计算机网络与物联网工程研究所

more

论文

发布时间:2020-04-27点击量:

2020年发表论文:

[1]D. Lu, R. Han, Y. Shen, X. Dong, J. Ma,X. Du and M. Guizani, “xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices”, IEEE Journal on Selected Areas in Communications, accepted, Mar. 2020. (CCF A类)

[2]Ji He, Jia Liu, Yulong Shen*, Xiaohong Jiang, Norio Shiratori: Link Selection for Security-QoS Tradeoffs in Buffer-aided Relaying Networks. IEEE Transactions on Information Forensics and Security, 2020, 15: 1347-1362. (CCF A类)

[3]Ke Cheng, Liangmin Wang, Yulong Shen*, Yangyang Liu, Yongzhi Wang, and Lele Zheng, “A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees”,in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April, 2020. (CCF A类)

2019年发表论文:

[1]Yongzhi Wang, Yulong Shen*, Cuicui Su, Ke Cheng, Yibo Yang, ANter Faree, Yao Liu: CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019. (CCF A类)

[2]Ke Cheng, Yulong Shen*, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, XionghongJiang and Cuicui Su:Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM 2019 (CCF A类)

[3]Bangbang Ren, Deke Guo, Yulong Shen, Guoming Tang, Xu Lin. Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast. IEEE Journal on Selected Areas in Communications (JSAC), 2019, 37(5): 1085-1097. (CCF A类)

[4]Lingtong Liu, Jun Hu, Yibo Yan, Siang Gao, Tong Yang and XiaoMing Li, Longest Prefix Matching with Pruning, IEEE International Conference on High Performance Switching and Routing (IEEE HPSR), 2019.

[5]He Ji, Jia Liu, Yang Xu, Xiaohong Jiang, Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime, IEEE International Conference on High Performance Switching and Routing (IEEE HPSR), 2019.

[6]Jiawei Zheng, Xuewen Dong, Wei Tong, Qihang Liu and Xinghui Zhu, Blockchain-based Secure Digital Asset Exchange Scheme with QoS-aware Incentive Mechanism, IEEE International Conference on High Performance Switching and Routing (IEEE HPSR), 2019.

[7]Yeqiu Xiao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori: Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective, IEEE Access, 2019(7):3371-3382.(中科院分区二区)

[8]Guangxia Li, Peilin Zhao, Xiao Lu, Jia Liu, Yulong Shen, “Data Analytics for Fog Computing by Distributed Online Learning with Asynchronous Update”, in Proceedings of IEEE International Conference on Communications (ICC 2019), Shanghai, China, May, 2019. (CCF C类)

[9]Ke Cheng, Yulong Shen, Yuzhen Zhang, Xinghui Zhu, Liangmin Wang, and Hong Zhong, “Towards Efficient Privacy-preserving Auction Mechanism for Two-sided Cloud Markets”, in Proceedings of IEEE International Conference on Communications (ICC 2019), Shanghai, China, May, 2019. (CCF C类)

[10]Yeqiu Xiao, Yulong Shen, Yong Zeng, and Yuzhen Zhang, “Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks”, in Proceedings of IEEE International Conference on Communications (ICC 2019), Shanghai, China, May, 2019. (CCF C类)

[11]Wei Tong, Xuewen Dong, Yulong Shen and Xiaohong Jiang, "A Hierarchical Sharding Protocol for multi-domain IoT Blockchains", in Proceedings of IEEE International Conference on Communications (ICC 2019), Shanghai, China, May, 2019. (CCF C类)

2018年发表论文:

[1]Yuanyu Zhang, Shoji Kasahara, Yulong Shen*, Xiaohong Jiang, Jianxiong Wan : Smart Contract-Based Access Control for the Internet of Things, IEEE Internet of Things Journal. 2018 (中科院分区一区)

[2]Yuanyu Zhang, Yulong Shen*, Xiaohong Jiang, Shoji Kasahara, Mode selection and spectrum partition for D2D inband communications: A physical layer security perspective[J]. IEEE Transactions on Communications, 2018, 67(1): 623-638. (中科院二区,CCF B类)

[3]Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:Diamond Sketch: Accurate Per-flow Measurement for Real IP Streams.INFOCOM 2018 (CCF A类) .

[4]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen and Jianfeng Ma:SALUTE: A Strategy-Proof Auction Mechanism for Flexible Multichannel Allocation.INFOCOM 2018(CCF A类)

[5]Junjie Xie, Deke Guo, Xiaozhou Li, Yulong Shen, Xiaohong Jiang: Cutting Long-tail Latency of Routing Response in Software Defined Networks.IEEE Journal of Selected Areas in Communications (CCF A类) .

[6]Xu Lin, Deke Guo, Yulong Shen, Guoming Tang,Bangbang Ren: Optimal Embedding of Hybrid Service Function Chain with DAG Abstraction. 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS) 2018. (CCF B类)

[7]Xu Lin, Deke Guo, Yulong Shen, Guoming Tang, Bangbang Ren,DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs.International Conference on Parallel Processing (ICPP) 2017. (CCF B类)

[8]Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018)

[9]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori: Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm. International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018.

[10]Yongzhi Wang, Yulong Shen, Xiaohong Jiang:Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Information Forensics and Security 13(6): 1376-1391 (2018) (CCF A类,中科院分区二区) .

[11]Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Services Computing 11(2): 318-328 (2018)(CCF B类,中科院分区二区).

[12]Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb: Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Vehicular Technology 67(3): 2631-2643 (2018)(中科院分区二区).

[13]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wireless Communications 17(3): 1893-1906 (2018)(中科院分区二区).

[14]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) .

[15]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang: Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications. IEEE Transactions on Big Data 4(3): 418-431 (2018).

2017年发表论文:

[1]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017)

[2]Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang:MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Communications Magazine 55(9): 86-93 (2017)(中科院分区一区).

[3]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks 123: 77-87 (2017)(CCF B类).

[4]Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu:Exploiting Content Delivery Networks for covert channel communications. Computer Communications 99: 84-92 (2017) .

[5]Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:Distributed Secure Service Composition with Declassification in Mobile Clouds. Mobile Information Systems 2017: 7469342:1-7469342:13 (2017) .

[6]Le Xiao, Wei Wei, Weidong Yang, Yulong Shen, Xianglin Wu:A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput. 21(13): 3713-3721 (2017) .

[7]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:On Performance Modeling for MANETs Under General Limited Buffer Constraint. IEEE Trans. Vehicular Technology 66(10): 9483-9497 (2017)(中科院分区二区).

[8]Yang Xu, Jia Liu, Yulong Shen, Xiangning Li, Xiaohong Jiang:On throughput capacity of large-scale ad hoc networks with realistic buffer constraint. Wireless Networks 23(1): 193-204 (2017) .

[9]Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 .

[10]Shuangrui Zhao, Jia Liu, Xiaochen Li, Yulong Shen, Xiaohong Jiang:Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying. GLOBECOM Workshops 2017: 1-6 .

[11]Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen, Xiaoming Li, Bin Cui, Gaogang Xie:SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items. ICDE 2017: 103-106 (CCF A类) .

[12]Ke Cheng, Liangmin Wang, Yulong Shen*, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong: Secure k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Transactions on Big Data.

2016年发表论文:

[1]Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:Toward integrity assurance of outsourced computing - a game theoretic perspective. Future Generation Comp. Syst. 55: 87-100 (2016)(中科院分区二区).

[2]Fangwei Wang, Wen-Yan Huang, Yulong Shen, Changguang Wang:Analysis of SVEIR worm attack model with saturated incidence and partial immunization. J. Comm. Inform. Networks 1(4): 105-115 (2016) .

[3]Yuanyu Zhang, Yulong Shen, Hua Wang, Jianming Yong, Xiaohong Jiang:On Secure Wireless Communications for IoT Under Eavesdropper Collusion. IEEE Trans. Automation Science and Engineering 13(3): 1281-1293 (2016)(CCF B类,中科院分区二区).

[4]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang, Hideyuki Tokuda:On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks. IEEE Trans. Communications 64(4): 1646-1659 (2016)(CCF B类).

[5]Yongzhi Wang, Yulong Shen:POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. ACM Conference on Computer and Communications Security 2016: 1799-1801(CCF A类) .

[6]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:Security/QoS-aware route selection in multi-hop wireless ad hoc networks. ICC 2016: 1-6 .

[7]Bin Yang, Yulong Shen, Guilin Chen, Yuanyuan Fan:Multicast Delivery Probability of MANETs with Limited Packet Redundancy. NaNA 2016: 48-52 .

[8]Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68 .

[9]Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:Exact Secrecy Throughput of MANETs with Guard Zone. NaNA 2016: 167-172 .

[10]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259.

[11]Meng Wang, Hui Li, Jiangtao Cui, Ke Deng, Sourav S Bhowmick, Zhenhua Dong. PINOCCHIO: Probabilistic Influence-based Location Selection over Moving Objects. IEEE TKDE. 2016, 28(11): 3068-3082. published online.

[12]Yanni Li*, Hui Li, Tihua Duan, Sheng Wang, Zhi Wang, Yang Cheng. A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm. ACM SIGKDD. 2016,pp.1725-1734.published online.

[13]Yanni LI, Yuping WANG, Zhensong Zhang, Yaxin Wang, Ding Ma, Jianbin Huang. A Novel Fast and Memory Efficient Parallel MLCS Algorithm for Longer and Large-Scale Sequences Alignments.IEEE ICDE. 2016,pp.1033-1044. published online.

上一篇:专利