


default search action
13th MSN 2017: Beijing, China
- Liehuang Zhu, Sheng Zhong:

Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers. Communications in Computer and Information Science 747, Springer 2018, ISBN 978-981-10-8889-6 - Xiaoli Zeng, Min Hu, Nuo Yu

, Xiaohua Jia:
An Efficient and Secure Range Query Scheme for Encrypted Data in Smart Grid. 1-18 - Jiangping Han, Kaiping Xue

, Hao Yue
, Peilin Hong, Nenghai Yu, Fenghua Li:
Receive Buffer Pre-division Based Flow Control for MPTCP. 19-31 - Cheng Wang, Jing Luo, Bo Yang, Changjun Jiang:

On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks. 32-44 - Qi Wang, Mingwei Liu, Kaiqu Chen, Yu Zhang, Jing Zheng:

A Hierarchical Framework for Evaluation of Cloud Service Qualities. 45-54 - Rixin Xu, Zijian Zhang, Jiamou Liu

, Nathan Situ, Jun Ho Jin:
Facility Location Selection Using Community-Based Single Swap: A Case Study. 55-69 - Ying Cai, Linqing Hou, Yanfang Fan, Ruoyu Chen:

Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks. 70-83 - Yang Du, Zhaoxia Yin, Xinpeng Zhang:

An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping. 84-98 - Zhengchao Lei, Weiyan Chai, Sanyuan Zhao, Hongmei Song, Fengxia Li:

Co-saliency Detection Based on Siamese Network. 99-109 - Mengxuan Sun, Xiaoju Dong, Fan Wu, Guihai Chen

:
An Efficient Privacy-Preserving Fingerprint-Based Localization Scheme Employing Oblivious Transfer. 110-132 - Dongshu Wang, Jialing He, Mussadiq Abdul Rahim

, Zijian Zhang, Liehuang Zhu:
An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid. 133-145 - Zijian Zhang, Chongxi Shen, Liehuang Zhu, Chen Xu, Salabat Khan Wazir

, Chuyi Chen:
Achieving Communication Effectiveness of Web Authentication Protocol with Key Update. 146-162 - Bo Wang, Fan Wu, Guihai Chen

:
Placement Fraud Detection on Smart Phones: A Joint Crowdsourcing and Data Analyzing Based Approach. 163-179 - Pengfei Zhu, Lejian Liao, Xin Li:

A Reinforcement Learning Approach of Data Forwarding in Vehicular Networks. 180-194 - Zhenkui Shi

:
Privacy-Assured Large-Scale Navigation from Encrypted Approximate Shortest Path Recommendation. 195-211 - Mengjie Duan, Shunrong Jiang, Liangmin Wang:

An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle. 212-226 - Juan Fang, Mengxuan Wang, Hao Sun:

Research of Task Scheduling Mechanism Based on Prediction of Memory Utilization. 227-236 - Zezhong Wang, Ye Yuan, Guoren Wang, Hongchao Qin, Yuliang Ma:

An Effective Method for Community Search in Large Directed Attributed Graphs. 237-251 - Fei Wang

, Yifan Du, Yongjun Xu, Tan Cheng, Xiaoli Pan:
EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANET. 252-270 - Chuangui Yang, Zhu Wang, Botao Wang, Shizhuo Deng, Guangxin Liu, Yuru Kang, Huichao Men:

CHAR-HMM: An Improved Continuous Human Activity Recognition Algorithm Based on Hidden Markov Model. 271-282 - Shaofeng Geng, Xiaoxi Guo, Jia Zhang, Yongheng Wang, Renfa Li, Binghua Song:

A Prediction Method Based on Complex Event Processing for Cyber Physical System. 283-292 - Xing Yin, Liangmin Wang:

A Fast Handover Scheme for SDN Based Vehicular Network. 293-302 - Xiangyi Chen, Liangmin Wang:

Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks. 303-317 - Rui Zhang, Wenjie Ma, Luo Zhong, Peng Xie, Hongbo Jiang:

Understanding Trajectory Data Based on Heterogeneous Information Network Using Visual Analytics. 318-327 - Rui Zhang, Nuofei Li, Siyuan Huang, Peng Xie, Hongbo Jiang:

Automatic Prediction of Traffic Flow Based on Deep Residual Networks. 328-337 - Muhammad Sohail

, Liangmin Wang, Bushra Yamin:
Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network. 338-349 - Shijie Dai, Minghui Liwang, Yang Liu, Zhibin Gao, Lianfen Huang, Xiaojiang Du:

Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things. 350-364 - Li Wei, Mingwei Xu:

Enhancing Software Reliability Against Soft Error Using Critical Data Model. 365-376 - XinDi Ma, Jianfeng Ma, Sheng Gao

, Qingsong Yao:
APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices. 377-390 - Jiaoyan Chen, Bang Wang, Wenyu Liu

:
Barrier Coverage Lifetime Maximization in a Randomly Deployed Bistatic Radar Network. 391-401 - Yeqiu Xiao, Jia Liu, Jiao Quan, Yulong Shen, Xiaohong Jiang:

On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users. 402-412 - Xuan Wang, Xin Kou, Zifan Wang, Lanqing Wang, Baoying Liu, Feng Chen:

Gesture Recognition System Based on RFID. 413-425 - Juan Fang, Huanhuan Chen, Junjie Mao:

Understanding Data Partition for Applications on CPU-GPU Integrated Processors. 426-434 - Yue Zhang, Zhitao Guan:

Privacy-Preserving and Traceable Data Aggregation in Energy Internet. 435-449 - Juan Fang, Zeeshan Shaukat

, Saqib Ali, Abdul Ahad Zulfiqar:
Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS). 450-460 - Shijie Ni, Zhuorui Yong, Ruipeng Gao:

Modeling and Evaluation of the Incentive Scheme in "E-photo". 461-472 - Wenjuan Song, Bing Zhou, Shijie Ni:

Intelligent Environment Monitoring and Control System for Plant Growth. 473-482 - Zheng Liu, Mingwei Xu, Jiahao Cao, Qi Li:

TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN. 483-496 - Zohaib Latif

, Kashif Sharif
, Maria K. Alvi, Fan Li:
Simulation Standardization: Current State and Cross-Platform System for Network Simulators. 497-508 - Xing Liu, Songtao Guo, Yuanyuan Yang:

Task Offloading with Execution Cost Minimization in Heterogeneous Mobile Cloud Computing. 509-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














