-
1
-
-
81855199790
-
Applications, architectures, and protocol design issues formobile social networks: Asurvey
-
Dec
-
N. Kayastha, D. Niyato, P. Wang, and E. Hossain, "Applications, architectures, and protocol design issues formobile social networks: Asurvey," Proc. IEEE, vol. 99, no. 12, pp. 2130-2158,Dec. 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.12
, pp. 2130-2158
-
-
Kayastha, N.1
Niyato, D.2
Wang, P.3
Hossain, E.4
-
2
-
-
84982290703
-
A game theoretical incentive scheme for relay selection services in mobile social networks
-
Aug
-
Q. Xu, Z. Su, and S. Guo, "A game theoretical incentive scheme for relay selection services in mobile social networks," IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6692-6702, Aug. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.8
, pp. 6692-6702
-
-
Xu, Q.1
Su, Z.2
Guo, S.3
-
3
-
-
84979846189
-
Amobile offloading game against smart attacks
-
L. Xiao, C. Xie, T. Chen,H. Dai, andH. V. Poor, "Amobile offloading game against smart attacks," IEEEAccess, vol. 4, pp. 2281-2291, 2016.
-
(2016)
IEEEAccess
, vol.4
, pp. 2281-2291
-
-
Xiao, L.1
Xie, C.2
Chen, T.3
Dai, H.4
Poor, H.V.5
-
4
-
-
84979527744
-
Game theoretic resource allocation in media cloud with mobile social networks
-
Aug
-
Z. Su, Q. Xu, M. Fei, and M. Dong, "Game theoretic resource allocation in media cloud with mobile social networks," IEEE Trans. Multimedia, vol. 18, no. 8, pp. 1650-1660, Aug. 2016.
-
(2016)
IEEE Trans. Multimedia
, vol.18
, Issue.8
, pp. 1650-1660
-
-
Su, Z.1
Xu, Q.2
Fei, M.3
Dong, M.4
-
5
-
-
85018864378
-
Cloud storage defense against advanced persistent threats: A prospect theoretic study
-
Mar
-
L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud storage defense against advanced persistent threats: A prospect theoretic study," IEEE J. Sel. Areas Commun., vol. 35, no. 5, pp. 534-544, Mar. 2017, doi: 10.1109/JSAC.2017.2659418.
-
(2017)
IEEE J. Sel. Areas Commun.
, vol.35
, Issue.5
, pp. 534-544
-
-
Xiao, L.1
Xu, D.2
Xie, C.3
Mandayam, N.B.4
Poor, H.V.5
-
6
-
-
85067107089
-
Utility based data computing scheme to provide sensing service in internet of things
-
Y. Hui, Z. Su, and S. Guo, "Utility based data computing scheme to provide sensing service in internet of things," IEEE Trans. Emerging Topics Comput., 2017, doi: 10.1109/TETC.2017.2674023.
-
(2017)
IEEE Trans. Emerging Topics Comput.
-
-
Hui, Y.1
Su, Z.2
Guo, S.3
-
7
-
-
84938351590
-
Epidemic information dissemination in mobile social networks in opportunistic links
-
Sep
-
Q. Xu, Z. Su, K. Zhang, P. Ren, and X. Shen, "Epidemic information dissemination in mobile social networks in opportunistic links," IEEE Trans. Emerging Topics Comput., vol. 3, no. 3, pp. 399-409, Sep. 2015.
-
(2015)
IEEE Trans. Emerging Topics Comput.
, vol.3
, Issue.3
, pp. 399-409
-
-
Xu, Q.1
Su, Z.2
Zhang, K.3
Ren, P.4
Shen, X.5
-
8
-
-
84969508563
-
Adaptive and channelaware detection of selective forwarding attacks in wireless sensor networks
-
May
-
J. Ren, Y. Zhamg, K. Zhang, and X. Shen, "Adaptive and channelaware detection of selective forwarding attacks in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3718-3731, May 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.5
, pp. 3718-3731
-
-
Ren, J.1
Zhamg, Y.2
Zhang, K.3
Shen, X.4
-
9
-
-
84933054696
-
Content distribution over content centric mobile social network in 5G
-
Jun
-
Z. Su and Q. Xu, "Content distribution over content centric mobile social network in 5G," IEEE Commun. Mag., vol. 53, no. 6, pp. 66-72, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 66-72
-
-
Su, Z.1
Xu, Q.2
-
10
-
-
85014107345
-
A survey on emerging computing paradigms for big data
-
Y. Zhang, J. Ren, J. Liu, C. Xv, H. Guo, and Y. Liu, "A survey on emerging computing paradigms for big data," Chinese J. Electron., vol. 2016, no. 1, pp. 1-12, 2017.
-
(2017)
Chinese J. Electron.
, vol.2016
, Issue.1
, pp. 1-12
-
-
Zhang, Y.1
Ren, J.2
Liu, J.3
Xv, C.4
Guo, H.5
Liu, Y.6
-
11
-
-
84933057232
-
A novel design for content delivery over software defined mobile social networks
-
Jul./Aug
-
Z. Su, Q. Xu, H. Zhu, and Y. Wang, "A novel design for content delivery over software defined mobile social networks," IEEE Netw., vol. 29, no. 4, pp. 62-67, Jul./Aug. 2015.
-
(2015)
IEEE Netw.
, vol.29
, Issue.4
, pp. 62-67
-
-
Su, Z.1
Xu, Q.2
Zhu, H.3
Wang, Y.4
-
12
-
-
85112702045
-
-
Cisco Visual Networking Index: Global mobile data traffic forecastupdate 2015-2020
-
Cisco Visual Networking Index: Global mobile data traffic forecastupdate 2015-2020.
-
-
-
-
13
-
-
84962028249
-
Big data in mobile social networks: A QoE-oriented framework
-
Jan./Feb
-
Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework," IEEE Netw., vol. 30, no. 1, pp. 52-57, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 52-57
-
-
Su, Z.1
Xu, Q.2
Qi, Q.3
-
14
-
-
84994525119
-
Exploiting secure and energy efficient collaborative spectrum sensing for cognitive radio sensor networks
-
Oct
-
J. Ren, Y. Zhamg, Q. Ye, K. Yang, K. Zhang, and X. Shen, "Exploiting secure and energy efficient collaborative spectrum sensing for cognitive radio sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6813-6827, Oct. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.10
, pp. 6813-6827
-
-
Ren, J.1
Zhamg, Y.2
Ye, Q.3
Yang, K.4
Zhang, K.5
Shen, X.6
-
15
-
-
85017258278
-
A resource allocation model based on double-sided combinational auctions for transparent computing
-
J. Wang, A. Liu, T. Yan, and Z. Zeng, "A resource allocation model based on double-sided combinational auctions for transparent computing," Peer-to-Peer Netw. Appl., doi: 10.1007/s12083-017-0556-6, pp. 1-8, 2017.
-
(2017)
Peer-to-Peer Netw. Appl.
, pp. 1-8
-
-
Wang, J.1
Liu, A.2
Yan, T.3
Zeng, Z.4
-
16
-
-
84940523433
-
Security and privacy for mobile healthcare networks: From a quality of protection perspective
-
Aug
-
K. Zhang, K. Yang, X. Liang, Z. Su, and X. She, "Security and privacy for mobile healthcare networks: From a quality of protection perspective," IEEE Wireless Commun., vol. 22, no. 4, pp. 104-112, Aug. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.4
, pp. 104-112
-
-
Zhang, K.1
Yang, K.2
Liang, X.3
Su, Z.4
She, X.5
-
17
-
-
84939233387
-
Security and privacy in mobile croudsourcing networks: Challenges and opportunities
-
Aug
-
K. Yang, K. Zhang, J. Ren, and X. Shen, "Security and privacy in mobile croudsourcing networks: Challenges and opportunities," IEEE Commun. Mag., vol. 53, no. 8, pp. 75-81, Aug. 2016.
-
(2016)
IEEE Commun. Mag.
, vol.53
, Issue.8
, pp. 75-81
-
-
Yang, K.1
Zhang, K.2
Ren, J.3
Shen, X.4
-
18
-
-
85029331493
-
A reinforcement learning-based data storage scheme for vehicular Ad Hoc networks
-
C.Wu, T. Yoshinaga, Y. Ji, T.Murase, and Y. Zhang, "A reinforcement learning-based data storage scheme for vehicular Ad Hoc networks," IEEE Trans. Veh. Technol., 2016, Doi: 10.1109/TVT.2016.2643665.
-
(2016)
IEEE Trans. Veh. Technol.
-
-
Wu, C.1
Yoshinaga, T.2
Ji, Y.3
Murase, T.4
Zhang, Y.5
-
19
-
-
85015763182
-
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
-
D. Wang, H. Cheng, D. He, and P. Wang, "On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices," IEEE Syst. J., vol. PP, no. 99, pp. 1-10, 2017.
-
(2017)
IEEE Syst. J.
, Issue.99
, pp. 1-10
-
-
Wang, D.1
Cheng, H.2
He, D.3
Wang, P.4
-
20
-
-
84883345595
-
Fully anonymous profile matching in mobile social networks
-
Sep
-
X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully anonymous profile matching in mobile social networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 641-655, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 641-655
-
-
Liang, X.1
Zhang, K.2
Lu, R.3
Lin, X.4
Shen, X.5
-
21
-
-
84979812487
-
Big privacy: Challenges and opportunities of privacy study in the age of big data
-
S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data" IEEE Access, vol. 4, pp. 2751-2763, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 2751-2763
-
-
Yu, S.1
-
22
-
-
85017165469
-
APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication
-
Y. Liu, A. Liu, Y. Li, Y. Choi, H. Sekiya, and J. Li, "APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication," Pervasive Mobile Comput., pp. 1-23, 2017.
-
(2017)
Pervasive Mobile Comput.
, pp. 1-23
-
-
Liu, Y.1
Liu, A.2
Li, Y.3
Choi, Y.4
Sekiya, H.5
Li, J.6
-
23
-
-
85014086530
-
Networking for big data: A survey
-
Jan.-Mar
-
S. Yu, M. Liu, W. Dou, X. Liu, and S. Zhou, "Networking for big data: A survey," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 531-549, Jan.-Mar. 2017.
-
(2017)
IEEE Commun. Surveys Tuts.
, vol.19
, Issue.1
, pp. 531-549
-
-
Yu, S.1
Liu, M.2
Dou, W.3
Liu, X.4
Zhou, S.5
-
24
-
-
85030666259
-
On the hybrid using of unicast-broadcast in wireless sensor networks
-
Q. Liu and A. Liu, "On the hybrid using of unicast-broadcast in wireless sensor networks," Comput. Elect. Eng., pp. 1-19, 2017.
-
(2017)
Comput. Elect. Eng.
, pp. 1-19
-
-
Liu, Q.1
Liu, A.2
-
25
-
-
84994164440
-
Dynamic-scheduling mechanism of controllers based on security policy in software-defined network
-
C. Qi, J. Wu, H. Hu, and G. Cheng, "Dynamic-scheduling mechanism of controllers based on security policy in software-defined network," Electron. Lett., vol. 52, no. 23, pp. 1918-1920, 2016.
-
(2016)
Electron. Lett.
, vol.52
, Issue.23
, pp. 1918-1920
-
-
Qi, C.1
Wu, J.2
Hu, H.3
Cheng, G.4
-
26
-
-
85014119108
-
Identifying propagation sources in networks: State-of-The-art and comparative studies
-
Jan.-Mar
-
J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou, "Identifying propagation sources in networks: State-of-the-art and comparative studies," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 465-481, Jan.-Mar. 2017.
-
(2017)
IEEE Commun. Surveys Tuts.
, vol.19
, Issue.1
, pp. 465-481
-
-
Jiang, J.1
Wen, S.2
Yu, S.3
Xiang, Y.4
Zhou, W.5
-
27
-
-
77951441926
-
Packet size optimization for increased throughput in multi-level security wireless networks
-
M. Younis, Q. Farrag, and W. Amico, "Packet size optimization for increased throughput in multi-level security wireless networks," in Proc. IEEE Military Commun. Conf., 2009, pp. 1-7.
-
(2009)
Proc. IEEE Military Commun. Conf.
, pp. 1-7
-
-
Younis, M.1
Farrag, Q.2
Amico, W.3
-
28
-
-
85027694554
-
Adaptive base station cooperation for physical layer security in two-cell wireless networks
-
L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, "Adaptive base station cooperation for physical layer security in two-cell wireless networks," IEEE Access, vol. 4, pp. 5607-5623, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 5607-5623
-
-
Hu, L.1
Wen, H.2
Wu, B.3
Tang, J.4
Pan, F.5
-
29
-
-
85000416096
-
On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system
-
J. Zhang, G. Pan, and H. Wang, "On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system," IEEE Access, vol. 4, pp. 3887-3893, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 3887-3893
-
-
Zhang, J.1
Pan, G.2
Wang, H.3
-
30
-
-
84861611405
-
Optimal resource allocation to defend against deliberate attackers in networking infrastructures
-
X. Xiao, M. Li, J. Wang, and C. Qiao, "Optimal resource allocation to defend against deliberate attackers in networking infrastructures," in Proc. IEEE INFOCOM, 2012, pp. 639-647.
-
(2012)
Proc. IEEE INFOCOM
, pp. 639-647
-
-
Xiao, X.1
Li, M.2
Wang, J.3
Qiao, C.4
-
31
-
-
79960606609
-
Resource allocation for security services in mobile cloud computing
-
H. Liang, D. Huang, L. Cai, X. Shen, and D. Peng, "Resource allocation for security services in mobile cloud computing," in Proc. IEEE INFOCOM, 2011, pp. 191-195.
-
(2011)
Proc. IEEE INFOCOM
, pp. 191-195
-
-
Liang, H.1
Huang, D.2
Cai, L.3
Shen, X.4
Peng, D.5
-
32
-
-
49049102940
-
A general architecture of mobile social network services
-
Nov
-
Y.-J. Chang, H.-H. Liu, L.-D. Chou, and Y.-W. Chen, and H.-Y. Shin, "A general architecture of mobile social network services," in Proc. Int. Conf. Convergence Inf. Technol., Nov. 2007, pp. 151-156.
-
(2007)
Proc. Int. Conf. Convergence Inf. Technol.
, pp. 151-156
-
-
Chang, Y.-J.1
Liu, H.-H.2
Chou, L.-D.3
Chen, Y.-W.4
Shin, H.-Y.5
-
33
-
-
84904430618
-
Information diffusion in mobile social networks: The speed perspective
-
May
-
Z. Lu, Y. Wen, and C. Cao, "Information diffusion in mobile social networks: The speed perspective," in Proc. IEEE INFOCOM, May 2014, pp. 1932-1940.
-
(2014)
Proc. IEEE INFOCOM
, pp. 1932-1940
-
-
Lu, Z.1
Wen, Y.2
Cao, C.3
-
34
-
-
84891558659
-
Cloud-based multicasting with feedback in mobile social networks
-
Dec
-
Y. Wang, J. Wu, and W. Yang, "Cloud-based multicasting with feedback in mobile social networks," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6043-6053, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6043-6053
-
-
Wang, Y.1
Wu, J.2
Yang, W.3
-
35
-
-
84904408894
-
Improving data forwarding in mobile social networks with infrastructure support: A space-crossing community approach
-
May
-
Z. Li, C. Wang, S. Yang, and J. Chang, and I. Stojmenovic, "Improving data forwarding in mobile social networks with infrastructure support: A space-crossing community approach," in Proc. IEEE INFOCOM, May 2014, pp. 1941-1949.
-
(2014)
Proc. IEEE INFOCOM
, pp. 1941-1949
-
-
Li, Z.1
Wang, C.2
Yang, S.3
Chang, J.4
Stojmenovic, I.5
-
36
-
-
84896447687
-
Security and privacy in mobile social networks challenges and solutions
-
Mar
-
X. Liang, K. Zhang, X. Shen, and X. Lin, "Security and privacy in mobile social networks challenges and solutions," IEEE Wireless Commun., vol. 21, no. 1, pp. 33-41, Mar. 2014.
-
(2014)
IEEE Wireless Commun.
, vol.21
, Issue.1
, pp. 33-41
-
-
Liang, X.1
Zhang, K.2
Shen, X.3
Lin, X.4
-
37
-
-
85028892688
-
Using screen brightness to improve security in mobile social network access
-
Aug
-
M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, F. Palmieri, and A. Castiglione, "Using screen brightness to improve security in mobile social network access," IEEE Trans. Dependable Secure Comput., vol. PP, no. 99, p. 1, Aug. 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, Issue.99
, pp. 1
-
-
Guerar, M.1
Migliardi, M.2
Merlo, A.3
Benmohammed, M.4
Palmieri, F.5
Castiglione, A.6
-
38
-
-
70849109966
-
Solutions to security and privacy issues in mobile social networking
-
Aug
-
A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking," in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 1036-1042.
-
(2009)
Proc. Int. Conf. Comput. Sci. Eng.
, pp. 1036-1042
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
39
-
-
84973643707
-
A sybil attack detection scheme for privacypreserving mobile social networks
-
Dec
-
P. Li and R. Lu, "A sybil attack detection scheme for privacypreserving mobile social networks," in Proc. 10th Int. Conf. Inf. Commun. Signal Process., Dec. 2015, pp. 1-5.
-
(2015)
Proc. 10th Int. Conf. Inf. Commun. Signal Process.
, pp. 1-5
-
-
Li, P.1
Lu, R.2
-
40
-
-
84966783569
-
Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks
-
Nov
-
X. Zhu, Y. Su, M. Gao, and Y. Huang, "Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks," in Proc. IEEE/CIC Int. Conf. Commun. China, Nov. 2015, pp. 1-6.
-
(2015)
Proc. IEEE/CIC Int. Conf. Commun. China
, pp. 1-6
-
-
Zhu, X.1
Su, Y.2
Gao, M.3
Huang, Y.4
-
41
-
-
84898804874
-
Social network based security scheme in mobile information-centric network
-
Jun
-
Y. Lu, Z. Wang, Y. Yu, R. Fan, and M. Gerla, "Social network based security scheme in mobile information-centric network," in Proc. 12th Annu. Mediterranean Ad Hoc Netw. Workshop, Jun. 2013, pp. 1-7.
-
(2013)
Proc. 12th Annu. Mediterranean Ad Hoc Netw. Workshop
, pp. 1-7
-
-
Lu, Y.1
Wang, Z.2
Yu, Y.3
Fan, R.4
Gerla, M.5
-
42
-
-
80051889537
-
Location cheating: A security challenge to location-based social network services
-
Jun
-
W. He, X. Liu, and M. Ren, "Location cheating: A security challenge to location-based social network services," in Proc. 31th Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 740-749.
-
(2011)
Proc. 31th Int. Conf. Distrib. Comput. Syst.
, pp. 740-749
-
-
He, W.1
Liu, X.2
Ren, M.3
-
43
-
-
84904462243
-
Defending sybil attacks in mobile social networks
-
Apr
-
Y. Sun, L. Yin, and W. Liu, "Defending sybil attacks in mobile social networks," in Proc. IEEE Conf. Comput. Commun. Workshops, Apr. 2014, pp. 163-164.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 163-164
-
-
Sun, Y.1
Yin, L.2
Liu, W.3
-
44
-
-
79960608392
-
A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms
-
Apr
-
R. Fei, K. Yang, and X. Cheng, "A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms," in Proc. IEEE Conf. Comput. Commun. Workshops, Apr. 2011, pp. 63-67.
-
(2011)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 63-67
-
-
Fei, R.1
Yang, K.2
Cheng, X.3
-
45
-
-
84893575900
-
A novel hierarchical bandwidth allocation approach in heterogeneous wireless networks, in Proc. 8th Int. Conf. Commun. Netw. China
-
Aug
-
B. Wang, H. Tian, B. Liu, S. Fan, and K. Sun, "A novel hierarchical bandwidth allocation approach in heterogeneous wireless networks, in Proc. 8th Int. Conf. Commun. Netw. China, Aug. 2013, pp. 206-211.
-
(2013)
, pp. 206-211
-
-
Wang, B.1
Tian, H.2
Liu, B.3
Fan, S.4
Sun, K.5
-
46
-
-
79960381001
-
Dynamic QoS-based bandwidth allocation framework for broadband wireless networks
-
Jul
-
A. Esmailpour and N. Nasser, "Dynamic QoS-based bandwidth allocation framework for broadband wireless networks," IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2690-2700, Jul. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.6
, pp. 2690-2700
-
-
Esmailpour, A.1
Nasser, N.2
-
47
-
-
84897583900
-
Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks
-
Mar
-
G. Nan, Z. Mao, M. Yu, M. Li, H. Wang, and Y. Zhang, "Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks," IEEE Syst. J., vol. 8, no. 1, pp. 256-267, Mar. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.1
, pp. 256-267
-
-
Nan, G.1
Mao, Z.2
Yu, M.3
Li, M.4
Wang, H.5
Zhang, Y.6
-
48
-
-
84861611405
-
Optimal resource allocation to defend against deliberate attackers in networking infrastructures
-
X. Xiao, M. Li, J. Wang, and C. Qiao, "Optimal resource allocation to defend against deliberate attackers in networking infrastructures," in Proc. IEEE INFOCOM, 2012, pp. 639-647.
-
(2012)
Proc. IEEE INFOCOM
, pp. 639-647
-
-
Xiao, X.1
Li, M.2
Wang, J.3
Qiao, C.4
-
49
-
-
79960606609
-
Resource allocation for security services in mobile cloud computing
-
H. Liang, D. Huang, L. Cai, X. Shen, and D. Peng, "Resource allocation for security services in mobile cloud computing," in Proc. IEEE INFOCOM, 2011, pp. 191-195.
-
(2011)
Proc. IEEE INFOCOM
, pp. 191-195
-
-
Liang, H.1
Huang, D.2
Cai, L.3
Shen, X.4
Peng, D.5
-
50
-
-
85015034778
-
QoE-based distributed multichannel allocation 5G heterogeneous cellular networks: A matching-coalitional game solution
-
Sept
-
D. Wu, Q. Wu, Y. Xu, J. Jing, and Z. Qin, "QoE-based distributed multichannel allocation 5G heterogeneous cellular networks: A matching-coalitional game solution," IEEE Access, vol. 5, pp. 61-71, Sept. 2016.
-
(2016)
IEEE Access
, vol.5
, pp. 61-71
-
-
Wu, D.1
Wu, Q.2
Xu, Y.3
Jing, J.4
Qin, Z.5
-
51
-
-
85018500654
-
Social networkbased content delivery in device-to-device underlay cellular networks using matching theory
-
Nov
-
C. Xu, C. Gao, Z. Zhou, Z. Chang, and Y. Jia, "Social networkbased content delivery in device-to-device underlay cellular networks using matching theory," IEEE Access, vol. 5, pp. 924-937, Nov. 2016.
-
(2016)
IEEE Access
, vol.5
, pp. 924-937
-
-
Xu, C.1
Gao, C.2
Zhou, Z.3
Chang, Z.4
Jia, Y.5
|