Skip to main content

Page of 5
and
  1. No Access

    Chapter and Conference Paper

    The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum’s Whisper Protocol

    Covert communication is an extension of the traditional encryption technology, which hides information through carriers such as text and images. Traditional covert communication relies on a third-party central...

    Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong ** in Frontiers in Cyber Security (2020)

  2. No Access

    Chapter and Conference Paper

    Performance Analysis of Consensus-Based Distributed System Under False Data Injection Attacks

    This paper investigates the security problem of consensus-based distributed system under false data injection attacks (FDIAs). Since the injected false data will spread to the whole network through data exchan...

    **aoyan Zheng, Lei **e, Huifang Chen, Chao Song in Communications and Networking (2020)

  3. No Access

    Chapter and Conference Paper

    An Adaptive MAC Layer Energy-Saving Algorithm for ZigBee-Enabled IoT Networks

    Energy conservation has become a major bottleneck for wide deployment of Internet of Things (IoT) technologies. This paper presents energy consumption analysis of ZigBee-enabled IoT networks, and shows the pri...

    Yaxuan Zhang, Kun Yang, Hui Chen in Smart City and Informatization (2019)

  4. No Access

    Chapter and Conference Paper

    Application of Internet of Things and GIS in Power Grid Emergency Command System

    The power grid is vulnerable to natural disasters and causes grid faults. When power disasters in the process of handling, the effective implementation of emergency command is important for timely restoring of...

    Daning Huang, Huihe Chen, Shiyong Huang in Dependability in Sensor, Cloud, and Big Da… (2019)

  5. No Access

    Chapter and Conference Paper

    The Application Research of AlphaGo Double Decision System in Network Bad Information Recognition

    As the carrier of information transmission, the internet inevitably contains much bad information. In view of this phenomenon, with the purpose of identifying the bad information in the network, we combine exi...

    Hui Chen, Zeyu Zheng, Qiurui Chen, Lanjiang Yang in Intelligent Computing Methodologies (2018)

  6. No Access

    Chapter and Conference Paper

    Application of Project Management in Undergraduates’ Innovation Experiment Teaching

    In view of unique characteristics of the experiment course of low power embedded system design and implementation, the project management theory is introduced into undergraduates’ innovation experiment teachin...

    Qing Wang, Huipeng Chen, Hongwei Liu, Lei Xu, Yanhang Zhang in Data Science (2018)

  7. No Access

    Chapter and Conference Paper

    From Small Scale Guerrilla Warfare to a Wide Range of Army Operations the Development Direction of Software Production and Education

    With the great improvement of computer computing power, the requirement of the software can be greatly improved in terms of performance, scale and reliability. From the programming of one or several people, it...

    Lei Xu, Huipeng Chen, Hongwei Liu, Yanhang Zhang, Qing Wang in Data Science (2018)

  8. No Access

    Chapter and Conference Paper

    The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students

    Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...

    Chun-Hsiung Tseng, Jyi-Shane Liu, Yung-Hui Chen, Lin Hui in Frontier Computing (2018)

  9. Article

    Open Access

    Ergodic Channel Capacity Analysis of Downlink in the Hybrid Satellite-Terrestrial Cooperative System

    In this paper, the ergodic channel capacity of the downlink is analyzed for a hybrid satellite-terrestrial cooperative system, which consists of a satellite (the source), a mobile terminal (the destination), a...

    Yue Zhao, Lei **e, Huifang Chen, Kuang Wang in Wireless Personal Communications (2017)

  10. No Access

    Chapter and Conference Paper

    Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision

    Positioning is a fundamental component in many applications such as mobile robot. In this field, vision-based positioning becomes a popular way. This paper proposes an approach of positioning in the planar sce...

    Yang Guo, Zheng **ao, Hui Chen, Ling Huang in Cloud Computing and Security (2017)

  11. No Access

    Article

    Post-FEC performance evaluation of coherent QPSK system with an enhanced pilot-aided CPE scheme

    In this paper, a simple and robust pilot-aided carrier phase estimation scheme with a modified phase unwrap** is proposed. The principle of the proposed phase unwrap** is shown with a step-by-step procedur...

    Haiquan Cheng, Huizhong Chen, Yan Li, Chao Lu, Jian Wu in Photonic Network Communications (2016)

  12. No Access

    Article

    A novel image matting method using sparse manual clicks

    Traditional image matting methods often have strict requirements on user input. This paper proposes a new matting method based on spectral clustering, which generates a well matte using a sparse user input. Fi...

    Guanghua Tan, Hui Chen, Jun Qi in Multimedia Tools and Applications (2016)

  13. No Access

    Chapter and Conference Paper

    Classification and Comparative Analysis of Resource Management Methods in Ad Hoc Network

    Due to distinct characteristics of Ad hoc network, such as constrained energy of nodes, the instability of wireless links, the rapid changes of topology, and the limited communication range, resource managemen...

    Haitao Wang, Li Yan, Lihua Song, Hui Chen in Wireless Communications, Networking and Ap… (2016)

  14. No Access

    Chapter and Conference Paper

    WhozDriving: Abnormal Driving Trajectory Detection by Studying Multi-faceted Driving Behavior Features

    Vehicles have become essential tools of transport, offering a great opportunity to exploit the relationship between people and the car. This paper aims to solve an interesting problem, recognizing who the pers...

    Meng He, Bin Guo, Huihui Chen, Alvin Chin in Big Data Computing and Communications (2016)

  15. No Access

    Chapter and Conference Paper

    Social Aware Mobile Payment Service Popularity Analysis: The Case of WeChat Payment in China

    Since its release in 2013, WeChat payment service has gradually become one of the most popular mobile payment services in China. Different from other mobile payment platforms, WeChat payment bundles with the m...

    Yue Qu, Wenge Rong, Yuanxin Ouyang, Hui Chen, Zhang **ong in Advances in Services Computing (2015)

  16. Chapter and Conference Paper

    Virtual View Synthesis Based on DIBR and Image Inpainting

    In 3DTV research, virtual view synthesis is a key component to the technology. Depth-image-based-rendering (DIBR) is an important method to realize virtual view synthesis. However, DIBR always results in hole ...

    Yuhan Gao, Hui Chen, Weisong Gao, Tobi Vaudrey in Image and Video Technology (2014)

  17. No Access

    Chapter and Conference Paper

    Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network

    The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes ...

    Jun Liu, Huiting Chen, Zhong Zhen in Proceedings of International Conference on… (2014)

  18. No Access

    Article

    Complex Step-Shape Binary Offset Carrier Modulation for a Unitary Analytical Framework of GNSS Signals

    The Binary Offset Carrier and Binary Coded Symbol modulation family is widely used in the existing Global Navigation Satellite Systems (GNSS). There are several modulation types in this family and new types ar...

    Jiawei Ren, Huihua Chen, Weimin Jia, Minli Yao in Wireless Personal Communications (2013)

  19. No Access

    Article

    A resource integration approach for HTML5 mobile applications

    As the new HTML5 specification is being accepted, comprehensive HTML5-based mobile applications provide users with better experiences. Huge amount of existing Internet-based resources are rapidly integrated in...

    **aoMin Zhu, Donghua Chen, Ying Chen in Information Technology and Management (2013)

  20. No Access

    Article

    Fault-Tolerant Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks

    In order to solve the uncertainty resulting from shadowing effect and resist the attack from malicious cognitive radio (CR) users, we propose a fault-tolerant cooperative spectrum sensing scheme for CR network...

    Huifang Chen, Ming Zhou, Lei **e, Xu ** in Wireless Personal Communications (2013)

Page of 5