


Остановите войну!
for scientists:
Yulong Shen
Yu-Long Shen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j94]Yu-Long Shen
, Rong-Jong Wai
:
Fast-Fourier-Transform Enhanced Progressive Singular-Value-Decomposition Algorithm in Double Diagnostic Window Frame for Weak Arc Fault Detection. IEEE Access 10: 39752-39768 (2022) - [j93]Shuiguang Zeng, Yin Chen
, Xufei Li, Jinxiao Zhu
, Yulong Shen, Norio Shiratori:
Visibility graph entropy based radiometric feature for physical layer identification. Ad Hoc Networks 127: 102780 (2022) - [j92]Yangyang Liu
, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Online machine learning-based physical layer authentication for MmWave MIMO systems. Ad Hoc Networks 131: 102864 (2022) - [j91]Wei Tong
, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j90]Tao Zhang
, Anxiao Song
, Xuewen Dong
, Yulong Shen
, Jianfeng Ma
:
Privacy-Preserving Asynchronous Grouped Federated Learning for IoT. IEEE Internet Things J. 9(7): 5511-5523 (2022) - [j89]Teng Li, Jiawei Zhang
, Mohammad S. Obaidat
, Chi Lin, Yangxu Lin, Yulong Shen, Jianfeng Ma:
Energy-Efficient and Secure Communication Toward UAV Networks. IEEE Internet Things J. 9(12): 10061-10076 (2022) - [j88]Jia Liu
, Yang Xu, Yulong Shen, Hiroki Takakura, Xiaohong Jiang, Tarik Taleb:
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? IEEE Internet Things J. 9(13): 10961-10977 (2022) - [j87]Yuanyu Zhang
, Yulong Shen
, Xiaohong Jiang
, Shoji Kasahara
:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 17: 99-114 (2022) - [j86]Yongzhi Wang
, Xiaoyu Zhang
, Yao Wu, Yulong Shen
:
Enhancing Leakage Prevention for MapReduce. IEEE Trans. Inf. Forensics Secur. 17: 1558-1572 (2022) - [j85]Xuewen Dong
, Wen Zhang
, Yushu Zhang
, Zhichao You
, Sheng Gao
, Yulong Shen
, Chao Wang:
Optimizing Task Location Privacy in Mobile Crowdsensing Systems. IEEE Trans. Ind. Informatics 18(4): 2762-2772 (2022) - [j84]Yangyang Liu
, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Physical layer authentication in MIMO systems: a carrier frequency offset approach. Wirel. Networks 28(5): 1909-1921 (2022) - [c64]Yan Liu, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Multi-antenna covert communications in random wireless networks with full-duplex relay. SAC 2022: 1960-1966 - [e1]Honghao Gao, Jun Wun, Jianwei Yin, Feifei Shen, Yulong Shen, Jun Yu:
Communications and Networking - 16th EAI International Conference, ChinaCom 2021, Virtual Event, November 21-22, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 433, Springer 2022, ISBN 978-3-030-99199-9 [contents] - [i26]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. CoRR abs/2201.08133 (2022) - 2021
- [j83]Guoying Qiu
, Yulong Shen
:
Mobility-Aware Differentially Private Trajectory for Privacy-Preserving Continual Crowdsourcing. IEEE Access 9: 26362-26376 (2021) - [j82]Yu-Long Shen, Rong-Jong Wai
:
Wavelet-Analysis-Based Singular-Value-Decomposition Algorithm for Weak Arc Fault Detection via Current Amplitude Normalization. IEEE Access 9: 71535-71552 (2021) - [j81]Ke Cheng
, Wei Tong
, Lele Zheng, Jiaxuan Fu, Xutong Mu, Yulong Shen
:
A Secure and Fair Double Auction Framework for Cloud Virtual Machines. IEEE Access 9: 87982-87994 (2021) - [j80]Guangxia Li
, Jia Liu, Xiao Lu
, Peilin Zhao, Yulong Shen
, Dusit Niyato
:
Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics. IEEE Commun. Lett. 25(9): 2958-2962 (2021) - [j79]Yang Xu
, Jia Liu
, Yulong Shen
, Jun Liu
, Xiaohong Jiang
, Tarik Taleb
:
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things. IEEE Internet Things J. 8(4): 3000-3013 (2021) - [j78]Xuewen Dong
, Zhichao You
, Tom H. Luan
, Qingsong Yao
, Yulong Shen
, Jianfeng Ma
:
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy. IEEE Internet Things J. 8(10): 8032-8043 (2021) - [j77]Guoying Qiu
, Deke Guo
, Yulong Shen
, Guoming Tang
, Sheng Chen
:
Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation. IEEE Internet Things J. 8(21): 16165-16180 (2021) - [j76]Di Lu
, Ruidong Han, Yulong Shen
, Xuewen Dong, Jianfeng Ma
, Xiaojiang Du
, Mohsen Guizani
:
xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE J. Sel. Areas Commun. 39(2): 370-383 (2021) - [j75]Guoying Qiu, Yulong Shen, Ke Cheng, Lingtong Liu
, Shuiguang Zeng:
Mobility-Aware Privacy-Preserving Mobile Crowdsourcing. Sensors 21(7): 2474 (2021) - [j74]Ke Cheng, Liangmin Wang
, Yulong Shen
, Hua Wang
, Yongzhi Wang
, Xiaohong Jiang
, Hong Zhong
:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j73]Ranran Sun
, Bin Yang
, Siqi Ma
, Yulong Shen
, Xiaohong Jiang
:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j72]Shuangrui Zhao
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 16: 3371-3386 (2021) - [j71]Pinchang Zhang
, Jun Liu
, Yulong Shen
, Xiaohong Jiang
:
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Trans. Inf. Forensics Secur. 16: 4265-4279 (2021) - [j70]Xuewen Dong
, Liangmin Wang
, Qingsong Yao
, Yongzhi Wang
, Junwei Zhang
, Yulong Shen
:
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA. IEEE Trans. Veh. Technol. 70(5): 4646-4656 (2021) - [j69]Bin Yang
, Tarik Taleb
, Yulong Shen
, Xiaohong Jiang
, Weidong Yang
:
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas. IEEE Trans. Wirel. Commun. 20(4): 2383-2397 (2021) - [j68]Yang Xu
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Yusheng Ji
, Norio Shiratori:
QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers. IEEE Trans. Wirel. Commun. 20(8): 4902-4916 (2021) - [c63]Tao Zhang, Yani Han, Xuewen Dong, Yang Xu, Yulong Shen:
Dual-Target Cross-Domain Bundle Recommendation. SCC 2021: 183-192 - [c62]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - [i25]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical Contrastive Federated Learning on Non-IID data. CoRR abs/2109.12273 (2021) - [i24]Jian Yang, Gang Xiao, Yulong Shen, Wei Jiang, Xinyu Hu, Ying Zhang, Jinghui Peng:
A Survey of Knowledge Enhanced Pre-trained Models. CoRR abs/2110.00269 (2021) - 2020
- [j67]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Shikai Shen:
On delay performance study for cooperative multicast MANETs. Ad Hoc Networks 102: 102117 (2020) - [j66]Wei Tong
, Xuewen Dong, Yulong Shen, Jiawei Zheng:
BC-RAN: Cloud radio access network enabled by blockchain for 5G. Comput. Commun. 162: 179-186 (2020) - [j65]Xiaochen Li, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol. IET Commun. 14(22): 4135-4141 (2020) - [j64]Pinchang Zhang
, Jun Liu
, Yulong Shen
, Hewu Li, Xiaohong Jiang
:
Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 7(5): 3977-3990 (2020) - [j63]Jiawei Zheng, Xuewen Dong, Yulong Shen, Wei Tong:
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT. J. Inf. Sci. Eng. 36(4): 821-836 (2020) - [j62]Guangxia Li
, Peilin Zhao, Tao Mei, Peng Yang, Yulong Shen, Kuiyu Chang, Steven C. H. Hoi:
Collaborative online ranking algorithms for multitask learning. Knowl. Inf. Syst. 62(6): 2327-2348 (2020) - [j61]Yongzhi Wang
, Yulong Shen
, Cuicui Su, Jiawen Ma, Lingtong Liu
, Xuewen Dong
:
CryptSQLite: SQLite With High Data Security. IEEE Trans. Computers 69(5): 666-678 (2020) - [j60]Pinchang Zhang
, Yulong Shen
, Xiaohong Jiang
, Bin Wu:
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 68(4): 2446-2458 (2020) - [j59]Ji He
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. IEEE Trans. Inf. Forensics Secur. 15: 1347-1362 (2020) - [j58]Shuangrui Zhao
, Jia Liu
, Yulong Shen
, Xiaohong Jiang
, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 15: 3775-3790 (2020) - [j57]Lingtong Liu
, Yulong Shen
, Yibo Yan, Tong Yang
, Muhammad Shahzad
, Bin Cui
, Gaogang Xie
:
SF-Sketch: A Two-Stage Sketch for Data Streams. IEEE Trans. Parallel Distributed Syst. 31(10): 2263-2276 (2020) - [j56]Xuewen Dong
, Zhichao You
, Liangmin Wang
, Sheng Gao
, Yulong Shen
, Jianfeng Ma:
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation. IEEE Trans. Wirel. Commun. 19(7): 4632-4642 (2020) - [j55]Huihui Wu, Yuanyu Zhang, Xuening Liao, Yulong Shen, Xiaohong Jiang:
On covert throughput performance of two-way relay covert wireless communications. Wirel. Networks 26(5): 3275-3289 (2020) - [j54]Xuewen Dong
, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma:
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing. World Wide Web 23(2): 1035-1055 (2020) - [c61]Yongchao Dang, Chafika Benzaïd, Yulong Shen, Tarik Taleb:
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs. GLOBECOM 2020: 1-6 - [c60]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. ICDE 2020: 1862-1865 - [c59]Ke Cheng, Liangmin Wang
, Yulong Shen, Yangyang Liu, Yongzhi Wang, Lele Zheng:
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees. INFOCOM 2020: 1708-1717 - [c58]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang:
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion. NaNA 2020: 193-197 - [i23]Zhongyuan Jiang, Lichao Sun, Philip S. Yu, Hui Li, Jianfeng Ma, Yulong Shen:
Target Privacy Preserving for Social Networks. CoRR abs/2002.03284 (2020) - [i22]Yanni Li, Bing Liu, Jiangtao Cui, Zhi Wang, Yulong Shen, Yueshen Xu, Kaicheng Yao:
Similarities and Evolutionary Relationships of COVID-19 and Related Viruses. CoRR abs/2003.05580 (2020) - [i21]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication. CoRR abs/2008.00147 (2020) - [i20]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. CoRR abs/2009.01988 (2020)
2010 – 2019
- 2019
- [j53]Yeqiu Xiao, Jia Liu
, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective. IEEE Access 7: 3371-3382 (2019) - [j52]Teng Li
, Jianfeng Ma, Qingqi Pei
, Houbing Song
, Yulong Shen, Cong Sun
:
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7: 35302-35316 (2019) - [j51]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang:
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Comput. Networks 161: 150-161 (2019) - [j50]Xuewen Dong, Feng Wu, Anter Faree
, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. Comput. Secur. 87 (2019) - [j49]Teng Li
, Jianfeng Ma, Yulong Shen, Qingqi Pei:
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning. Entropy 21(8): 734 (2019) - [j48]Bo Shen, Yulong Shen, Wen Ji:
Profit optimization in service-oriented data market: A Stackelberg game approach. Future Gener. Comput. Syst. 95: 17-25 (2019) - [j47]Guangxia Li
, Yulong Shen, Peilin Zhao, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi:
Detecting cyberattacks in industrial control systems using online learning algorithms. Neurocomputing 364: 338-348 (2019) - [j46]Yuanyu Zhang
, Shoji Kasahara
, Yulong Shen
, Xiaohong Jiang
, Jianxiong Wan
:
Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 6(2): 1594-1605 (2019) - [j45]Hui Qiao, Xuewen Dong, Yulong Shen:
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. J. Medical Syst. 43(11): 321:1-321:13 (2019) - [j44]Bangbang Ren, Deke Guo
, Yulong Shen, Guoming Tang
, Xu Lin:
Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast. IEEE J. Sel. Areas Commun. 37(5): 1085-1097 (2019) - [j43]Wengui Su, Xiang Wang
, Fu Li, Yulong Shen, Qingqi Pei:
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multim. Tools Appl. 78(7): 7927-7945 (2019) - [j42]Yuanyu Zhang
, Yulong Shen
, Xiaohong Jiang
, Shoji Kasahara
:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. IEEE Trans. Commun. 67(1): 623-638 (2019) - [j41]Tong Yang
, Siang Gao
, Zhouyi Sun, Yufei Wang, Yulong Shen
, Xiaoming Li:
Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data. IEEE Trans. Parallel Distributed Syst. 30(12): 2650-2662 (2019) - [j40]Ting Qu, Deke Guo
, Yulong Shen
, Xiaomin Zhu, Lailong Luo
, Zhong Liu:
Minimizing Traffic Migration During Network Update in IaaS Datacenters. IEEE Trans. Serv. Comput. 12(4): 577-589 (2019) - [j39]Xuewen Dong
, Tao Zhang, Di Lu
, Guangxia Li, Yulong Shen
, Jianfeng Ma:
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing. IEEE Trans. Veh. Technol. 68(9): 8881-8892 (2019) - [j38]Yuanyu Zhang
, Yulong Shen, Xiaohong Jiang:
Friendship-based cooperative jamming for secure communication in Poisson networks. Wirel. Networks 25(7): 4077-4095 (2019) - [c57]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c56]Guangxia Li, Peilin Zhao, Xiao Lu, Jia Liu, Yulong Shen:
Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update. ICC 2019: 1-6 - [c55]Wei Tong
, Xuewen Dong, Yulong Shen, Xiaohong Jiang:
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains. ICC 2019: 1-6 - [c54]Yeqiu Xiao, Yulong Shen, Yong Zeng, Yuzhen Zhang:
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks. ICC 2019: 1-6 - [c53]Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019: 541-549 - [c52]Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang
, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019: 2494-2502 - [c51]Chenyang Gao, Jianfeng Ma, Yulong Shen, Teng Li, Fei Li, Yuelin Gao:
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm. NaNA 2019: 458-463 - [c50]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems. WCNC 2019: 1-6 - [i19]Guangxia Li, Yulong Shen, Peilin Zhao, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi:
Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms. CoRR abs/1912.03589 (2019) - 2018
- [j37]Xiaochen Li, Yuanyu Zhang
, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:
Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018) - [j36]Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen:
Information flow control on encrypted data for service composition among multiple clouds. Distributed Parallel Databases 36(3): 511-527 (2018) - [j35]Junjie Xie
, Deke Guo
, Xiaozhou Li, Yulong Shen, Xiaohong Jiang
:
Cutting Long-Tail Latency of Routing Response in Software Defined Networks. IEEE J. Sel. Areas Commun. 36(3): 384-396 (2018) - [j34]Yongzhi Wang, Yulong Shen, Hua Wang
, Jinli Cao, Xiaohong Jiang
:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - [j33]Yongzhi Wang
, Yulong Shen, Xiaohong Jiang
:
Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Inf. Forensics Secur. 13(6): 1376-1391 (2018) - [j32]Yuanyu Zhang, Yulong Shen, Hua Wang
, Yanchun Zhang
, Xiaohong Jiang
:
On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Serv. Comput. 11(2): 318-328 (2018) - [j31]Bin Yang
, Yulong Shen, Xiaohong Jiang
, Tarik Taleb
:
Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 67(3): 2631-2643 (2018) - [j30]Xuening Liao
, Yuanyu Zhang
, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang
, Hiroshi Inamura:
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wirel. Commun. 17(3): 1893-1906 (2018) - [j29]Ahmed Salem
, Xuening Liao, Yulong Shen, Xiaohong Jiang
:
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework. Wirel. Commun. Mob. Comput. 2018: 1029175:1-1029175:14 (2018) - [j28]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) - [c49]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA 2018: 240-246 - [c48]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori:
Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm. ICNC 2018: 215-219 - [c47]Xu Lin, Deke Guo, Yulong Shen, Guoming Tang, Bangbang Ren:
DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs. ICPP 2018: 15:1-15:10 - [c46]Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:
Obfuscating program control flow with Intel SGX. ICSE (Companion Volume) 2018: 321-322 - [c45]Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:
Diamond sketch: Accurate per-flow measurement for real IP streams. INFOCOM Workshops 2018: 1-2 - [c44]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. INFOCOM Workshops 2018: 1-2 - [c43]Tong Yang, Alex X. Liu, Yulong Shen, Qiaobin Fu, Dagang Li
, Xiaoming Li:
Fast OpenFlow Table Lookup with Fast Update. INFOCOM 2018: 2636-2644 - [c42]Ahmed Salem, Xuening Liao, Shuiguang Zeng, Yulong Shen:
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework. NaNA 2018: 47-51 - [c41]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. NaNA 2018: 206-211 - [c40]Tong Yang, Lun Wang, Yulong Shen, Muhammad Shahzad, Qun Huang, Xiaohong Jiang, Kun Tan, Xiaoming Li:
Empowering Sketches with Machine Learning for Network Measurements. NetAI@SIGCOMM 2018: 15-20 - [i18]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. CoRR abs/1802.03147 (2018) - [i17]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. CoRR abs/1802.04410 (2018) - [i16]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying. CoRR abs/1802.06538 (2018) - 2017
- [j27]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:
On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017) - [j26]Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang
, Xiaohong Jiang:
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Commun. Mag. 55(9): 86-93 (2017) - [j25]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Comput. Networks 123: 77-87 (2017) - [j24]Yongzhi Wang
, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu:
Exploiting Content Delivery Networks for covert channel communications. Comput. Commun. 99: 84-92 (2017) - [j23]Ning Xi
, Di Lu
, Cong Sun
, Jianfeng Ma
, Yulong Shen:
Distributed Secure Service Composition with Declassification in Mobile Clouds. Mob. Inf. Syst. 2017: 7469342:1-7469342:13 (2017) - [j22]Le Xiao, Wei Wei, Weidong Yang, Yulong Shen, Xianglin Wu:
A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput. 21(13): 3713-3721 (2017) - [j21]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb
:
On Performance Modeling for MANETs Under General Limited Buffer Constraint. IEEE Trans. Veh. Technol. 66(10): 9483-9497 (2017) - [j20]Yang Xu, Jia Liu, Yulong Shen, Xiangning Li, Xiaohong Jiang:
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint. Wirel. Networks 23(1): 193-204 (2017) - [c39]Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:
Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 - [c38]Shuangrui Zhao, Jia Liu, Xiaochen Li, Yulong Shen, Xiaohong Jiang:
Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying. GLOBECOM Workshops 2017: 1-6 - [c37]Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen, Xiaoming Li, Bin Cui
, Gaogang Xie:
SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items. ICDE 2017: 103-106 - [c36]