![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Hybrid Framework for Class-Imbalanced Classification
Data classification is a commonly used data processing method in the fields of networks and distributed systems, and it has attracted extensive attention in recent years. Nevertheless, the existing classificat...
-
Chapter and Conference Paper
K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
Recent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researc...
-
Chapter and Conference Paper
Exploration of Human Activities Using Sensing Data via Deep Embedded Determination
Clustering analysis is one of promising techniques of uncovering different types of human activities from a set of ubiquitous sensing data in an unsupervised manner. Previous work proposes deep clustering to l...
-
Chapter and Conference Paper
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection
Machine learning algorithms have been increasingly adopted in Intrusion Detection Systems (IDSs) and achieved demonstrable results, but few studies have considered intrinsic vulnerabilities of these algorithms...
-
Chapter and Conference Paper
An Adaptive MAC Protocol for Wireless Rechargeable Sensor Networks
In the existing medium access control (MAC) protocols of rechargeable sensor networks, the maximum charging threshold of sensor nodes generally set to a fixed value based on nodes battery capacity. It leads to...
-
Chapter and Conference Paper
Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments
Cloud platforms can provide elastic infrastructure for mobile users. Therefore, publicly auditing the integrity of shared data outsourced on the cloud is very important since the cloud may be untrusted. Howeve...
-
Chapter and Conference Paper
Throughput Prediction-Based Rate Adaptation for Real-Time Video Streaming over UAVs Networks
Real-time video streaming is extensively used in UAVs networks for battlefield surveillance, disaster relief, etc. The available throughput of the multi-hop networks varies a lot with the movement of UAVs. To ...
-
Chapter and Conference Paper
Empirical Study on Spatial and Temporal Features for Vehicular Wireless Communications
Traditional networking technologies based on static topology analysis are not sufficient to the dynamic Vehicular Ad hoc Network. Understanding the network dynamics caused by vehicle mobility is very important...
-
Chapter and Conference Paper
Schedule Algorithms for File Transmission in Vehicular Ad Hoc Networks
The development of vehicular ad-hoc networks has lead to several new services, such as instant messages, multi-media videos and large data transmissions. These applications have altered the pattern of data tra...
-
Chapter and Conference Paper
Local Information Storage Protocol for Urban Vehicular Networks
Local information dissemination is a potential application of VANETs. By cooperative communication among vehicles, the information could be stored in a certain size of region for some time. However, it is diff...
-
Chapter and Conference Paper
ContactSim: An Efficient Realistic Trace Driven Contact Simulator for Vehicular Opportunistic Networks
Opportunistic networking is an innovative data delivery solution, which leverages the contact opportunities between mobile terminals to exchange messages. The contact events are highly relevant to human behavi...
-
Chapter and Conference Paper
MASS: Multiple ASSociation Scheme in IEEE 802.11 Wireless Mesh Networks
Traditional association mechanism in IEEE 802.11 is in the form of one-to-many. It indicates that an access point (AP) can associate with many clients at the same time, while one client is capable to be associ...
-
Chapter and Conference Paper
An Anti-void Geographic Routing Algorithm for Wireless Sensor Networks
Wireless sensor networks have attracted great attention in research and industrial development due to their fast-growing application potentials. Most of the existing geographic routing algorithms for wireless ...
-
Chapter and Conference Paper
A Resource Reservation Protocol for Mobile Cellular Networks
This paper proposed a protocol named RSVP-C, which aims at reserving resources for mobile cellular networks. In RSVP-C, both active and passive resource reservation routes could be established. We described th...