default search action
NaNA 2019: Daegu, South Korea
- 2019 International Conference on Networking and Network Applications, NaNA 2019, Daegu, Korea (South), October 10-13, 2019. IEEE 2019, ISBN 978-1-7281-2629-6
Track 1: Wireless Networks
- Minzheng Xuanyuuan, Le Xiao, Weidong Yang:
Analysis of Influence Maximization Algorithm in Hub-Sparse Structure Social Network. 1-8 - Zhao Li, Ke Long, Yanan Tian, Xiaohong Li, Liyuan Xiao, Jiamin Ding, Jia Liu:
Space-Power Adaptive Interference Steering. 9-14 - Jun Niu, Xiaoyan Zhu, Lei Shi, Jianfeng Ma:
Time-Aware Dummy-Based Privacy Protection for Continuous LBSs. 15-20 - Muyu Zhao, Xiaoyan Zhu, Jun Niu, Jianfeng Ma:
A Semantic-Based Dummy Generation Strategy for Location Privacy. 21-26 - Md. Enamul Kabir, Lili Sun, Hua Wang:
Finding an Optimum Set of Roles in a CPAC Model. 27-33 - Gaofeng Hong, Qili Wen, Wei Su, Penglei Wu:
An Optimal Resource Allocation Mechanism in Vehicular MEC Systems. 34-38 - Liyuan Xiao, Zhao Li, Lu Zhen, Bigui Zhang, Yang Xu, Jia Liu:
Taichi: Signal Dodging and Interference Guiding. 39-44 - Wenchao Pi, Hao Hao, Shujie Yang, Yong Liao, Changqiao Xu:
RBDR: A Distributed Routing Algorithm in High Mobility UAV Network. 45-50 - Tong Li, Xiaoqing Li, Xuefeng Liu:
An Efficient Privacy-Preserving Bidirectional Friends Matching Scheme in Mobile Social Networks. 51-57 - Lin Yang, Zhihong Liu, Yong Zeng, Shijia Mei, Jianfeng Ma:
Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning. 58-63 - Cuili Jiang, Tengfei Cao, Zhiqiang Liu, Xiaoying Wang, Shanjun Zhang:
Multimedia Service Distribution Optimization in Edge Cloud Networks. 64-69 - Ziwen Zhao, Ayong Ye, Lingyu Meng, Qiang Zhang:
Pseudonym Changing for Vehicles in VANETs: A Game-Theoretic Analysis Based Approach. 70-74 - Han Xiao, Tengfei Cao, Shujie Yang, Lujie Zhong, Yong Liao, Changqiao Xu:
Service Stochastic Optimization with Energy Constraint Over UAV-Assisted Network. 75-80 - Miaofei Zhang, Bin Yang, Shenghui Zhao, Lisheng Ma:
Secrecy Capacity Analysis in D2D-Enabled Cellular Networks Under Power Control. 81-84 - Jianping Cai, Mingming Chen, Shuangyue Zhang, Chengxi Hong, Yuehong Lu:
A Fast Algorithm for Solving a Kind of Gauss Hypergeometric Functions in Wireless Communication Based on Pfaff Transformation. 85-89 - Longfei Wang, Yong Zeng, Yixin Li, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Research on Resolution Limit of Community Detection in Location-Based Social Networks. 90-95 - Mubarak Umar, Xuening Liao, Jiawang Chen:
Enhanced BAN-GZKP: Optimal Zero Knowledge Proof Based Scheme in Body Area Networks. 96-101 - Xuening Liao, Yuanyu Zhang, Bo Liu, Zhenqiang Wu:
Secure Communication in Two-Hop Buffer-Aided Networks with Limited Packet Lifetime. 102-106 - Haoran Mei, Qiang Zhao, Limei Peng:
Energy-Efficiency in Cache-Enabled mmWave Cellular Networks. 107-112 - Hongli Yu, Bin Yang, Jinjun Liu, Tao Wang:
An Improved Mobile Charging Algorithm for Wireless Sensor Networks. 113-118 - Shumaila Javaid, Hamza Fahim, Xuening Liao, Farhana Javed:
Exploiting Temporal Correlation Mechanism for Energy Efficient Data Collection in Intrabody Nanonetworks. 119-123 - Hamza Fahim, Wei Li, Shumaila Javed, Farhana Javed:
Bio-Inspired Nanorouter Mobility Model for Energy Efficient Data Collection in Intrabody Nanonetwork. 124-128 - Jun Li:
Mobility-Aware Gradient Routing Algorithm for Flying Ad hoc Networks. 129-134
Track 2: Wired Networks and Data Center (DC) Networks
- Shu Li, Rentao Gu, Geng Zhang, Yanan Wang, Yang Wang, Yuefeng Ji:
Order Aware Service Recovery Algorithm in Elastic Optical Network with Multiple Failures. 135-141 - Xiaoban Wu, Peilong Li, Timothy Miskell, Liang-Min Wang, Yan Luo, Xiaohong Jiang:
Ripple: An Efficient Runtime Reconfigurable P4 Data Plane for Multicore Systems. 142-148 - Kun Yu, Li-Zhuang Tan, Xiao-jin Wu, Wei Su:
Sonum: Software-Defined Optimal Network Utilization Mechanism for Long Flow Scheduling in Data Center Networks. 149-154 - Lisheng Ma, Bin Yang:
Data Backup in Geo-Distributed Data Center Networks Under Time and Budget Constraints. 155-159 - Wenhao Zhang, Lisheng Ma, Xiaohong Jiang:
Disaster-Aware Dynamic Routing for SDN-Based Active-Active Data Center Networks. 160-165 - Hongle Du, Lin Zhang, Yan Zhang:
Network Intrusion Detection Based on Selective Ensemble Learning. 166-170 - Lin Zhang, Hongle Du, Yan Zhang:
Network Anomaly Detection Based on Cooperative Semi-Supervised Support Vector Machine. 171-180 - Ziwei Han, Laifeng Lu, Hai Liu:
A Differential Privacy Preserving Approach for Logistic Regression in Genome-Wide Association Studies. 181-185 - Yupan Tian, Yang Niu, Jun Yan, Feng Tian:
Inferring Private Attributes Based on Graph Convolutional Neural Network in Social Networks. 186-190 - Muhammad Azfar Yaqub, Syed Hassan Ahmed, Dongkyun Kim:
A Detailed Simulation Study of the Push-Based Protocol for Critical Data Dissemination in Vehicular Named Data Networks. 191-195
Track 3: Network Management, Monitoring, and Automation
- Man Li, Wei Su, Shuai Gao, Li-Zhuang Tan:
Delay Prediction and Abnormal Detection for Hybrid Cloud Based on GBDT. 196-201 - Zhongmin Wang, Yue Tong, Xia Heng:
Emotional Analysis Based on Dynamic Functional Brain Network. 202-207 - Cong Gao, Zhongmin Wang, Yanping Chen:
On the Connectivity of Highly Dynamic Wireless Sensor Networks in Smart Factory. 208-212 - Zeyu Zhang, Zhiyang Lu, Youliang Tian:
Data Privacy Quantification and De-identification Model Based on Information Theory. 213-222 - Fangwei Wang, Shaojie Yang, Dongmei Zhao, Changguang Wang:
An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment. 223-228 - Yanping Chen, Cong Gao, Weihui Yang, Zhongmin Wang, Zhong Yu, Hong Xia:
A Recurrent Gaussian Process Regression Model with Composite Kernel for Industrial Process Quality Prediction. 229-234 - Jianfeng Chen, Jie Liu, Zhi Sun, Chunlin Li, Chunhui Hu:
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration. 235-240 - Wei Wang, Binbin Bai, Yichuan Wang, Xinhong Hei, Li Zhang:
Bitstream Protocol Classification Mechanism Based on Feature Extraction. 241-246 - Zhongmin Wang, Lanlan Cai, Na Duan, Lin Fan:
Improved Siamese Network for Video-Based Person Re-identification. 247-252 - Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving. 253-258
Track 4: Network Applications
- Lingjie Zhou, Yong Zeng, Yang Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Edge Weight Differential Privacy Based Spectral Query Algorithm. 259-267 - Jie Chi, Lihua Dong, Yong Zeng:
Reconfigurable Pseudo-Random Number Generator Based on Cellular Automata. 268-273 - Linxia Gong, Feng Guo, Quanli Miao:
Location Privacy Protection in Mobile Social Networks Based on l-Diversity. 274-281 - Mengli Liu, Yong Zeng, Yi-Kai Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Collective Influence Based Privacy Preservation for Social Networks. 282-289 - Hui Qiao, Yangyang Liu, Xuewen Dong, Di Lu:
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model. 290-295 - Krishna Prasad Bhattarai, Khamvila Visai, Ryohei Ito, Kazuhiko Sato, Bishnu Prasad Gautam:
Monitoring of E-Learning System Servers Using the MariaDB Galera Cluster. 296-301 - Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. 302-308 - Li Zhang, Chunhong Wang, Tao Pei, Yong Zeng:
Another Analysis of a Synchronizing Stream Cipher Combining LFSR and FCSR. 309-312 - Dongsheng Qi, Naijie Gu, Junjie Su:
Detecting Data Race in Network Applications using Static Analysis. 313-318 - Jiawei Zhang, Jianfeng Ma, Zhuo Ma, Ning Lu, Yanbo Yang, Teng Li, Dawei Wei:
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health. 319-324 - Xiaohan Zhu, Xiang Lu, Shaobo Wu:
Research on Pricing Mechanism and Security of Digital Currency. 325-331 - Pengfei Yang, Yumin Tian, Lu Fan, Fanhui Zhou, Jiayang Huang:
A Time-Based bi-Objective Virtual Machine Placement Algorithm in Cloud Computing Platform. 332-337 - Mingkang Zhang, Yanbiao Ma, Linan Zheng, Yuanyuan Wang, Zhihong Liu, Jianfeng Ma:
Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles. 338-343 - Wei Tong, Xuewen Dong, Jiawei Zheng:
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus Algorithm. 344-349 - Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
A Topology Based Differential Privacy Scheme for Average Path Length Query. 350-355 - Huichuan Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method. 356-361 - Guozhu Zhao, Lisheng Ma, Shenghui Zhao:
Rapid Data Evacuation Based on Zone Risks for Large-Scale Disasters in Software-Defined Optical Networks. 362-367 - Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. 368-373 - Xinlei Wang, Zhenqiang Wu, Bo Liu:
A Monotone Detection Algorithm to Mitigate ISI for Molecular Communications Based on Drift Diffusion. 374-378 - Teng Li, Jianfeng Ma, Pengbin Feng, Yue Meng, XinDi Ma, Jiawei Zhang, Chenyang Gao, Di Lu:
Lightweight Security Authentication Mechanism Towards UAV Networks. 379-384 - Feng Tian, Zhenqiang Wu, Hai Liu, Laifeng Lu, Xiaolin Gui:
Secure Spatial Query with Differentially Private Access Pattern. 385-390 - Xiaolan Liu, Wu Wang, Bin Yang, Yuanyuan Fan:
Incentive Mechanism for Data Uploading in Mobile Crowdsensing. 391-395 - Junshuai Sun, Jianfeng Ma, Jiao Quan, Xinghui Zhu, Chih-Lin I:
A Fuzzy String Matching Scheme Resistant to Statistical Attack. 396-402 - Shiyang Ma, Xuewen Dong, Jiawei Zheng, Xiaozhou Yang, Qihang Liu:
Partial-Equivalence: A Semantic Strategy in Service Composition and Modeling. 403-408 - Xuewen Dong, Qihang Liu, Di Lu, Shiyang Ma, Jiawei Zheng:
QoS-Aware Path Finding and Load Balancing in Service-Composition. 409-414 - Xinghui Zhu, Chaojie Pan, Lele Zheng, Junshuai Sun:
Detection Method on the Privacy Leakage for Composite Services. 415-420 - Anter Faree, Yongzhi Wang:
Protecting Security-Sensitive Data Using Program Transformation and Intel SGX. 421-428 - Hai Liu, Zhenqiang Wu, Changgen Peng, Xiujuan Lei, Feng Tian, Laifeng Lu:
Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing. 429-436 - Pengfei Yang, Jiayang Huang, Xin Mi, Bo Wan:
An Integrity Protection Scheme Based on Binary Multi-granularity Incremental Tree for Embedded Computing Platform. 437-445 - Li Yang, Jiaxue Wang, Huihui Guo, Jianfeng Ma:
An Automatic Crisis Information Recognition Model Based on BP Neural Network. 446-451 - Lingxiao Yang, Xuewen Dong, Siyu Xing, Jiawei Zheng, Xinyu Gu, Xiongfei Song:
An Abnormal Transaction Detection Mechanim on Bitcoin. 452-457 - Chenyang Gao, Jianfeng Ma, Yulong Shen, Teng Li, Fei Li, Yuelin Gao:
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm. 458-463 - Huanhuan Zhao, Zuchang Ma, Yining Sun:
A Hypertension Risk Prediction Model Based on BP Neural Network. 464-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.