| 1. |
Virtual Multipath Attack And Defense For Location Distinction In Wireless Networks |
 |
 |
| 2. |
Two-Sided Matching Based Cooperative Spectrum Sharing |
 |
 |
| 3. |
Towards Information Diffusion In Mobile Social Networks |
 |
 |
| 4. |
Towards Distributed Optimal Movement Strategy For Data Gathering In Wireless Sensor Networks |
 |
 |
| 5. |
State Estimation Oriented Wireless Transmission For Ubiquitous Monitoring In Industrial Cyber-Physical Systems |
 |
 |
| 6. |
Spectrum-Energy Efficiency Optimization For Downlink Lte-A For Heterogeneous Networks |
 |
 |
| 7. |
Space-Time Network Coding With Transmit Antenna Selection And Maximal-Ratio Combining |
 |
 |
| 8. |
Secure Data Aggregation In Wireless Sensor Networks: Filtering Out The Attacker’s Impact |
 |
 |
| 9. |
Resource Allocation For A Massive Mimo Relayaided Secure Communication |
 |
 |
| 10. |
Real-Time Path Planning Based Onhybrid-Vanet-Enhanced Transportation System |
 |
 |
| 11. |
Providing Privacy-Aware Incentives In Mobile Sensing Systems |
 |
 |
| 12. |
Privacy Protection For Wireless Medicalsensor Data |
 |
 |
| 13. |
Priority-Aware Fec Coding For High-Definition Mobile Video Delivery Using Tcp |
 |
 |
| 14. |
Priority-Aware Fec Coding For High-Definition Mobile Video Delivery Using Tcp |
 |
 |
| 15. |
Physical-Layer Network Coding In Two-Wayheterogeneous Cellular Networks With Power Imbalance |
 |
 |
| 16. |
Opportunistic Concurrency: A Mac Protocol For Wireless Sensor Networks |
 |
 |
| 17. |
On The Construction Of Data Aggregation Tree With Maximizing Lifetime In Large Scale Wireless Sensor Networks |
 |
 |
| 18. |
Network Coding As A Performance Booster Forconcurrent Multi-Path Transfer Of Data In Multi-Hopwireless Networks |
 |
 |
| 19. |
Mobile-Projected Trajectory Algorithm With Velocity-Change Detection For Predicting Residual Link Lifetime In Manet |
 |
 |
| 20. |
Mobile Demand Profiling Forcellular Cognitive Networking |
 |
 |
| 21. |
Maximizing The Sum Rate In Cellular Networks Using Multi-Convex Optimization |
 |
 |
| 22. |
Maximizing Energy Efficiency For Loss Tolerant Applications: The Packet Buffering Case |
 |
 |
| 23. |
Key-Recovery Attacks On Kids, A Keyed Anomaly Detection System |
 |
 |
| 24. |
Improved Privacy-Preserving P2p Multimedia Distribution Based On Recombined Fingerprints |
 |
 |
| 25. |
Lifetime Maximization Of Wireless Sensor Networks With A Mobilesource Node |
 |
 |
| 26. |
In-Network Aggregation For Vehicularad Hoc Networks |
 |
 |
| 27. |
Increasing User Perceived Quality By Selectiveload Balancing Of Video Traffic In Wireless Networks |
 |
 |
| 28. |
Increasing User Perceived Quality By Selectiveload Balancing Of Video Traffic In Wireless Networks |
 |
 |
| 29. |
Hydrocast: Pressure Routing For Underwater Sensor Networks |
 |
 |
| 30. |
Hybrid Spectrum Sharing Through Adaptive Spectrum Handoff And Selection |
 |
 |
| 31. |
Group Key Agreement With Local Connectivity |
 |
 |
| 32. |
Getrust: A Guarantee-Based Trust Model In Chord-Based P2p Networks |
 |
 |
| 33. |
Geographic And Opportunistic Routing For Underwater Sensor Networks |
 |
 |
| 34. |
Game User-Oriented Multimedia Transmission Overcognitive Radio Networks |
 |
 |
| 35. |
Fluidnet: A Flexible Cloud-Based Radio Accessnetwork For Small Cells |
 |
 |
| 36. |
Enhanced Deployment Algorithms For Heterogeneous Directional Mobile Sensors In A Bounded Monitoring Area |
 |
 |
| 37. |
Energy-Aware Cooperative Wireless Networks With Multiple Cognitive Users |
 |
 |
| 38. |
Energy-Aware Bio-Signal Compressed Sensingreconstruction: Focuss On The Wbsn-Gateway |
 |
 |
| 39. |
Empowering Device-To-Device Networks With Cross-Link Interference Management |
 |
 |
| 40. |
Efficient Tracking Area Management Framework For 5g Networks |
 |
 |
| 41. |
Efficient Broadcasting In Vanets Using Dynamic Backbone And Network Coding |
 |
 |
| 42. |
Effective Key Management In Dynamic Wireless Sensor Networks |
 |
 |
| 43. |
Edsa: Energy-Efficient Dynamic Spectrumaccess Protocols For Cognitive Radio Networks |
 |
 |
| 44. |
Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks |
 |
 |
| 45. |
Dynamic Frequency Resource Allocation Inheterogeneous Cellular Networks |
 |
 |
| 46. |
Discovering Mobile Applications In Cellular Device-To-Device Communications: Hashfunction And Bloom Filter-Based Approach |
 |
 |
| 47. |
Delay Analysis Of Multichannel Opportunistic Spectrum Access Mac Protocols |
 |
 |
| 48. |
Decentralized Beam Former Design With Limited Multi-Cell Cooperation For
Interference Channel Of Cognitive Radio Networks
|
 |
 |
| 49. |
Defending Against Collaborative Attacks By Malicious Nodes In Manets: A Cooperative Bait Detection Approach |
 |
 |
| 50. |
D2d: Delay-Aware Distributed Dynamic Adaptation Of Contention Window In Wireless Networks |
 |
 |
| 51. |
Cost-Efficient Strategies For Restraining Rumor Spreading In Mobile Social Networks |
 |
 |
| 52. |
Contact-Aware Data Replication In Roadside Unit Aided Vehicular Delay Tolerant Networks |
 |
 |
| 53. |
Blackhole Attack Detection And Prevention By Real Time Monitoring |
 |
 |
| 54. |
Authorized And Rogue Device Discrimination Using Dimensionally Reduced Rf-Dna Fingerprints |
 |
 |
| 55. |
A Secure Scheme Against Power Exhausting Attacks In Hierarchical Wireless Sensor Networks |
 |
 |
| 56. |
Anti-Eavesdropping Schemes For Interference Alignment (Ia)-Based Wireless Networks |
 |
 |
| 57. |
An Efficient Anonymous Batch Authentication Scheme Based On Hmac For Vanets |
 |
 |
| 58. |
Activetrust: Secure And Trustable Routing Inwireless Sensor Networks |
 |
 |
| 59. |
A Unified Resource Allocation Framework For Defending Against Pollution Attacks In Wireless Network Coding Systems |
 |
 |
| 60. |
A Secure Scheme Against Power Exhausting Attacks In Hierarchical Wireless Sensor Networks |
 |
 |
| 61. |
A New Authentication Protocol For An Authentication-As-A-Service (Aaas) Cloud Using Pedersen Commitment Scheme |
 |
 |
| 62. |
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data |
 |
 |
| 63. |
2flip: A Two-Factor Lightweight Privacy Preserving Authentication Scheme For Vanet |
 |
 |