default search action
Jiang Li 0009
Person information
- affiliation: Howard University, Washington, DC, USA
Other persons with the same name
- Jiang Li — disambiguation page
- Jiang Li 0001 — Old Dominion University, Norfolk, VA, USA
- Jiang Li 0002 — Nanjing University, School of Information Management, Nanjing, China (and 1 more)
- Jiang Li 0003 — Northeast Electric Power University, School of Electrical Engineering, Jilin, China
- Jiang Li 0004 — Chongqing University, College of Computer Science, Chongqing, China
- Jiang Li 0005 — Tsinghua University, State Key Laboratory of Hydroscience and Engineering, Beijing, China
- Jiang Li 0006 — California Institute of Technology, Watson Laboratory of Applied Physics, Pasadena, CA, USA
- Jiang Li 0007 — Tokyo University of Agriculture and Technology, Tokyo, Japan
- Jiang Li 0008 — Microsoft Research Asia, Beijing, China
- Jiang Li 0010 — Griffith University, Gold Coast, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j13]Bimal Ghimire, Danda B. Rawat, Chunmei Liu, Jiang Li:
Sharding-Enabled Blockchain for Software-Defined Internet of Unmanned Vehicles in the Battlefield. IEEE Netw. 35(1): 101-107 (2021) - [c30]Earl Tankard, Christopher Flowers, Jiang Li, Danda B. Rawat:
Toward Bias Analysis Using Tweets and Natural Language Processing. CCNC 2021: 1-3 - [c29]Aashma Uprety, Danda B. Rawat, Jiang Li:
Privacy Preserving Misbehavior Detection in IoV Using Federated Machine Learning. CCNC 2021: 1-6
2010 – 2019
- 2018
- [c28]Abdulhamid Adebayo, Danda B. Rawat, Jiang Li, Moses Garuba:
Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR framework. INFOCOM Workshops 2018: 842-847 - [c27]Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li:
Optimizing Message Ferry Scheduling in a DTN. MobiWac 2018: 113-117 - 2015
- [c26]Anteneh Girma, Moses Garuba, Jiang Li:
Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics. ITNG 2015: 206-211 - [c25]Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu:
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. ITNG 2015: 212-217 - 2013
- [j12]Jiazhen Zhou, Sankardas Roy, Jiang Li, Rose Qingyang Hu, Yi Qian:
Minimizing the Average Delay of Messages in Pigeon Networks. IEEE Trans. Commun. 61(8): 3349-3361 (2013) - [j11]Hui Guo, Jiang Li, Rose Qingyang Hu, Yi Qian:
Homing-pigeon-based messaging: multiple pigeon-assisted delivery in delay-tolerant networks. Wirel. Commun. Mob. Comput. 13(8): 719-733 (2013) - 2012
- [j10]Jiazhen Zhou, Jiang Li, Yi Qian, Sankardas Roy, Kenneth Mitchell:
Quasi-Optimal Dual-Phase Scheduling for Pigeon Networks. IEEE Trans. Veh. Technol. 61(9): 4157-4169 (2012) - [c24]Jiazhen Zhou, Jiang Li, Rose Qingyang Hu, Yi Qian:
Study of visiting frequency in a delay tolerant network. ICC 2012: 58-62 - [c23]Jiazhen Zhou, Sankardas Roy, Jiang Li, Yi Qian:
A geographical partitioning-based pigeon assignment in a pigeon network. ICC 2012: 601-605 - 2010
- [j9]Jiazhen Zhou, Jiang Li, Legand L. Burge III:
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j8]Jiazhen Zhou, Jiang Li, Kenneth Mitchell:
Adaptive Scheduling of Message Carrying in a Pigeon Network. J. Ubiquitous Syst. Pervasive Networks 1(1): 29-37 (2010) - [j7]Hui Guo, Jiang Li, Yi Qian:
HoP-DTN: Modeling and Evaluation of Homing-Pigeon-Based Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 59(2): 857-868 (2010) - [j6]Kai Xing, Xiuzhen Cheng, Jiang Li, Min Song:
Location-centric storage and query in wireless sensor networks. Wirel. Networks 16(4): 955-967 (2010) - [c22]Ye Tian, Jiang Li:
Modeling Contacts and Mobility for Wireless Mobile Networks. UIC 2010: 489-503 - [c21]Ye Tian, Jiang Li:
Heterogeneity of Device Contact Process in Pocket Switched Networks. WASA 2010: 157-166
2000 – 2009
- 2009
- [j5]Hui Guo, Kwok-Tung Lo, Yi Qian, Jiang Li:
Peer-to-Peer Live Video Distribution under Heterogeneous Bandwidth Constraints. IEEE Trans. Parallel Distributed Syst. 20(2): 233-245 (2009) - [c20]Bin Sun, Fei Fan, Jiang Li, Legand L. Burge III:
A Study on Routing Algorithm of Mass Transit. CSIE (2) 2009: 686-690 - [c19]Hui Guo, Jiang Li, Yi Qian:
Modeling and Evaluation of Homing-Pigeon Based Delay Tolerant Networks with Periodic Scheduling. ICC 2009: 1-5 - [c18]Bin Sun, Wang Chuan, Jiang Li, Legand L. Burge III:
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. ITNG 2009: 350-355 - [c17]Pierrot Chery, Jiang Li, Legand L. Burge III:
Characterizing the association between mobile users using wireless network traces. Richard Tapia Celebration of Diversity in Computing Conference 2009: 70-74 - [c16]Jiazhen Zhou, Jiang Li, Legand L. Burge III:
Dynamic Scheduling of Pigeons for Delay Constrained Applications. WASA 2009: 449-458 - 2008
- [c15]Jiang Li, Moses Garuba:
Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. ITNG 2008: 557-562 - [c14]Moses Garuba, Jiang Li, Zhenqiang Yi:
Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. ITNG 2008: 587-591 - [c13]Jiang Li, Moses Garuba, Legand L. Burge III:
Multicast Using Static Trees. ITNG 2008: 1046-1052 - [c12]Hui Guo, Jiang Li, Yi Qian:
HoP: Pigeon-Assisted Forwarding in Partitioned Wireless Networks. WASA 2008: 72-83 - 2007
- [j4]Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman:
Generalized multicast congestion control. Comput. Networks 51(6): 1421-1443 (2007) - [c11]Hui Guo, Kwok-Tung Lo, Jiang Li:
An Efficient Caching Scheme for On-Demand Streaming Service on Overlay Networks. CCNC 2007: 322-326 - [c10]Moses Garuba, Jiang Li, Legand L. Burge III:
Comparative Analysis of Email Filtering Technologies. ITNG 2007: 785-789 - [c9]Moses Garuba, Jiang Li:
Preventing parameterized vulnerability in Web based applications. ITNG 2007: 790-793 - [c8]Hui Guo, Kwok-Tung Lo, Jiang Li:
LSONet: A Case of Layer-Encoded Video Transmission in Overlay Networks. MMM (1) 2007: 485-494 - 2006
- [j3]Jiang Li, Murat Yuksel, Shivkumar Kalyanaraman:
Explicit rate multicast congestion control. Comput. Networks 50(15): 2614-2640 (2006) - 2005
- [c7]Fengguang An, Xiuzhen Cheng, Jose Manny Rivera, Jiang Li, Z. Cheng:
PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. ICCNMC 2005: 992-1001 - [c6]Jiang Li, Legand L. Burge III, Marcus Alfred, Kathleen Kaplan:
A Probabilistic Routing Algorithm for DTNs of Randomly Moving Nodes. ICWN 2005: 196-202 - [c5]Kai Xing, Xiuzhen Cheng, Jiang Li:
Location-centric storage for sensor networks. MASS 2005: 10 - [c4]Joseph Gill, Charles Torsoo, Legand L. Burge III, Jiang Li:
IEEE 1394: Another Low Cost Viable Alternative Interconnect for High Performance Computing. PDPTA 2005: 1350-1354 - 2004
- [j2]Jiang Li, Shivkumar Kalyanaraman:
MCA: an end-to-end multicast congestion avoidance scheme with feedback suppression. Comput. Commun. 27(13): 1264-1277 (2004) - [c3]Joseph Gill, Legand L. Burge III, Jiang Li:
Floating Parasitic Data Storage. International Conference on Internet Computing 2004: 960-965 - 2003
- [c2]Jiang Li, Shivkumar Kalyanaraman:
Generalized Multicast Congestion Control. An Efficient Multi-rate Scheme Using Single-rate Control. Networked Group Communication 2003: 155-167 - 2002
- [j1]Puneet Thapliyal, Sidhartha, Jiang Li, Shivkumar Kalyanaraman:
LE-SBCC: Loss-Event Oriented Source-Based Multicast Congestion Control. Multim. Tools Appl. 17(2-3): 257-294 (2002) - [c1]Jiang Li, Shivkumar Kalyanaraman:
MCA: a rate-based end-to-end multicast congestion avoidance scheme. ICC 2002: 2341-2347
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint