-
1
-
-
85020556247
-
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
-
to be published
-
D. Wang, H. Cheng, D. He, and P. Wang, "On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices," IEEE Syst. J., to be published.
-
IEEE Syst. J.
-
-
Wang, D.1
Cheng, H.2
He, D.3
Wang, P.4
-
2
-
-
85067107089
-
Utility based data computing scheme to provide sensing service in internet of things
-
to be published
-
Y. Hui, Z. Su, and S. Guo, "Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things," IEEE Trans. Emerging Topics Comput., to be published, doi: 10.1109/TETC.2017.2674023.
-
IEEE Trans. Emerging Topics Comput.
-
-
Hui, Y.1
Su, Z.2
Guo, S.3
-
3
-
-
84940523433
-
Security and privacy formobile healthcare networks: From a quality of protection perspective
-
Aug
-
K. Zhang, K. Yang, X. Liang, Z. Su, and X. She, "Security and privacy formobile healthcare networks: From a quality of protection perspective," IEEE Wireless Commun., vol. 22, no. 4, pp. 104-112, Aug. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.4
, pp. 104-112
-
-
Zhang, K.1
Yang, K.2
Liang, X.3
Su, Z.4
She, X.5
-
4
-
-
84979527744
-
Game theoretic resource allocation in media cloud with mobile social networks
-
Aug
-
Z. Su, Q. Xu, M. Fei, and M. Dong, "Game theoretic resource allocation in media cloud with mobile social networks," IEEE Trans. Multimedia, vol. 18, no. 8, pp. 1650-1660, Aug. 2016.
-
(2016)
IEEE Trans. Multimedia
, vol.18
, Issue.8
, pp. 1650-1660
-
-
Su, Z.1
Xu, Q.2
Fei, M.3
Dong, M.4
-
6
-
-
84939233387
-
Security and privacy in mobile croudsourcing networks: Challenges and opportunities
-
Aug
-
K. Yang, K. Zhang, J. Ren, and X. Shen, "Security and privacy in mobile croudsourcing networks: challenges and opportunities," IEEE Commun. Mag., vol. 53, no. 8, pp. 75-81, Aug. 2016.
-
(2016)
IEEE Commun. Mag.
, vol.53
, Issue.8
, pp. 75-81
-
-
Yang, K.1
Zhang, K.2
Ren, J.3
Shen, X.4
-
7
-
-
85081629456
-
Incentive scheme for cyber physical social systems based on user behaviors
-
to be published
-
Z. Su, Q. Qi, Q. Xu, Y. Hui, S. Guo, and X. Wang, "Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors," IEEE Trans. Emerging Topics Comput., to be published, doi: 10.1109/TETC.2017.2671843.
-
IEEE Trans. Emerging Topics Comput.
-
-
Su, Z.1
Qi, Q.2
Xu, Q.3
Hui, Y.4
Guo, S.5
Wang, X.6
-
8
-
-
84883345595
-
Fully anonymous profile matching inmobile social networks
-
Sep
-
X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully anonymous profile matching inmobile social networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 641-655, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 641-655
-
-
Liang, X.1
Zhang, K.2
Lu, R.3
Lin, X.4
Shen, X.5
-
9
-
-
84962028249
-
Big data in mobile social networks: A QoE-oriented framework
-
Jan./Feb
-
Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework," IEEE Netw., vol. 30, no. 1, pp. 52-57, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 52-57
-
-
Su, Z.1
Xu, Q.2
Qi, Q.3
-
10
-
-
84994164440
-
Dynamic-scheduling mechanism of controllers based on security policy in software-defined network
-
C. Qi, J. Wu, H. Hu, and G. Cheng, "Dynamic-scheduling mechanism of controllers based on security policy in software-defined network," Electron. Lett., vol. 52, no. 23, pp. 1918-1920, 2016.
-
(2016)
Electron. Lett.
, vol.52
, Issue.23
, pp. 1918-1920
-
-
Qi, C.1
Wu, J.2
Hu, H.3
Cheng, G.4
-
11
-
-
84933057232
-
A novel design for content delivery over software defined mobile social networks
-
Jul./Aug
-
Z, Su, Q. Xu, H. Zhu, and Y. Wang, "A novel design for content delivery over software defined mobile social networks," IEEE Netw., vol. 29, no. 4, pp. 62-67. Jul./Aug. 2015.
-
(2015)
IEEE Netw.
, vol.29
, Issue.4
, pp. 62-67
-
-
Xu, S.Q.1
Zhu, H.2
Wang, Y.3
-
12
-
-
77951441926
-
Packet size optimization for increased throughput in multi-level security wireless networks
-
Oct
-
M. Younis, Q. Farrag, and W. Amico, "Packet size optimization for increased throughput in multi-level security wireless networks," in Proc. IEEE MILCOM, Oct. 2009, pp. 1-7.
-
(2009)
Proc. IEEE MILCOM
, pp. 1-7
-
-
Younis, M.1
Farrag, Q.2
Amico, W.3
-
13
-
-
84933054696
-
Content distribution over content centric mobile social network in 5G
-
Jun
-
Z. Su and Q. Xu, "Content distribution over content centric mobile social network in 5G," IEEE Commun. Mag., vol. 53, no. 6, pp. 66-72, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 66-72
-
-
Su, Z.1
Xu, Q.2
-
14
-
-
85027694554
-
Adaptive base station cooperation for physical layer security in two-cell wireless networks
-
L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, "Adaptive base station cooperation for physical layer security in two-cell wireless networks," IEEE Access, vol. 4, pp. 5607-5623, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 5607-5623
-
-
Hu, L.1
Wen, H.2
Wu, B.3
Tang, J.4
Pan, F.5
-
15
-
-
84938351590
-
Epidemic Information dissemination in mobile social networks in opportunistic links
-
Sep
-
Q. Xu, Z. Su, K. Zhang, P Ren, and X. Shen, "Epidemic Information dissemination in mobile social networks in opportunistic links," IEEE Trans. Emerg. Topics Comput., vol. 3, no. 3, pp. 399-409, Sep. 2015.
-
(2015)
IEEE Trans. Emerg. Topics Comput.
, vol.3
, Issue.3
, pp. 399-409
-
-
Xu, Q.1
Su, Z.2
Zhang, K.3
Ren, P.4
Shen, X.5
-
16
-
-
49049102940
-
A general architecture of mobile social network services
-
Gyeongju, Korea, Nov
-
Y. Chang et al., "A general architecture of mobile social network services," in Proc. IEEE Int. Conf. Convergence Inf. Technol., Gyeongju, Korea, Nov. 2007, pp. 151-156.
-
(2007)
Proc. IEEE Int. Conf. Convergence Inf. Technol.
, pp. 151-156
-
-
Chang, Y.1
-
17
-
-
85000416096
-
On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system
-
J. Zhang, G. Pan, and H. Wang, "On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system," IEEE Access, vol. 4, pp. 3887-3893, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 3887-3893
-
-
Zhang, J.1
Pan, G.2
Wang, H.3
-
18
-
-
84986197821
-
Share communication and computation resources on mobile devices: A social awareness persepective
-
Aug
-
Y. Cao, C. Long, T. Jiang, and S. Mao, "Share communication and computation resources on mobile devices: A social awareness persepective," IEEE Wireless Commun., vol. 23, no. 4, pp. 52-59, Aug. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.4
, pp. 52-59
-
-
Cao, Y.1
Long, C.2
Jiang, T.3
Mao, S.4
-
19
-
-
84891558659
-
Cloud-based multicasting with feedback in mobile social networks
-
Dec
-
Y. Wang, J. Wu, and W. Yang, "Cloud-based multicasting with feedback in mobile social networks," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6043-6053, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6043-6053
-
-
Wang, Y.1
Wu, J.2
Yang, W.3
-
20
-
-
79960608392
-
A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms
-
Shanghai, China, Apr
-
R. Fei, K. Yang, and X. Cheng, "A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms," in Proc. IEEE Conf. Comput. Commun. Workshops, Shanghai, China, Apr. 2011, pp. 63-67.
-
(2011)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 63-67
-
-
Fei, R.1
Yang, K.2
Cheng, X.3
-
21
-
-
84904408894
-
Improving data forwarding in mobile social networks with infrastructure support: A space-crossing social community approach
-
Toronto, Canada, May
-
Z. Li et al., "Improving data forwarding in mobile social networks with infrastructure support: A space-crossing social community approach," in Proc. IEEE Conf. Comput. Commun., Toronto, Canada, May 2014, pp. 1941-1949.
-
(2014)
Proc. IEEE Conf. Comput. Commun.
, pp. 1941-1949
-
-
Li, Z.1
-
22
-
-
80051889537
-
Location cheating: A security challenge to location-based social network services
-
Minneapolis, MN, USA, Jun
-
W. He, X. Liu, and M. Ren, "Location cheating: A security challenge to location-based social network services," in Proc. 31th Int. Conf. Distrib. Comput. Syst., Minneapolis, MN, USA, Jun. 2011, pp. 740-749.
-
(2011)
Proc. 31th Int. Conf. Distrib. Comput. Syst.
, pp. 740-749
-
-
He, W.1
Liu, X.2
Ren, M.3
-
23
-
-
85030129108
-
Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks
-
Szilvsvrad, Hungary, Nov
-
X. Zhu, Y. Su, M. Gao, and Y. Huang, "Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks," in Proc. Commun. China, Szilvsvrad, Hungary, Nov. 2015, pp. 1-6.
-
(2015)
Proc. Commun. China
, pp. 1-6
-
-
Zhu, X.1
Su, Y.2
Gao, M.3
Huang, Y.4
-
24
-
-
84904462243
-
Defending Sybil attacks in mobile social networks
-
Hong Kong, China, Apr
-
Y. Sun, L. Yin, and W. Liu, "Defending Sybil attacks in mobile social networks," in Proc. IEEE Conf. Comput. Commun. Workshops, Hong Kong, China, Apr. 2014, pp. 163-164.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 163-164
-
-
Sun, Y.1
Yin, L.2
Liu, W.3
-
25
-
-
0036451258
-
Wireless video transport using path diversity: Multiple decription vs layered coding
-
Y. Wang, S. Panwar, S. Lin, and S. Mao, "Wireless video transport using path diversity: Multiple decription vs layered coding," in Proc. ICIP, vol. 1, pp. I-21-I-24, 2002.
-
(2002)
Proc. ICIP
, vol.1
, pp. I21-I24
-
-
Wang, Y.1
Panwar, S.2
Lin, S.3
Mao, S.4
-
26
-
-
85027517460
-
Redundancy allocation based on the weighted mismatch-rate slope for multiple description video coding
-
Jan.
-
M. Kazemi, R. Iqbal, and S. Shirmohammadi, "Redundancy allocation based on the weighted mismatch-rate slope for multiple description video coding," IEEE Trans. Multimedia, vol. 19, no. 1, pp. 54-66, Jan. 2017.
-
(2017)
IEEE Trans. Multimedia
, vol.19
, Issue.1
, pp. 54-66
-
-
Kazemi, M.1
Iqbal, R.2
Shirmohammadi, S.3
-
27
-
-
84859054614
-
Joint source-channel coding and optimization for layered video broadcasting to heterogeneous devices
-
Apr
-
W. Ji, Z. Li, and Y. Chen, "Joint source-channel coding and optimization for layered video broadcasting to heterogeneous devices," IEEE Trans. Multimedia, vol. 14, no. 2, pp. 443-445, Apr. 2012.
-
(2012)
IEEE Trans. Multimedia
, vol.14
, Issue.2
, pp. 443-445
-
-
Ji, W.1
Li, Z.2
Chen, Y.3
-
28
-
-
79961181650
-
Peer-to-peer streaming of layered video: Efficiency, fairness and incentive
-
Aug
-
H. Hu, Y. Guo, and Y. Liu, "Peer-to-peer streaming of layered video: Efficiency, fairness and incentive," IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 8, pp. 1013-1026, Aug. 2011.
-
(2011)
IEEE Trans. Circuits Syst. Video Technol.
, vol.21
, Issue.8
, pp. 1013-1026
-
-
Hu, H.1
Guo, Y.2
Liu, Y.3
-
29
-
-
84921767996
-
Multiple description coding and recovery of free viewpoint video for wireless multi-path streaming
-
Feb
-
Z. Liu, G. Cheung, J. Chakareski, and Y. Ji, "Multiple description coding and recovery of free viewpoint video for wireless multi-path streaming," IEEE J. Sel. Topics Signal Process., vol. 9, no. 1, pp. 151-164, Feb. 2015.
-
(2015)
IEEE J. Sel. Topics Signal Process.
, vol.9
, Issue.1
, pp. 151-164
-
-
Liu, Z.1
Cheung, G.2
Chakareski, J.3
Ji, Y.4
-
30
-
-
84921341127
-
Coalitional games for determining rate region of multiple description coding
-
Jan
-
S. Azimi, "Coalitional games for determining rate region of multiple description coding," IEEE Commun. Lett., vol. 19, no. 1, pp. 34-37, Jan. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.1
, pp. 34-37
-
-
Azimi, S.1
-
31
-
-
77955614405
-
Layered wireless video multicast using relays
-
Aug
-
O. Alay, T. Korakis, Y. Wang, E. Erkip, and S. Panwar, "Layered wireless video multicast using relays," IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 8, pp. 1095-1109, Aug. 2010.
-
(2010)
IEEE Trans. Circuits Syst. Video Technol.
, vol.20
, Issue.8
, pp. 1095-1109
-
-
Alay, O.1
Korakis, T.2
Wang, Y.3
Erkip, E.4
Panwar, S.5
-
32
-
-
84983316568
-
Caching and operator cooperation policies for layered video content delivery
-
Apr
-
K. Poularakis, G. Iosifidis, A. Argyriou, I. Koutsopoulos, and L. Tassiulas, "Caching and operator cooperation policies for layered video content delivery," in Proc. IEEE Conf. Comput. Commun., Apr. 2016, pp. 1-9.
-
(2016)
Proc. IEEE Conf. Comput. Commun
, pp. 1-9
-
-
Poularakis, K.1
Iosifidis, G.2
Argyriou, A.3
Koutsopoulos, I.4
Tassiulas, L.5
-
33
-
-
85014894452
-
Trend-aware video caching through online learning
-
Dec
-
S. Li, J. Xu, M. Schaar, and W. Li, "Trend-aware video caching through online learning," IEEE Trans. Multimedia, vol. 18, no. 12, pp. 2503-2516, Dec. 2016.
-
(2016)
IEEE Trans. Multimedia
, vol.18
, Issue.12
, pp. 2503-2516
-
-
Li, S.1
Xu, J.2
Schaar, M.3
Li, W.4
-
34
-
-
85018910804
-
Efficient video pricing and caching in heterogeneous networks
-
Oct
-
J. Li, W. Chen, M. Xiao, F. Shu, and X. Liu, "Efficient video pricing and caching in heterogeneous networks," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8744-8751, Oct. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.10
, pp. 8744-8751
-
-
Li, J.1
Chen, W.2
Xiao, M.3
Shu, F.4
Liu, X.5
-
35
-
-
84994531650
-
Proactive caching for mobile video streaming in millimeter wave 5G networks
-
Oct
-
J. Qiao, Y. He, and X. Shen, "Proactive caching for mobile video streaming in millimeter wave 5G networks," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 7187-7198, Oct. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.10
, pp. 7187-7198
-
-
Qiao, J.1
He, Y.2
Shen, X.3
-
36
-
-
84983373573
-
Enabling secure and efficient video delivery through encrypted in-network caching
-
Aug
-
X. Yuan et al., "Enabling secure and efficient video delivery through encrypted in-network caching," IEEE J. Sel. Areas Commun., vol. 34, no. 8, pp. 2077-2090, Aug. 2016.
-
(2016)
IEEE J. Sel. Areas Commun.
, vol.34
, Issue.8
, pp. 2077-2090
-
-
Yuan, X.1
-
37
-
-
84982290703
-
A game theoretical incentive scheme for relay selection services in mobile social networks
-
Aug
-
Q. Xu, Z. Su, and S. Guo, "A game theoretical incentive scheme for relay selection services in mobile social networks," IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6692-6702, Aug. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.8
, pp. 6692-6702
-
-
Xu, Q.1
Su, Z.2
Guo, S.3
-
38
-
-
84891558659
-
Cloud-based multicasting with feedback in mobile social networks
-
Dec
-
Y. Wang, J. Wu, and W. Yang, "Cloud-based multicasting with feedback in mobile social networks," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6043-6053, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6043-6053
-
-
Wang, Y.1
Wu, J.2
Yang, W.3
-
39
-
-
79955976020
-
Controlled coalitional games for cooperative mobile social networks
-
May
-
D. Niyato, P. Wang, W. Saad, and A. Hjorungnes, "Controlled coalitional games for cooperative mobile social networks," IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1812-1824, May 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.4
, pp. 1812-1824
-
-
Niyato, D.1
Wang, P.2
Saad, W.3
Hjorungnes, A.4
-
40
-
-
84963747681
-
PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks
-
Sep
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks," IEEE Trans. Computat. Social Syst., vol. 2, no. 3, pp. 41-52, Sep. 2015.
-
(2015)
IEEE Trans. Computat. Social Syst.
, vol.2
, Issue.3
, pp. 41-52
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
41
-
-
84961736552
-
Fairness-aware and privacy-preserving friend matching protocol in mobile social networks
-
Jun
-
H. Zhu, S. Du, M. Li, and Z. Gao, "Fairness-aware and privacy-preserving friend matching protocol in mobile social networks," IEEE Trans. Emerg. Topics Comput., vol. 1, no. 1, pp. 192-200, Jun. 2013.
-
(2013)
IEEE Trans. Emerg. Topics Comput.
, vol.1
, Issue.1
, pp. 192-200
-
-
Zhu, H.1
Du, S.2
Li, M.3
Gao, Z.4
-
42
-
-
84964798232
-
ESD: An energy saving data delivery scheme in mobile social networks
-
Dec
-
X. Wang, S. Leng, J. Yin, B. Fan, and K. Yang, "ESD: An energy saving data delivery scheme in mobile social networks," in Proc. IEEE GLOBECOM, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Wang, X.1
Leng, S.2
Yin, J.3
Fan, B.4
Yang, K.5
-
43
-
-
1942468812
-
Optimal proxy cache allocation for efficient media distribution
-
B. Wang, S. Sen, M. Adler, and D. Towsley, "Optimal proxy cache allocation for efficient media distribution, IEEE Trans. Multimedia, vol 6, no. 2, pp. 366-374, 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.2
, pp. 366-374
-
-
Wang, B.1
Sen, S.2
Adler, M.3
Towsley, D.4
|