Остановите войну!
for scientists:
default search action
Xiaoyan Hong
- > Home > Persons > Xiaoyan Hong
Publications
- 2011
- [i1]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. IACR Cryptol. ePrint Arch. 2011: 639 (2011) - 2010
- [j19]Dijiang Huang, Xiaoyan Hong, Mario Gerla:
Situation-aware trust architecture for vehicular networks. IEEE Commun. Mag. 48(11): 128-135 (2010) - [c53]Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla:
Establishing Email-Based Social Network Trust for Vehicular Networks. CCNC 2010: 1-5 - [c48]Nanxi Chen, Mario Gerla, Dijiang Huang, Xiaoyan Hong:
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. Med-Hoc-Net 2010: 1-8 - 2007
- [j6]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(8): 888-902 (2007) - [c35]Jiejun Kong, Xiaoyan Hong, Dapeng Wu, Mario Gerla:
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks. BIBE 2007: 914-921 - 2006
- [j4]Xiaoyan Hong, Jiejun Kong, Mario Gerla:
Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 281-293 (2006) - [c23]Jun Liu, Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Performance evaluation of anonymous routing protocols in MANETs. WCNC 2006: 646-651 - [c22]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Modeling Ad-hoc rushing attack in a negligibility-based security framework. Workshop on Wireless Security 2006: 55-64 - 2005
- [c20]Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla:
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. ISCC 2005: 57-62 - [c19]Yeng-Zhong Lee, Kaixin Xu, Xiaoyan Hong, Mario Gerla:
Hybrid landmark routing in ad hoc networks with heterogeneous group mobility. ISWCS 2005: 125-129 - [c18]Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, Mario Gerla:
A secure ad-hoc routing approach using localized self-healing communities. MobiHoc 2005: 254-265 - [c17]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. SASN 2005: 97-106 - [c16]Yeng-Zhong Lee, Jason Chen, Xiaoyan Hong, Kaixin Xu, Teresa Maria Breyer, Mario Gerla:
Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol. WCNC 2005: 2032-2037 - 2003
- [j3]Kaixin Xu, Xiaoyan Hong, Mario Gerla:
Landmark routing in ad hoc networks with mobile backbones. J. Parallel Distributed Comput. 63(2): 110-122 (2003) - 2002
- [j2]Xiaoyan Hong, Kaixin Xu, Mario Gerla:
Scalable routing protocols for mobile ad hoc networks. IEEE Netw. 16(4): 11-21 (2002) - [c13]Kaixin Xu, Xiaoyan Hong, Mario Gerla:
An ad hoc network with mobile backbones. ICC 2002: 3138-3143 - [c12]Xiaoyan Hong, Mario Gerla, Yunjung Yi, Kaixin Xu, Taek Jin Kwon:
Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks. ICC 2002: 3179-3185 - [c10]Yunjung Yi, Xiaoyan Hong, Mario Gerla:
Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion. Networked Group Communication 2002: 97-104 - 2001
- [j1]Ronn Ritke, Xiaoyan Hong, Mario Gerla:
Contradictory relationship between Hurst parameter and queueing performance (extended version). Telecommun. Syst. 16(1-2): 159-175 (2001) - [c9]Xiaoyan Hong, Taek Jin Kwon, Mario Gerla, Daniel Lihui Gu, Guangyu Pei:
A Mobility Framework for Ad Hoc Wireless Networks. Mobile Data Management 2001: 185-196 - 2000
- [c8]Mario Gerla, Xiaoyan Hong, Guangyu Pei:
Landmark routing for large ad hoc wireless networks. GLOBECOM 2000: 1702-1706 - [c7]Guangyu Pei, Mario Gerla, Xiaoyan Hong:
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. MobiHoc 2000: 11-18 - [c6]Daniel Lihui Gu, Henry Ly, Xiaoyan Hong, Mario Gerla, Guangyu Pei, Yeng-Zhong Lee:
C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs. WCNC 2000: 879-884 - [c5]Daniel Lihui Gu, Guangyu Pei, Henry Ly, Mario Gerla, Beichuan Zhang, Xiaoyan Hong:
UAV aided intelligent routing for ad-hoc wireless network in single-area theater. WCNC 2000: 1220-1225 - 1999
- [c4]Xiaoyan Hong, Mario Gerla, Guangyu Pei, Ching-Chuan Chiang:
A group mobility model for ad hoc wireless networks. MSWiM 1999: 53-60 - [c3]Guangyu Pei, Mario Gerla, Xiaoyan Hong, Ching-Chuan Chiang:
A wireless hierarchical routing protocol with group mobility. WCNC 1999: 1538-1542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-28 02:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint