.B.4
Poor, H.V.5
-
17
-
-
84904708169
-
Incorporating attacktype uncertainty into network protection
-
Aug.
-
A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Incorporating attacktype uncertainty into network protection," IEEE Trans. Information Forensics and Security, vol. 9, pp. 1278-1287, Aug. 2014.
-
(2014)
IEEE Trans. Information Forensics and Security
, vol.9
, pp. 1278-1287
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
18
-
-
73049092718
-
Channelbased spoofing detection in frequency-selective rayleigh channels
-
Dec.
-
L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective rayleigh channels," IEEE Trans. Wireless Communications, vol. 8, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Communications
, vol.8
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.B.3
Trappe, W.4
-
19
-
-
40949147745
-
A comprehensive survey of multiagent reinforcement learning
-
Mar.
-
L. Busoniu, R. Babuska, and B. De Schutter, "A comprehensive survey of multiagent reinforcement learning," IEEE Trans. Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 38, pp. 156-172, Mar. 2008.
-
(2008)
IEEE Trans. Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.38
, pp. 156-172
-
-
Busoniu, L.1
Babuska, R.2
De Schutter, B.3
|