Search

Your search keyword '"Jiming Chen"' showing total 100 results

Search Constraints

Start Over You searched for: Author "Jiming Chen" Remove constraint Author: "Jiming Chen" Topic computer networks and communications Remove constraint Topic: computer networks and communications
100 results on '"Jiming Chen"'

Search Results

6. Fingerprinting Movements of Industrial Robots for Replay Attack Detection

11. Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing

12. Operation State Scheduling Towards Optimal Network Utility in RF-Powered Internet of Things

13. A survey of cloud network fault diagnostic systems and tools

14. High-Confidence Gateway Planning and Performance Evaluation of a Hybrid LoRa Network

15. Introduction to the Special Section on Security and Privacy of Smart Network Systems

16. CEDAR: A Cost-Effective Crowdsensing System for Detecting and Localizing Drones

17. Adaptive Switching Spatial-Temporal Fusion Detection for Remote Flying Drones

18. DRAIM: A Novel Delay-Constraint and Reverse Auction-Based Incentive Mechanism for WiFi Offloading

19. On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid

20. VANET-Assisted Interference Mitigation for Millimeter-Wave Automotive Radar Sensors

21. Intra-Operator Customer Churn in Telecommunications: A Systematic Perspective

23. Data-Driven Battery-Lifetime-Aware Scheduling for Electric Bus Fleets

24. Orientation Optimization for Full-View Coverage Using Rotatable Camera Sensors

25. Adaptive Ramp Metering Control for Urban Freeway Using Large-Scale Data

26. Differentially Private Maximum Consensus: Design, Analysis and Impossibility Result

27. Dynamic Pricing for Privacy-Preserving Mobile Crowdsensing: A Reinforcement Learning Approach

29. You foot the bill! Attacking NFC with passive relays

30. Enabling Ultra-Dense UAV-Aided Network with Overlapped Spectrum Sharing: Potential and Approaches

31. Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges

32. Resilient Consensus with Mobile Detectors Against Malicious Attacks

33. An Online Algorithm for Data Collection by Multiple Sinks in Wireless-Sensor Networks

34. Big data and smart computing in network systems

35. Narrowband Internet of Things: Implementations and Applications

36. Q-Charge: A Quadcopter-Based Wireless Charging Platform for Large-Scale Sensing Applications

37. Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink

38. Promoting Device-to-Device Communication in Cellular Networks by Contract-based Incentive Mechanisms

39. Near-Optimal Allocation Algorithms for Location-Dependent Tasks in Crowdsensing

40. An Exchange Market Approach to Mobile Crowdsensing: Pricing, Task Allocation, and Walrasian Equilibrium

41. Promoting Cooperation by the Social Incentive Mechanism in Mobile Crowdsensing

42. Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems

43. Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

44. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks

45. Full-View Area Coverage in Camera Sensor Networks: Dimension Reduction and Near-Optimal Solutions

46. ESync : Energy Synchronized Mobile Charging in Rechargeable Wireless Sensor Networks

47. Group-Based Neighbor Discovery in Low-Duty-Cycle Mobile Sensor Networks

48. Near-Optimal Velocity Control for Mobile Charging in Wireless Rechargeable Sensor Networks

49. Maximizing Network Utility of Rechargeable Sensor Networks With Spatiotemporally Coupled Constraints

50. Privacy and performance trade-off in cyber-physical systems

Catalog

Books, media, physical & digital resources