-
1
-
-
85016498736
-
E-Sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems
-
M. Z. A. Bhuiyan, J. Wu, G. Wang, T. Wang, and M. M. Hassan, "e-Sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems," ACM Trans. Auton. Adapt. Syst., vol. 12, no. 1, p. 1, 2017.
-
(2017)
ACM Trans. Auton. Adapt. Syst.
, vol.12
, Issue.1
, pp. 1
-
-
Bhuiyan, M.Z.A.1
Wu, J.2
Wang, G.3
Wang, T.4
Hassan, M.M.5
-
2
-
-
85030973270
-
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing
-
Dec.
-
P. Le Nguyen, Y. Ji, Z. Liu, H. Vu, and K.-V. Nguyen, "Distributed hole- bypassing protocol in WSNs with constant stretch and load balancing," Comput. Netw., vol. 129, pp. 232-250, Dec. 2017.
-
(2017)
Comput. Netw.
, vol.129
, pp. 232-250
-
-
Le Nguyen, P.1
Ji, Y.2
Liu, Z.3
Vu, H.4
Nguyen, K.-V.5
-
3
-
-
85019714294
-
R-TTWD: Robust device- free through-the-wall detection of moving human withWiFi
-
May
-
H. Zhu, F. Xiao, L. Sun, R. Wang, and P. Yang, "R-TTWD: Robust device- free through-the-wall detection of moving human withWiFi," IEEE J. Sel. Areas Commun., vol. 35, no. 5, pp. 1090-1103, May 2017.
-
(2017)
IEEE J. Sel. Areas Commun.
, vol.35
, Issue.5
, pp. 1090-1103
-
-
Zhu, H.1
Xiao, F.2
Sun, L.3
Wang, R.4
Yang, P.5
-
4
-
-
84933532152
-
Asurvey of energy harvesting communications: Models and offline optimal policies
-
Jun.
-
Y. He, X. Cheng, W. Peng, and G. L. Stuber, "Asurvey of energy harvesting communications: Models and offline optimal policies," IEEE Commun. Mag., vol. 53, no. 6, pp. 79-85, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 79-85
-
-
He, Y.1
Cheng, X.2
Peng, W.3
Stuber, G.L.4
-
5
-
-
85000392971
-
FFSC: An energy efficiency communications approach for delay minimizing in Internet of Things
-
Y. Liu et al., "FFSC: An energy efficiency communications approach for delay minimizing in Internet of Things," IEEE Access, vol. 4, pp. 3775-3793, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 3775-3793
-
-
Liu, Y.1
-
6
-
-
85021863410
-
Lifelogging data validation model for Internet of Things enabled personalized healthcare
-
Jan.
-
P. Yang et al., "Lifelogging data validation model for Internet of Things enabled personalized healthcare," IEEE Trans. Syst., Man, Cybern. Syst., vol. 48, no. 1, pp. 50-64, Jan. 2016, doi: 10.1109/TSMC.2016.2586075.
-
(2016)
IEEE Trans. Syst., Man, Cybern. Syst.
, vol.48
, Issue.1
, pp. 50-64
-
-
Yang, P.1
-
7
-
-
85045520335
-
Security and privacy in the medical Internet of Things: A review
-
Mar.
-
W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G.Wang, "Security and privacy in the medical Internet of Things: A review," Secur. Commun. Netw., vol. 2018, Mar. 2018, Art. no. 5978636, doi: 10.1155/2018/5978636.
-
(2018)
Secur. Commun. Netw., 2018
-
-
Sun, W.1
Cai, Z.2
Li, Y.3
Liu, F.4
Fang, S.5
Wang, G.6
-
8
-
-
84979470062
-
A novel transmission range adjustment strategy for energy hole avoiding in wireless sensor networks
-
May
-
X. Liu, "A novel transmission range adjustment strategy for energy hole avoiding in wireless sensor networks," J. Netw. Comput. Appl., vol. 67, pp. 43-52, May 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.67
, pp. 43-52
-
-
Liu, X.1
-
9
-
-
85042701249
-
QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks
-
Y. Liu et al., "QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks," IEEE Access, vol. 6, pp. 8273-8291, 2018.
-
(2018)
IEEE Access
, vol.6
, pp. 8273-8291
-
-
Liu, Y.1
-
10
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Feb.
-
J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
11
-
-
85043474272
-
A services routing based caching scheme for cloud assisted CRNs
-
M. Huang et al., "A services routing based caching scheme for cloud assisted CRNs," IEEE Access, vol. 6, pp. 15787-15805, 2018.
-
IEEE Access
, vol.6
, Issue.2018
, pp. 15787-15805
-
-
Huang, M.1
-
12
-
-
85042787741
-
A trust-based secure routing scheme using the traceback approach for energy- harvesting wireless sensor networks
-
J. Tang, A. Liu, J. Zhang, N. N. Xiong, Z. Zeng, and T. Wang, "A trust- based secure routing scheme using the traceback approach for energy- harvesting wireless sensor networks," Sensors, vol. 18, no. 3, p. 751, 2018, doi: 10.3390/s18030751.
-
(2018)
Sensors
, vol.18
, Issue.3
, pp. 751
-
-
Tang, J.1
Liu, A.2
Zhang, J.3
Xiong, N.N.4
Zeng, Z.5
Wang, T.6
-
13
-
-
85045634103
-
Construction of large-scale low-cost delivery infrastructure using vehicular networks
-
X. Liu et al., "Construction of large-scale low-cost delivery infrastructure using vehicular networks," IEEE Access, vol. 6, pp. 21482-21497, 2018.
-
IEEE Access
, vol.6
, Issue.2018
, pp. 21482-21497
-
-
Liu, X.1
-
14
-
-
85023779796
-
A novel dual-broadband dual-polarized electrical downtilt base station antenna for 2G/3G applications
-
Y. He, W. Tian, and L. Zhang, "A novel dual-broadband dual-polarized electrical downtilt base station antenna for 2G/3G applications," IEEE Access, vol. 5, pp. 15241-15249, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 15241-15249
-
-
He, Y.1
Tian, W.2
Zhang, L.3
-
15
-
-
85059047985
-
Context- aware collect data with energy efficient in Cyber-physical cloud systems
-
to be published
-
Y. Liu, A. Liu, S. Guo, Z. Li, Y.-J. Choi, and H. Sekiya, "Context- aware collect data with energy efficient in Cyber-physical cloud systems," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.05.029.
-
Future Gener. Comput. Syst.
-
-
Liu, Y.1
Liu, A.2
Guo, S.3
Li, Z.4
Choi, Y.-J.5
Sekiya, H.6
-
16
-
-
85045679067
-
Adaptive aggregation routing to reduce delay for multi-layer wireless sensor networks
-
X. Li, A. Liu, M. Xie, N. Xiong, Z. Zeng, and Z. Cai, "Adaptive aggregation routing to reduce delay for multi-layer wireless sensor networks," Sensors, vol. 18, no. 4, p. 1216, 2018, doi: 10.3390/s18041216.
-
(2018)
Sensors
, vol.18
, Issue.4
, pp. 1216
-
-
Li, X.1
Liu, A.2
Xie, M.3
Xiong, N.4
Zeng, Z.5
Cai, Z.6
-
17
-
-
85045672022
-
Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks
-
A. Liu, W. Chen, and X. Liu, "Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks," Int. J. Distrib. Sensor Netw., vol. 14, no. 4, 2018, Art. no. 1550147718772532, doi: 10.1177/1550147718772532.
-
(2018)
Int. J. Distrib. Sensor Netw.
, vol.14
, Issue.4
-
-
Liu, A.1
Chen, W.2
Liu, X.3
-
18
-
-
85028345951
-
Knowledge-aware proactive nodes selection approach for energy management in Internet of Things
-
to be published
-
X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledge-aware proactive nodes selection approach for energy management in Internet of Things," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.07.022.
-
Future Gener. Comput. Syst.
-
-
Liu, X.1
Zhao, S.2
Liu, A.3
Xiong, N.4
Vasilakos, A.V.5
-
19
-
-
85039919350
-
Integrated collaborative filtering recommendation in social cyber-physical systems
-
J. Xu, A. Liu, N. Xiong, T. Wang, and Z. Zuo, "Integrated collaborative filtering recommendation in social cyber-physical systems," Int. J. Dis- trib. Sensor Netw., vol. 13, no. 12, 2017, Art. no. 1550147717749745, doi: 10.1177/1550147717749745.
-
(2017)
Int. J. Dis- Trib. Sensor Netw.
, vol.13
, Issue.12
-
-
Xu, J.1
Liu, A.2
Xiong, N.3
Wang, T.4
Zuo, Z.5
-
20
-
-
85019940910
-
Big program code dissemination scheme for emergency software-define wireless sensor networks
-
New York, NY, USA: Springer
-
X. Liu, G. Li, S. Zhang, and A. Liu, "Big program code dissemination scheme for emergency software-define wireless sensor networks," in Peer- to-Peer Networking and Applications. New York, NY, USA: Springer, 2017, doi: 10.1007/s12083-017-0565-5.
-
(2017)
Peer-to-Peer Networking and Applications
-
-
Liu, X.1
Li, G.2
Zhang, S.3
Liu, A.4
-
21
-
-
85017096173
-
On the hybrid using of unicast-broadcast in wireless sensor networks
-
Q. Liu and A. Liu, "On the hybrid using of unicast-broadcast in wireless sensor networks," Comput. Elect. Eng., to be published, doi: 10.1016/j.compeleceng.2017.03.004.
-
Comput. Elect. Eng., to Be Published
-
-
Liu, Q.1
Liu, A.2
-
22
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Oct.
-
X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," IEEE Trans. Comput., vol. 65, no. 10, pp. 3184-3195, Oct. 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
23
-
-
85040682686
-
Fog-based storage technology to fight with cyber threat
-
Jun.
-
T. Wang et al., "Fog-based storage technology to fight with cyber threat," Future Gener. Comput. Syst., vol. 83, pp. 208-218, Jun. 2018.
-
Future Gener. Comput. Syst.
, vol.83
, Issue.2018
, pp. 208-218
-
-
Wang, T.1
-
24
-
-
84990912999
-
Distributed interference-aware cooperative random access in multi-hop wireless networks
-
H. Cui, J. Li, Z. Li, D. Pan, and Y. He, "Distributed interference-aware cooperative random access in multi-hop wireless networks," IEEE Access, vol. 4, pp. 4823-4828, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 4823-4828
-
-
Cui, H.1
Li, J.2
Li, Z.3
Pan, D.4
He, Y.5
-
25
-
-
85042715495
-
A smart high-speed backbone path construction approach for energy and delay optimization in WSNs
-
A. Liu, M. Huang, M. Zhao, and T. Wang, "A smart high-speed backbone path construction approach for energy and delay optimization in WSNs," IEEE Access, vol. 6, pp. 13836-13854, 2018.
-
IEEE Access
, vol.6
, Issue.2018
, pp. 13836-13854
-
-
Liu, A.1
Huang, M.2
Zhao, M.3
Wang, T.4
-
26
-
-
0036343658
-
An energy-efficient MAC protocol for wireless sensor networks
-
Los Angeles, CA, USA, Jun.
-
W. Ye, J. Heidemann, and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," in Proc. IEEE INFOCOM, Los Angeles, CA, USA, vol. 3, Jun. 2002, pp. 1567-1576.
-
(2002)
Proc.IEEE INFOCOM
, vol.3
, pp. 1567-1576
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
27
-
-
84973896642
-
Understanding graph- based trust evaluation in online social networks: Methodologies and chal- lenges
-
W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, "Understanding graph- based trust evaluation in online social networks: Methodologies and chal- lenges," ACM Comput. Surv., vol. 49, no. 1, p. 10, 2016.
-
(2016)
ACM Comput. Surv.
, vol.49
, Issue.1
, pp. 10
-
-
Jiang, W.1
Wang, G.2
Bhuiyan, M.Z.A.3
Wu, J.4
-
28
-
-
85045424026
-
Multi working sets alternate covering scheme for continuous partial coverage in WSNs
-
New York, NY, USA: Springer
-
M. Huang, A. Liu, M. Zhao, and T. Wang, "Multi working sets alternate covering scheme for continuous partial coverage in WSNs," in Peer-to- Peer Networking and Applications. New York, NY, USA: Springer, 2018, doi: 10.1007/s12083-018-0647-z.
-
(2018)
Peer-to- Peer Networking and Applications
-
-
Huang, M.1
Liu, A.2
Zhao, M.3
Wang, T.4
-
29
-
-
84984821863
-
Distributed duty cycle control for delay improvement in wireless sensor networks
-
Z. Chen, A. Liu Z. Li, Y.-J. Choi, and J. Li, "Distributed duty cycle control for delay improvement in wireless sensor networks," Peer-to-Peer Netw. Appl., vol. 10, no. 3, pp. 559-578, 2017.
-
(2017)
Peer-to-Peer Netw. Appl.
, vol.10
, Issue.3
, pp. 559-578
-
-
Chen, Z.1
Liu Z Li, A.2
Choi, Y.-J.3
Li, J.4
-
30
-
-
85027435800
-
A green TDMA scheduling algorithm for prolonging lifetime in wireless sensor networks
-
Jun.
-
J. Long, M. Dong, K. Ota, and A. Liu, "A green TDMA scheduling algorithm for prolonging lifetime in wireless sensor networks," IEEE Syst. J., vol. 11, no. 2, pp. 868-877, Jun. 2017.
-
(2017)
IEEE Syst. J.
, vol.11
, Issue.2
, pp. 868-877
-
-
Long, J.1
Dong, M.2
Ota, K.3
Liu, A.4
-
31
-
-
34547480316
-
X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks
-
Boulder, CO, USA
-
M. Buettner, G. V. Yee, E. Anderson, and R. Han, "X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks," in Proc. 4th ACMInt. Conf. Embedded Netw. Sensor Syst., Boulder, CO, USA, 2006, pp. 307-320.
-
(2006)
Proc. 4th ACMInt. Conf. Embedded Netw. Sensor Syst.
, pp. 307-320
-
-
Buettner, M.1
Yee, G.V.2
Anderson, E.3
Han, R.4
-
32
-
-
84866485309
-
RI-MAC: A receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wire- less sensor networks
-
Raleigh, NC, USA
-
Y. Sun, O. Gurewitz, and D. B. Johnson, "RI-MAC: A receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wire- less sensor networks," in Proc. 6th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), Raleigh, NC, USA, 2008, pp. 1-14.
-
(2008)
Proc. 6th ACM Conf. Embedded Netw. Sensor Syst. (SenSys)
, pp. 1-14
-
-
Sun, Y.1
Gurewitz, O.2
Johnson, D.B.3
-
33
-
-
84877584336
-
An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks
-
M. H. S. Gilani, I. Sarrafi, and M. Abbaspour, "An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks," Ad Hoc Netw., vol. 11, no. 4, pp. 1297-1304, 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.4
, pp. 1297-1304
-
-
Gilani, M.H.S.1
Sarrafi, I.2
Abbaspour, M.3
-
34
-
-
84948711805
-
On-demand beaconing: Periodic and adaptive policies for effective routing in diverse mobile topologies
-
Jan.
-
I. Manolopoulos, K. Kontovasilis, I. Stavrakakis, and S. C. A. Thomopoulos, "On-demand beaconing: Periodic and adaptive policies for effective routing in diverse mobile topologies," Ad Hoc Netw., vol. 36, pp. 35-48, Jan. 2016.
-
(2016)
Ad Hoc Netw.
, vol.36
, pp. 35-48
-
-
Manolopoulos, I.1
Kontovasilis, K.2
Stavrakakis, I.3
Thomopoulos, S.C.A.4
-
35
-
-
85046655009
-
High performance target tracking scheme with low prediction precision requirement in WSNs
-
[Online]
-
A. Liu and S. Zhao, "High performance target tracking scheme with low prediction precision requirement in WSNs," Int. J. Ad Hoc Ubiquitous Comput., 2017. [Online]. Available: http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijahuc
-
(2017)
Int. J. Ad Hoc Ubiquitous Comput.
-
-
Liu, A.1
Zhao, S.2
-
36
-
-
84999664659
-
On WiFi offioading in het- erogeneous networks: Various incentives and trade-off strategies
-
4th Quart.
-
Y. He, M. Chen, B. Ge, and M. Guizani, "On WiFi offioading in het- erogeneous networks: Various incentives and trade-off strategies," IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2345-2385, 4th Quart., 2016.
-
(2016)
IEEE Commun. Surveys Tuts.
, vol.18
, Issue.4
, pp. 2345-2385
-
-
He, Y.1
Chen, M.2
Ge, B.3
Guizani, M.4
-
37
-
-
85028770754
-
Exploiting massive D2D collaboration for energy-efficient mobile edge computing
-
Aug.
-
X. Chen, L. Pu, L. Gao, W. Wu, and D. Wu, "Exploiting massive D2D collaboration for energy-efficient mobile edge computing," IEEE Wireless Commun., vol. 24, no. 4, pp. 64-71, Aug. 2017.
-
(2017)
IEEE Wireless Commun.
, vol.24
, Issue.4
, pp. 64-71
-
-
Chen, X.1
Pu, L.2
Gao, L.3
Wu, W.4
Wu, D.5
-
38
-
-
57349119839
-
DW-MAC: A low latency, energy efficient demand-wakeup MAC protocol for wireless sensor net- works
-
Y. Sun, S. Du, D. B. Johnson, and O. Gurewitz, "DW-MAC: A low latency, energy efficient demand-wakeup MAC protocol for wireless sensor net- works," in Proc. 9th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2008, pp. 53-62.
-
(2008)
Proc. 9th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 53-62
-
-
Sun, Y.1
Du, S.2
Johnson, D.B.3
Gurewitz, O.4
-
39
-
-
85027571106
-
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
-
Dec.
-
M. Xie, U. Bhanja, J. Shao, G. Zhang, and G. Wei, "LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants," Inf. Sci., vol. 420, pp. 37-48, Dec. 2017.
-
(2017)
Inf. Sci.
, vol.420
, pp. 37-48
-
-
Xie, M.1
Bhanja, U.2
Shao, J.3
Zhang, G.4
Wei, G.5
-
40
-
-
85027683302
-
Dependable structural health monitoring using wireless sensor networks
-
Jul./Aug.
-
M. Z. A. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang, "Dependable structural health monitoring using wireless sensor networks," IEEE Trans. Dependable Secure Comput., vol. 14, no. 4, pp. 363-376, Jul./Aug. 2017.
-
(2017)
IEEE Trans. Dependable Secure Comput.
, vol.14
, Issue.4
, pp. 363-376
-
-
Bhuiyan, M.Z.A.1
Wang, G.2
Wu, J.3
Cao, J.4
Liu, X.5
Wang, T.6
-
41
-
-
84962049973
-
Dynamic channel access to improve energy efficiency in cognitive radio sensor networks
-
May
-
J. Ren, Y. Zhang, N. Zhang, D. Zhang, and X. Shen, "Dynamic channel access to improve energy efficiency in cognitive radio sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3143-3156, May 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.5
, pp. 3143-3156
-
-
Ren, J.1
Zhang, Y.2
Zhang, N.3
Zhang, D.4
Shen, X.5
-
42
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
May
-
J. Li, Y. K. Li, X. Chen, P. P. C. Lee, andW. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
43
-
-
77955303563
-
An energy-efficient and low-latencyMAC protocol with adaptive scheduling for multi-hop wireless sensor networks
-
Y. Z. Zhao, M. Ma, C.Y. Miao, and T. N. Nguyen, "An energy-efficient and low-latencyMAC protocol with adaptive scheduling for multi-hop wireless sensor networks," Comput. Commun., vol. 33, no. 12, pp. 1452-1461, 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.12
, pp. 1452-1461
-
-
Zhao, Y.Z.1
Ma, M.2
Miao, C.Y.3
Nguyen, T.N.4
-
44
-
-
84880764238
-
A traffic-aware energy efficient scheme for WSN employing an adaptable wakeup period
-
J.-H. Lee, "A traffic-aware energy efficient scheme for WSN employing an adaptable wakeup period," Wireless Pers. Commun., vol. 71, no. 3, pp. 1879-1914, 2013.
-
(2013)
Wireless Pers. Commun.
, vol.71
, Issue.3
, pp. 1879-1914
-
-
Lee, J.-H.1
-
45
-
-
85046685842
-
Construction low complexity and low delay CDS for big data codes dissemination
-
Mar. 2018
-
X. Liu, M. Dong, Y. Liu, A. Liu, and N. Xiong, "Construction low com- plexity and low delay CDS for big data codes dissemination," Complexity, vol. 2018, Mar. 2018, Art. no. 5429546, doi: 10.1155/2018/5429546.
-
(2018)
Complexity
-
-
Liu, X.1
Dong, M.2
Liu, Y.3
Liu, A.4
Xiong, N.5
-
46
-
-
84919615808
-
Dynamic spectrum access in multi-channel cognitive radio networks
-
Nov.
-
N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2053-2064
-
-
Zhang, N.1
Liang, H.2
Cheng, N.3
Tang, Y.4
Mark, J.W.5
Shen, X.6
-
47
-
-
84896803856
-
Risk-aware cooperative spectrum access for multi-channel cognitive radio networks
-
Mar.
-
N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, "Risk- aware cooperative spectrum access for multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 3, pp. 516-527, Mar. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.3
, pp. 516-527
-
-
Zhang, N.1
Cheng, N.2
Lu, N.3
Zhou, H.4
Mark, J.W.5
Shen, X.6
-
48
-
-
85045523370
-
Asurvey on security-aware measurement in SDN
-
Apr. 2018
-
H. Zhang et al., "Asurvey on security-aware measurement in SDN," Secur. Commun. Netw., vol. 2018, Apr. 2018, Art. no. 2459154, doi: 10.1155/2018/2459154.
-
(2018)
Secur. Commun. Netw.
-
-
Zhang, H.1
-
49
-
-
85041406587
-
A trust with abstract information verified routing scheme for cyber-physical network
-
X. Liu, N. Xiong, N. Zhang, A. Liu, H. Shen, and C. Huang, "A trust with abstract information verified routing scheme for cyber-physical network," IEEE Access, vol. 6, pp. 3882-3898, 2018.
-
IEEE Access
, vol.6
, Issue.2018
, pp. 3882-3898
-
-
Liu, X.1
Xiong, N.2
Zhang, N.3
Liu, A.4
Shen, H.5
Huang, C.6
|