default search action
Yulong Shen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j160]Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen:
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction. Ad Hoc Networks 152: 103303 (2024) - [j159]Teng Li, Weiguo Lin, Ruichen Ma, Zhuo Ma, Yulong Shen, Jianfeng Ma:
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67(5) (2024) - [j158]Liushun Zhao, Deke Guo, Lailong Luo, Junjie Xie, Yulong Shen, Bangbang Ren:
Tiger Tally: A secure IoT data management approach based on redactable blockchain. Comput. Networks 248: 110500 (2024) - [j157]Liushun Zhao, Deke Guo, Lailong Luo, Yulong Shen, Bangbang Ren, Shi Zhu, Fangliao Yang:
Concordit: A credit-based incentive mechanism for permissioned redactable blockchain. Comput. Networks 255: 110848 (2024) - [j156]Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang:
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection. Comput. Commun. 219: 216-228 (2024) - [j155]Guoying Qiu, Guoming Tang, Chuandong Li, Lailong Luo, Deke Guo, Yulong Shen:
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective. ACM Comput. Surv. 56(3): 60:1-60:36 (2024) - [j154]Guoying Qiu, Guoming Tang, Chuandong Li, Deke Guo, Yulong Shen, Yan Gan:
Behavioral-Semantic Privacy Protection for Continual Social Mobility in Mobile-Internet Services. IEEE Internet Things J. 11(1): 462-477 (2024) - [j153]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. IEEE Internet Things J. 11(2): 3233-3249 (2024) - [j152]Guoying Qiu, Guoming Tang, Chuandong Li, Lailong Luo, Deke Guo, Yulong Shen:
A Complete and Comprehensive Semantic Perception of Mobile Traveling for Mobile Communication Services. IEEE Internet Things J. 11(3): 5467-5490 (2024) - [j151]Guoying Qiu, Guoming Tang, Chuandong Li, Deke Guo, Yulong Shen, Yan Gan:
DSG-BTra: Differentially Semantic-Generalized Behavioral Trajectory for Privacy-Preserving Mobile Internet Services. IEEE Internet Things J. 11(7): 13029-13038 (2024) - [j150]Anxiao Song, Haoshuo Li, Ke Cheng, Tao Zhang, Aijing Sun, Yulong Shen:
Guard-FL: An UMAP-Assisted Robust Aggregation for Federated Learning. IEEE Internet Things J. 11(16): 27557-27570 (2024) - [j149]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks. IEEE Syst. J. 18(3): 1504-1515 (2024) - [j148]Teng Li, Ximeng Liu, Wei Qiao, Xiongjie Zhu, Yulong Shen, Jianfeng Ma:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. IEEE Trans. Dependable Secur. Comput. 21(3): 1179-1195 (2024) - [j147]Tao Jiang, Xu Yuan, Qiong Cheng, Yulong Shen, Liangmin Wang, Jianfeng Ma:
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination. IEEE Trans. Dependable Secur. Comput. 21(4): 3528-3544 (2024) - [j146]Xutong Mu, Ke Cheng, Yulong Shen, Xiaoxiao Li, Zhao Chang, Tao Zhang, Xindi Ma:
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients. IEEE Trans. Dependable Secur. Comput. 21(6): 5259-5274 (2024) - [j145]Jiaxuan Fu, Ke Cheng, Zhao Chang, Yulong Shen:
PPA-DBSCAN: Privacy-Preserving $\rho$ρ-Approximate Density-Based Clustering. IEEE Trans. Dependable Secur. Comput. 21(6): 5324-5340 (2024) - [j144]Yang Xu, Jianbo Shao, Jia Liu, Yulong Shen, Tarik Taleb, Norio Shiratori:
BWKA: A Blockchain-Based Wide-Area Knowledge Acquisition Ecosystem. IEEE Trans. Dependable Secur. Comput. 21(6): 5617-5634 (2024) - [j143]Yu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming. IEEE Trans. Inf. Forensics Secur. 19: 5696-5711 (2024) - [j142]Jiaxuan Fu, Ke Cheng, Anxiao Song, Yuheng Xia, Zhao Chang, Yulong Shen:
FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 7759-7773 (2024) - [j141]Xutong Mu, Ke Cheng, Teng Liu, Tao Zhang, Xueli Geng, Yulong Shen:
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9100-9114 (2024) - [j140]Zhao Chang, Dong Xie, Sheng Wang, Feifei Li, Yulong Shen:
Towards Practical Oblivious Join Processing. IEEE Trans. Knowl. Data Eng. 36(4): 1829-1842 (2024) - [j139]Chengyan Ma, Di Lu, Chaoyue Lv, Ning Xi, Xiaohong Jiang, Yulong Shen, Jianfeng Ma:
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems. IEEE Trans. Knowl. Data Eng. 36(9): 4472-4485 (2024) - [j138]Zhao Chang, Feifei Li, Yulong Shen:
Generalized Measure-Biased Sampling and Priority Sampling. IEEE Trans. Knowl. Data Eng. 36(11): 6251-6265 (2024) - [j137]Xufei Li, Yin Chen, Jinxiao Zhu, Shuiguang Zeng, Yulong Shen, Xiaohong Jiang, Daqing Zhang:
Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification. IEEE Trans. Mob. Comput. 23(2): 1416-1430 (2024) - [j136]Ranran Sun, Huihui Wu, Bin Yang, Yulong Shen, Weidong Yang, Xiaohong Jiang, Tarik Taleb:
On Covert Rate in Full-Duplex D2D-Enabled Cellular Networks With Spectrum Sharing and Power Control. IEEE Trans. Mob. Comput. 23(10): 9931-9945 (2024) - [j135]Peipei Chen, Lailong Luo, Deke Guo, Qianzhen Zhang, Xueshan Luo, Bangbang Ren, Yulong Shen:
Frisbee: An Efficient Data Sharing Framework for UAV Swarms. IEEE Trans. Netw. Sci. Eng. 11(6): 5380-5393 (2024) - [j134]Zhiwei Zhang, Zehan Chen, Yulong Shen, Xuewen Dong, Ning Xi:
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles. IEEE Trans. Veh. Technol. 73(6): 7532-7546 (2024) - [j133]Xuewen Dong, Zhichao You, Ximeng Liu, Yuanxiong Guo, Yulong Shen, Yanmin Gong:
Federated and Online Dynamic Spectrum Access for Mobile Secondary Users. IEEE Trans. Wirel. Commun. 23(1): 621-636 (2024) - [j132]Mubarak Umar, Jiandong Wang, Hafsa Kabir Ahmad, Shuangrui Zhao, Feng Li, Shuguang Wang, Minggang Zheng, Yulong Shen, Zhiwei Zhang, Xin Guo:
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles. Veh. Commun. 45: 100708 (2024) - [c90]Yuxin Liu, Ning Xi, Ruidong Han, Yuanzhao Li, Jian Feng Ma, Yulong Shen:
Action-Driven UAV Fingerprint Verification with Perception Data. ACISP (3) 2024: 303-322 - [c89]Chaoyue Lv, Di Lu, Yuanyuan Zhang, Xindi Ma, Yulong Shen, Liping Wang, Jianfeng Ma:
ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT. AIiH (2) 2024: 263-278 - [c88]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li, Masatoshi Yoshikawa:
Enhancing Privacy of Spatiotemporal Federated Learning Against Gradient Inversion Attacks. DASFAA (1) 2024: 457-473 - [c87]Jiaxuan Fu, Ke Cheng, Yuheng Xia, Anxiao Song, Qianxing Li, Yulong Shen:
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing. ESORICS (2) 2024: 310-330 - [c86]Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma:
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction. ICASSP 2024: 4530-4534 - [c85]Cheng Zhou, Guangxia Li, Yulong Shen:
A Simple and Effective Method for Anomaly Detection on Attributed Graphs via Feature Consistency. ICASSP 2024: 7780-7784 - [c84]Wei Tong, Xuewen Dong, Weidong Yang, Yulong Shen, Chao Yang, Zesong Dong:
Non-Subjective Trust Mechanism for Online Ride-Hailing Services. ICWS 2024: 1377-1383 - [c83]Yuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang:
Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing. NaNA 2024: 172-178 - [c82]Xiaodong Zhang, Jie Bao, Yulong Shen:
Testing Object Detection Models For Autonomous Vehicles Against Hazards. NaNA 2024: 542-548 - [c81]Tao Zhang, Haoshuo Li, Teng Liu, Anxiao Song, Yulong Shen:
FBR-FL: Fair and Byzantine-Robust Federated Learning via SPD Manifold. PRCV (1) 2024: 395-409 - [c80]Jian Yang, Xinyu Hu, Yulong Shen, Gang Xiao:
Refining Pre-trained Language Models for Domain Adaptation with Entity-Aware Discriminative and Contrastive Learning. SDM 2024: 409-417 - [c79]Haoyu Guo, Xiaodong Zhang, Zhiwei Zhang, Yulong Shen:
Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program Slices. TASE 2024: 165-185 - [i38]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay. CoRR abs/2404.05983 (2024) - [i37]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li, Masatoshi Yoshikawa:
Enhancing Privacy of Spatiotemporal Federated Learning against Gradient Inversion Attacks. CoRR abs/2407.08529 (2024) - [i36]Zhiwei Zhang, Ruoyu Zhou, Haocheng Han, Xiaodong Zhang, Yulong Shen:
LiTelFuzz : Swarms Fuzzing Based on Linear Temporal Logic Constraints. CoRR abs/2409.04736 (2024) - [i35]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li, Masatoshi Yoshikawa:
Extracting Spatiotemporal Data from Gradients with Large Language Models. CoRR abs/2410.16121 (2024) - [i34]Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu:
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. CoRR abs/2410.17910 (2024) - 2023
- [b1]Yulong Shen, Yuanyu Zhang, Xiaohong Jiang:
Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach. Wireless Networks, Springer 2023, ISBN 978-3-031-38464-6, pp. 1-360 - [j131]Shuiguang Zeng, Yin Chen, Xufei Li, Jinxiao Zhu, Yulong Shen, Norio Shiratori:
Time-frequency fusion for enhancement of deep learning-based physical layer identification. Ad Hoc Networks 142: 103099 (2023) - [j130]Yulong Shen, Nengji Zhou:
Numerical variational studies of quantum phase transitions in the sub-Ohmic spin-boson model with multiple polaron ansatz. Comput. Phys. Commun. 293: 108895 (2023) - [j129]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical contrastive federated learning on non-IID data. Future Gener. Comput. Syst. 143: 93-104 (2023) - [j128]Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. IET Inf. Secur. 2023: 1-15 (2023) - [j127]Ranran Sun, Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks. IEEE Internet Things J. 10(1): 17-30 (2023) - [j126]Jiandong Wang, Hao Liu, Xuewen Dong, Yulong Shen, Xinghui Zhu, Bin Wang, Feng Li:
Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing. IEEE Internet Things J. 10(10): 8971-8983 (2023) - [j125]Yang Xu, Honggang He, Jia Liu, Yulong Shen, Tarik Taleb, Norio Shiratori:
IDADET: Iterative Double-Sided Auction-Based Data-Energy Transaction Ecosystem in Internet of Vehicles. IEEE Internet Things J. 10(11): 10113-10130 (2023) - [j124]Ke Cheng, Jiaxuan Fu, Yulong Shen, Haichang Gao, Ning Xi, Zhiwei Zhang, Xinghui Zhu:
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT. IEEE Internet Things J. 10(16): 14856-14872 (2023) - [j123]Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen:
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J. 10(19): 16715-16726 (2023) - [j122]Yong Ma, Mengxuan Dai, Shiyun Shao, Yunni Xia, Fan Li, Yulong Shen, Jianqi Li, Yin Li, Hemeng Peng:
A Performance and Reliability-Guaranteed Predictive Approach to Service Migration Path Selection in Mobile Computing. IEEE Internet Things J. 10(20): 17977-17987 (2023) - [j121]Wei Tong, Xuewen Dong, Yushu Zhang, Zongyang Zhang, Lingxiao Yang, Weidong Yang, Yulong Shen:
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive. IEEE Internet Things J. 10(24): 21528-21543 (2023) - [j120]Shiyang Ma, Yulong Shen, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process. J. Inf. Sci. Eng. 39(6): 1321-1339 (2023) - [j119]Xuelin Cao, Bo Yang, Yulong Shen, Chau Yuen, Yan Zhang, Zhu Han, H. Vincent Poor, Lajos Hanzo:
Edge-Assisted Multi-Layer Offloading Optimization of LEO Satellite-Terrestrial Integrated Networks. IEEE J. Sel. Areas Commun. 41(2): 381-398 (2023) - [j118]Lele Zheng, Tao Zhang, Yulong Shen, Bowen Deng, Ze Tong:
A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing. Mob. Networks Appl. 28(5): 1647-1657 (2023) - [j117]Xinghui Zhu, Zijie Di, Qingsong Yao, Xuewen Dong, Jiandong Wang, Yulong Shen:
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee. IEEE Trans. Computers 72(6): 1554-1567 (2023) - [j116]Ke Cheng, Ning Xi, Ximeng Liu, Xinghui Zhu, Haichang Gao, Zhiwei Zhang, Yulong Shen:
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization. IEEE Trans. Computers 72(12): 3519-3531 (2023) - [j115]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems. IEEE Trans. Cloud Comput. 11(3): 2770-2783 (2023) - [j114]Xuewen Dong, Lingtao Xue, Zhiwei Zhang, Yushu Zhang, Teng Li, Zhichao You, Yulong Shen:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [j113]Teng Li, Ya Jiang, Chi Lin, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 740-757 (2023) - [j112]Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma:
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3617-3635 (2023) - [j111]Pinchang Zhang, Yulin Teng, Yulong Shen, Xiaohong Jiang, Fu Xiao:
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems. IEEE Trans. Dependable Secur. Comput. 20(6): 4778-4792 (2023) - [j110]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems. IEEE Trans. Inf. Forensics Secur. 18: 4059-4074 (2023) - [j109]Liushun Zhao, Deke Guo, Junjie Xie, Lailong Luo, Yulong Shen:
A Closed-loop Hybrid Supervision Framework of Cryptocurrency Transactions for Data Trading in IoT. ACM Trans. Internet Things 4(1): 4:1-4:26 (2023) - [j108]Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong, Yulong Shen, Jianfeng Ma:
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. IEEE Trans. Mob. Comput. 22(2): 1143-1156 (2023) - [j107]Xuewen Dong, Zhichao You, Yulong Shen, Di Lu, Yang Xu, Jia Liu:
A Two-Dimensional Sybil-Proof Mechanism for Dynamic Spectrum Access. IEEE Trans. Mob. Comput. 22(11): 6237-6250 (2023) - [j106]Xu Lin, Deke Guo, Yulong Shen, Guoming Tang, Bangbang Ren, Ming Xu:
SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs. IEEE/ACM Trans. Netw. 31(4): 1463-1477 (2023) - [j105]Teng Li, Jiawei Zhang, Yulong Shen, Jianfeng Ma:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(5): 3425-3438 (2023) - [j104]Xuewen Dong, Zijie Di, Liangmin Wang, Qingsong Yao, Guangxia Li, Yulong Shen:
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing. IEEE Trans. Wirel. Commun. 22(7): 4313-4326 (2023) - [j103]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. IEEE Trans. Wirel. Commun. 22(12): 9907-9922 (2023) - [c78]Zesong Dong, Wei Tong, Zhiwei Zhang, Jian Li, Weidong Yang, Yulong Shen:
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking. Blockchain 2023: 68-73 - [c77]Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen, Xiaohong Jiang:
3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication. GLOBECOM 2023: 7586-7591 - [c76]Lingxiao Yang, Xuewen Dong, Sheng Gao, Qiang Qu, Xiaodong Zhang, Wensheng Tian, Yulong Shen:
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability. ICDCS 2023: 692-702 - [c75]Yue Wang, Chao Yang, Ning Xi, Yulong Shen, Jianfeng Ma:
SEBD: Sensor Emulation Based Backdoor for Autopilot. IoT 2023: 265-269 - [c74]Xiaodong Zhang, Wei Zhao, Yang Sun, Jun Sun, Yulong Shen, Xuewen Dong, Zijiang Yang:
Testing Automated Driving Systems by Breaking Many Laws Efficiently. ISSTA 2023: 942-953 - [c73]Jian Yang, Xinyu Hu, Weichun Huang, Hao Yuan, Yulong Shen, Gang Xiao:
Advancing Domain Adaptation of BERT by Learning Domain Term Semantics. KSEM (4) 2023: 12-24 - [c72]Ranran Sun, Bin Yang, Jingsen Jiao, Yanchun Zuo, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Joint Secure and Covert Communication Study in Two-hop Relaying Systems. VTC Fall 2023: 1-7 - [i33]Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang:
Covert Communication in Hybrid Microwave/mmWave A2G Systems with Transmission Mode Selection. CoRR abs/2302.00301 (2023) - [i32]Zhonghai Zhao, Yang Xu, Jia Liu, Li Zhao, Yulong Shen, Norio Shiratori:
Marriage Matching-based Instant Parking Spot Sharing in Internet of Vehicles. CoRR abs/2305.14678 (2023) - [i31]Lingxiao Yang, Xuewen Dong, Sheng Gao, Qiang Qu, Xiaodong Zhang, Wensheng Tian, Yulong Shen:
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability. CoRR abs/2305.19182 (2023) - [i30]Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang:
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark. CoRR abs/2307.06123 (2023) - [i29]Zesong Dong, Wei Tong, Zhiwei Zhang, Jian Li, Weidong Yang, Yulong Shen:
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking. CoRR abs/2312.12381 (2023) - 2022
- [j102]Yu-Long Shen, Rong-Jong Wai:
Fast-Fourier-Transform Enhanced Progressive Singular-Value-Decomposition Algorithm in Double Diagnostic Window Frame for Weak Arc Fault Detection. IEEE Access 10: 39752-39768 (2022) - [j101]Yu-Long Shen, Zhihong Xu:
Fast Detection of Weak Arc Faults Based on Progressive Singular-Value-Decomposition and Empirical Analyses. IEEE Access 10: 130586-130601 (2022) - [j100]Shuiguang Zeng, Yin Chen, Xufei Li, Jinxiao Zhu, Yulong Shen, Norio Shiratori:
Visibility graph entropy based radiometric feature for physical layer identification. Ad Hoc Networks 127: 102780 (2022) - [j99]Yangyang Liu, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Online machine learning-based physical layer authentication for MmWave MIMO systems. Ad Hoc Networks 131: 102864 (2022) - [j98]Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j97]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang, Zhiwei Zhang:
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity. Future Gener. Comput. Syst. 135: 85-94 (2022) - [j96]Tao Zhang, Anxiao Song, Xuewen Dong, Yulong Shen, Jianfeng Ma:
Privacy-Preserving Asynchronous Grouped Federated Learning for IoT. IEEE Internet Things J. 9(7): 5511-5523 (2022) - [j95]Teng Li, Jiawei Zhang, Mohammad S. Obaidat, Chi Lin, Yangxu Lin, Yulong Shen, Jianfeng Ma:
Energy-Efficient and Secure Communication Toward UAV Networks. IEEE Internet Things J. 9(12): 10061-10076 (2022) - [j94]Jia Liu, Yang Xu, Yulong Shen, Hiroki Takakura, Xiaohong Jiang, Tarik Taleb:
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? IEEE Internet Things J. 9(13): 10961-10977 (2022) - [j93]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems. IEEE Internet Things J. 9(14): 12783-12798 (2022) - [j92]Yongchao Dang, Chafika Benzaïd, Bin Yang, Tarik Taleb, Yulong Shen:
Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs. IEEE Internet Things J. 9(24): 25068-25085 (2022) - [j91]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. IEEE J. Sel. Areas Commun. 40(11): 3191-3206 (2022) - [j90]Yongzhi Wang, Yu Zou, Yulong Shen, Yao Liu:
CFHider: Protecting Control Flow Confidentiality With Intel SGX. IEEE Trans. Computers 71(9): 2128-2141 (2022) - [j89]Ji He, Jia Liu, Wei Su, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System. IEEE Trans. Commun. 70(8): 5451-5468 (2022) - [j88]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 17: 99-114 (2022) - [j87]Yongzhi Wang, Xiaoyu Zhang, Yao Wu, Yulong Shen:
Enhancing Leakage Prevention for MapReduce. IEEE Trans. Inf. Forensics Secur. 17: 1558-1572 (2022) - [j86]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. IEEE Trans. Inf. Forensics Secur. 17: 2920-2935 (2022) - [j85]Xuewen Dong, Wen Zhang, Yushu Zhang, Zhichao You, Sheng Gao, Yulong Shen, Chao Wang:
Optimizing Task Location Privacy in Mobile Crowdsensing Systems. IEEE Trans. Ind. Informatics 18(4): 2762-2772 (2022) - [j84]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Physical layer authentication in MIMO systems: a carrier frequency offset approach. Wirel. Networks 28(5): 1909-1921 (2022) - [c71]Guangxia Li, Gang Xiao, Junbo Zhang, Jia Liu, Yulong Shen:
Towards Relational Multi-Agent Reinforcement Learning via Inductive Logic Programming. ICANN (2) 2022: 99-110 - [c70]Yongchao Dang, Chafika Benzaïd, Tarik Taleb, Bin Yang, Yulong Shen:
Transfer Learning based GPS Spoofing Detection for Cellular-Connected UAVs. IWCMC 2022: 629-634 - [c69]Zewei Guo, Shuangrui Zhao, Jiandong Wang, Haipeng Lit, Yulong Shen:
Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver. NaNA 2022: 35-40 - [c68]Xinghong Jiang, Xuan Li, Chenyang Lv, Yong Ma, Yulong Shen, Meibin He, Guozheng Li:
An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation. NaNA 2022: 198-204 - [c67]Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. NaNA 2022: 489-494 - [c66]Yan Liu, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Multi-antenna covert communications in random wireless networks with full-duplex relay. SAC 2022: 1960-1966 - [c65]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. SciSec 2022: 276-284 - [c64]Lu Sun, Liang Wu, Zaichen Zhang, Jian Dang, Yulong Shen, Gefeng Huang, Liliang Ding:
An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images. WCSP 2022: 455-459 - [e1]Honghao Gao, Jun Wun, Jianwei Yin, Feifei Shen, Yulong Shen, Jun Yu:
Communications and Networking - 16th EAI International Conference, ChinaCom 2021, Virtual Event, November 21-22, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 433, Springer 2022, ISBN 978-3-030-99199-9 [contents] - [i28]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. CoRR abs/2201.08133 (2022) - [i27]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. CoRR abs/2207.05383 (2022) - [i26]Lele Zheng, Bowen Deng, Tao Zhang, Yulong Shen, Yang Cao:
Graph Analysis in Decentralized Online Social Networks with Fine-Grained Privacy Protection. CoRR abs/2212.05253 (2022) - 2021
- [j83]Guoying Qiu, Yulong Shen:
Mobility-Aware Differentially Private Trajectory for Privacy-Preserving Continual Crowdsourcing. IEEE Access 9: 26362-26376 (2021) - [j82]Yu-Long Shen, Rong-Jong Wai:
Wavelet-Analysis-Based Singular-Value-Decomposition Algorithm for Weak Arc Fault Detection via Current Amplitude Normalization. IEEE Access 9: 71535-71552 (2021) - [j81]Ke Cheng, Wei Tong, Lele Zheng, Jiaxuan Fu, Xutong Mu, Yulong Shen:
A Secure and Fair Double Auction Framework for Cloud Virtual Machines. IEEE Access 9: 87982-87994 (2021) - [j80]Guangxia Li, Jia Liu, Xiao Lu, Peilin Zhao, Yulong Shen, Dusit Niyato:
Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics. IEEE Commun. Lett. 25(9): 2958-2962 (2021) - [j79]Yang Xu, Jia Liu, Yulong Shen, Jun Liu, Xiaohong Jiang, Tarik Taleb:
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things. IEEE Internet Things J. 8(4): 3000-3013 (2021) - [j78]Xuewen Dong, Zhichao You, Tom H. Luan, Qingsong Yao, Yulong Shen, Jianfeng Ma:
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy. IEEE Internet Things J. 8(10): 8032-8043 (2021) - [j77]Guoying Qiu, Deke Guo, Yulong Shen, Guoming Tang, Sheng Chen:
Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation. IEEE Internet Things J. 8(21): 16165-16180 (2021) - [j76]Di Lu, Ruidong Han, Yulong Shen, Xuewen Dong, Jianfeng Ma, Xiaojiang Du, Mohsen Guizani:
xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE J. Sel. Areas Commun. 39(2): 370-383 (2021) - [j75]Guoying Qiu, Yulong Shen, Ke Cheng, Lingtong Liu, Shuiguang Zeng:
Mobility-Aware Privacy-Preserving Mobile Crowdsourcing. Sensors 21(7): 2474 (2021) - [j74]Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j73]Ranran Sun, Bin Yang, Siqi Ma, Yulong Shen, Xiaohong Jiang:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j72]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 16: 3371-3386 (2021) - [j71]Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Trans. Inf. Forensics Secur. 16: 4265-4279 (2021) - [j70]Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen:
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA. IEEE Trans. Veh. Technol. 70(5): 4646-4656 (2021) - [j69]Bin Yang, Tarik Taleb, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas. IEEE Trans. Wirel. Commun. 20(4): 2383-2397 (2021) - [j68]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Yusheng Ji, Norio Shiratori:
QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers. IEEE Trans. Wirel. Commun. 20(8): 4902-4916 (2021) - [c63]Tao Zhang, Yani Han, Xuewen Dong, Yang Xu, Yulong Shen:
Dual-Target Cross-Domain Bundle Recommendation. SCC 2021: 183-192 - [c62]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - [i25]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical Contrastive Federated Learning on Non-IID data. CoRR abs/2109.12273 (2021) - [i24]Jian Yang, Gang Xiao, Yulong Shen, Wei Jiang, Xinyu Hu, Ying Zhang, Jinghui Peng:
A Survey of Knowledge Enhanced Pre-trained Models. CoRR abs/2110.00269 (2021) - 2020
- [j67]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Shikai Shen:
On delay performance study for cooperative multicast MANETs. Ad Hoc Networks 102: 102117 (2020) - [j66]Wei Tong, Xuewen Dong, Yulong Shen, Jiawei Zheng:
BC-RAN: Cloud radio access network enabled by blockchain for 5G. Comput. Commun. 162: 179-186 (2020) - [j65]Xiaochen Li, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol. IET Commun. 14(22): 4135-4141 (2020) - [j64]Pinchang Zhang, Jun Liu, Yulong Shen, Hewu Li, Xiaohong Jiang:
Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 7(5): 3977-3990 (2020) - [j63]Jiawei Zheng, Xuewen Dong, Yulong Shen, Wei Tong:
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT. J. Inf. Sci. Eng. 36(4): 821-836 (2020) - [j62]Guangxia Li, Peilin Zhao, Tao Mei, Peng Yang, Yulong Shen, Kuiyu Chang, Steven C. H. Hoi:
Collaborative online ranking algorithms for multitask learning. Knowl. Inf. Syst. 62(6): 2327-2348 (2020) - [j61]Yongzhi Wang, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, Xuewen Dong:
CryptSQLite: SQLite With High Data Security. IEEE Trans. Computers 69(5): 666-678 (2020) - [j60]Pinchang Zhang, Yulong Shen, Xiaohong Jiang, Bin Wu:
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 68(4): 2446-2458 (2020) - [j59]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. IEEE Trans. Inf. Forensics Secur. 15: 1347-1362 (2020) - [j58]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 15: 3775-3790 (2020) - [j57]Lingtong Liu, Yulong Shen, Yibo Yan, Tong Yang, Muhammad Shahzad, Bin Cui, Gaogang Xie:
SF-Sketch: A Two-Stage Sketch for Data Streams. IEEE Trans. Parallel Distributed Syst. 31(10): 2263-2276 (2020) - [j56]Xuewen Dong, Zhichao You, Liangmin Wang, Sheng Gao, Yulong Shen, Jianfeng Ma:
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation. IEEE Trans. Wirel. Commun. 19(7): 4632-4642 (2020) - [j55]Huihui Wu, Yuanyu Zhang, Xuening Liao, Yulong Shen, Xiaohong Jiang:
On covert throughput performance of two-way relay covert wireless communications. Wirel. Networks 26(5): 3275-3289 (2020) - [j54]Xuewen Dong, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma:
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing. World Wide Web 23(2): 1035-1055 (2020) - [c61]Yongchao Dang, Chafika Benzaïd, Yulong Shen, Tarik Taleb:
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs. GLOBECOM 2020: 1-6 - [c60]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. ICDE 2020: 1862-1865 - [c59]Ke Cheng, Liangmin Wang, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng:
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees. INFOCOM 2020: 1708-1717 - [c58]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang:
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion. NaNA 2020: 193-197 - [i23]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. CoRR abs/2002.03284 (2020) - [i22]Yanni Li, Bing Liu, Jiangtao Cui, Zhi Wang, Yulong Shen, Yueshen Xu, Kaicheng Yao:
Similarities and Evolutionary Relationships of COVID-19 and Related Viruses. CoRR abs/2003.05580 (2020) - [i21]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication. CoRR abs/2008.00147 (2020) - [i20]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. CoRR abs/2009.01988 (2020)
2010 – 2019
- 2019
- [j53]Yeqiu Xiao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective. IEEE Access 7: 3371-3382 (2019) - [j52]Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun:
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7: 35302-35316 (2019) - [j51]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang:
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Comput. Networks 161: 150-161 (2019) - [j50]Xuewen Dong, Feng Wu, Anter Faree, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. Comput. Secur. 87 (2019) - [j49]Teng Li, Jianfeng Ma, Yulong Shen, Qingqi Pei:
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning. Entropy 21(8): 734 (2019) - [j48]Bo Shen, Yulong Shen, Wen Ji:
Profit optimization in service-oriented data market: A Stackelberg game approach. Future Gener. Comput. Syst. 95: 17-25 (2019) - [j47]Guangxia Li, Yulong Shen, Peilin Zhao, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi:
Detecting cyberattacks in industrial control systems using online learning algorithms. Neurocomputing 364: 338-348 (2019) - [j46]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 6(2): 1594-1605 (2019) - [j45]Hui Qiao, Xuewen Dong, Yulong Shen:
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. J. Medical Syst. 43(11): 321:1-321:13 (2019) - [j44]Bangbang Ren, Deke Guo, Yulong Shen, Guoming Tang, Xu Lin:
Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast. IEEE J. Sel. Areas Commun. 37(5): 1085-1097 (2019) - [j43]Wengui Su, Xiang Wang, Fu Li, Yulong Shen, Qingqi Pei:
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multim. Tools Appl. 78(7): 7927-7945 (2019) - [j42]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. IEEE Trans. Commun. 67(1): 623-638 (2019) - [j41]Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:
Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data. IEEE Trans. Parallel Distributed Syst. 30(12): 2650-2662 (2019) - [j40]Ting Qu, Deke Guo, Yulong Shen, Xiaomin Zhu, Lailong Luo, Zhong Liu:
Minimizing Traffic Migration During Network Update in IaaS Datacenters. IEEE Trans. Serv. Comput. 12(4): 577-589 (2019) - [j39]Xuewen Dong, Tao Zhang, Di Lu, Guangxia Li, Yulong Shen, Jianfeng Ma:
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing. IEEE Trans. Veh. Technol. 68(9): 8881-8892 (2019) - [j38]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Friendship-based cooperative jamming for secure communication in Poisson networks. Wirel. Networks 25(7): 4077-4095 (2019) - [c57]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c56]Guangxia Li, Peilin Zhao, Xiao Lu, Jia Liu, Yulong Shen:
Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update. ICC 2019: 1-6 - [c55]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang:
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains. ICC 2019: 1-6 - [c54]Yeqiu Xiao, Yulong Shen, Yong Zeng, Yuzhen Zhang:
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks. ICC 2019: 1-6 - [c53]Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019: 541-549 - [c52]Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019: 2494-2502 - [c51]Chenyang Gao, Jianfeng Ma, Yulong Shen, Teng Li, Fei Li, Yuelin Gao:
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm. NaNA 2019: 458-463 - [c50]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems. WCNC 2019: 1-6 - [i19]Guangxia Li, Yulong Shen, Peilin Zhao, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi:
Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms. CoRR abs/1912.03589 (2019) - 2018
- [j37]Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:
Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018) - [j36]Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen:
Information flow control on encrypted data for service composition among multiple clouds. Distributed Parallel Databases 36(3): 511-527 (2018) - [j35]Junjie Xie, Deke Guo, Xiaozhou Li, Yulong Shen, Xiaohong Jiang:
Cutting Long-Tail Latency of Routing Response in Software Defined Networks. IEEE J. Sel. Areas Commun. 36(3): 384-396 (2018) - [j34]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - [j33]Yongzhi Wang, Yulong Shen, Xiaohong Jiang:
Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Inf. Forensics Secur. 13(6): 1376-1391 (2018) - [j32]Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:
On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Serv. Comput. 11(2): 318-328 (2018) - [j31]Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 67(3): 2631-2643 (2018) - [j30]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wirel. Commun. 17(3): 1893-1906 (2018) - [j29]Ahmed Salem, Xuening Liao, Yulong Shen, Xiaohong Jiang:
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework. Wirel. Commun. Mob. Comput. 2018: 1029175:1-1029175:14 (2018) - [j28]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) - [c49]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA 2018: 240-246 - [c48]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori:
Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm. ICNC 2018: 215-219 - [c47]Xu Lin, Deke Guo, Yulong Shen, Guoming Tang, Bangbang Ren:
DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs. ICPP 2018: 15:1-15:10 - [c46]Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:
Obfuscating program control flow with Intel SGX. ICSE (Companion Volume) 2018: 321-322 - [c45]Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:
Diamond sketch: Accurate per-flow measurement for real IP streams. INFOCOM Workshops 2018: 1-2 - [c44]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. INFOCOM Workshops 2018: 1-2 - [c43]Tong Yang, Alex X. Liu, Yulong Shen, Qiaobin Fu, Dagang Li, Xiaoming Li:
Fast OpenFlow Table Lookup with Fast Update. INFOCOM 2018: 2636-2644 - [c42]Ahmed Salem, Xuening Liao, Shuiguang Zeng, Yulong Shen:
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework. NaNA 2018: 47-51 - [c41]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. NaNA 2018: 206-211 - [c40]Tong Yang, Lun Wang, Yulong Shen, Muhammad Shahzad, Qun Huang, Xiaohong Jiang, Kun Tan, Xiaoming Li:
Empowering Sketches with Machine Learning for Network Measurements. NetAI@SIGCOMM 2018: 15-20 - [i18]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. CoRR abs/1802.03147 (2018) - [i17]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. CoRR abs/1802.04410 (2018) - [i16]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying. CoRR abs/1802.06538 (2018) - 2017
- [j27]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:
On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017) - [j26]Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang:
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Commun. Mag. 55(9): 86-93 (2017) - [j25]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Comput. Networks 123: 77-87 (2017) - [j24]Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu:
Exploiting Content Delivery Networks for covert channel communications. Comput. Commun. 99: 84-92 (2017) - [j23]Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:
Distributed Secure Service Composition with Declassification in Mobile Clouds. Mob. Inf. Syst. 2017: 7469342:1-7469342:13 (2017) - [j22]Le Xiao, Wei Wei, Weidong Yang, Yulong Shen, Xianglin Wu:
A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput. 21(13): 3713-3721 (2017) - [j21]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
On Performance Modeling for MANETs Under General Limited Buffer Constraint. IEEE Trans. Veh. Technol. 66(10): 9483-9497 (2017) - [j20]Yang Xu, Jia Liu, Yulong Shen, Xiangning Li, Xiaohong Jiang:
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint. Wirel. Networks 23(1): 193-204 (2017) - [c39]Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:
Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 - [c38]Shuangrui Zhao, Jia Liu, Xiaochen Li, Yulong Shen, Xiaohong Jiang:
Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying. GLOBECOM Workshops 2017: 1-6 - [c37]Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen, Xiaoming Li, Bin Cui, Gaogang Xie:
SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items. ICDE 2017: 103-106 - [c36]Yeqiu Xiao, Jia Liu, Jiao Quan, Yulong Shen, Xiaohong Jiang:
On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users. MSN 2017: 402-412 - [c35]Yongchao Dang, Yin Chen, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources. NaNA 2017: 30-35 - [c34]Huihui Wu, Xuening Liao, Yongchao Dang, Yulong Shen, Xiaohong Jiang:
Limits of Covert Communication on Two-Hop AWGN Channels. NaNA 2017: 42-47 - [c33]Jiao Quan, Xiaochen Li, Yeqiu Xiao, Yulong Shen, Fenghua Li:
Secure Transmission with Limited Feedback in MISOME Wiretap Channels. NaNA 2017: 48-53 - [c32]Bin Yang, Zhenqiang Wu, Yulong Shen, Yuanyuan Fan:
Multicast Delivery Delay in General Two-Hop Relay MANETs. NaNA 2017: 100-103 - [c31]Ning Xi, Cong Sun, Di Lu, Yulong Shen:
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds. NaNA 2017: 286-291 - [c30]Hui Gao, Yulong Shen, Bin Yang:
D2D Communication for Disaster Recovery in Cellular Networks. NaNA 2017: 292-295 - [c29]Yongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong:
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX. NaNA 2017: 303-308 - [c28]Ahmed Salem, Xuening Liao, Yulong Shen, Xiang Lu:
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework. NaNA 2017: 326-329 - [i15]Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen, Xiaoming Li, Bin Cui, Gaogang Xie:
SF-sketch: slim-fat-sketch with GPU assistance. CoRR abs/1701.04148 (2017) - [i14]Juntao Gao, Yulong Shen, Jia Liu, Minoru Ito, Norio Shiratori:
Adaptive Traffic Signal Control: Deep Reinforcement Learning Algorithm with Experience Replay and Target Network. CoRR abs/1705.02755 (2017) - [i13]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori:
Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction. CoRR abs/1708.06926 (2017) - 2016
- [j19]Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:
Toward integrity assurance of outsourced computing - a game theoretic perspective. Future Gener. Comput. Syst. 55: 87-100 (2016) - [j18]Fangwei Wang, Wen-Yan Huang, Yulong Shen, Changguang Wang:
Analysis of SVEIR worm attack model with saturated incidence and partial immunization. J. Commun. Inf. Networks 1(4): 105-115 (2016) - [j17]Yuanyu Zhang, Yulong Shen, Hua Wang, Jianming Yong, Xiaohong Jiang:
On Secure Wireless Communications for IoT Under Eavesdropper Collusion. IEEE Trans Autom. Sci. Eng. 13(3): 1281-1293 (2016) - [j16]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang, Hideyuki Tokuda:
On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks. IEEE Trans. Commun. 64(4): 1646-1659 (2016) - [c27]Yongzhi Wang, Yulong Shen:
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. CCS 2016: 1799-1801 - [c26]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Security/QoS-aware route selection in multi-hop wireless ad hoc networks. ICC 2016: 1-6 - [c25]Bin Yang, Yulong Shen, Guilin Chen, Yuanyuan Fan:
Multicast Delivery Probability of MANETs with Limited Packet Redundancy. NaNA 2016: 48-52 - [c24]Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68 - [c23]Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Exact Secrecy Throughput of MANETs with Guard Zone. NaNA 2016: 167-172 - [c22]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:
Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259 - [i12]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
On Performance Modeling for MANETs under General Limited Buffer Constraint. CoRR abs/1609.02252 (2016) - [i11]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Physical Layer Security-Aware Routing and Performance Tradeoffs in WANETs. CoRR abs/1609.02288 (2016) - [i10]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks. CoRR abs/1609.07830 (2016) - 2015
- [j15]Juntao Gao, Yulong Shen, Xiaohong Jiang, Jie Li:
Source delay in mobile ad hoc networks. Ad Hoc Networks 24: 109-120 (2015) - [j14]Yuanyu Zhang, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming. Ad Hoc Sens. Wirel. Networks 29(1-4): 113-131 (2015) - [j13]Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach. Ad Hoc Sens. Wirel. Networks 29(1-4): 265-285 (2015) - [j12]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen:
Secure service composition with information flow control in service clouds. Future Gener. Comput. Syst. 49: 142-148 (2015) - [j11]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process. Wirel. Networks 21(8): 2453-2466 (2015) - [c21]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang:
Modeling the success transmission rate in Aloha MANETs with Binomial point process. ICMU 2015: 36-41 - 2014
- [j10]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy transmission capacity in noisy wireless ad hoc networks. Ad Hoc Networks 21: 123-133 (2014) - [j9]Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel. IEICE Trans. Commun. 97-B(2): 396-407 (2014) - [j8]Yulong Shen, Yuanyu Zhang:
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. Inf. Sci. 281: 201-210 (2014) - [j7]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma:
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. J. Inf. Sci. Eng. 30(3): 875-893 (2014) - [j6]Yulong Shen, Yuanyu Zhang:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks. EAI Endorsed Trans. Scalable Inf. Syst. 1(2): e2 (2014) - [c20]Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. CIS 2014: 603-607 - [i9]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks. CoRR abs/1401.6123 (2014) - 2013
- [j5]Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang:
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Yongzhao Zhan, Lu Liu, Liangmin Wang, Yulong Shen:
Wireless Sensor Networks for the Internet of Things. Int. J. Distributed Sens. Networks 9 (2013) - [c19]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. ITCS 2013: 397-406 - [c18]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Flexible relay selection for secure communication in two-hop wireless networks. WiOpt 2013: 648-651 - [i8]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1301.1746 (2013) - [i7]Juntao Gao, Yulong Shen, Xiaohong Jiang, Jie Li:
Source Delay in Mobile Ad Hoc Networks. CoRR abs/1310.7444 (2013) - [i6]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process. CoRR abs/1310.8374 (2013) - [i5]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks. CoRR abs/1312.3748 (2013) - [i4]Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
End-to-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach. CoRR abs/1312.7201 (2013) - 2012
- [j3]Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma:
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j2]Yulong Shen, Qingqi Pei, Qijian Xu, Zhiwei Zhang:
The multimedia service session handoff method in heterogeneous wireless networks. Int. J. Grid Util. Comput. 3(1): 68-77 (2012) - [c17]Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:
Security Information Flow Control Model and Method in MILS. CIS 2012: 591-595 - [c16]Xinghua Li, Jianfeng Ma, Yulong Shen:
An efficient WLAN initial access authentication protocol. GLOBECOM 2012: 1035-1040 - [c15]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu:
The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. INCoS 2012: 185-192 - [i3]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1211.7075 (2012) - [i2]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks. CoRR abs/1212.0287 (2012) - [i1]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System. CoRR abs/1212.6627 (2012) - 2011
- [c14]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. CIS 2011: 545-549 - [c13]Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. CIS 2011: 635-639 - [c12]Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. CIS 2011: 731-735 - [c11]Yulong Shen, Qingzhen Liu, Wenzhong Guo:
Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization. ICNC 2011: 2179-2183 - [c10]Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. INCoS 2011: 251-257 - [c9]Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. INCoS 2011: 320-327 - 2010
- [c8]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A novel data communication approach in wireless sensor networks. HPCS 2010: 509-511 - [c7]Yahui Li, Xining Cui, Linping Hu, Yulong Shen:
Efficient security transmission protocol with identity-based encryption in wireless mesh networks. HPCS 2010: 679-685
2000 – 2009
- 2009
- [c6]Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. IAS 2009: 423-426 - [c5]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. CIS (2) 2009: 431-435 - [c4]Yulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma:
A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks. CIS (2) 2009: 441-445 - [c3]Yulong Shen, Qingqi Pei, Xinghua Li, Hailin Feng, Jianfeng Ma:
The Development Mode of Trust E-commerce Services. ICEBE 2009: 181-187 - 2008
- [c2]Zhuo Ma, Jianfeng Ma, Yulong Shen:
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. EUC (2) 2008: 43-48 - 2007
- [c1]Yulong Shen, Jianfeng Ma, Qingqi Pei:
Research on the Resilience of Key Management in Sensor Networks. CIS 2007: 716-720 - 2003
- [j1]France Laliberté, Langis Gagnon, Yulong Shen:
Registration and Fusion of Retinal Images - An Evaluation Study. IEEE Trans. Medical Imaging 22(5): 661-673 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint