default search action
Xiaolin Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j94]Weiqiao Zhu, Yang Yang, Yipin Zhang, Xiaolin Chang:
Can Migration-Based Dynamic Platform Technique Work Effectively: A Quantitative Analysis Perspective. IEEE Access 12: 138319-138328 (2024) - [j93]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecur. 7(1): 5 (2024) - [j92]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang:
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. IEEE Internet Things J. 11(1): 1374-1384 (2024) - [j91]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Zhi Chen, Junchao Fan:
PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning. IEEE Internet Things J. 11(10): 17960-17974 (2024) - [j90]Yanling Wang, Xiaolin Chang, Haoran Zhu, Jianhua Wang, Yanwei Gong, Lin Li:
Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC. IEEE Trans. Computers 73(4): 1138-1151 (2024) - [j89]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lei Han, Zhi Chen:
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network. IEEE Trans. Netw. Sci. Eng. 11(3): 2586-2595 (2024) - [j88]Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus. IEEE Trans. Netw. Serv. Manag. 21(1): 507-516 (2024) - [j87]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake. IEEE Trans. Netw. Serv. Manag. 21(2): 1777-1790 (2024) - [j86]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lei Han, Zhi Chen:
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis. IEEE Trans. Serv. Comput. 17(5): 2488-2501 (2024) - [c85]Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Performance of Ethereum 2.0-Like Consensus Under Single-Slot Finality. ICC 2024: 515-520 - [c84]Haoran Zhu, Jing Bai, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
On Dependability of Heterogeneous Distributed Oracle System in Blockchain. ICC 2024: 782-787 - [c83]Jianhua Wang, Xuyang Lei, Min Liang, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective. ICC 2024: 4275-4280 - [c82]Farzaneh Abdolahi, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Performance Assessment of Vehicular Cloud Systems: An Analytical Approach Using M/G/m Queueing Model. SM 2024: 177-182 - [i24]Yuqi Guo, Lin Li, Zhongxiang Zheng, Hanrui Yun, Ruoyan Zhang, Xiaolin Chang, Zhixuan Gao:
Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption. CoRR abs/2403.11519 (2024) - [i23]Jingkai Mao, Haoran Zhu, Junchao Fan, Lin Li, Xiaolin Chang:
Towards Trust Proof for Secure Confidential Virtual Machines. CoRR abs/2405.01030 (2024) - [i22]Zhenshuai Yue, Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan:
MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation. CoRR abs/2405.04046 (2024) - [i21]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service. CoRR abs/2407.11320 (2024) - [i20]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan, Kaiwen Wang:
Towards Lightweight and Privacy-preserving Data Provision in Digital Forensics for Driverless Taxi. CoRR abs/2409.14039 (2024) - 2023
- [j85]Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiao Liang, Shenshen Zhou, Xiaolin Chang:
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach. Comput. J. 66(10): 2339-2354 (2023) - [j84]Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li, Xiaolin Chang:
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis. Cybersecur. 6(1): 7 (2023) - [j83]Yaru Li, Lin Li, Jing Bai, Xiaolin Chang, Yingying Yao, Peide Liu:
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View. Int. J. Comput. Intell. Syst. 16(1): 52 (2023) - [j82]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan, Yating Liu:
Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach. IEEE Internet Things J. 10(12): 10497-10509 (2023) - [j81]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism. IEEE Internet Things J. 10(13): 11440-11452 (2023) - [j80]Jing Bai, Yaru Li, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi:
Understanding NFV-Enabled Vehicle Platooning Application: A Dependability View. IEEE Trans. Cloud Comput. 11(4): 3367-3380 (2023) - [j79]Jing Bai, Xiaolin Chang, Fumio Machida, Lili Jiang, Zhen Han, Kishor S. Trivedi:
Impact of Service Function Aging on the Dependability for MEC Service Function Chain. IEEE Trans. Dependable Secur. Comput. 20(4): 2811-2824 (2023) - [j78]Shiyuan Tong, Yun Liu, Jelena V. Misic, Xiaolin Chang, Zhenjiang Zhang, Chunyan Wang:
Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm. IEEE Trans. Intell. Transp. Syst. 24(11): 12933-12948 (2023) - [j77]Feng Sun, Zhenjiang Zhang, Xiaolin Chang, Kaige Zhu:
Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading. IEEE Trans. Netw. Serv. Manag. 20(2): 1572-1586 (2023) - [j76]Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi, Yaru Li:
Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT. IEEE Trans. Serv. Comput. 16(4): 2769-2785 (2023) - [j75]Shiyuan Tong, Yun Liu, Xiaolin Chang, Jelena V. Misic, Zhenjiang Zhang:
Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model. IEEE Trans. Veh. Technol. 72(2): 2202-2215 (2023) - [j74]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Design of Proof-of-Stake PBFT Algorithm for IoT Environments. IEEE Trans. Veh. Technol. 72(2): 2497-2510 (2023) - [j73]Jing Bai, Xiaolin Chang, Ricardo J. Rodríguez, Kishor S. Trivedi, Shupan Li:
Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach. IEEE Trans. Veh. Technol. 72(4): 5181-5194 (2023) - [c81]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao, Liwei Wang:
SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data. GLOBECOM 2023: 2190-2195 - [c80]Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Analytical evaluation of three attacks on Ethereum. GLOBECOM 2023: 3191-3196 - [c79]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
PBFT with Gated Prioritized Block Cycles. ICC 2023: 609-614 - [c78]Jelena V. Misic, Vojislav B. Misic, Elham Amini, Zahra Mohtajollah, Xiaolin Chang:
Fast Cycle Multiple Entry PBFT Consensus. ICC 2023: 3658-3663 - [c77]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse. ICC 2023: 6318-6323 - [c76]Haoran Zhu, Zhi Chen, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Jing Bai:
Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain. ICC 2023: 6553-6558 - [c75]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Trust and Rewards in a Two-Tier Consensus Architecture. ICNC 2023: 95-100 - [i19]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lei Han, Zhi Chen:
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis. CoRR abs/2302.00210 (2023) - [i18]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods. CoRR abs/2303.10877 (2023) - [i17]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network. CoRR abs/2304.06963 (2023) - [i16]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lin Li, Yingying Yao:
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning. CoRR abs/2306.00674 (2023) - [i15]Yanling Wang, Xiaolin Chang, Haoran Zhu, Jianhua Wang, Yanwei Gong, Lin Li:
Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC. CoRR abs/2307.04375 (2023) - [i14]Lina Liu, Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi, Haoran Zhu:
Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain. CoRR abs/2308.12748 (2023) - [i13]Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi:
Understanding Container-based Services under Software Aging: Dependability and Performance Views. CoRR abs/2308.12784 (2023) - [i12]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Zhi Chen, Junchao Fan:
PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning. CoRR abs/2309.13864 (2023) - [i11]Yingfan Zong, Jing Bai, Xiaolin Chang, Fumio Machida, Yingsi Zhao:
On Metaverse Application Dependability Analysis. CoRR abs/2310.03318 (2023) - [i10]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao:
RSMS: Towards Reliable and Secure Metaverse Service Provision. CoRR abs/2310.05033 (2023) - 2022
- [j72]Wen Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Yanling Wang, Lin Li, Xiaolin Chang:
Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment. IEEE Access 10: 86953-86961 (2022) - [j71]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Hong Wang:
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks. IEEE Access 10: 121120-121132 (2022) - [j70]Qiang Yue, Wei Zhou, Qiao Wang, Yuntian Feng, Gang Ma, Xiaolin Chang:
An adaptive phase-field model based on bilinear elements for tensile-compressive-shear fracture. Comput. Math. Appl. 105: 112-135 (2022) - [j69]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j68]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j67]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [j66]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Scalable Self-Sovereign Identity Architecture. IEEE Netw. 36(3): 114-121 (2022) - [j65]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Reducing the number of transaction messages in bitcoin. Peer-to-Peer Netw. Appl. 15(1): 768-782 (2022) - [j64]Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jing Bai:
Understanding MEC empowered vehicle task offloading performance in 6G networks. Peer-to-Peer Netw. Appl. 15(2): 1090-1104 (2022) - [j63]Jing Bai, Xiaolin Chang, Fumio Machida, Zhen Han, Yang Xu, Kishor S. Trivedi:
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective. Peer-to-Peer Netw. Appl. 15(4): 1923-1938 (2022) - [j62]Junchao Fan, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics. Peer-to-Peer Netw. Appl. 15(5): 2376-2389 (2022) - [j61]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Revisiting FAW attack in an imperfect PoW blockchain system. Peer-to-Peer Netw. Appl. 15(5): 2430-2443 (2022) - [j60]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
A high performance two-layer consensus architecture for blockchain-based IoT systems. Peer-to-Peer Netw. Appl. 15(5): 2444-2456 (2022) - [j59]Jing Bai, Xiaolin Chang, Gao-Rong Ning, Zhenjiang Zhang, Kishor S. Trivedi:
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach. IEEE Trans. Cloud Comput. 10(3): 2118-2130 (2022) - [j58]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment. IEEE Trans. Green Commun. Netw. 6(3): 1660-1670 (2022) - [j57]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack. IEEE Trans. Netw. Serv. Manag. 19(2): 1142-1158 (2022) - [j56]Xiaolin Chang, Yu Shi, Zhenjiang Zhang, Zhen Xu, Kishor S. Trivedi:
Job Completion Time Under Migration-Based Dynamic Platform Technique. IEEE Trans. Serv. Comput. 15(3): 1345-1357 (2022) - [j55]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT. IEEE Trans. Veh. Technol. 71(3): 2293-2304 (2022) - [j54]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan, Jing Bai:
Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization. IEEE Trans. Veh. Technol. 71(10): 10570-10583 (2022) - [c74]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Haoran Zhu:
Evaluating fork after withholding (FAW) attack in Bitcoin. CF 2022: 67-74 - [c73]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting. GLOBECOM 2022: 6253-6258 - [c72]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Proof of Stake Voting in Multiple Entry PBFT System. ICC 2022: 38-43 - [c71]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems. ICC 2022: 3418-3423 - [c70]Haorao Zhu, Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach. ICC 2022: 4199-4204 - [c69]Xiaolin Chang, Shaofu Lin, Xiliang Liu:
TISM-CAE: A Fast Unsupervised Learning Method for Trajectory Similarity Measure via Convolutional Auto-Encoder. ICCSIE 2022: 140-148 - [c68]Hongyue Kang, Wei Li, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Dual-UAV Aided Secure Dynamic G2U Communication. ISCC 2022: 1-6 - [c67]Jianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang:
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning. ISCC 2022: 1-6 - [c66]Wen Wang, Junchao Fan, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Hongyue Kang, Xiaolin Chang:
Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach. ISPA/BDCloud/SocialCom/SustainCom 2022: 82-89 - [c65]Minghao Fu, Haoran Zhu, Jelena V. Misic, Vojislav B. Misic, Jing Bai, Xiaolin Chang:
Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain. ISPA/BDCloud/SocialCom/SustainCom 2022: 937-944 - [c64]Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. SACMAT 2022: 49-60 - [c63]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2421-2427 - [i9]Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. IACR Cryptol. ePrint Arch. 2022: 1281 (2022) - 2021
- [j53]Si Chen, Lin Li, Wenyu Zhang, Xiaolin Chang, Zhen Han:
BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System. IEEE Access 9: 30124-30134 (2021) - [j52]Yingying Yao, Xiaolin Chang, Jianhua Wang, Jelena V. Misic, Vojislav B. Misic, Hong Wang:
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X. Ad Hoc Networks 123: 102695 (2021) - [j51]Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang:
LSGAN-AT: enhancing malware detector robustness against adversarial examples. Cybersecur. 4(1): 38 (2021) - [j50]Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Performance analysis of heterogeneous cloud-edge services: A modeling approach. Peer-to-Peer Netw. Appl. 14(1): 151-163 (2021) - [j49]Yipin Zhang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yutong Cai:
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach. Peer-to-Peer Netw. Appl. 14(3): 1207-1217 (2021) - [j48]Lun Li, Xiaolin Chang, Jingxian Liu, Jiqiang Liu, Zhu Han:
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4181-4193 (2021) - [j47]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 3073-3086 (2021) - [j46]Hongyue Kang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic:
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks. IEEE Trans. Netw. Serv. Manag. 18(3): 3079-3091 (2021) - [j45]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
Adapting PBFT for Use With Blockchain-Enabled IoT Systems. IEEE Trans. Veh. Technol. 70(1): 33-48 (2021) - [j44]Jing Bai, Xiaolin Chang, Kishor S. Trivedi, Zhen Han:
Resilience-Driven Quantitative Analysis of Vehicle Platooning Service. IEEE Trans. Veh. Technol. 70(6): 5378-5389 (2021) - [c62]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang:
Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles. BigCom 2021: 14-21 - [c61]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper. CCECE 2021: 1-6 - [c60]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Priyanka Sarode:
Voting control in multiple entry PBFT blockchain systems for IoT. CCECE 2021: 1-6 - [c59]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Trade-offs in large blockchain-based IoT system design. GLOBECOM 2021: 1-6 - [c58]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications. GLOBECOM 2021: 1-6 - [c57]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang, Jianan Zhang:
Mal-LSGAN: An Effective Adversarial Malware Example Generation Model. GLOBECOM 2021: 1-6 - [c56]Haytham Qushtom, Jelena V. Misic, Xiaolin Chang, Vojislav B. Misic:
A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording. ICC 2021: 1-6 - [c55]Yingying Yao, Zhendong Zhao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang:
A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System. ICC 2021: 1-6 - [c54]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan:
Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven. ICSOC 2021: 663-671 - [i8]Yuzhou Lin, Xiaolin Chang:
Towards Interpretable Ensemble Learning for Image-based Malware Detection. CoRR abs/2101.04889 (2021) - [i7]Yuzhou Lin, Xiaolin Chang:
Towards interpreting ML-based automated malware detection models: a survey. CoRR abs/2101.06232 (2021) - [i6]Yuzhou Lin, Xiaolin Chang:
A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion. CoRR abs/2101.08969 (2021) - [i5]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs/2101.09930 (2021) - [i4]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i3]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - [i2]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum. CoRR abs/2112.02588 (2021) - 2020
- [j43]Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi, Zhen Han:
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access 8: 6448-6459 (2020) - [j42]Zhi Chen, Xiaolin Chang, Zhen Han, Yang Yang:
Numerical Evaluation of Job Finish Time Under MTD Environment. IEEE Access 8: 11437-11446 (2020) - [j41]Yipin Zhang, Xiaolin Chang, Yuzhou Lin, Jelena V. Misic, Vojislav B. Misic:
Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification. IEEE Access 8: 44652-44660 (2020) - [j40]Lili Jiang, Xiaolin Chang, Jing Bai, Jelena V. Misic, Vojislav B. Misic, Zhi Chen:
Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives. IEEE Access 8: 89562-89574 (2020) - [j39]Lili Jiang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic:
Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies. Comput. J. 63(10): 1564-1583 (2020) - [j38]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput. Secur. 97: 101956 (2020) - [j37]Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecur. 3(1): 23 (2020) - [j36]Lun Li, Jiqiang Liu, Xiaolin Chang, Tianhao Liu, Jingxian Liu:
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 (2020) - [j35]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Performance Modeling of Linux Network System with Open vSwitch. Peer-to-Peer Netw. Appl. 13(1): 151-162 (2020) - [j34]Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic:
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. Peer-to-Peer Netw. Appl. 13(3): 1014-1025 (2020) - [j33]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks. IEEE Trans. Cogn. Commun. Netw. 6(2): 597-606 (2020) - [j32]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Saeideh Gholamrezazadeh Motlagh, M. Zulfiker Ali:
Modeling of Bitcoin's Blockchain Delivery Network. IEEE Trans. Netw. Sci. Eng. 7(3): 1368-1381 (2020) - [j31]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks. IEEE Trans. Netw. Sci. Eng. 7(4): 3135-3147 (2020) - [j30]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing. IEEE Trans. Veh. Technol. 69(2): 2185-2194 (2020) - [c53]Zhi Chen, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han:
Model-based Performance Evaluation of a Moving Target Defense System. GLOBECOM 2020: 1-6 - [c52]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin. GLOBECOM 2020: 1-6 - [c51]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
Multiple entry point PBFT for IoT systems. GLOBECOM 2020: 1-6 - [c50]Haoran Zhu, Jing Bai, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang:
Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability. ICA3PP (2) 2020: 619-632 - [c49]Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading. ICA3PP (1) 2020: 695-709 - [c48]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
On the Benefits of Compact Blocks in Bitcoin. ICC 2020: 1-6 - [c47]Hongyue Kang, Bo Liu, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks. ICNC 2020: 513-517 - [c46]Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading. ISPA/BDCloud/SocialCom/SustainCom 2020: 175-182 - [c45]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Comparison of single- and multiple entry point PBFT for IoT blockchain systems. VTC Fall 2020: 1-6 - [c44]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
PBFT-based ordering service for IoT domains. VTC Fall 2020: 1-6 - [i1]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao, Zhi Chen:
Stochastic Modeling Approaches for Analyzing Blockchain: A Survey. CoRR abs/2009.05945 (2020)
2010 – 2019
- 2019
- [j29]Yixiang Wang, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic, ShaoHua Lv, Xiaolin Chang:
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples. IEEE Access 7: 152766-152776 (2019) - [j28]Qiao Wang, Wei Zhou, Yuntian Feng, Gang Ma, Yonggang Cheng, Xiaolin Chang:
An adaptive orthogonal improved interpolating moving least-square method and a new boundary element-free method. Appl. Math. Comput. 353: 347-370 (2019) - [j27]Qiao Wang, Wei Zhou, Yonggang Cheng, Gang Ma, Xiaolin Chang:
NURBS-enhanced line integration boundary element method for 2D elasticity problems with body forces. Comput. Math. Appl. 77(7): 2006-2028 (2019) - [j26]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Reliable and Secure Vehicular Fog Service Provision. IEEE Internet Things J. 6(1): 734-743 (2019) - [j25]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lin Li:
BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services. IEEE Internet Things J. 6(2): 3775-3784 (2019) - [j24]Xiaolin Chang, Yongwen Fan, Weijun Zhu, Yang Liu:
基于拟态防御的管理信息系统 (Management Information System Based on Mimic Defense). 计算机科学 46(11A): 438-441 (2019) - [j23]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Data Lifetime Estimation in a Multicast-Based CoAP Proxy. Open J. Internet Things 5(1): 150-162 (2019) - [j22]Yu Shi, Xiaolin Chang, Ricardo J. Rodríguez, Zhenjiang Zhang, Kishor S. Trivedi:
Quantitative security analysis of a dynamic network system under lateral movement-based attacks. Reliab. Eng. Syst. Saf. 183: 213-225 (2019) - [c43]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network. Blockchain 2019: 212-219 - [c42]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. CF 2019: 211-214 - [c41]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. GLOBECOM 2019: 1-6 - [c40]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Zhi Chen, Bo Liu:
Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF. GLOBECOM 2019: 1-6 - [c39]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Saeideh Gholamrezazadeh Motlagh, M. Zulfiker Ali:
Block Delivery Time in Bitcoin Distribution Network. ICC 2019: 1-7 - [c38]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Towards a Blockchain-Based Healthcare Information System : Invited Paper. ICCC 2019: 13-18 - [c37]Bo Liu, Xiaolin Chang, Yang Yang, Zhi Chen, Zhen Han:
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach. ISCC 2019: 1-6 - 2018
- [j21]Qiao Wang, Wei Zhou, Yonggang Cheng, Gang Ma, Xiaolin Chang, E. Chen:
NE-IIBEFM for problems with body forces: A seamless integration of the boundary type meshfree method and the NURBS boundary in CAD. Adv. Eng. Softw. 118: 1-17 (2018) - [j20]Qiao Wang, Wei Zhou, Yonggang Cheng, Gang Ma, Xiaolin Chang, Yu Miao, E. Chen:
Regularized moving least-square method and regularized improved interpolating moving least-square method with nonsingular moment matrices. Appl. Math. Comput. 325: 120-145 (2018) - [j19]Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang:
Modeling and Analysis of High Availability Techniques in a Virtualized System. Comput. J. 61(2): 180-198 (2018) - [j18]Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:
Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. Comput. J. 61(9): 1296-1305 (2018) - [j17]Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83: 1-13 (2018) - [j16]Xiaolin Chang, José M. Martínez, Kishor S. Trivedi:
Transient performance analysis of smart grid with dynamic power distribution. Inf. Sci. 422: 98-109 (2018) - [j15]Xiaolin Chang, Ruofan Xia, Jogesh K. Muppala, Kishor S. Trivedi, Jiqiang Liu:
Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload. IEEE Trans. Cloud Comput. 6(4): 991-1003 (2018) - [c36]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh. GLOBECOM 2018: 1-6 - [c35]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Kernel Based Estimation of Domain Parameters at IoT Proxy. GLOBECOM 2018: 1-6 - [c34]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Yang Yang:
Interest Relevance-Based Caching Design in Content-Centric Networking. ICA3PP (3) 2018: 661-671 - [c33]Xiaolin Chang, ShaoHua Lv, Ricardo J. Rodríguez, Kishor S. Trivedi:
Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System. ICCCN 2018: 1-6 - [c32]Yang Yang, Xiaolin Chang, Zhen Han, Lin Li:
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 346-353 - 2017
- [j14]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Zhi Chen:
Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking. IEEE Access 5: 19012-19022 (2017) - [j13]Qiao Wang, Wei Zhou, Yonggang Cheng, Gang Ma, Xiaolin Chang, Qiang Huang:
The Boundary Element Method with a Fast Multipole Accelerated Integration Technique for 3D Elastostatic Problems with Arbitrary Body Forces. J. Sci. Comput. 71(3): 1238-1264 (2017) - [j12]Yang Yang, Xiaolin Chang, Jiqiang Liu, Lin Li:
Towards Robust Green Virtual Cloud Data Center Provisioning. IEEE Trans. Cloud Comput. 5(2): 168-181 (2017) - [c31]Lin Li, Yingying Yao, Xiaolin Chang:
Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding. DSA 2017: 57-65 - [c30]Bo Liu, Xiaolin Chang, Bing Liu, Zhi Chen:
Performance Analysis Model for Fog Services under Multiple Resource Types. DSA 2017: 110-117 - [c29]Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, Andy J. Rindos:
Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric). SRDS 2017: 253-255 - 2016
- [j11]Wei Zhou, Shaolin Li, Zhiwei Zhou, Xiaolin Chang:
Remote Sensing of Deformation of a High Concrete-Faced Rockfill Dam Using InSAR: A Study of the Shuibuya Dam, China. Remote. Sens. 8(3): 255 (2016) - [j10]Wei Zhou, Shaolin Li, Zhiwei Zhou, Xiaolin Chang:
InSAR Observation and Numerical Modeling of the Earth-Dam Displacement of Shuibuya Dam (China). Remote. Sens. 8(10): 877 (2016) - [j9]Xiaolin Chang, Bin Wang, Jogesh K. Muppala, Jiqiang Liu:
Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Serv. Comput. 9(3): 408-420 (2016) - [c28]Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi:
Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. GraMSec@CSF 2016: 134-149 - [c27]Xiaolin Chang, Zhenjiang Zhang, Xiaodan Li, Kishor S. Trivedi:
Model-Based Survivability Analysis of a Virtualized System. LCN 2016: 611-614 - [c26]Zibo Zhou, Xiaolin Chang, Yang Yang, Lin Li:
Resource-Aware Virtual Network Parallel Embedding Based on Genetic Algorithm. PDCAT 2016: 81-86 - [c25]Tianju Wang, Xiaolin Chang, Bo Liu:
Performability Analysis for IaaS Cloud Data Center. PDCAT 2016: 91-94 - 2015
- [j8]Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu:
OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. Pract. Exp. 27(5): 1092-1109 (2015) - [j7]Bin Wang, Xiaolin Chang, Jiqiang Liu:
Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Commun. Lett. 19(4): 537-540 (2015) - 2014
- [c24]Xuanni Du, Xiaolin Chang:
Performance of AI algorithms for mining meaningful roles. IEEE Congress on Evolutionary Computation 2014: 2070-2076 - 2013
- [j6]Xiaolin Chang, Xiuming Mi, Jogesh K. Muppala:
Performance evaluation of artificial intelligence algorithms for virtual network embedding. Eng. Appl. Artif. Intell. 26(10): 2540-2550 (2013) - [c23]Wenbo Wang, Xiaolin Chang, Jiqiang Liu, Bin Wang:
Simulated annealing based resource allocation for cloud data centers. GECCO (Companion) 2013: 81-82 - [c22]Xiaolin Chang, Bin Wang, Jiqiang Liu, Wenbo Wang, Jogesh K. Muppala:
Green cloud virtual network provisioning based ant colony optimization. GECCO (Companion) 2013: 1553-1560 - [c21]Yang Yang, Xiaolin Chang, Xuanni Du, Jiqiang Liu, Lin Li:
Effective and efficient AI-based approaches to cloud resource provisioning. ICON 2013: 1-6 - 2012
- [j5]Gang Ma, Wei Zhou, Xiaolin Chang:
A novel particle swarm optimization algorithm based on particle migration. Appl. Math. Comput. 218(11): 6620-6626 (2012) - [c20]Xiaolin Chang, Bin Xing, Jogesh K. Muppala:
E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure. APSCC 2012: 341-344 - [c19]Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala:
Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718 - [c18]Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun:
Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29 - [c17]Xiaolin Chang, Bin Wang, Jiqiang Liu:
Network state aware virtual network parallel embedding. IPCCC 2012: 193-194 - [c16]Xiuming Mi, Xiaolin Chang, Jiqiang Liu, Longmei Sun, Bin Xing:
Embedding Virtual Infrastructure Based on Genetic Algorithm. PDCAT 2012: 239-244 - [c15]Xiaolin Chang, Bin Xing, Jiqiang Liu, Zhonglan Yuan, Longmei Sun:
Robust and Efficient Response to TCG TOCTOU Attacks in TPVM. PDCAT 2012: 323-328
2000 – 2009
- 2009
- [c14]Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala:
LWRM: A lightweight response mechanism for TCG TOCTOU attack. IPCCC 2009: 200-207 - 2008
- [j4]Wei Zhou, Changbin Zhou, Xiaolin Chang:
A contact model based on the SQP algorithm and engineering application. Appl. Math. Comput. 198(2): 916-924 (2008) - [c13]Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu:
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts. ICC 2008: 1835-1839 - 2007
- [c12]Xiaolin Chang, Jogesh K. Muppala, Wei Kong, Pengcheng Zou, Xiangkai Li, Zhongyuan Zheng:
A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks. IPCCC 2007: 117-124 - [c11]Xiaolin Chang, Jogesh K. Muppala, Pengcheng Zou, Xiangkai Li:
A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks. LCN 2007: 444-454 - 2006
- [j3]Xiaolin Chang, Jogesh K. Muppala:
A stable queue-based adaptive controller for improving AQM performance. Comput. Networks 50(13): 2204-2224 (2006) - [j2]Xiaolin Chang, Jogesh K. Muppala:
The effects of AQM on the performance of Assured Forwarding Service. Comput. Commun. 29(12): 2294-2307 (2006) - [c10]Xiaolin Chang, Xiaoyang Lin, Jogesh K. Muppala:
A control-theoretic approach to improving fairness in DCF based WLANs. IPCCC 2006 - 2005
- [j1]Xiaolin Chang, Jogesh K. Muppala:
On improving bandwidth assurance in AF-based DiffServ networks using a control theoretic approach. Comput. Networks 49(6): 816-839 (2005) - [c9]Xiaolin Chang, Jogesh K. Muppala:
Applying adaptive virtual queue to improve the performance of the assured forwarding service. ICC 2005: 100-104 - [c8]Xiaolin Chang, Jogesh K. Muppala:
The effects of AQM on the performance of assured forwarding services. IPCCC 2005: 321-328 - [c7]Xiaoyang Lin, Xiaolin Chang, Jogesh K. Muppala:
VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN. LCN 2005: 632-638 - [c6]Xiaolin Chang, Xiaoyang Lin, Jogesh K. Muppala:
An adaptive queue management mechanism for improving TCP fairness in the infrastructure WLAN. PIMRC 2005: 1941-1945 - 2004
- [c5]Xiaolin Chang, Jogesh K. Muppala:
An integral sliding mode based AQM mechanism for stable queue length. GLOBECOM 2004: 1698-1702 - [c4]Xiaolin Chang, Jogesh K. Muppala, Jen-te Yu:
A robust nonlinear PI controller for improving AQM performance. ICC 2004: 2272-2276 - [c3]Xiaolin Chang, Jogesh K. Muppala:
A robust PI controller for improving performance in the AF-based differentiated services network. IPCCC 2004: 487-494 - 2003
- [c2]Xiaolin Chang, Jogesh K. Muppala:
Adaptive marking threshold for improving bandwidth assurance in a differentiated services network. GLOBECOM 2003: 3073-3077 - [c1]Xiaolin Chang, Jogesh K. Muppala:
Adaptive marking threshold for assured forwarding services. ICCCN 2003: 325-330
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint