Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Hybrid Framework for Class-Imbalanced Classification

    Data classification is a commonly used data processing method in the fields of networks and distributed systems, and it has attracted extensive attention in recent years. Nevertheless, the existing classificat...

    Rui Chen, Lailong Luo, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2021)

  2. No Access

    Chapter and Conference Paper

    K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data

    Recent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researc...

    Linghang Meng, Xueshu Hong, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2020)

  3. No Access

    Chapter and Conference Paper

    Exploration of Human Activities Using Sensing Data via Deep Embedded Determination

    Clustering analysis is one of promising techniques of uncovering different types of human activities from a set of ubiquitous sensing data in an unsupervised manner. Previous work proposes deep clustering to l...

    Yiqi Wang, En Zhu, Qiang Liu, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2018)

  4. No Access

    Chapter and Conference Paper

    Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection

    Machine learning algorithms have been increasingly adopted in Intrusion Detection Systems (IDSs) and achieved demonstrable results, but few studies have considered intrinsic vulnerabilities of these algorithms...

    Yifan Dong, Peidong Zhu, Qiang Liu in Wireless Algorithms, Systems, and Applicat… (2018)

  5. No Access

    Chapter and Conference Paper

    An Adaptive MAC Protocol for Wireless Rechargeable Sensor Networks

    In the existing medium access control (MAC) protocols of rechargeable sensor networks, the maximum charging threshold of sensor nodes generally set to a fixed value based on nodes battery capacity. It leads to...

    ** Zhong, Yiwen Zhang, Shuaihua Ma in Wireless Algorithms, Systems, and Applicat… (2017)

  6. No Access

    Chapter and Conference Paper

    Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments

    Cloud platforms can provide elastic infrastructure for mobile users. Therefore, publicly auditing the integrity of shared data outsourced on the cloud is very important since the cloud may be untrusted. Howeve...

    Feng Chen, Hong Zhou, Yuchuan Luo in Wireless Algorithms, Systems, and Applicat… (2015)

  7. No Access

    Chapter and Conference Paper

    Throughput Prediction-Based Rate Adaptation for Real-Time Video Streaming over UAVs Networks

    Real-time video streaming is extensively used in UAVs networks for battlefield surveillance, disaster relief, etc. The available throughput of the multi-hop networks varies a lot with the movement of UAVs. To ...

    Tongqing Zhou, Haidong Zhang, Ming Xu in Wireless Algorithms, Systems, and Applicat… (2014)

  8. No Access

    Chapter and Conference Paper

    Empirical Study on Spatial and Temporal Features for Vehicular Wireless Communications

    Traditional networking technologies based on static topology analysis are not sufficient to the dynamic Vehicular Ad hoc Network. Understanding the network dynamics caused by vehicle mobility is very important...

    Yingwen Chen, Ming Xu, Pei Li, Bin Zhang in Wireless Algorithms, Systems, and Applications (2014)

  9. No Access

    Chapter and Conference Paper

    Schedule Algorithms for File Transmission in Vehicular Ad Hoc Networks

    The development of vehicular ad-hoc networks has lead to several new services, such as instant messages, multi-media videos and large data transmissions. These applications have altered the pattern of data tra...

    Chao Wang, Maya Larson, Yingwen Chen in Wireless Algorithms, Systems, and Applicat… (2014)

  10. No Access

    Chapter and Conference Paper

    Local Information Storage Protocol for Urban Vehicular Networks

    Local information dissemination is a potential application of VANETs. By cooperative communication among vehicles, the information could be stored in a certain size of region for some time. However, it is diff...

    Bo **e, Yingwen Chen, Ming Xu, Yuangang Wang in Wireless Algorithms, Systems, and Applicat… (2013)

  11. No Access

    Chapter and Conference Paper

    ContactSim: An Efficient Realistic Trace Driven Contact Simulator for Vehicular Opportunistic Networks

    Opportunistic networking is an innovative data delivery solution, which leverages the contact opportunities between mobile terminals to exchange messages. The contact events are highly relevant to human behavi...

    Jianbin Jia, Xu Ming, Chen Yingwen in Internet and Distributed Computing Systems (2013)

  12. No Access

    Chapter and Conference Paper

    MASS: Multiple ASSociation Scheme in IEEE 802.11 Wireless Mesh Networks

    Traditional association mechanism in IEEE 802.11 is in the form of one-to-many. It indicates that an access point (AP) can associate with many clients at the same time, while one client is capable to be associ...

    Haidong Zhang, Pin Lv, Yingwen Chen, Ming Xu in Wireless Internet (2012)

  13. No Access

    Chapter and Conference Paper

    An Anti-void Geographic Routing Algorithm for Wireless Sensor Networks

    Wireless sensor networks have attracted great attention in research and industrial development due to their fast-growing application potentials. Most of the existing geographic routing algorithms for wireless ...

    Ming Xu, Yingwen Chen, Yi Wu, Wanrong Yu in Mobile Ad-hoc and Sensor Networks (2006)

  14. No Access

    Chapter and Conference Paper

    A Resource Reservation Protocol for Mobile Cellular Networks

    This paper proposed a protocol named RSVP-C, which aims at reserving resources for mobile cellular networks. In RSVP-C, both active and passive resource reservation routes could be established. We described th...

    Ming Xu, Zhijiao Zhang in Parallel and Distributed Processing and Applications (2005)