Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    FCSO: Source Code Summarization by Fusing Multiple Code Features and Ensuring Self-consistency Output

    Source code summarization is the process of generating a concise and generalized natural language summary from a given source code, which can facilitate software developers to comprehend and use the code bette...

    Donghua Zhang, Gang Lei, Jianmao **ao in Algorithms and Architectures for Parallel … (2024)

  2. Article

    Open Access

    Blockchain-based collaborative edge computing: efficiency, incentive and trust

    The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...

    Qinghang Gao, Jianmao **ao, Yuanlong Cao, Shuiguang Deng in Journal of Cloud Computing (2023)

  3. No Access

    Chapter and Conference Paper

    A Blockchain-Based Framework for Audio Copyright Deposition

    Based on the defects of existing audio copyright transaction processes such as complicated deposition models, long periods of rights maintenance, and ambiguous benefit distribution, this paper mainly proposes ...

    Ridong Huang, Jianmao **ao, **g Zhao, Jiangyu Wang in Mobile Internet Security (2023)

  4. No Access

    Chapter and Conference Paper

    Blockchain-Based Cross-Border Supply Chain Model

    With the rapid development of cross-border e-commerce in China, cross-border transactions are becoming more and more frequent, and the problems of centralized and easy tampering, information siloing, difficult...

    Jianyu Zou, Jianmao **ao, Xuanying Long, **n Yang in Mobile Networks and Management (2023)

  5. No Access

    Chapter and Conference Paper

    A Survey of QUIC-Based Network Traffic Identification

    With the QUIC (Quick UDP Internet Connection) protocol recognized by the Internet Engineering Task Force as the core protocol of HTTP/3, network traffic based on the QUIC protocol (also known as “QUIC traffic”...

    **aolin Gui, Yuanlong Cao, Longjun Huang, Yong Luo in Mobile Networks and Management (2023)

  6. No Access

    Chapter and Conference Paper

    USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation

    Fair evaluation of users is the basic guarantee for the healthy development of the service ecosystem. However, existing methods do not provide an indicator of when can get fair evaluation and how to reduce the...

    Jianmao **ao, Jia Zeng, Xu Miao, Yuanlong Cao in Machine Learning for Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts

    With the widespread use of smart contracts in various fields, the research on smart contract vulnerability detection has increased yearly. Most of the previous research work is based on symbol detection and co...

    Fan Jiang, Yuanlong Cao, Jianmao **ao, Hui Yi in Machine Learning for Cyber Security (2023)

  8. No Access

    Book and Conference Proceedings

    Mobile Networks and Management

    12th EAI International Conference, MONAMI 2022, Virtual Event, October 29-31, 2022, Proceedings

    Yuanlong Cao, Xun Shao in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2023)

  9. No Access

    Chapter and Conference Paper

    Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP

    With the vigorous development of mobile Internet technology, real-time streaming media applications such as mobile short video and network live broadcast are becoming more and more popular. As a result, people...

    Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao in Mobile Internet Security (2022)

  10. No Access

    Chapter and Conference Paper

    A Decentralized Scheduling Function for TSCH-Based Wireless Networks

    Time-Slotted Channel Hop** (TSCH) is the emerging standard for industrial automation and process control low-power and lossy networks. Scheduling function is very crucial in the TSCH-based wireless networks,...

    Wei Yang, Yuanlong Cao, Xun Shao, Hao Wang, Zhiming Zhang in Mobile Networks and Management (2022)

  11. No Access

    Living Reference Work Entry In depth

    Collaborative Multipath Transmission

    Yuanlong Cao, Li Zeng, Qinghua Liu, Gang Lei, Hao Wang in Encyclopedia of Wireless Networks

  12. No Access

    Chapter and Conference Paper

    A Security Architecture for Internet of Things Based on Blockchain

    Internet-of-Things (IoT) began to be widely used in smart city, smart agriculture, and smart factories. However, security issues have always threatened the development of the IoT. Blockchain is the current pr...

    Wei Yang, Hao Wang, Yadong Wan, Yuanlong Cao in Blockchain and Trustworthy Systems (2020)

  13. No Access

    Reference Work Entry In depth

    Collaborative Multipath Transmission

    Yuanlong Cao, Li Zeng, Qinghua Liu, Gang Lei, Hao Wang in Encyclopedia of Wireless Networks (2020)

  14. No Access

    Chapter and Conference Paper

    Secure Cluster-Wise Time Synchronization in IEEE802.15.4e Networks

    In IEEE802.15.4e networks, all nodes need to keep high-precision synchronization, which can enable highly reliable and low-power wireless networks. Cluster-wise time synchronization is usually necessary in IEE...

    Wei Yang, Zhixiang Lai, JuanJuan Zheng in Computational Science and Its Applications… (2018)

  15. No Access

    Article

    Joint entropy-based motion segmentation for 3D animations

    With the recent advancement of data acquisition techniques, 3D animation is becoming a new challenging subject for data processing. In this paper, we present a joint entropy-based key-frame extraction method, ...

    Guoliang Luo, Gang Lei, Yuanlong Cao, Qinghua Liu, Hyewon Seo in The Visual Computer (2017)

  16. No Access

    Chapter and Conference Paper

    Unsupervised Feature Selection with Graph Regularized Nonnegative Self-representation

    In this paper, we propose a novel algorithm called Graph Regularized Nonnegative Self Representation (GRNSR) for unsupervised feature selection. In our proposed GRNSR, each feature is first represented as a li...

    Yugen Yi, Wei Zhou, Yuanlong Cao, Qinghua Liu, Jianzhong Wang in Biometric Recognition (2016)

  17. No Access

    Article

    Qos-driven SCTP-based multimedia delivery over heterogeneous wireless networks

    Stream Control Transport Protocol (SCTP)-based handover is supposedly the best suit for current mobile Internet users. However, prevalent SCTP-based handover solutions mostly evaluate candidate networks by a f...

    YuanLong Cao, ChangQiao Xu, JianFeng Guan in Science China Information Sciences (2014)