Skip to main content

and
  1. No Access

    Article

    A message transmission scheduling algorithm based on time-domain interference alignment in UWANs

    High propagation delays cause message collisions at intended nodes, which seriously affects network performance. In this paper, we consider the transmission scheduling problem of messages with specified transm...

    Nan Zhao, Nianmin Yao, Zhenguo Gao in Peer-to-Peer Networking and Applications (2021)

  2. No Access

    Chapter and Conference Paper

    Memory Confidentiality and Integrity Protection Technology

    In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...

    Hong** Wang, Huimin Meng, Nianmin Yao in Communications, Signal Processing, and Sys… (2020)

  3. No Access

    Article

    A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs

    Vehicular ad hoc networks (VANETs) have the potential to change the way of people drive, travel and so on, in which vehicle can broadcast and forward the message of road condition or emergency. When the receiv...

    Shibin Wang, Nianmin Yao in Wireless Networks (2019)

  4. No Access

    Article

    Efficient key generation leveraging channel reciprocity and balanced gray code

    Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, ...

    Furui Zhan, Nianmin Yao, Zhenguo Gao, Zhimao Lu, Bingcai Chen in Wireless Networks (2019)

  5. No Access

    Article

    An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing

    To address the challenges of privacy preserving and incentive mechanisms, the paper proposes a system and a strategy to ensure anonymous data reporting while ensuring incentives simultaneously. The envisioned ...

    Yang Li, Yunlong Zhao, Serrat Ishak in Journal of Ambient Intelligence and Humani… (2018)

  6. No Access

    Article

    A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

    Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the s...

    Shibin Wang, Nianmin Yao, Ning Gong in Peer-to-Peer Networking and Applications (2018)

  7. No Access

    Article

    A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs

    Being the building block of network infrastructure for Vehicular Ad-hoc Networks (VANETs), Roadside Units (RSUs) can facilitate vehicle-to-vehicle communications and bridge communications between vehicles and ...

    Zhenguo Gao, Danjie Chen, Nianmin Yao, Zhimao Lu in Wireless Personal Communications (2018)

  8. No Access

    Article

    Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints

    Outage probability analysis of cognitive selective DF relay networks with selection combining technique taking into account all the following issues is important: multiple SU relays, multiple PUs, non-identica...

    Zhenguo Gao, Danjie Chen, Nianmin Yao, Zhimao Lu in Wireless Personal Communications (2017)

  9. No Access

    Article

    Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining

    Outage probability of selective decode-and-forward (DF) relay networks with different relay selection schemes are usually analyzed separately in the literature. In this paper, for selective DF relay networks w...

    Zhenguo Gao, Danjie Chen, Bingcai Chen, Zhimao Lu in Wireless Personal Communications (2015)

  10. Article

    Open Access

    A reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network

    MPNC (multiple path and network coding) is proposed as a reliable transport protocol for UWASN (underwater acoustic sensor network). In MPNC, after three disjoint paths being established, two groups of packets (A

    Shaobin Cai, Nianmin Yao, Zhenguo Gao in EURASIP Journal on Wireless Communications… (2015)

  11. No Access

    Article

    Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters

    In this paper, we investigate outage performance of dual-hop cognitive AF relay networks with multiple primary users (PUs) and heterogeneous non-identical parameters, including non-identical Rayleigh fading ch...

    Zhenguo Gao, Danjie Chen, Bingcai Chen, Nianmin Yao in Wireless Personal Communications (2014)

  12. Article

    Open Access

    Research of localization algorithm based on weighted Voronoi diagrams for wireless sensor network

    Wireless sensor network (WSN) is formed by a large number of cheap sensors, which are communicated by an ad hoc wireless network to collect information of sensed objects of a certain area. The acquired informatio...

    Shaobin Cai, Hongqi Pan, Zhenguo Gao in EURASIP Journal on Wireless Communications… (2014)

  13. Article

    Open Access

    Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks

    In this article, we intend to investigate the performance of channel access protocols in multi-hop underwater acoustic sensor networks, which are characterized by long propagation delays and limited channel ba...

    Hongyang Yu, Nianmin Yao, Shaobin Cai in EURASIP Journal on Wireless Communications… (2013)

  14. No Access

    Chapter

    Tree-Mesh Based P2P Streaming Data Distribution Scheme

    This paper presents the design of a novel P2P live streaming policy, tree-mesh based P2P Streaming Data Distribution Scheme(TMDS). Both the tree-based and the mesh-based structures have respective flaws while ...

    Jianming Zhao, Nianmin Yao, Shaobin Cai, **ang Li in Knowledge Discovery and Data Mining (2012)