Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    FCSO: Source Code Summarization by Fusing Multiple Code Features and Ensuring Self-consistency Output

    Source code summarization is the process of generating a concise and generalized natural language summary from a given source code, which can facilitate software developers to comprehend and use the code bette...

    Donghua Zhang, Gang Lei, Jianmao **ao in Algorithms and Architectures for Parallel … (2024)

  2. Article

    Open Access

    Blockchain-based collaborative edge computing: efficiency, incentive and trust

    The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...

    Qinghang Gao, Jianmao **ao, Yuanlong Cao, Shuiguang Deng in Journal of Cloud Computing (2023)

  3. No Access

    Chapter and Conference Paper

    A Blockchain-Based Framework for Audio Copyright Deposition

    Based on the defects of existing audio copyright transaction processes such as complicated deposition models, long periods of rights maintenance, and ambiguous benefit distribution, this paper mainly proposes ...

    Ridong Huang, Jianmao **ao, **g Zhao, Jiangyu Wang in Mobile Internet Security (2023)

  4. No Access

    Chapter and Conference Paper

    Blockchain-Based Cross-Border Supply Chain Model

    With the rapid development of cross-border e-commerce in China, cross-border transactions are becoming more and more frequent, and the problems of centralized and easy tampering, information siloing, difficult...

    Jianyu Zou, Jianmao **ao, Xuanying Long, **n Yang in Mobile Networks and Management (2023)

  5. No Access

    Chapter and Conference Paper

    A Survey of QUIC-Based Network Traffic Identification

    With the QUIC (Quick UDP Internet Connection) protocol recognized by the Internet Engineering Task Force as the core protocol of HTTP/3, network traffic based on the QUIC protocol (also known as “QUIC traffic”...

    **aolin Gui, Yuanlong Cao, Longjun Huang, Yong Luo in Mobile Networks and Management (2023)

  6. No Access

    Chapter and Conference Paper

    USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation

    Fair evaluation of users is the basic guarantee for the healthy development of the service ecosystem. However, existing methods do not provide an indicator of when can get fair evaluation and how to reduce the...

    Jianmao **ao, Jia Zeng, Xu Miao, Yuanlong Cao in Machine Learning for Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts

    With the widespread use of smart contracts in various fields, the research on smart contract vulnerability detection has increased yearly. Most of the previous research work is based on symbol detection and co...

    Fan Jiang, Yuanlong Cao, Jianmao **ao, Hui Yi in Machine Learning for Cyber Security (2023)

  8. No Access

    Book and Conference Proceedings

    Mobile Networks and Management

    12th EAI International Conference, MONAMI 2022, Virtual Event, October 29-31, 2022, Proceedings

    Yuanlong Cao, Xun Shao in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2023)

  9. No Access

    Article

    EDSF: Efficient Distributed Scheduling Function for IETF 6TiSCH-based Industrial Wireless Networks

    IETF 6TiSCH, which is composed of the IEEE802.15.4e and IPv6 RPL protocols, is a highly reliable and low-power industrial wireless network protocol stack. IEEE802.15.4e is the medium access control (MAC) layer...

    Wei Yang, Yuanlong Cao, Hao Wang, Zhiming Zhang in Mobile Networks and Applications (2022)

  10. No Access

    Article

    Empirical Mode Decomposition-empowered Network Traffic Anomaly Detection for Secure Multipath TCP Communications

    The development of new technologies such as the Internet of Things and cloud computing tests the transmission capabilities of communication networks. With the widespread application of multiple wireless access...

    Yuanlong Cao, Ruiwen Ji, **n Huang, Gang Lei, Xun Shao in Mobile Networks and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP

    With the vigorous development of mobile Internet technology, real-time streaming media applications such as mobile short video and network live broadcast are becoming more and more popular. As a result, people...

    Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao in Mobile Internet Security (2022)

  12. No Access

    Chapter and Conference Paper

    A Decentralized Scheduling Function for TSCH-Based Wireless Networks

    Time-Slotted Channel Hop** (TSCH) is the emerging standard for industrial automation and process control low-power and lossy networks. Scheduling function is very crucial in the TSCH-based wireless networks,...

    Wei Yang, Yuanlong Cao, Xun Shao, Hao Wang, Zhiming Zhang in Mobile Networks and Management (2022)

  13. No Access

    Article

    Investigations on the nonlinear dynamic characteristics of a rotor supported by porous tilting pad bearings

    Porous tilting pad bearings (PTPBs) combine the advantages of tilting pad and porous gas bearings and can be used in rotary motion and precision machine tools. This research mathematically investigates the dyn...

    Yihua Wu, Mingwei Deng, Kai Feng, Hanqing Guan, Yuanlong Cao in Nonlinear Dynamics (2020)

  14. No Access

    Living Reference Work Entry In depth

    Collaborative Multipath Transmission

    Yuanlong Cao, Li Zeng, Qinghua Liu, Gang Lei, Hao Wang in Encyclopedia of Wireless Networks

  15. No Access

    Chapter and Conference Paper

    A Security Architecture for Internet of Things Based on Blockchain

    Internet-of-Things (IoT) began to be widely used in smart city, smart agriculture, and smart factories. However, security issues have always threatened the development of the IoT. Blockchain is the current pr...

    Wei Yang, Hao Wang, Yadong Wan, Yuanlong Cao in Blockchain and Trustworthy Systems (2020)

  16. No Access

    Reference Work Entry In depth

    Collaborative Multipath Transmission

    Yuanlong Cao, Li Zeng, Qinghua Liu, Gang Lei, Hao Wang in Encyclopedia of Wireless Networks (2020)

  17. No Access

    Article

    Transient characteristics of a straight tube actuated by viscous compressible flow with consideration of large axisymmetric deformation

    Advancements in soft materials and advantages brought by unlimited degrees of freedom have led to the wide acceptance of soft robotics in medical and military fields. Gas actuation has been widely adopted in s...

    Min Zhang, Kai Feng, Kai Zhang, Zilong Zhao, Yuanlong Cao in Acta Mechanica (2019)

  18. No Access

    Chapter and Conference Paper

    Secure Cluster-Wise Time Synchronization in IEEE802.15.4e Networks

    In IEEE802.15.4e networks, all nodes need to keep high-precision synchronization, which can enable highly reliable and low-power wireless networks. Cluster-wise time synchronization is usually necessary in IEE...

    Wei Yang, Zhixiang Lai, JuanJuan Zheng in Computational Science and Its Applications… (2018)

  19. No Access

    Article

    Joint entropy-based motion segmentation for 3D animations

    With the recent advancement of data acquisition techniques, 3D animation is becoming a new challenging subject for data processing. In this paper, we present a joint entropy-based key-frame extraction method, ...

    Guoliang Luo, Gang Lei, Yuanlong Cao, Qinghua Liu, Hyewon Seo in The Visual Computer (2017)

  20. Article

    Open Access

    Receiver-assisted cellular/wifi handover management for efficient multipath multimedia delivery in heterogeneous wireless networks

    In a heterogeneous wireless environment, mobility particularly vertical handover between WiFi and cellular data service has to be supported. The support for multihoming feature makes Stream Control Transmissio...

    Yuanlong Cao, Qinghua Liu, Yi Zuo in EURASIP Journal on Wireless Communications… (2016)

previous disabled Page of 2