default search action
NaNA 2021: Lijiang City, China
- 2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021. IEEE 2021, ISBN 978-1-6654-4158-2
- Wendi Sun, Xiaoying Liu, Kechen Zheng, Yang Xu, Jia Liu:
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting. 1-7 - Yuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang:
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. 8-14 - Ranran Sun, Bin Yang, Shenghui Zhao:
Covert Communication in D2D Underlaying Cellular Network. 15-22 - Wentao Du, Xinyu Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun:
Calibrating Privacy Budgets for Locally Private Graph Neural Networks. 23-29 - Yangyang Liu, Pinchang Zhang, Xufei Li:
Physical Layer Authentication Using MmWave Channel State Information. 30-33 - Yanwen Liu, Wei Su, Lizhuang Tan:
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol. 34-40 - Xufei Li, Shuiguang Zeng, Yangyang Liu:
Covert Authentication at the Physical Layer. 41-46 - Shiyi Zou, Lingge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang:
Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI. 47-51 - Ze Yang, Youliang Tian:
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory. 52-58 - Muhammad Fawad Khan, Limei Peng:
Energy-efficient UAV Trajectory Planning Based On Flexible Data Rate. 59-62 - He Zhu, Huihui Wu, Xiaohong Jiang:
Covert MIMO Communication in Two-hop Relay Systems. 63-68 - Cheng Zhang, Xuening Liao, Zhenqiang Wu, Guoyong Qiu:
Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays. 69-74 - Hui Wang, Yani Han, Shaojing Yang, Anxiao Song, Tao Zhang:
Privacy-Preserving Federated Generative Adversarial Network for IoT. 75-80 - Mubarak Umar, Xuening Liao, Jiawang Chen:
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics. 81-87 - Yu He, Youliang Tian, Hua Xu:
Random verifiable multi-server searchable encryption scheme. 88-93 - Dalia Nashat, S. Khairy:
Detecting Http Flooding Attacks Based on Uniform Model. 94-98 - Chen Yang, Zhen Jia, Shundong Li:
Privacy-Preserving Proximity Detection Framework for Location-Based Services. 99-106 - Alibek Nurgaliyev, Hua Wang:
Comparative study of symmetric cryptographic algorithms. 107-112 - Tianyi Liang, Huijie Zhu:
Research on PDCCH Channel in 5G NR System. 113-118 - Ahmed Salem, Huihui Wu, Xiaohong Jiang:
Exact Evaluation of Total Variation Distance in Covert Communications. 119-124 - Yuanhang He, Lei Chen, Yi Ni, Yuyao Wang, Jiangtao Li, Yufeng Li:
Privacy protection scheme for edge computing based on function encryption. 131-135 - Jingping She, Ne Wang, Ruiting Zhou, Chen Tian:
Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks. 136-143 - Zhonghua Xie, Tao Tao, Lisheng Ma:
Emergency Virtual Machine Online Migration in Cloud Data Centers. 144-149 - Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao:
Energy-saving mechanism based on tidal characteristic in computing power network. 150-154 - Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. 155-160 - Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. 161-167 - Zichen Feng, Changqiao Xu, Han Xiao, Yongpu Jia, Zhongyi Ding, Zhaoyang Liu:
Dynamic Overhead Queue-based Efficient Service Delivery at Edge for Adaptive Live Streaming. 168-173 - Gaofeng Hong, Qili Wen, Wei Su:
A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing. 174-180 - Pin Chen, Naijie Gu:
A Game Theory Perspective on IP Routing Protocols Evaluation. 181-185 - Yuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao:
Research on Data Security of Unmanned Aerial Vehicles. 186-193 - Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Ming-Ze Wang:
CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift. 194-199 - Guozhu Zhao, Pinchang Zhang, Lisheng Ma:
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios. 200-205 - Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen:
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI. 206-211 - Yue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu:
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems. 212-216 - Yanchun Kong, Weibin Su, Gang Xu:
Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing. 217-221 - Mingbo Pan, Weibin Su, Yikai Wang:
Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing. 222-226 - Yanxia Tan, Yong Zhang, Yanlei Zheng, Yacheng Liu, Guangquan Wang, Yuefeng Ji:
Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound API. 227-230 - Zhi Qiao, Bo Liu, Bo Tian, Yu Liu:
Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet Network. 231-235 - Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:
A Method for Fast Outlier Detection in High Dimensional Database Log. 236-241 - Liumei Zhang, Xi Deng, Yichuan Wang:
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net. 242-247 - Wu Wang, Yuejuan Liu, Shikai Shen:
Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic Fluid. 248-253 - Aiguo Wang, Yue Meng, Jinjun Liu, Shenghui Zhao, Guilin Chen:
Multi-domain Feature Extraction for Human Activity Recognition Using Wearable Sensors. 254-259 - Hong Xia, Jianguo Li, Yanping Chen, Ning Lv, Zhongmin Wang, Qingyi Dong:
CLSDRL: A routing optimization method for traffic feature extraction. 260-264 - Yusuke Noda, Bishnu Prasad Gautam:
A Proposal of Large Scale Network Route Optimization Technique Based on Genetic Algorithm. 265-271 - Junjie Lu, Chao Qi:
Fatigue Detection Technology for Online Learning. 272-277 - Xu An Wang, Yunxuan Su, Jindan Zhang:
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. 278-281 - Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Zhiqiang Hou:
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network. 282-287 - Guorong Zhang, Lingge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He:
A Modified K-means User Grouping Design for HAP Massive MIMO Systems. 288-292 - Fang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou:
A New Symmetric Information Hiding Scheme Based on Cover Randomness. 293-300 - Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang:
Network Traffic Oriented Malware Detection in IoT (Internet-of-Things). 301-307 - Kaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao:
An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection. 308-312 - Qingyi Ye, Tingting Zhao, Guo Sun, Xia Feng:
A Recommendation Scheme with Reputation-Based Incentive Mechanism on Consortium Blockchain. 313-318 - Junpeng Zhang, Mengqian Li, Shuiguang Zeng, Bin Xie, Dongmei Zhao:
A survey on security and privacy threats to federated learning. 319-326 - Yuanqing Liu, Ning Xi, Yongbo Zhi:
NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android. 327-333 - Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu:
Research on A Vulnerability Detection Technology for Network Topology Security. 334-337 - Zhang Lin:
Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data. 338-344 - Xiaoguo Lin, Pujie Jing, Chuntang Yu, Xia Feng:
TPLI: A Traceable Privacy-preserving Logistics Information Scheme via Blockchain. 345-350 - Chen Chong, Zou Ping:
Network application vulnerability detection based on fuzzing technology. 351-355 - Dongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng:
An efficient authentication scheme based on Zero Trust for UAV swarm. 356-360 - Xue Wang, Hao Zhang, Kaijun Wu:
Expression Tree-based Policy Conflict Detection Algorithm. 361-366 - Xiaoteng Yang, Wenbo Zhang, Bo Liu, Hong Su:
On the Robustness of Complex System With Percolation Theory Under Node Attack. 367-372 - Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao:
The Trade-off Between Privacy and Utility in Local Differential Privacy. 373-378 - Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen:
Access Control Scheme Supporting Attribute Revocation in Cloud Computing. 379-384 - Rui Li, Zilan Yang:
The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance. 385-389 - Yu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu:
Implementation and Analysis of Hybrid DRAM PUFs on FPGA. 390-394 - Sisong Ru, Bingbing Zhang, Yixin Jie, Chi Zhang, Lingbo Wei, Chengjie Gu:
Graph Neural Networks for Privacy-Preserving Recommendation with Secure Hardware. 395-400 - Yue He, Hui Li, Yiming Li, Qiang Wu, Yuefeng Ji, Rentao Gu, Shaobin Fan:
Exploration of Simulation Teaching Mode for Intelligent Information Network Course. 401-407 - Zhihui Wang, Jianrui Chen, Peijie Wang, Tingting Zhu:
Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal Recommendation. 408-413 - Zhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, Kui Liu, Bin Wang, Xinghui Zhu, Jiadong Chen:
You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens. 414-419 - Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:
Chinese named entity recognition method for the field of network security based on RoBERTa. 420-425 - Yan Jiao, Pin-Han Ho:
Design of Binocular Stereo Vision System Via CNN-based Stereo Matching Algorithm. 426-431 - Chun Jen Lin, Yan Luo, Liang-Min Wang:
Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment. 432-436 - Xiangyi Lu, Qing Ren, Feng Tian:
A Fine-tuning-based Adversarial Network for Member Privacy Preserving. 437-442 - Jiahui Sun, Ningchun Liu, Shuai Gao, Wei Su:
A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier Network. 437-442 - Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. 443-448 - Yubaraj Gautam, Kazuhiko Sato, Bishnu Prasad Gautam, Norio Shiratori:
Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network. 449-455 - Ke Zhao, Limei Peng:
UAV Deployment with Flexible Height Under SINR Constraint. 456-460 - Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li:
Cold-start Recommendation Method Based on Homomorphic Encryption. 461-465 - Lingling An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma:
Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network. 466-471 - Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu:
Network Construction Using Overlapping Histogram under Local Differential Privacy. 472-479 - Kenan Qin, Yihui Zhou, Bo Tian, Rui Wang:
AttentionAE: Autoencoder for Anomaly Detection in Attributed Networks. 480-484 - You Wu, Xin-feng Dong, Jin Bo Wang, Wen-zheng Zhang:
Construction of MDS Matrices Based on the Primitive Elements of the Finite Field. 485-488 - Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu:
Privacy-Preserving and Efficient Range Counting in IoT Networks. 489-494 - Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:
A permission generation and configuration method based on Rules and FP-Growth algorithm. 495-500 - Yongchao Dang, Chafika Benzaïd, Bin Yang, Tarik Taleb:
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems. 501-506 - Mingyi You, Binhua Shi, Yunxia Ye, Kai Huang:
Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase Interferometers. 507-512 - Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. 513-519 - Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. 520-526 - Ruizhi Zhai, Deshun Yin, Jianping Wang, Lili Yuan, Ziheng Shangguan:
Wet Aggregate Stability Predicting of Soil in Multiple Land-Uses Based on Support Vector Machine. 527-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.