default search action
Yanfei Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2010
- [b1]Yanfei Fan:
Network Coding based Information Security in Multi-hop Wireless Networks. University of Waterloo, Ontario, Canada, 2010
Journal Articles
- 2023
- [j11]Yanfei Fan, Lele Li, Haihua Chen, Lei Guan:
Evaluation and Application of SMRT Model for L-Band Brightness Temperature Simulation in Arctic Sea Ice. Remote. Sens. 15(15): 3889 (2023) - 2015
- [j10]Jiming Chen, Qing Yu, Bo Chai, Youxian Sun, Yanfei Fan, Xuemin (Sherman) Shen:
Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach. IEEE Trans. Parallel Distributed Syst. 26(1): 95-106 (2015) - 2014
- [j9]Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, Xuemin Shen:
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2211-2221 (2014) - 2012
- [j8]Rongfei Zeng, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin (Sherman) Shen:
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting. IEEE Trans. Parallel Distributed Syst. 23(10): 1819-1830 (2012) - 2011
- [j7]Rongfei Zeng, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin (Sherman) Shen:
A scalable and robust key pre-distribution scheme with network coding for sensor data storage. Comput. Networks 55(10): 2534-2544 (2011) - [j6]Jiming Chen, Qing Yu, Peng Cheng, Youxian Sun, Yanfei Fan, Xuemin Shen:
Game Theoretical Approach for Channel Allocation in Wireless Sensor and Actuator Networks. IEEE Trans. Autom. Control. 56(10): 2332-2344 (2011) - [j5]Yanfei Fan, Yixin Jiang, Haojin Zhu, Jiming Chen, Xuemin (Sherman) Shen:
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks. IEEE Trans. Wirel. Commun. 10(3): 834-843 (2011) - 2010
- [j4]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks. IEEE Trans. Wirel. Commun. 9(3): 945-950 (2010) - 2009
- [j3]Yixin Jiang, Yanfei Fan, Xuemin (Sherman) Shen, Chuang Lin:
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Comput. Networks 53(18): 3089-3101 (2009) - [j2]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Yanfei Fan, Xuemin Shen:
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 58(8): 4628-4639 (2009) - 2006
- [j1]Hao Yin, Zhangxi Tan, Chuang Lin, Geyong Min, Yanfei Fan:
A context-based simulation tool for design and evaluation of network processors. Simul. Model. Pract. Theory 14(3): 263-278 (2006)
Conference and Workshop Papers
- 2022
- [c11]Lele Li, Yanfei Fan, Haihua Chen, Lili Zhan:
Sensitivity Analysis of Microwave Brightness Temperature to Snow Depth on Sea Ice in the Arctic. IGARSS 2022: 3951-3954 - 2010
- [c10]Yanfei Fan, Jiming Chen, Xiaodong Lin, Xuemin Shen:
Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding. GLOBECOM 2010: 1-5 - [c9]Fangqin Liu, Yanfei Fan, Xuemin Shen, Chuang Lin, Rongfei Zeng:
An Analytical Model to Study the Packet Loss Burstiness over Wireless Channels. GLOBECOM 2010: 1-5 - [c8]Qing Yu, Jiming Chen, Youxian Sun, Yanfei Fan, Xuemin Shen:
Regret Matching Based Channel Assignment for Wireless Sensor Networks. ICC 2010: 1-5 - [c7]Qing Yu, Jiming Chen, Yanfei Fan, Xuemin Shen, Youxian Sun:
Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach. INFOCOM 2010: 1127-1135 - [c6]Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen:
P-Coding: Secure Network Coding against Eavesdropping Attacks. INFOCOM 2010: 2249-2257 - 2009
- [c5]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding. GLOBECOM 2009: 1-7 - [c4]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. INFOCOM 2009: 2213-2221 - 2008
- [c3]Yanfei Fan, Bin Lin, Yixin Jiang, Xuemin Shen:
An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security. GLOBECOM 2008: 4652-4656 - [c2]Yanfei Fan, Jingqiu Zhang, Xuemin Shen:
Mobility-Aware Multi-Path Forwarding Scheme for Wireless Mesh Networks. WCNC 2008: 2337-2342 - 2003
- [c1]Yanfei Fan, Fengyuan Ren, Chuang Lin:
Design a PID Controller for Active Queue Management. ISCC 2003: 985-990
Parts in Books or Collections
- 2011
- [p1]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Yanfei Fan, Xuemin Shen:
A Routing-Compatible Credit-Based Incentive Scheme for DTNs. Delay Tolerant Networks 2011: 101-126
Coauthor Index
aka: Xuemin (Sherman) Shen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint