callback( { "result":{ "query":":facetid:toc:\"db/conf/nana/nana2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.58" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"61", "@dc":"61", "@oc":"61", "@id":"43403883", "text":":facetid:toc:db/conf/nana/nana2017.bht" } }, "hits":{ "@total":"61", "@computed":"61", "@sent":"61", "@first":"0", "hit":[{ "@score":"1", "@id":"2994908", "info":{"authors":{"author":[{"@pid":"09/6669-3","text":"Teng Li 0003"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"45/5103-1","text":"Cong Sun 0001"},{"@pid":"76/10773","text":"Dawei Wei"},{"@pid":"84/5683-2","text":"Ning Xi 0002"}]},"title":"PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.","venue":"NaNA","pages":"5-10","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/0003M0WX17","doi":"10.1109/NANA.2017.21","ee":"https://doi.org/10.1109/NaNA.2017.21","url":"https://dblp.org/rec/conf/nana/0003M0WX17"}, "url":"URL#2994908" }, { "@score":"1", "@id":"2994909", "info":{"authors":{"author":[{"@pid":"174/9648","text":"Omran Ayoub"},{"@pid":"78/10585","text":"Francesco Musumeci 0001"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"36/6659","text":"Achille Pattavina"}]},"title":"Techno-Economic Evaluation of CDN Deployments in Metropolitan Area Networks.","venue":"NaNA","pages":"314-319","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/Ayoub0TP17","doi":"10.1109/NANA.2017.29","ee":"https://doi.org/10.1109/NaNA.2017.29","url":"https://dblp.org/rec/conf/nana/Ayoub0TP17"}, "url":"URL#2994909" }, { "@score":"1", "@id":"2994910", "info":{"authors":{"author":[{"@pid":"221/1597","text":"Yongchao Dang"},{"@pid":"32/6098-1","text":"Yin Chen 0001"},{"@pid":"119/3488","text":"Huihui Wu"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"}]},"title":"Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.","venue":"NaNA","pages":"30-35","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/DangCWSJ17","doi":"10.1109/NANA.2017.38","ee":"https://doi.org/10.1109/NaNA.2017.38","url":"https://dblp.org/rec/conf/nana/DangCWSJ17"}, "url":"URL#2994910" }, { "@score":"1", "@id":"2994911", "info":{"authors":{"author":[{"@pid":"221/1536","text":"Xiaowu Du"},{"@pid":"69/889","text":"Lisheng Ma"}]},"title":"Backup Path Provisioning for Service Protection against Disaster Failures in Telecom Networks.","venue":"NaNA","pages":"220-224","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/DuM17","doi":"10.1109/NANA.2017.40","ee":"https://doi.org/10.1109/NaNA.2017.40","url":"https://dblp.org/rec/conf/nana/DuM17"}, "url":"URL#2994911" }, { "@score":"1", "@id":"2994912", "info":{"authors":{"author":[{"@pid":"44/2489","text":"Jianming Fu"},{"@pid":"175/2667","text":"Mengfei Xie"},{"@pid":"158/0864","text":"Yingjun Wang"},{"@pid":"221/1604","text":"Xufen Mei"}]},"title":"An Empirical Study of Unsolicited Content Injection into a Website.","venue":"NaNA","pages":"104-111","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/FuXWM17","doi":"10.1109/NANA.2017.39","ee":"https://doi.org/10.1109/NaNA.2017.39","url":"https://dblp.org/rec/conf/nana/FuXWM17"}, "url":"URL#2994912" }, { "@score":"1", "@id":"2994913", "info":{"authors":{"author":[{"@pid":"46/5223","text":"Hui Gao"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"77/377-10","text":"Bin Yang 0010"}]},"title":"D2D Communication for Disaster Recovery in Cellular Networks.","venue":"NaNA","pages":"292-295","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/GaoSY17","doi":"10.1109/NANA.2017.50","ee":"https://doi.org/10.1109/NaNA.2017.50","url":"https://dblp.org/rec/conf/nana/GaoSY17"}, "url":"URL#2994913" }, { "@score":"1", "@id":"2994914", "info":{"authors":{"author":[{"@pid":"12/4000","text":"Kai Gao"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"47/6455","text":"Jianfeng Guan"},{"@pid":"51/3710-38","text":"Yang Liu 0038"}]},"title":"A Survey of Multipath Transport Mechanism in Software Defined Network.","venue":"NaNA","pages":"320-325","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/GaoXGL17","doi":"10.1109/NANA.2017.8","ee":"https://doi.org/10.1109/NaNA.2017.8","url":"https://dblp.org/rec/conf/nana/GaoXGL17"}, "url":"URL#2994914" }, { "@score":"1", "@id":"2994915", "info":{"authors":{"author":[{"@pid":"138/9842","text":"Bishnu Prasad Gautam"},{"@pid":"180/3012","text":"Amit Batajoo"},{"@pid":"197/8856","text":"Hiroyasu Asami"}]},"title":"Cost Effective Accommodation Planning in a Trip by Using Accommodation Advisor Query (AA-Query) in STPF.","venue":"NaNA","pages":"330-336","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/GautamBA17","doi":"10.1109/NANA.2017.60","ee":"https://doi.org/10.1109/NaNA.2017.60","url":"https://dblp.org/rec/conf/nana/GautamBA17"}, "url":"URL#2994915" }, { "@score":"1", "@id":"2994916", "info":{"authors":{"author":[{"@pid":"39/6194","text":"Rentao Gu"},{"@pid":"148/8379","text":"Shizong Zhang"},{"@pid":"221/1571","text":"Zidi Yan"},{"@pid":"82/383","text":"Yuefeng Ji"}]},"title":"Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail Area.","venue":"NaNA","pages":"36-41","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/GuZYJ17","doi":"10.1109/NANA.2017.35","ee":"https://doi.org/10.1109/NaNA.2017.35","url":"https://dblp.org/rec/conf/nana/GuZYJ17"}, "url":"URL#2994916" }, { "@score":"1", "@id":"2994917", "info":{"authors":{"author":[{"@pid":"49/11348","text":"Yiming Guo"},{"@pid":"97/5856","text":"Yulong Wang"},{"@pid":"97/8704-94","text":"Lei Zhang 0094"},{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"80/6406-1","text":"Qi Qi 0001"}]},"title":"GA-based Load Balancing Algorithm for Distributed Timing Task.","venue":"NaNA","pages":"258-262","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/GuoWZW017","doi":"10.1109/NANA.2017.67","ee":"https://doi.org/10.1109/NaNA.2017.67","url":"https://dblp.org/rec/conf/nana/GuoWZW017"}, "url":"URL#2994917" }, { "@score":"1", "@id":"2994918", "info":{"authors":{"author":[{"@pid":"215/7445","text":"Ziyi Han"},{"@pid":"09/3925-5","text":"Li Yang 0005"},{"@pid":"61/3234","text":"Qiang Liu"}]},"title":"A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing.","venue":"NaNA","pages":"341-346","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/Han0L17","doi":"10.1109/NANA.2017.20","ee":"https://doi.org/10.1109/NaNA.2017.20","url":"https://dblp.org/rec/conf/nana/Han0L17"}, "url":"URL#2994918" }, { "@score":"1", "@id":"2994919", "info":{"authors":{"author":[{"@pid":"96/10637","text":"Hao Hao"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"78/10624","text":"Shujie Yang"},{"@pid":"47/6455","text":"Jianfeng Guan"},{"@pid":"51/3710-38","text":"Yang Liu 0038"},{"@pid":"124/8701","text":"Lujie Zhong"}]},"title":"BF-PDT: A New Name Lookup Mechanism in Content-Centric Networking.","venue":"NaNA","pages":"69-74","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/HaoXYGLZ17","doi":"10.1109/NANA.2017.11","ee":"https://doi.org/10.1109/NaNA.2017.11","url":"https://dblp.org/rec/conf/nana/HaoXYGLZ17"}, "url":"URL#2994919" }, { "@score":"1", "@id":"2994920", "info":{"authors":{"author":[{"@pid":"98/942","text":"Jingjing Hu"},{"@pid":"121/2303","text":"Yancheng Ji"},{"@pid":"221/1649","text":"Junma Li"},{"@pid":"221/1573","text":"Danfeng Dong"}]},"title":"Research on Power Allocation of Network Coding in Vehicle Networking.","venue":"NaNA","pages":"347-352","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/HuJLD17","doi":"10.1109/NANA.2017.18","ee":"https://doi.org/10.1109/NaNA.2017.18","url":"https://dblp.org/rec/conf/nana/HuJLD17"}, "url":"URL#2994920" }, { "@score":"1", "@id":"2994921", "info":{"authors":{"author":[{"@pid":"95/6046","text":"Jing Hu"},{"@pid":"221/1535","text":"Wuchao Shi"},{"@pid":"46/2375-7","text":"Hai Liu 0007"},{"@pid":"89/5901","text":"Jun Yan"},{"@pid":"39/5423","text":"Yuan Tian"},{"@pid":"150/2652","text":"Zhenqiang Wu"}]},"title":"Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy.","venue":"NaNA","pages":"24-29","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/HuSLYTW17","doi":"10.1109/NANA.2017.27","ee":"https://doi.org/10.1109/NaNA.2017.27","url":"https://dblp.org/rec/conf/nana/HuSLYTW17"}, "url":"URL#2994921" }, { "@score":"1", "@id":"2994922", "info":{"authors":{"author":[{"@pid":"87/7188","text":"Zhao Huang"},{"@pid":"86/5728-6","text":"Quan Wang 0006"}]},"title":"MSIPS: Multi-tiered Security IPs Architecture for Secure SoC Design.","venue":"NaNA","pages":"203-208","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/HuangW17","doi":"10.1109/NANA.2017.43","ee":"https://doi.org/10.1109/NaNA.2017.43","url":"https://dblp.org/rec/conf/nana/HuangW17"}, "url":"URL#2994922" }, { "@score":"1", "@id":"2994923", "info":{"authors":{"author":[{"@pid":"221/1551","text":"Anku Jaiswal"},{"@pid":"221/1564","text":"Purrushottam Bagale"}]},"title":"A Survey on Big Data in Financial Sector.","venue":"NaNA","pages":"337-340","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/JaiswalB17","doi":"10.1109/NANA.2017.46","ee":"https://doi.org/10.1109/NaNA.2017.46","url":"https://dblp.org/rec/conf/nana/JaiswalB17"}, "url":"URL#2994923" }, { "@score":"1", "@id":"2994924", "info":{"authors":{"author":[{"@pid":"221/1580","text":"Sujeet Kumar Jha"},{"@pid":"221/1576","text":"Rupa Rokaya"},{"@pid":"221/1685","text":"Amit Bhagat"},{"@pid":"221/1654","text":"Ahmed Raja Khan"},{"@pid":"221/1583","text":"Laxman Aryal"}]},"title":"LTE Network: Coverage and Capacity Planning - 4G Cellular Network Planning around Banepa.","venue":"NaNA","pages":"180-185","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/JhaRBKA17","doi":"10.1109/NANA.2017.23","ee":"https://doi.org/10.1109/NaNA.2017.23","url":"https://dblp.org/rec/conf/nana/JhaRBKA17"}, "url":"URL#2994924" }, { "@score":"1", "@id":"2994925", "info":{"authors":{"author":[{"@pid":"46/2563","text":"Xiang Ji"},{"@pid":"79/6607","text":"Qingyi Hua"},{"@pid":"132/0431","text":"Chunyu Li"},{"@pid":"221/1626","text":"Junsong Tang"},{"@pid":"179/3262","text":"Anwen Wang"},{"@pid":"95/10521","text":"Xiaojiang Chen"},{"@pid":"80/3909","text":"Dingyi Fang"}]},"title":"2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue.","venue":"NaNA","pages":"225-231","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/JiHLTWCF17","doi":"10.1109/NANA.2017.16","ee":"https://doi.org/10.1109/NaNA.2017.16","url":"https://dblp.org/rec/conf/nana/JiHLTWCF17"}, "url":"URL#2994925" }, { "@score":"1", "@id":"2994926", "info":{"authors":{"author":[{"@pid":"221/1678","text":"Kappala Vinod Kiran"},{"@pid":"221/1579","text":"Shikha Rathore"},{"@pid":"24/6016","text":"Ashok Kumar Turuk"},{"@pid":"03/2681","text":"Santos Kumar Das"}]},"title":"Development of a Hybrid FSO/RF System during Link Misalignment.","venue":"NaNA","pages":"138-140","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/KiranRTD17","doi":"10.1109/NANA.2017.63","ee":"https://doi.org/10.1109/NaNA.2017.63","url":"https://dblp.org/rec/conf/nana/KiranRTD17"}, "url":"URL#2994926" }, { "@score":"1", "@id":"2994927", "info":{"authors":{"author":[{"@pid":"121/5986","text":"Long-Hai Li"},{"@pid":"121/5972","text":"Cheng-Qiang Huang"},{"@pid":"121/5978","text":"Shao-Feng Fu"}]},"title":"A CCA-secure Verifiable Mix-Net.","venue":"NaNA","pages":"239-245","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiHF17","doi":"10.1109/NANA.2017.57","ee":"https://doi.org/10.1109/NaNA.2017.57","url":"https://dblp.org/rec/conf/nana/LiHF17"}, "url":"URL#2994927" }, { "@score":"1", "@id":"2994928", "info":{"authors":{"author":[{"@pid":"77/2109-1","text":"Yanping Li 0001"},{"@pid":"120/0167","text":"Yanjiao Qi"},{"@pid":"217/6959","text":"Laifeng Lu"}]},"title":"Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks.","venue":"NaNA","pages":"93-99","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiQL17","doi":"10.1109/NANA.2017.54","ee":"https://doi.org/10.1109/NaNA.2017.54","url":"https://dblp.org/rec/conf/nana/LiQL17"}, "url":"URL#2994928" }, { "@score":"1", "@id":"2994929", "info":{"authors":{"author":[{"@pid":"95/3736-63","text":"Jun Liu 0063"},{"@pid":"47/3951","text":"Zhiwei Li"},{"@pid":"194/3928","text":"Boyan Ding"},{"@pid":"64/1935","text":"Haoyang Wu"},{"@pid":"12/5838-4","text":"Tao Wang 0004"}]},"title":"A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless Network.","venue":"NaNA","pages":"118-124","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiuLDWW17","doi":"10.1109/NANA.2017.31","ee":"https://doi.org/10.1109/NaNA.2017.31","url":"https://dblp.org/rec/conf/nana/LiuLDWW17"}, "url":"URL#2994929" }, { "@score":"1", "@id":"2994930", "info":{"authors":{"author":[{"@pid":"46/2375-7","text":"Hai Liu 0007"},{"@pid":"150/2652","text":"Zhenqiang Wu"},{"@pid":"22/4616","text":"Changgen Peng"},{"@pid":"85/3128","text":"Xiujuan Lei"}]},"title":"Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences.","venue":"NaNA","pages":"125-132","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiuWPL17","doi":"10.1109/NANA.2017.24","ee":"https://doi.org/10.1109/NaNA.2017.24","url":"https://dblp.org/rec/conf/nana/LiuWPL17"}, "url":"URL#2994930" }, { "@score":"1", "@id":"2994931", "info":{"authors":{"author":[{"@pid":"221/1610","text":"Mengjie Liu"},{"@pid":"221/1577","text":"Yatong Wang"},{"@pid":"11/2578","text":"Jiang Zhou"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud Networks.","venue":"NaNA","pages":"252-257","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiuWZFQ17","doi":"10.1109/NANA.2017.12","ee":"https://doi.org/10.1109/NaNA.2017.12","url":"https://dblp.org/rec/conf/nana/LiuWZFQ17"}, "url":"URL#2994931" }, { "@score":"1", "@id":"2994932", "info":{"authors":{"author":[{"@pid":"49/1245-9","text":"Jia Liu 0009"},{"@pid":"61/3906-12","text":"Yang Xu 0012"},{"@pid":"93/5588","text":"Ruo Ando"},{"@pid":"99/4054","text":"Hiroki Takakura"},{"@pid":"11/504","text":"Yifei Xu"}]},"title":"Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks.","venue":"NaNA","pages":"80-86","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiuXATX17","doi":"10.1109/NANA.2017.10","ee":"https://doi.org/10.1109/NaNA.2017.10","url":"https://dblp.org/rec/conf/nana/LiuXATX17"}, "url":"URL#2994932" }, { "@score":"1", "@id":"2994933", "info":{"authors":{"author":[{"@pid":"97/6143","text":"Xiaolan Liu"},{"@pid":"77/377-10","text":"Bin Yang 0010"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"}]},"title":"Trust-Aware Data Uploading Based on Device-to-Device Communications.","venue":"NaNA","pages":"309-313","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/LiuYJ17","doi":"10.1109/NANA.2017.53","ee":"https://doi.org/10.1109/NaNA.2017.53","url":"https://dblp.org/rec/conf/nana/LiuYJ17"}, "url":"URL#2994933" }, { "@score":"1", "@id":"2994934", "info":{"authors":{"author":[{"@pid":"32/8360","text":"Guojun Ma"},{"@pid":"26/379","text":"Xing Li"},{"@pid":"06/4559","text":"Qingqi Pei"},{"@pid":"29/6830","text":"Zi Li"}]},"title":"A Security Routing Protocol for Internet of Things Based on RPL.","venue":"NaNA","pages":"209-213","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/MaLPL17","doi":"10.1109/NANA.2017.28","ee":"https://doi.org/10.1109/NaNA.2017.28","url":"https://dblp.org/rec/conf/nana/MaLPL17"}, "url":"URL#2994934" }, { "@score":"1", "@id":"2994935", "info":{"authors":{"author":[{"@pid":"221/1686","text":"Runcong Ma"},{"@pid":"52/3135","text":"Gwo-Jong Yu"},{"@pid":"c/GuilinChen","text":"Guilin Chen"},{"@pid":"61/5354","text":"Shenghui Zhao"},{"@pid":"77/377-10","text":"Bin Yang 0010"}]},"title":"Hierarchical CSI-fingerprints Classification for Passive Multi-person Localization.","venue":"NaNA","pages":"112-117","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/MaYCZY17","doi":"10.1109/NANA.2017.56","ee":"https://doi.org/10.1109/NaNA.2017.56","url":"https://dblp.org/rec/conf/nana/MaYCZY17"}, "url":"URL#2994935" }, { "@score":"1", "@id":"2994936", "info":{"authors":{"author":[{"@pid":"202/3668","text":"Jingcheng Miao"},{"@pid":"170/3230","text":"Xiao Ou Song"}]},"title":"An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum Sensing.","venue":"NaNA","pages":"176-179","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/MiaoS17","doi":"10.1109/NANA.2017.13","ee":"https://doi.org/10.1109/NaNA.2017.13","url":"https://dblp.org/rec/conf/nana/MiaoS17"}, "url":"URL#2994936" }, { "@score":"1", "@id":"2994937", "info":{"authors":{"author":[{"@pid":"221/1675","text":"Khem Narayan Poudel"},{"@pid":"221/1596","text":"Shankar Gangaju"}]},"title":"Spectral Efficiency, Diversity Gain and Multiplexing Capacity Analysis for Massive MIMO, 5G Communications System.","venue":"NaNA","pages":"133-137","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/PoudelG17","doi":"10.1109/NANA.2017.45","ee":"https://doi.org/10.1109/NaNA.2017.45","url":"https://dblp.org/rec/conf/nana/PoudelG17"}, "url":"URL#2994937" }, { "@score":"1", "@id":"2994938", "info":{"authors":{"author":[{"@pid":"221/1594","text":"Pratima Pradhan"},{"@pid":"98/2801","text":"Subarna Shakya"}]},"title":"Big Data Application for Nepalese Government: A Proposed Solution for Labor Migrant.","venue":"NaNA","pages":"296-302","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/PradhanS17","doi":"10.1109/NANA.2017.68","ee":"https://doi.org/10.1109/NaNA.2017.68","url":"https://dblp.org/rec/conf/nana/PradhanS17"}, "url":"URL#2994938" }, { "@score":"1", "@id":"2994939", "info":{"authors":{"author":[{"@pid":"221/1586","text":"Shuangyuan Qiao"},{"@pid":"01/6205-2","text":"Yong Zeng 0002"},{"@pid":"214/2457","text":"Lingjie Zhou"},{"@pid":"06/255","text":"Zhihong Liu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"}]},"title":"A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.","venue":"NaNA","pages":"158-163","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/QiaoZZLM17","doi":"10.1109/NANA.2017.25","ee":"https://doi.org/10.1109/NaNA.2017.25","url":"https://dblp.org/rec/conf/nana/QiaoZZLM17"}, "url":"URL#2994939" }, { "@score":"1", "@id":"2994940", "info":{"authors":{"author":[{"@pid":"221/1655","text":"Jiao Quan"},{"@pid":"49/1510","text":"Xiaochen Li"},{"@pid":"221/1641","text":"Yeqiu Xiao"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"20/8277","text":"Fenghua Li"}]},"title":"Secure Transmission with Limited Feedback in MISOME Wiretap Channels.","venue":"NaNA","pages":"48-53","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/QuanLXSL17","doi":"10.1109/NANA.2017.59","ee":"https://doi.org/10.1109/NaNA.2017.59","url":"https://dblp.org/rec/conf/nana/QuanLXSL17"}, "url":"URL#2994940" }, { "@score":"1", "@id":"2994941", "info":{"authors":{"author":[{"@pid":"221/1691","text":"Rahul Kumar Sah"},{"@pid":"221/1662","text":"Sushant Ghising"},{"@pid":"221/1550","text":"Saurab Dulal"},{"@pid":"221/1633","text":"Manish Karn"},{"@pid":"221/1669","text":"Suresh Sah"}]},"title":"Wireless Monitoring of Photovoltaics Panels.","venue":"NaNA","pages":"186-189","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/SahGDKS17","doi":"10.1109/NANA.2017.51","ee":"https://doi.org/10.1109/NaNA.2017.51","url":"https://dblp.org/rec/conf/nana/SahGDKS17"}, "url":"URL#2994941" }, { "@score":"1", "@id":"2994942", "info":{"authors":{"author":[{"@pid":"41/506-3","text":"Ahmed Salem 0003"},{"@pid":"170/9423","text":"Xuening Liao"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"05/5990","text":"Xiang Lu"}]},"title":"Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework.","venue":"NaNA","pages":"326-329","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/SalemLSL17","doi":"10.1109/NANA.2017.41","ee":"https://doi.org/10.1109/NaNA.2017.41","url":"https://dblp.org/rec/conf/nana/SalemLSL17"}, "url":"URL#2994942" }, { "@score":"1", "@id":"2994943", "info":{"authors":{"author":[{"@pid":"221/1503","text":"G. S. R. Satyanarayana"},{"@pid":"221/1501","text":"Debarka Chakraborty"},{"@pid":"03/2681","text":"Santos Kumar Das"}]},"title":"Application Oriented Sensor Database System.","venue":"NaNA","pages":"141-146","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/SatyanarayanaCD17","doi":"10.1109/NANA.2017.64","ee":"https://doi.org/10.1109/NaNA.2017.64","url":"https://dblp.org/rec/conf/nana/SatyanarayanaCD17"}, "url":"URL#2994943" }, { "@score":"1", "@id":"2994944", "info":{"authors":{"author":[{"@pid":"177/2241","text":"Shikai Shen"},{"@pid":"177/2198","text":"Kaiguo Qian"},{"@pid":"77/377-10","text":"Bin Yang 0010"},{"@pid":"188/7998","text":"Yumei She"},{"@pid":"57/3470","text":"Wu Wang"},{"@pid":"30/1851","text":"Yujian Wang"}]},"title":"An Improved Amorphous Algorithm in Wireless Sensor Network Based on Approximate Equilateral Triangle Beacon Selection.","venue":"NaNA","pages":"54-60","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ShenQYSWW17","doi":"10.1109/NANA.2017.30","ee":"https://doi.org/10.1109/NaNA.2017.30","url":"https://dblp.org/rec/conf/nana/ShenQYSWW17"}, "url":"URL#2994944" }, { "@score":"1", "@id":"2994945", "info":{"authors":{"author":[{"@pid":"221/1535","text":"Wuchao Shi"},{"@pid":"95/6046","text":"Jing Hu"},{"@pid":"89/5901","text":"Jun Yan"},{"@pid":"150/2652","text":"Zhenqiang Wu"},{"@pid":"217/6959","text":"Laifeng Lu"}]},"title":"A Privacy Measurement Method Using Network Structure Entropy.","venue":"NaNA","pages":"147-151","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ShiHYWL17","doi":"10.1109/NANA.2017.32","ee":"https://doi.org/10.1109/NaNA.2017.32","url":"https://dblp.org/rec/conf/nana/ShiHYWL17"}, "url":"URL#2994945" }, { "@score":"1", "@id":"2994946", "info":{"authors":{"author":[{"@pid":"27/1620","text":"Zhan Shi"},{"@pid":"218/7451","text":"Chenyue Wang"},{"@pid":"221/1552","text":"Qili Wen"},{"@pid":"50/4091-6","text":"Wei Su 0006"},{"@pid":"95/796","text":"Huachun Zhou"},{"@pid":"03/4179","text":"Shuai Gao"}]},"title":"A Transmission Mechanism of the Backup for Disaster Recovery in DCNs.","venue":"NaNA","pages":"214-219","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ShiWWSZG17","doi":"10.1109/NANA.2017.14","ee":"https://doi.org/10.1109/NaNA.2017.14","url":"https://dblp.org/rec/conf/nana/ShiWWSZG17"}, "url":"URL#2994946" }, { "@score":"1", "@id":"2994947", "info":{"authors":{"author":[{"@pid":"221/1506","text":"Haokai Song"},{"@pid":"06/4559","text":"Qingqi Pei"},{"@pid":"181/1848-14","text":"Yang Xiao 0014"},{"@pid":"29/6830","text":"Zi Li"},{"@pid":"84/2694-31","text":"Yong Wang 0031"}]},"title":"A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks.","venue":"NaNA","pages":"17-23","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/SongPXLW17","doi":"10.1109/NANA.2017.17","ee":"https://doi.org/10.1109/NaNA.2017.17","url":"https://dblp.org/rec/conf/nana/SongPXLW17"}, "url":"URL#2994947" }, { "@score":"1", "@id":"2994948", "info":{"authors":{"author":[{"@pid":"78/3204-4","text":"Feng Tian 0004"},{"@pid":"144/4742","text":"Shuangyue Zhang"},{"@pid":"217/6959","text":"Laifeng Lu"},{"@pid":"46/2375-7","text":"Hai Liu 0007"},{"@pid":"65/1767","text":"Xiaolin Gui"}]},"title":"A Novel Personalized Differential Privacy Mechanism for Trajectory Data Publication.","venue":"NaNA","pages":"61-68","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/TianZLLG17","doi":"10.1109/NANA.2017.47","ee":"https://doi.org/10.1109/NaNA.2017.47","url":"https://dblp.org/rec/conf/nana/TianZLLG17"}, "url":"URL#2994948" }, { "@score":"1", "@id":"2994949", "info":{"authors":{"author":[{"@pid":"221/1553","text":"Zhengqi Wang"},{"@pid":"221/1530","text":"Xiaobing Feng"},{"@pid":"138/2951","text":"Yukun Niu"},{"@pid":"91/195-1","text":"Chi Zhang 0001"},{"@pid":"221/1613","text":"Jue Su"}]},"title":"TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers.","venue":"NaNA","pages":"170-175","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/WangFNZS17","doi":"10.1109/NANA.2017.58","ee":"https://doi.org/10.1109/NaNA.2017.58","url":"https://dblp.org/rec/conf/nana/WangFNZS17"}, "url":"URL#2994949" }, { "@score":"1", "@id":"2994950", "info":{"authors":{"author":[{"@pid":"09/8502-1","text":"Yongzhi Wang 0001"},{"@pid":"194/2912","text":"Lingtong Liu"},{"@pid":"205/7558","text":"Cuicui Su"},{"@pid":"07/11486","text":"Jiawen Ma"},{"@pid":"181/2817","text":"Lei Wang"},{"@pid":"28/7717","text":"Yibo Yang"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"23/8127","text":"Guangxia Li"},{"@pid":"15/4777-29","text":"Tao Zhang 0029"},{"@pid":"49/7488","text":"Xuewen Dong"}]},"title":"CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.","venue":"NaNA","pages":"303-308","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/WangLSMWYSLZD17","doi":"10.1109/NANA.2017.48","ee":"https://doi.org/10.1109/NaNA.2017.48","url":"https://dblp.org/rec/conf/nana/WangLSMWYSLZD17"}, "url":"URL#2994950" }, { "@score":"1", "@id":"2994951", "info":{"authors":{"author":[{"@pid":"18/2920","text":"Xinlei Wang"},{"@pid":"150/2652","text":"Zhenqiang Wu"},{"@pid":"221/1645","text":"Jiawang Chen"},{"@pid":"167/8377","text":"Xuanwen Hao"},{"@pid":"58/2670-46","text":"Bo Liu 0046"}]},"title":"Reliability Analysis of Molecular Communication Based on Drift Diffusion.","venue":"NaNA","pages":"152-157","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/WangWCHL17","doi":"10.1109/NANA.2017.33","ee":"https://doi.org/10.1109/NaNA.2017.33","url":"https://dblp.org/rec/conf/nana/WangWCHL17"}, "url":"URL#2994951" }, { "@score":"1", "@id":"2994952", "info":{"authors":{"author":[{"@pid":"57/3470","text":"Wu Wang"},{"@pid":"77/377-10","text":"Bin Yang 0010"},{"@pid":"177/2241","text":"Shikai Shen"},{"@pid":"30/1851","text":"Yujian Wang"},{"@pid":"45/6326","text":"Gang Fang"}]},"title":"Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet Replication.","venue":"NaNA","pages":"164-169","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/WangYSWF17","doi":"10.1109/NANA.2017.65","ee":"https://doi.org/10.1109/NaNA.2017.65","url":"https://dblp.org/rec/conf/nana/WangYSWF17"}, "url":"URL#2994952" }, { "@score":"1", "@id":"2994953", "info":{"authors":{"author":[{"@pid":"119/3488","text":"Huihui Wu"},{"@pid":"170/9423","text":"Xuening Liao"},{"@pid":"221/1597","text":"Yongchao Dang"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"}]},"title":"Limits of Covert Communication on Two-Hop AWGN Channels.","venue":"NaNA","pages":"42-47","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/WuLDSJ17","doi":"10.1109/NANA.2017.55","ee":"https://doi.org/10.1109/NaNA.2017.55","url":"https://dblp.org/rec/conf/nana/WuLDSJ17"}, "url":"URL#2994953" }, { "@score":"1", "@id":"2994954", "info":{"authors":{"author":[{"@pid":"84/5683-2","text":"Ning Xi 0002"},{"@pid":"45/5103-1","text":"Cong Sun 0001"},{"@pid":"70/5794","text":"Di Lu"},{"@pid":"74/2768","text":"Yulong Shen"}]},"title":"Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.","venue":"NaNA","pages":"286-291","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/Xi0LS17","doi":"10.1109/NANA.2017.61","ee":"https://doi.org/10.1109/NaNA.2017.61","url":"https://dblp.org/rec/conf/nana/Xi0LS17"}, "url":"URL#2994954" }, { "@score":"1", "@id":"2994955", "info":{"authors":{"author":[{"@pid":"61/3906-12","text":"Yang Xu 0012"},{"@pid":"49/1245-9","text":"Jia Liu 0009"},{"@pid":"93/5588","text":"Ruo Ando"},{"@pid":"03/5898","text":"Norio Shiratori"}]},"title":"End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks.","venue":"NaNA","pages":"87-92","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/XuLAS17","doi":"10.1109/NANA.2017.9","ee":"https://doi.org/10.1109/NaNA.2017.9","url":"https://dblp.org/rec/conf/nana/XuLAS17"}, "url":"URL#2994955" }, { "@score":"1", "@id":"2994956", "info":{"authors":{"author":[{"@pid":"200/0781","text":"Mu Yan"},{"@pid":"221/1577","text":"Yatong Wang"},{"@pid":"46/308","text":"Su Wu"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLAN.","venue":"NaNA","pages":"196-202","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/YanWW0Q17","doi":"10.1109/NANA.2017.19","ee":"https://doi.org/10.1109/NaNA.2017.19","url":"https://dblp.org/rec/conf/nana/YanWW0Q17"}, "url":"URL#2994956" }, { "@score":"1", "@id":"2994957", "info":{"authors":{"author":[{"@pid":"89/5901","text":"Jun Yan"},{"@pid":"37/1629","text":"Lin Zhang"},{"@pid":"221/1535","text":"Wuchao Shi"},{"@pid":"95/6046","text":"Jing Hu"},{"@pid":"150/2652","text":"Zhenqiang Wu"}]},"title":"Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social Network.","venue":"NaNA","pages":"190-195","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/YanZSHW17","doi":"10.1109/NANA.2017.34","ee":"https://doi.org/10.1109/NaNA.2017.34","url":"https://dblp.org/rec/conf/nana/YanZSHW17"}, "url":"URL#2994957" }, { "@score":"1", "@id":"2994958", "info":{"authors":{"author":[{"@pid":"77/377-10","text":"Bin Yang 0010"},{"@pid":"150/2652","text":"Zhenqiang Wu"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"51/2259","text":"Yuanyuan Fan"}]},"title":"Multicast Delivery Delay in General Two-Hop Relay MANETs.","venue":"NaNA","pages":"100-103","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/YangWSF17","doi":"10.1109/NANA.2017.44","ee":"https://doi.org/10.1109/NaNA.2017.44","url":"https://dblp.org/rec/conf/nana/YangWSF17"}, "url":"URL#2994958" }, { "@score":"1", "@id":"2994959", "info":{"authors":{"author":[{"@pid":"221/1569","text":"Mohamed Ben Zeglam"},{"@pid":"53/4284","text":"Pin-Han Ho"},{"@pid":"131/7378","text":"Limei Peng"},{"@pid":"221/1513","text":"Shuiping Jie"}]},"title":"A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical Networks.","venue":"NaNA","pages":"75-79","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZeglamHPJ17","doi":"10.1109/NANA.2017.37","ee":"https://doi.org/10.1109/NaNA.2017.37","url":"https://dblp.org/rec/conf/nana/ZeglamHPJ17"}, "url":"URL#2994959" }, { "@score":"1", "@id":"2994960", "info":{"authors":{"author":[{"@pid":"199/8528","text":"You Zhai"},{"@pid":"46/241","text":"Guangquan Xu"},{"@pid":"57/3892","text":"Yao Zhang"}]},"title":"A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature.","venue":"NaNA","pages":"279-285","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhaiXZ17","doi":"10.1109/NANA.2017.49","ee":"https://doi.org/10.1109/NaNA.2017.49","url":"https://dblp.org/rec/conf/nana/ZhaiXZ17"}, "url":"URL#2994960" }, { "@score":"1", "@id":"2994961", "info":{"authors":{"author":[{"@pid":"194/4764","text":"Xiaoci Zhang"},{"@pid":"61/3467","text":"Naijie Gu"},{"@pid":"201/8049","text":"Robail Yasrab"},{"@pid":"75/639","text":"Hong Ye"}]},"title":"GT-SGD: A Novel Gradient Synchronization Algorithm in Training Distributed Recurrent Neural Network Language Models.","venue":"NaNA","pages":"274-278","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhangGYY17","doi":"10.1109/NANA.2017.22","ee":"https://doi.org/10.1109/NaNA.2017.22","url":"https://dblp.org/rec/conf/nana/ZhangGYY17"}, "url":"URL#2994961" }, { "@score":"1", "@id":"2994962", "info":{"authors":{"author":[{"@pid":"221/1632","text":"Siqie Zhang"},{"@pid":"83/2914","text":"Changle Li"},{"@pid":"16/1951","text":"Xun Zhou"}]},"title":"A Novel Approach for Mining Road Information from Low Precision GPS Data.","venue":"NaNA","pages":"268-273","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhangLZ17","doi":"10.1109/NANA.2017.36","ee":"https://doi.org/10.1109/NaNA.2017.36","url":"https://dblp.org/rec/conf/nana/ZhangLZ17"}, "url":"URL#2994962" }, { "@score":"1", "@id":"2994963", "info":{"authors":{"author":[{"@pid":"15/4777-29","text":"Tao Zhang 0029"},{"@pid":"09/8502-1","text":"Yongzhi Wang 0001"},{"@pid":"23/8127","text":"Guangxia Li"},{"@pid":"65/7760","text":"Jingjing Guo"},{"@pid":"181/2688-11","text":"Qi Li 0011"}]},"title":"Reputation Propagation for Web Service Composition: A Shapley Value Approach.","venue":"NaNA","pages":"232-238","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhangWLGL17","doi":"10.1109/NANA.2017.52","ee":"https://doi.org/10.1109/NaNA.2017.52","url":"https://dblp.org/rec/conf/nana/ZhangWLGL17"}, "url":"URL#2994963" }, { "@score":"1", "@id":"2994964", "info":{"authors":{"author":[{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"94/3077-1","text":"Dong Zheng 0001"},{"@pid":"167/3132","text":"Qinglan Zhao"},{"@pid":"74/11196","text":"Chengzhe Lai"},{"@pid":"90/6613","text":"Fang Ren"}]},"title":"PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.","venue":"NaNA","pages":"11-16","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhangZZLR17","doi":"10.1109/NANA.2017.26","ee":"https://doi.org/10.1109/NaNA.2017.26","url":"https://dblp.org/rec/conf/nana/ZhangZZLR17"}, "url":"URL#2994964" }, { "@score":"1", "@id":"2994965", "info":{"authors":{"author":[{"@pid":"150/2979","text":"Yuyan Zhao"},{"@pid":"68/10364","text":"Haibao Chen"},{"@pid":"61/5354","text":"Shenghui Zhao"},{"@pid":"76/3854","text":"Yihong Wang"}]},"title":"The Storage of Virtual Machine Disk Image in Cloud Computing: A Survey.","venue":"NaNA","pages":"263-267","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhaoCZW17","doi":"10.1109/NANA.2017.42","ee":"https://doi.org/10.1109/NaNA.2017.42","url":"https://dblp.org/rec/conf/nana/ZhaoCZW17"}, "url":"URL#2994965" }, { "@score":"1", "@id":"2994966", "info":{"authors":{"author":[{"@pid":"61/6097","text":"Yajing Zhao"},{"@pid":"02/736-39","text":"Jing Wang 0039"},{"@pid":"97/8704-94","text":"Lei Zhang 0094"},{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"80/6406-1","text":"Qi Qi 0001"}]},"title":"Performance Evaluation and Optimization for Android-Based Web Server.","venue":"NaNA","pages":"246-251","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhaoWZW017","doi":"10.1109/NANA.2017.66","ee":"https://doi.org/10.1109/NaNA.2017.66","url":"https://dblp.org/rec/conf/nana/ZhaoWZW017"}, "url":"URL#2994966" }, { "@score":"1", "@id":"2994967", "info":{"authors":{"author":[{"@pid":"99/549-11","text":"Lei Zhu 0011"},{"@pid":"74/11326-1","text":"Yanxiao Liu 0001"},{"@pid":"60/7475","text":"Yichuan Wang"},{"@pid":"161/8558","text":"Wenjiang Ji"},{"@pid":"34/6545-1","text":"Xinhong Hei 0001"},{"@pid":"13/7811","text":"Quanzhu Yao"},{"@pid":"50/1222-3","text":"Xiaoyan Zhu 0003"}]},"title":"Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.","venue":"NaNA","pages":"1-4","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/nana/ZhuLWJ0YZ17","doi":"10.1109/NANA.2017.62","ee":"https://doi.org/10.1109/NaNA.2017.62","url":"https://dblp.org/rec/conf/nana/ZhuLWJ0YZ17"}, "url":"URL#2994967" }, { "@score":"1", "@id":"3035913", "info":{"title":"International Conference on Networking and Network Applications, NaNA 2017, Kathmandu City, Nepal, October 16-19, 2017","venue":"NaNA","publisher":"IEEE Computer Society","year":"2017","type":"Editorship","key":"conf/nana/2017","ee":"https://ieeexplore.ieee.org/xpl/conhome/8246105/proceeding","url":"https://dblp.org/rec/conf/nana/2017"}, "url":"URL#3035913" } ] } } } )