default search action
Xiaohong Jiang 0001
Person information
- affiliation: Future University Hakodate, Japan
- affiliation: Tohoku University, Department of Graduate School of Information Sciences, Japan
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
- affiliation (PhD 1999): Xidian University, China
Other persons with the same name
- Xiaohong Jiang (aka: Xiao-hong Jiang, Xiao-Hong Jiang) — disambiguation page
- Xiaohong Jiang 0002 (aka: Xiao-hong Jiang 0002, Xiao-Hong Jiang 0002) — Zhejiang University, School of Computer Science and Technology, Hangzhou, China
- Xiaohong Jiang 0003 — Nanjing Forestry University, College of Automobile and Traffic Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j185]Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang:
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection. Comput. Commun. 219: 216-228 (2024) - [j184]Junjun Wang, Zhao Huang, Lirong Zhou, Jinhui Liu, Xiaohong Jiang, Yin Chen, Yuan Cao, Quan Wang:
A new entropy source design based on NAND-XOR ring oscillators for resource-efficient and ultra-high throughput TRNG. IEICE Electron. Express 21(14): 20240259 (2024) - [j183]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. IEEE Internet Things J. 11(2): 3233-3249 (2024) - [j182]Zeyu Li, Yan Wang, Zhao Huang, Junjie Wang, Quan Wang, Xiaohong Jiang:
Ada-FA: A Comprehensive Framework for Adaptive Fault Tolerance and Aging Mitigation in FPGAs. IEEE Internet Things J. 11(10): 17688-17699 (2024) - [j181]Xiaolan Liu, Bin Yang, Jianming Liu, Lintao Xian, Xiaohong Jiang, Tarik Taleb:
Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint. IEEE Internet Things J. 11(23): 38704-38718 (2024) - [j180]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks. IEEE Syst. J. 18(3): 1504-1515 (2024) - [j179]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems. IEEE Trans. Commun. 72(2): 1020-1032 (2024) - [j178]Yulin Teng, Pinchang Zhang, Xiao Chen, Xiaohong Jiang, Fu Xiao:
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems. IEEE Trans. Inf. Forensics Secur. 19: 4642-4657 (2024) - [j177]Yu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming. IEEE Trans. Inf. Forensics Secur. 19: 5696-5711 (2024) - [j176]Chengyan Ma, Di Lu, Chaoyue Lv, Ning Xi, Xiaohong Jiang, Yulong Shen, Jianfeng Ma:
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems. IEEE Trans. Knowl. Data Eng. 36(9): 4472-4485 (2024) - [j175]Xufei Li, Yin Chen, Jinxiao Zhu, Shuiguang Zeng, Yulong Shen, Xiaohong Jiang, Daqing Zhang:
Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification. IEEE Trans. Mob. Comput. 23(2): 1416-1430 (2024) - [j174]Ranran Sun, Huihui Wu, Bin Yang, Yulong Shen, Weidong Yang, Xiaohong Jiang, Tarik Taleb:
On Covert Rate in Full-Duplex D2D-Enabled Cellular Networks With Spectrum Sharing and Power Control. IEEE Trans. Mob. Comput. 23(10): 9931-9945 (2024) - [j173]Yong-Feng Ge, Hua Wang, Jinli Cao, Yanchun Zhang, Xiaohong Jiang:
Privacy-preserving data publishing: an information-driven distributed genetic algorithm. World Wide Web (WWW) 27(1): 1 (2024) - [c132]Meiyun Xie, Xin Liu, Shuangrui Zhao, Yeqiu Xiao, Xiaohong Jiang:
A New Secrecy Metric for Relay-Eavesdropper Channel. NaNA 2024: 42-47 - [i26]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Achievable Covert Communication Performance under CSI Estimation Error and Feedback Delay. CoRR abs/2404.05983 (2024) - [i25]He Zhu, Huihui Wu, Wei Su, Xiaohong Jiang:
Enhancing Covert Communication in Relay Systems Using Multi-Antenna Technique. CoRR abs/2407.11882 (2024) - 2023
- [j172]Yan Liu, Huihui Wu, Xiaohong Jiang:
Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems. Ad Hoc Networks 148: 103207 (2023) - [j171]Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. IET Inf. Secur. 2023: 1-15 (2023) - [j170]Ranran Sun, Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks. IEEE Internet Things J. 10(1): 17-30 (2023) - [j169]Depeng Chen, Xiaohong Jiang, Hong Zhong, Jie Cui:
Building Trusted Federated Learning: Key Technologies and Challenges. J. Sens. Actuator Networks 12(1): 13 (2023) - [j168]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems. IEEE Trans. Cloud Comput. 11(3): 2770-2783 (2023) - [j167]Pinchang Zhang, Yulin Teng, Yulong Shen, Xiaohong Jiang, Fu Xiao:
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems. IEEE Trans. Dependable Secur. Comput. 20(6): 4778-4792 (2023) - [j166]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems. IEEE Trans. Inf. Forensics Secur. 18: 4059-4074 (2023) - [j165]Bin Yang, Yongchao Dang, Tarik Taleb, Shikai Shen, Xiaohong Jiang:
Sum Rate and Max-Min Rate for Cellular-Enabled UAV Swarm Networks. IEEE Trans. Veh. Technol. 72(1): 1073-1083 (2023) - [j164]Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. IEEE Trans. Wirel. Commun. 22(12): 9907-9922 (2023) - [c131]Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen, Xiaohong Jiang:
3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication. GLOBECOM 2023: 7586-7591 - [c130]Yin Chen, Zhen Jia, Zeiwei Guo, Jinxiao Zhu, Xiaohong Jiang:
A Review on Feature, Problem Formulation and Application of Radio Frequency Fingerprinting. IoT 2023: 260-264 - [c129]Sibo Wang, Bin Yang, Wu Wang, Shikai Shen, Xiaohong Jiang:
On UAV-IRS-Aided Covert Communication of D2D-Enabled Cellular Networks. NaNA 2023: 58-63 - [c128]He Zhu, Huihui Wu, Xiaohong Jiang:
Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO Systems. NaNA 2023: 122-126 - [c127]Xinzhe Pi, Bin Yang, Xiaohong Jiang:
Covert Terahertz Communication for UAV-Aided Wireless Relay Systems. NaNA 2023: 127-132 - [c126]Ranran Sun, Bin Yang, Jingsen Jiao, Yanchun Zuo, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Joint Secure and Covert Communication Study in Two-hop Relaying Systems. VTC Fall 2023: 1-7 - [i24]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications. CoRR abs/2303.07770 (2023) - [i23]Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang:
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark. CoRR abs/2307.06123 (2023) - 2022
- [j163]Yangyang Liu, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang:
Online machine learning-based physical layer authentication for MmWave MIMO systems. Ad Hoc Networks 131: 102864 (2022) - [j162]Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j161]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang, Zhiwei Zhang:
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity. Future Gener. Comput. Syst. 135: 85-94 (2022) - [j160]Jia Liu, Yang Xu, Yulong Shen, Hiroki Takakura, Xiaohong Jiang, Tarik Taleb:
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? IEEE Internet Things J. 9(13): 10961-10977 (2022) - [j159]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems. IEEE Internet Things J. 9(14): 12783-12798 (2022) - [j158]Ji He, Jia Liu, Wei Su, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System. IEEE Trans. Commun. 70(8): 5451-5468 (2022) - [j157]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 17: 99-114 (2022) - [j156]Jiaqing Bai, Ji He, Yanping Chen, Yulong Shen, Xiaohong Jiang:
On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems. IEEE Trans. Inf. Forensics Secur. 17: 2920-2935 (2022) - [j155]Lisheng Ma, Wei Su, Bin Wu, Bin Yang, Xiaohong Jiang:
Joint Emergency Data and Service Evacuation in Cloud Data Centers Against Early Warning Disasters. IEEE Trans. Netw. Serv. Manag. 19(2): 1306-1320 (2022) - [j154]Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Physical layer authentication in MIMO systems: a carrier frequency offset approach. Wirel. Networks 28(5): 1909-1921 (2022) - [c125]Jiaqing Bai, Ji He, Xiaohong Jiang:
Covert Communication in NOMA Systems with Decision-Assisted Q-learning. CANDARW 2022: 283-287 - [c124]Zhen Jia, Lisheng Ma, Shigen Shen, Xiaohong Jiang:
Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver. NaNA 2022: 23-28 - [c123]Yan Liu, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Multi-antenna covert communications in random wireless networks with full-duplex relay. SAC 2022: 1960-1966 - [c122]Guozhu Zhao, Pinchang Zhang, Yulong Shen, Xiaohong Jiang:
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. SciSec 2022: 276-284 - 2021
- [j153]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime. Ad Hoc Networks 121: 102580 (2021) - [j152]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
Trust-aware buffer-aided relay selection for secure communications in cooperative wireless systems. Comput. Networks 199: 108456 (2021) - [j151]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j150]Yang Xu, Jia Liu, Yulong Shen, Jun Liu, Xiaohong Jiang, Tarik Taleb:
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things. IEEE Internet Things J. 8(4): 3000-3013 (2021) - [j149]Chan Gao, Bin Yang, Xiaohong Jiang, Hiroshi Inamura, Masaru Fukushi:
Covert Communication in Relay-Assisted IoT Systems. IEEE Internet Things J. 8(8): 6313-6323 (2021) - [j148]Xuening Liao, Zhen Jia, Zhenqiang Wu, Bo Liu, Xinlei Wang, Xiaohong Jiang:
Modulation and Signal Detection for Diffusive-Drift Molecular Communication with a Mobile Receiver. Mob. Inf. Syst. 2021: 9656465:1-9656465:17 (2021) - [j147]Lisheng Ma, Wei Su, Bin Wu, Xiaohong Jiang:
Real-time data backup in Geo-distributed data center networks against progressive disaster. Photonic Netw. Commun. 41(3): 211-221 (2021) - [j146]Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j145]Ranran Sun, Bin Yang, Siqi Ma, Yulong Shen, Xiaohong Jiang:
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control. IEEE Trans. Commun. 69(9): 6198-6212 (2021) - [j144]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 16: 3371-3386 (2021) - [j143]Pinchang Zhang, Jun Liu, Yulong Shen, Xiaohong Jiang:
Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Trans. Inf. Forensics Secur. 16: 4265-4279 (2021) - [j142]Bin Yang, Tarik Taleb, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas. IEEE Trans. Wirel. Commun. 20(4): 2383-2397 (2021) - [j141]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Yusheng Ji, Norio Shiratori:
QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers. IEEE Trans. Wirel. Commun. 20(8): 4902-4916 (2021) - [c121]He Zhu, Huihui Wu, Xiaohong Jiang:
Covert MIMO Communication in Two-hop Relay Systems. NaNA 2021: 63-68 - [c120]Ahmed Salem, Huihui Wu, Xiaohong Jiang:
Exact Evaluation of Total Variation Distance in Covert Communications. NaNA 2021: 119-124 - [c119]Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen:
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI. NaNA 2021: 206-211 - 2020
- [j140]Zhao Huang, Quan Wang, Yin Chen, Xiaohong Jiang:
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges. IEEE Access 8: 10796-10826 (2020) - [j139]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Xiaohong Jiang:
Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper. Ad Hoc Networks 98 (2020) - [j138]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Shikai Shen:
On delay performance study for cooperative multicast MANETs. Ad Hoc Networks 102: 102117 (2020) - [j137]Xiaolan Liu, Bin Yang, Xiaohong Jiang, Lisheng Ma, Shikai Shen:
On social-aware data uploading study of D2D-enabled cellular networks. Comput. Networks 166 (2020) - [j136]Lisheng Ma, Wei Su, Bin Wu, Bin Yang, Xiaohong Jiang:
Early warning disaster-aware service protection in geo-distributed data centers. Comput. Networks 180: 107419 (2020) - [j135]Xiaochen Li, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol. IET Commun. 14(22): 4135-4141 (2020) - [j134]Pinchang Zhang, Jun Liu, Yulong Shen, Hewu Li, Xiaohong Jiang:
Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 7(5): 3977-3990 (2020) - [j133]Pinchang Zhang, Yulong Shen, Xiaohong Jiang, Bin Wu:
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Trans. Commun. 68(4): 2446-2458 (2020) - [j132]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks. IEEE Trans. Inf. Forensics Secur. 15: 1347-1362 (2020) - [j131]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems. IEEE Trans. Inf. Forensics Secur. 15: 3775-3790 (2020) - [j130]Pinchang Zhang, Tarik Taleb, Xiaohong Jiang, Bin Wu:
Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments. IEEE Trans. Wirel. Commun. 19(3): 1563-1576 (2020) - [j129]Huihui Wu, Yuanyu Zhang, Xuening Liao, Yulong Shen, Xiaohong Jiang:
On covert throughput performance of two-way relay covert wireless communications. Wirel. Networks 26(5): 3275-3289 (2020) - [j128]Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang:
Editorial: Special issue on security and privacy in network computing. World Wide Web 23(2): 951-957 (2020) - [c118]Guozhu Zhao, Pinchang Zhang, Xiaohong Jiang:
On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT Scenarios. NaNA 2020: 124-129 - [c117]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang:
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion. NaNA 2020: 193-197 - [i22]Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Weidong Yang:
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication. CoRR abs/2008.00147 (2020) - [i21]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. CoRR abs/2009.01988 (2020)
2010 – 2019
- 2019
- [j127]Yeqiu Xiao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective. IEEE Access 7: 3371-3382 (2019) - [j126]Pinchang Zhang, Jinxiao Zhu, Yin Chen, Xiaohong Jiang:
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks. IEEE Access 7: 38322-38336 (2019) - [j125]Bin Yang, Zhenqiang Wu, Yuanyuan Fan, Xiaohong Jiang, Shikai Shen:
Non-Asymptotic Capacity Study in Multicast Mobile Ad Hoc Networks. IEEE Access 7: 115109-115121 (2019) - [j124]Bin Yang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang:
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Comput. Networks 161: 150-161 (2019) - [j123]Xiaolan Liu, Lisheng Ma, Xiaohong Jiang:
A Generalized Data Uploading Scheme for D2D-Enhanced Cellular Networks. IEICE Trans. Commun. 102-B(9): 1914-1923 (2019) - [j122]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 6(2): 1594-1605 (2019) - [j121]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. IEEE Trans. Commun. 67(1): 623-638 (2019) - [j120]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Friendship-based cooperative jamming for secure communication in Poisson networks. Wirel. Networks 25(7): 4077-4095 (2019) - [c116]Yutaka Musaka, Yoshitaka Nakamura, Hiroshi Inamura, Xiaohong Jiang:
Relay UE Selection Scheme in an Emergency Warning System Integrating Proximity Services. CCNC 2019: 1-2 - [c115]Ji He, Jia Liu, Yang Xu, Xiaohong Jiang:
Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime. HPSR 2019: 1-7 - [c114]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang:
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains. ICC 2019: 1-6 - [c113]Yutaka Musaka, Yoshitaka Nakamura, Hiroshi Inamura, Xiaohong Jiang:
Transmission Reduction Scheme in an Emergency Warning System with LTE D2D. ICMU 2019: 1-6 - [c112]Xiaoban Wu, Peilong Li, Timothy Miskell, Liang-Min Wang, Yan Luo, Xiaohong Jiang:
Ripple: An Efficient Runtime Reconfigurable P4 Data Plane for Multicore Systems. NaNA 2019: 142-148 - [c111]Wenhao Zhang, Lisheng Ma, Xiaohong Jiang:
Disaster-Aware Dynamic Routing for SDN-Based Active-Active Data Center Networks. NaNA 2019: 160-165 - [c110]Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems. WCNC 2019: 1-6 - 2018
- [j119]Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen:
On the packet delivery delay study for three-dimensional mobile ad hoc networks. Ad Hoc Networks 69: 38-48 (2018) - [j118]Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:
Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018) - [j117]Lisheng Ma, Wei Su, Xiaozhou Li, Bin Wu, Xiaohong Jiang:
Heterogeneous Data Backup Against Early Warning Disasters in Geo-Distributed Data Center Networks. JOCN 10(4): 376-385 (2018) - [j116]Junjie Xie, Deke Guo, Xiaozhou Li, Yulong Shen, Xiaohong Jiang:
Cutting Long-Tail Latency of Routing Response in Software Defined Networks. IEEE J. Sel. Areas Commun. 36(3): 384-396 (2018) - [j115]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - [j114]Lisheng Ma, Xiaohong Jiang, Achille Pattavina:
Blocking Probability Analysis for Optical Banyan Networks With Link Failure. IEEE Trans. Commun. 66(9): 4074-4086 (2018) - [j113]Yongzhi Wang, Yulong Shen, Xiaohong Jiang:
Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Inf. Forensics Secur. 13(6): 1376-1391 (2018) - [j112]Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:
On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Serv. Comput. 11(2): 318-328 (2018) - [j111]Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 67(3): 2631-2643 (2018) - [j110]Kechen Zheng, Ying Cui, Xiaoying Liu, Xinbing Wang, Xiaohong Jiang, Jun Tian:
Asymptotic Analysis of Inhomogeneous Information-Centric Wireless Networks With Infrastructure Support. IEEE Trans. Veh. Technol. 67(6): 5245-5259 (2018) - [j109]Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wirel. Commun. 17(3): 1893-1906 (2018) - [j108]Pin-Han Ho, Limei Peng, Xiaohong Jiang, Anwar Haque:
Special Issue on Secure and privacy-preserving Autonomous Vehicle Networks (AVNs). Veh. Commun. 11: 32 (2018) - [j107]Chengzhe Lai, Dong Zheng, Qinglan Zhao, Xiaohong Jiang:
SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11: 33-45 (2018) - [j106]Ahmed Salem, Xuening Liao, Yulong Shen, Xiaohong Jiang:
Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework. Wirel. Commun. Mob. Comput. 2018: 1029175:1-1029175:14 (2018) - [c109]Pinchang Zhang, Xiaohong Jiang:
Channel-based Authentication for Dual-Hop Wireless Networks. NaNA 2018: 42-46 - [c108]Guozhu Zhao, Lisheng Ma, Xiaohong Jiang:
Least-Unavailability Path Selecting Algorithm Based on RBF for Disaster-Survivable Software-Defined Optical Networks. NaNA 2018: 175-181 - [c107]Xiaolan Liu, Lisheng Ma, Xiaohong Jiang:
An Optimized Content Uploading Scheme for D2D Communications Underlaying Cellular Networks. NaNA 2018: 182-186 - [c106]Tong Yang, Lun Wang, Yulong Shen, Muhammad Shahzad, Qun Huang, Xiaohong Jiang, Kun Tan, Xiaoming Li:
Empowering Sketches with Machine Learning for Network Measurements. NetAI@SIGCOMM 2018: 15-20 - [i20]Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara:
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. CoRR abs/1802.03147 (2018) - [i19]Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, Jianxiong Wan:
Smart Contract-Based Access Control for the Internet of Things. CoRR abs/1802.04410 (2018) - [i18]Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying. CoRR abs/1802.06538 (2018) - 2017
- [j105]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:
On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017) - [j104]Ruonan Zhang, Xiaohong Jiang, Tarik Taleb, Bin Li, Heng Qin, Zhimeng Zhong, Xiaomei Zhang:
Connecting a City by Wireless Backhaul: 3D Spatial Channel Characterization and Modeling Perspectives. IEEE Commun. Mag. 55(5): 62-69 (2017) - [j103]Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang:
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Commun. Mag. 55(9): 86-93 (2017) - [j102]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:
Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Comput. Networks 123: 77-87 (2017) - [j101]Pin-Han Ho, Mingfu Li, Hsiang-Fu Yu, Xiaohong Jiang, György Dán:
Special Section on Mobile Content Delivery Networks. Comput. Commun. 99: 62 (2017) - [j100]Lisheng Ma, Wei Su, Bin Wu, Tarik Taleb, Xiaohong Jiang, Norio Shiratori:
ϵ-Time Early Warning Data Backup in Disaster-Aware Optical Inter-Connected Data Center Networks. JOCN 9(6): 536-545 (2017) - [j99]Xiaohong Jiang, Gabriel-Miro Muntean, George Ghinea, Changqiao Xu:
Challenges and Opportunities of Network Virtualization over Wireless Mobile Networks. Mob. Inf. Syst. 2017: 9053678:1-9053678:2 (2017) - [j98]Lisheng Ma, Bin Wu, Xiaohong Jiang, Achille Pattavina:
Nonblocking conditions for -cast Clos networks under balanced traffic. Opt. Switch. Netw. 25: 109-116 (2017) - [j97]Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Yaoxue Zhang:
Practical Performance of MANETs Under Limited Buffer and Packet Lifetime. IEEE Syst. J. 11(2): 995-1005 (2017) - [j96]Lisheng Ma, Xiaohong Jiang, Bin Wu, Achille Pattavina:
Performance Analysis of f-Cast Crosstalk-Free Optical Banyan Networks. IEEE Trans. Commun. 65(4): 1721-1732 (2017) - [j95]Kechen Zheng, Jinbei Zhang, Xiaoying Liu, Luoyi Fu, Xinbing Wang, Xiaohong Jiang, Wenjun Zhang:
Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships. IEEE Trans. Veh. Technol. 66(3): 2688-2702 (2017) - [j94]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
On Performance Modeling for MANETs Under General Limited Buffer Constraint. IEEE Trans. Veh. Technol. 66(10): 9483-9497 (2017) - [j93]Yang Xu, Jia Liu, Yulong Shen, Xiangning Li, Xiaohong Jiang:
On throughput capacity of large-scale ad hoc networks with realistic buffer constraint. Wirel. Networks 23(1): 193-204 (2017) - [c105]Shuangrui Zhao, Jia Liu, Xiaochen Li, Yulong Shen, Xiaohong Jiang:
Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying. GLOBECOM Workshops 2017: 1-6 - [c104]Kenta Sasaki, Xuening Liao, Xiaohong Jiang:
Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays. CANDAR 2017: 565-569 - [c103]Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Di Zhang, Yaoxue Zhang:
Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing. ICCCN 2017: 1-9 - [c102]Yeqiu Xiao, Jia Liu, Jiao Quan, Yulong Shen, Xiaohong Jiang:
On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users. MSN 2017: 402-412 - [c101]Yongchao Dang, Yin Chen, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources. NaNA 2017: 30-35 - [c100]Huihui Wu, Xuening Liao, Yongchao Dang, Yulong Shen, Xiaohong Jiang:
Limits of Covert Communication on Two-Hop AWGN Channels. NaNA 2017: 42-47 - [c99]Xiaolan Liu, Bin Yang, Xiaohong Jiang:
Trust-Aware Data Uploading Based on Device-to-Device Communications. NaNA 2017: 309-313 - [c98]Yang Xu, Jia Liu, Osamu Takahashi, Norio Shiratori, Xiaohong Jiang:
SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks. WCNC 2017: 1-6 - 2016
- [j92]Jia Liu, Min Sheng, Yang Xu, Jiandong Li, Xiaohong Jiang:
On throughput capacity for a class of buffer-limited MANETs. Ad Hoc Networks 37: 354-367 (2016) - [j91]Lisheng Ma, Xiaohong Jiang, Bin Wu, Achille Pattavina, Norio Shiratori:
Probabilistic region failure-aware data center network and content placement. Comput. Networks 103: 56-66 (2016) - [j90]Xiaohong Jiang, Han-Chieh Chao, Gabriel-Miro Muntean, George Ghinea, Changqiao Xu:
Green Communication for Mobile and Wireless Networks. Mob. Inf. Syst. 2016: 8719763:1-8719763:2 (2016) - [j89]Yuanyu Zhang, Yulong Shen, Hua Wang, Jianming Yong, Xiaohong Jiang:
On Secure Wireless Communications for IoT Under Eavesdropper Collusion. IEEE Trans Autom. Sci. Eng. 13(3): 1281-1293 (2016) - [j88]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang, Hideyuki Tokuda:
On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks. IEEE Trans. Commun. 64(4): 1646-1659 (2016) - [j87]Jia Liu, Min Sheng, Yang Xu, Jiandong Li, Xiaohong Jiang:
End-to-End Delay Modeling in Buffer-Limited MANETs: A General Theoretical Framework. IEEE Trans. Wirel. Commun. 15(1): 498-511 (2016) - [c97]Lisheng Ma, Xiaohong Jiang, Bin Wu, Tarik Taleb, Achille Pattavina, Norio Shiratori:
Cost-efficient data backup for data center networks against ε-time early warning disaster. HPSR 2016: 22-26 - [c96]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Security/QoS-aware route selection in multi-hop wireless ad hoc networks. ICC 2016: 1-6 - [c95]Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen:
Delivery Probability of 3D MANETs with Packet Replication. NaNA 2016: 29-34 - [c94]Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68 - [c93]Shikai Shen, Bin Yang, Kaiguo Qian, Wu Wang, Xiaohong Jiang, Yumei She, Yujian Wang:
An Improved Amorphous Localization Algorithm for Wireless Sensor Networks. NaNA 2016: 69-72 - [c92]Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
Exact Secrecy Throughput of MANETs with Guard Zone. NaNA 2016: 167-172 - [c91]Xuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang:
The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network. NaNA 2016: 173-177 - [c90]Bo Liu, Pengfei Lu, Xuanwen Hao, Xiaohong Jiang, Zhenqiang Wu:
Data Collection Scheme Based on Wake-Up in Body Area Nanonetworks. NaNA 2016: 438-443 - [i17]Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
On Performance Modeling for MANETs under General Limited Buffer Constraint. CoRR abs/1609.02252 (2016) - [i16]Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:
Physical Layer Security-Aware Routing and Performance Tradeoffs in WANETs. CoRR abs/1609.02288 (2016) - [i15]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks. CoRR abs/1609.07830 (2016) - 2015
- [j86]Juntao Gao, Yulong Shen, Xiaohong Jiang, Jie Li:
Source delay in mobile ad hoc networks. Ad Hoc Networks 24: 109-120 (2015) - [j85]Bin Yang, Ying Cai, Yin Chen, Xiaohong Jiang:
On the exact multicast delay in mobile ad hoc networks with f-cast relay. Ad Hoc Networks 33: 71-86 (2015) - [j84]Yuanyu Zhang, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming. Ad Hoc Sens. Wirel. Networks 29(1-4): 113-131 (2015) - [j83]Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach. Ad Hoc Sens. Wirel. Networks 29(1-4): 265-285 (2015) - [j82]Shu Fu, Bin Wu, Xiaohong Jiang, Achille Pattavina, Hong Wen, Hongfang Yu:
Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead. Comput. Networks 87: 33-43 (2015) - [j81]Bin Yang, Yin Chen, Guilin Chen, Xiaohong Jiang:
Throughput Capacity Study for MANETs with Erasure Coding and Packet Replication. IEICE Trans. Commun. 98-B(8): 1537-1552 (2015) - [j80]Dingyi Fang, Chase Q. Wu, Jie Wang, Lin Cai, Xiaohong Jiang:
Location-Related Challenges and Strategies in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 571796:1-571796:3 (2015) - [j79]Changqiao Xu, Gabriel-Miro Muntean, Liang Zhou, Xiaohong Jiang:
Green and Friendly Communication for Sensor Networks. Int. J. Distributed Sens. Networks 11: 968167:1-968167:2 (2015) - [j78]Hua Wang, Xiaohong Jiang, Georgios Kambourakis:
Special issue on Security, Privacy and Trust in network-based Big Data. Inf. Sci. 318: 48-50 (2015) - [j77]Bin Yang, Yin Chen, Ying Cai, Xiaohong Jiang:
Packet Delivery Ratio/Cost in MANETs With Erasure Coding and Packet Replication. IEEE Trans. Veh. Technol. 64(5): 2062-2070 (2015) - [j76]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process. Wirel. Networks 21(8): 2453-2466 (2015) - [c89]Lisheng Ma, Xiaohong Jiang, Achille Pattavina, Norio Shiratori:
Probabilistic region failure-aware data center network placement. HPSR 2015: 94-99 - [c88]Wu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang:
Delivery Delay in 3D MANETs with Packet Redundancy. CANDAR 2015: 207-212 - [c87]Bo Liu, Yuanyu Zhang, Xiaohong Jiang, Zhenqiang Wu:
An Energy-Efficient Data Collection Scheme in Body Area Nanonetworks. CANDAR 2015: 240-245 - [c86]Shikai Shen, Bin Yang, Kaiguo Qian, Xiaohong Jiang:
An Efficient Localization Algorithm in Wireless Sensor Networks. CANDAR 2015: 291-294 - [c85]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang:
Modeling the success transmission rate in Aloha MANETs with Binomial point process. ICMU 2015: 36-41 - [c84]Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Outage performance of secure multicasting in the presence of multiple eavesdroppers. ICMU 2015: 138-142 - [c83]Chungang Yang, Jiandong Li, Xiaohong Jiang, Alagan Anpalagan:
Interference-aware spectral-and-energy efficiency tradeoff in heterogeneous networks. WCNC 2015: 819-824 - [i14]Jia Liu, Min Sheng, Yang Xu, Hongguang Sun, Xijun Wang, Xiaohong Jiang:
Throughput capacity of two-hop relay MANETs under finite buffers. CoRR abs/1509.06889 (2015) - [i13]Jia Liu, Min Sheng, Yang Xu, Jiandong Li, Xiaohong Jiang:
On throughput capacity for a class of buffer-limited MANETs. CoRR abs/1509.06916 (2015) - [i12]Jia Liu, Yang Xu, Xiaohong Jiang:
End-to-end delay in two hop relay MANETs with limited buffer. CoRR abs/1509.06921 (2015) - [i11]Jia Liu, Min Sheng, Yang Xu, Jiandong Li, Xiaohong Jiang:
End-to-end delay modeling in buffer-limited MANETs: a general theoretical framework. CoRR abs/1509.06969 (2015) - [i10]Lisheng Ma, Xiaohong Jiang, Bin Wu, Tarik Taleb:
Cost-Efficient Data Backup for Data Center Networks against ε-Time Early Warning Disaster. CoRR abs/1512.08189 (2015) - 2014
- [j75]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy transmission capacity in noisy wireless ad hoc networks. Ad Hoc Networks 21: 123-133 (2014) - [j74]Kaikai Chi, Yi-hua Zhu, Xiaohong Jiang, Xianzhong Tian:
Practical throughput analysis for two-hop wireless network coding. Comput. Networks 60: 101-114 (2014) - [j73]Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel. IEICE Trans. Commun. 97-B(2): 396-407 (2014) - [j72]Maria Salama, Amir Zeid, Ahmed Shawish, Xiaohong Jiang:
A Novel QoS-Based Framework for Cloud Computing Service Provider Selection. Int. J. Cloud Appl. Comput. 4(2): 48-72 (2014) - [j71]Jie Xiao, Bin Wu, Xiaohong Jiang, Achille Pattavina, Hong Wen, Lei Zhang:
Scalable Data Center Network Architecture With Distributed Placement of Optical Switches and Racks. JOCN 6(3): 270-281 (2014) - [j70]Bin Wu, Shu Fu, Xiaohong Jiang, Hong Wen:
Joint Scheduling and Routing for QoS Guaranteed Packet Transmission in Energy Efficient Reconfigurable WDM Mesh Networks. IEEE J. Sel. Areas Commun. 32(8): 1533-1541 (2014) - [j69]Jie Xiao, Hong Wen, Bin Wu, Xiaohong Jiang, Pin-Han Ho, Lei Zhang:
Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks. IEEE Trans. Commun. 62(1): 235-245 (2014) - [j68]Changhoon Lee, Xiaohong Jiang, Christian Becker, Laurence T. Yang:
Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology". Telecommun. Syst. 55(1): 1-3 (2014) - [j67]Kaikai Chi, Yi-hua Zhu, Xiaohong Jiang, Victor C. M. Leung:
Energy-Efficient Prefix-Free Codes for Wireless Nano-Sensor Networks Using OOK Modulation. IEEE Trans. Wirel. Commun. 13(5): 2670-2682 (2014) - [j66]Bin Yang, Juntao Gao, Yuezhi Zhou, Xiaohong Jiang:
Delay control in MANETs with erasure coding and f-cast relay. Wirel. Networks 20(8): 2617-2631 (2014) - [c82]Yujian Fang, Yue-Zhi Zhou, Xiaohong Jiang, Yaoxue Zhang:
On Delivery Delay-Constrained Throughput and End-to-End Delay in MANETs. HPCC/CSS/ICESS 2014: 456-463 - [c81]Lisheng Ma, Xiaohong Jiang, Bin Wu, Achille Pattavina:
Blocking probability of f-cast optical banyan networks on vertical stacking. HPSR 2014: 173-178 - [c80]Xiaohong Jiang:
On Capacity Studies for Mobile Ad Hoc Networks. CANDAR 2014: 7-10 - [c79]Jia Liu, Yang Xu, Xiaohong Jiang:
End-to-End Delay in Two Hop Relay MANETs with Limited Buffer. CANDAR 2014: 151-156 - [c78]Bin Yang, Yin Chen, Xiaohong Jiang:
Multicast Delay of Mobile Ad Hoc Networks. CANDAR 2014: 272-277 - [c77]Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang:
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. INFOCOM 2014: 2768-2776 - [c76]Jia Liu, Min Sheng, Yang Xu, Hongguang Sun, Xijun Wang, Xiaohong Jiang:
Throughput capacity of two-hop relay MANETs under finite buffers. PIMRC 2014: 1243-1248 - [i9]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks. CoRR abs/1401.6123 (2014) - 2013
- [j65]Yin Chen, Jiajia Liu, Xiaohong Jiang, Osamu Takahashi:
Throughput analysis in mobile ad hoc networks with directional antennas. Ad Hoc Networks 11(3): 1122-1135 (2013) - [j64]Keyvan Kashkouli Nejad, Xiaohong Jiang, Michitaka Kameyama:
RFID-based localization with Non-Blocking tag scanning. Ad Hoc Networks 11(8): 2264-2272 (2013) - [j63]Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:
Block-level packet recovery with network coding for wireless reliable multicast. Comput. Networks 57(4): 910-923 (2013) - [j62]Juntao Gao, Jiajia Liu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Throughput Capacity of MANETs with Group-Based Scheduling and General Transmission Range. IEICE Trans. Commun. 96-B(7): 1791-1802 (2013) - [j61]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Effects of Channel Correlation on Outage Secrecy Capacity. Inf. Media Technol. 8(4): 1224-1233 (2013) - [j60]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Effects of Channel Correlation on Outage Secrecy Capacity. J. Inf. Process. 21(4): 640-649 (2013) - [j59]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Performance Modeling for Relay Cooperation in Delay Tolerant Networks. Mob. Networks Appl. 18(2): 186-194 (2013) - [j58]Kaikai Chi, Yi-hua Zhu, Xiaohong Jiang, Xianzhong Tian:
Optimal coding for transmission energy minimization in wireless nanosensor networks. Nano Commun. Networks 4(3): 120-130 (2013) - [j57]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
On the Delivery Probability of Two-Hop Relay MANETs with Erasure Coding. IEEE Trans. Commun. 61(4): 1314-1326 (2013) - [j56]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Throughput Capacity of MANETs with Power Control and Packet Redundancy. IEEE Trans. Wirel. Commun. 12(6): 3035-3047 (2013) - [c75]Xiaoliang Wang, Xiaohong Jiang, Cam-Tu Nguyen, Xiao Zhang, Sanglu Lu:
Fast connection recovery against region failures with landmark-based source routing. DRCN 2013: 11-19 - [c74]Jie Xiao, Bin Wu, Xiaohong Jiang, Pin-Han Ho, Shu Fu:
Data center network placement and service protection in all-optical mesh networks. DRCN 2013: 88-94 - [c73]Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Xiaochun Wang:
A Delay Constrained Two-Hop Relay Algorithm for Transparent Computing in MANETs. HPCC/EUC 2013: 2337-2341 - [c72]Shu Fu, Bin Wu, Xiaohong Jiang, Achille Pattavina, Lei Zhang, Shizhong Xu:
Cost and delay tradeoff in three-stage switch architecture for data center networks. HPSR 2013: 56-61 - [c71]Bin Yang, Yin Chen, Yuezhi Zhou, Xiaohong Jiang:
Packet Delivery Probability in Two-Hop Relay MANETs with Hybrid Routing. CANDAR 2013: 448-453 - [c70]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Throughput analysis for two-hop relay mobile ad hoc networks with receiver probing. ICC 2013: 6091-6095 - [c69]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. ITCS 2013: 397-406 - [c68]Kaikai Chi, Yi-hua Zhu, Xiaohong Jiang, Xianzhong Tian:
Energy optimal coding for wireless nanosensor networks. WCNC 2013: 998-1002 - [c67]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Flexible relay selection for secure communication in two-hop wireless networks. WiOpt 2013: 648-651 - [i8]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1301.1746 (2013) - [i7]Juntao Gao, Yulong Shen, Xiaohong Jiang, Jie Li:
Source Delay in Mobile Ad Hoc Networks. CoRR abs/1310.7444 (2013) - [i6]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process. CoRR abs/1310.8374 (2013) - [i5]Yuanyu Zhang, Yulong Shen, Hua Wang, Xiaohong Jiang:
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks. CoRR abs/1312.3748 (2013) - [i4]Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
End-to-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach. CoRR abs/1312.7201 (2013) - 2012
- [j55]Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Yanjun Li:
Acknowledgment Mechanisms for Network-Coding-Based Reliable Wireless Multicast. IEICE Trans. Commun. 95-B(10): 3103-3112 (2012) - [j54]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Ryu Miura, Nei Kato, Naoto Kadowaki:
Optimal Forwarding Games in Mobile Ad Hoc Networks with Two-Hop f-cast Relay. IEEE J. Sel. Areas Commun. 30(11): 2169-2179 (2012) - [j53]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina:
Constructing N-to-N Shared Optical Queues With Switches and Fiber Delay Lines. IEEE Trans. Inf. Theory 58(6): 3836-3842 (2012) - [j52]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Generalized two-hop relay for flexible delay control in MANETs. IEEE/ACM Trans. Netw. 20(6): 1950-1963 (2012) - [j51]Jiajia Liu, Juntao Gao, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Capacity and Delay of Probing-Based Two-Hop Relay in MANETs. IEEE Trans. Wirel. Commun. 11(11): 4172-4183 (2012) - [j50]Hong Wen, Pin-Han Ho, Xiaohong Jiang:
On Achieving Unconditional Secure Communications over Binary Symmetric Channels (BSC). IEEE Wirel. Commun. Lett. 1(2): 49-52 (2012) - [c66]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Secrecy capacity of correlated rayleigh fading channels. APCC 2012: 333-337 - [c65]Yin Chen, Jiajia Liu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Exact throughput capacity in MANETs with directional antenna and transmission power constraint. APCC 2012: 450-455 - [c64]Jinxiao Zhu, Xiaohong Jiang, Yuezhi Zhou, Yaoxue Zhang, Osamu Takahashi, Norio Shiratori:
Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI. APSCC 2012: 257-262 - [c63]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Message delivery probability of two-hop relay with erasure coding in MANETs. CHINACOM 2012: 144-149 - [c62]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Throughput capacity of the group-based two-hop relay algorithm in MANETs. GLOBECOM 2012: 26-30 - [c61]Jiajia Liu, Juntao Gao, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Probing-based two-hop relay with limited packet redundancy. HPSR 2012: 96-101 - [c60]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina, Sanglu Lu:
Assessing physical network vulnerability under random line-segment failure model. HPSR 2012: 121-126 - [c59]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Capacity vs. delivery delay in MANETs with power control and f-cast relay. ICC 2012: 53-57 - [c58]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Delivery ratio in two-hop relay MANETs with limited message lifetime and redundancy. ICC 2012: 5173-5177 - [c57]Juntao Gao, Jiajia Liu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Exact capacity study for a class of MANETs. ICCC 2012: 173-178 - [c56]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Exact throughput capacity under power control in mobile ad hoc networks. INFOCOM 2012: 1-9 - [c55]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Multicast capacity, delay and delay jitter in intermittently connected mobile networks. INFOCOM 2012: 253-261 - [c54]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato, Xuemin (Sherman) Shen:
End-to-end delay in mobile ad hoc networks with generalized transmission range and limited packet redundancy. WCNC 2012: 1731-1736 - [i3]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks. CoRR abs/1211.7075 (2012) - [i2]Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks. CoRR abs/1212.0287 (2012) - [i1]Yulong Shen, Xiaohong Jiang, Jianfeng Ma:
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System. CoRR abs/1212.6627 (2012) - 2011
- [j49]Kaikai Chi, Xiaohong Jiang, Baoliu Ye, Yanjun Li:
Flow-oriented network coding architecture for multihop wireless networks. Comput. Networks 55(10): 2425-2442 (2011) - [j48]Xiaoming Wang, Xiaohong Jiang, Tao Yang, Qiaoliang Li, Yingshu Li:
Node Aggregation Degree-Aware Random Routing for Non-uniform Wireless Sensor Networks. IEICE Trans. Commun. 94-B(1): 97-108 (2011) - [j47]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina:
Efficient Designs of Optical LIFO Buffer with Switches and Fiber Delay Lines. IEEE Trans. Commun. 59(12): 3430-3439 (2011) - [j46]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Reliability Assessment for Wireless Mesh Networks Under Probabilistic Region Failure Model. IEEE Trans. Veh. Technol. 60(5): 2253-2264 (2011) - [j45]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Delay and Capacity in Ad Hoc Mobile Networks with f-cast Relay Algorithms. IEEE Trans. Wirel. Commun. 10(8): 2738-2751 (2011) - [c53]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
A general model for store-carry-forward routing schemes with multicast in delay tolerant networks. CHINACOM 2011: 494-500 - [c52]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Performance Modeling for Two-Hop Relay with Erasure Coding in MANETs. GLOBECOM 2011: 1-5 - [c51]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina:
An improved design of optical LIFO buffer with switched delay lines. HPSR 2011: 126-131 - [c50]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina:
Assessing network vulnerability under probabilistic region failure model. HPSR 2011: 164-170 - [c49]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Group-based two-hop relay with redundancy in MANETs. HPSR 2011: 197-202 - [c48]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Delay and Capacity in Ad Hoc Mobile Networks with ??-Cast Relay Algorithms. ICC 2011: 1-5 - [c47]Keyvan Kashkouli Nejad, Xiaohong Jiang, Michitaka Kameyama:
High Performance Tag Singulation for Memory-Less RFID Systems. ICC 2011: 1-6 - [c46]Guojun Ma, Qingqi Pei, Yuchen Wang, Xiaohong Jiang:
A General Sharing Model Based on Proxy Re-encryption. IIH-MSP 2011: 248-251 - [c45]Keyvan Kashkouli Nejad, Xiaohong Jiang, Michitaka Kameyama:
Non-blocking tag scanning for passive RFID localization. ISDA 2011: 1140-1145 - [c44]Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Performance modeling for two-hop relay with node selfishness in delay tolerant networks. OnlineGreenComm 2011: 70-75 - 2010
- [j44]Keyvan Kashkouli Nejad, Shawish Ahmed, Xiaohong Jiang, Susumu Horiguchi:
Probabilistic proactive routing with active route trace-back for MANETs. Ad Hoc Networks 8(6): 640-653 (2010) - [j43]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
Network coding-based reliable multicast in wireless networks. Comput. Networks 54(11): 1823-1836 (2010) - [j42]Kaikai Chi, Xiaohong Jiang, Baoliu Ye, Susumu Horiguchi:
Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks. IEICE Trans. Commun. 93-B(4): 971-981 (2010) - [j41]Dalia Nashat, Xiaohong Jiang, Michitaka Kameyama:
Group Testing Based Detection of Web Service DDoS Attackers. IEICE Trans. Commun. 93-B(5): 1113-1121 (2010) - [j40]Jianming Liu, Xiaohong Jiang, Susumu Horiguchi, Tony-Tong Lee:
Analysis of random sleep scheme for wireless sensor networks. Int. J. Sens. Networks 7(1/2): 71-84 (2010) - [j39]Ahmad R. Dhaini, Pin-Han Ho, Xiaohong Jiang:
WiMAX-VPON: A Framework of Layer-2 VPNs for Next-Generation Access Networks. JOCN 2(7): 400-414 (2010) - [j38]Jianming Liu, Xiaohong Jiang, Susumu Horiguchi:
Opportunistic link overbooking for resource efficiency under per-flow service guarantee. IEEE Trans. Commun. 58(6): 1769-1781 (2010) - [j37]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
Joint Design of Network Coding and Transmission Rate Selection for Multihop Wireless Networks. IEEE Trans. Veh. Technol. 59(5): 2435-2444 (2010) - [j36]Song Guo, Victor C. M. Leung, Xiaohong Jiang:
Distributed Approximation Algorithms for Longest-Lived Multicast in WANETs with Directional Antennas. IEEE Trans. Wirel. Commun. 9(7): 2227-2237 (2010) - [c43]Keyvan Kashkouli Nejad, Xiaohong Jiang, Jianhua Ma:
Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. AINA 2010: 489-494 - [c42]Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng:
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks. CIS 2010: 478-482 - [c41]Ahmad R. Dhaini, Pin-Han Ho, Xiaohong Jiang:
Performance Analysis of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks. GLOBECOM 2010: 1-6 - [c40]Jianming Liu, Xiaohong Jiang, Achille Pattavina:
Packet loss process under bounded delay. HPSR 2010: 52-56 - [c39]Son-Hong Ngo, Xiaohong Jiang:
Burst Loss Probability Model for Hybrid Deflection and Retransmission Routing in OBS Networks. RIVF 2010: 1-5
2000 – 2009
- 2009
- [j35]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
A More Efficient COPE Architecture for Network Coding in Multihop Wireless Networks. IEICE Trans. Commun. 92-B(3): 766-775 (2009) - [j34]Yusuke Fukushima, Xiaohong Jiang, Achille Pattavina, Susumu Horiguchi:
Self-Routing Nonblocking WDM Switches Based on Arrayed Waveguide Grating. IEICE Trans. Commun. 92-B(4): 1173-1182 (2009) - [j33]Xiaoliang Wang, Xiaohong Jiang, Susumu Horiguchi:
New Bounds on the Feedforward Design of Optical Output Buffer Multiplexers and Switches. IEICE Trans. Commun. 92-B(4): 1183-1190 (2009) - [j32]Ayong Ye, Jianfeng Ma, Xiaohong Jiang, Susumu Horiguchi:
Robust Node Positioning in Wireless Sensor Networks. IEICE Trans. Commun. 92-B(6): 2023-2031 (2009) - [j31]Keyvan Kashkouli Nejad, Ahmed Shawish, Xiaohong Jiang, Susumu Horiguchi:
Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks. IEICE Trans. Commun. 92-B(8): 2610-2618 (2009) - [j30]Shawish Ahmed, Xiaohong Jiang, Susumu Horiguchi:
Fair Scheduling for Delay-Sensitive VoIP Traffic. IEICE Trans. Commun. 92-B(10): 3115-3125 (2009) - [j29]Xiaoliang Wang, Xiaohong Jiang, Achille Pattavina, Susumu Horiguchi:
A construction of 1-to-2 shared optical buffer queue with switched delay lines. IEEE Trans. Commun. 57(12): 3712-3723 (2009) - [j28]Ahmed Shawish, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
Wireless Access Point Voice Capacity Analysis and Enhancement Based on Clients' Spatial Distribution. IEEE Trans. Veh. Technol. 58(5): 2597-2603 (2009) - [c38]Dalia Nashat, Xiaohong Jiang, Susumu Horiguchi:
On the Detection of DDoS Attackers for Large-Scale Networks. ICEBE 2009: 206-212 - [c37]Kaikai Chi, Xiaohong Jiang, Baoliu Ye:
Reliable multicast with network coding. Internetware 2009: 5 - [c36]M. M. Hafizur Rahman, Xiaohong Jiang, Md. Shahin-Al Masud, Susumu Horiguchi:
Network Performance of Pruned Hierarchical Torus Network. NPC 2009: 9-15 - 2008
- [j27]Jianming Liu, Xiaohong Jiang, Susumu Horiguchi:
Recursive Formula for the Moments of Queue Length in the M/M/1 Queue. IEEE Commun. Lett. 12(9): 690-692 (2008) - [j26]Xu Zhang, Xiaohong Jiang, Susumu Horiguchi:
Redundant Vias Insertion for Performance Enhancement in 3D ICs. IEICE Trans. Electron. 91-C(4): 571-580 (2008) - [j25]Xiaoliang Wang, Xiaohong Jiang, Susumu Horiguchi:
Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch. IEICE Trans. Commun. 91-B(9): 2889-2896 (2008) - [j24]Yusuke Fukushima, Xiaohong Jiang, Susumu Horiguchi:
Routing Algorithms for Packet/Circuit Switching in Optical Multi-log2N Networks. IEICE Trans. Commun. 91-B(12): 3913-3924 (2008) - [j23]Xiaohong Jiang, Achille Pattavina, Susumu Horiguchi:
Rearrangeable f-cast multi-log2 N networks. IEEE Trans. Commun. 56(11): 1929-1938 (2008) - [j22]Xiaohong Jiang, Achille Pattavina, Susumu Horiguchi:
Strictly nonblocking f-cast photonic networks. IEEE/ACM Trans. Netw. 16(3): 732-745 (2008) - [j21]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi, Minyi Guo:
Topology Design of Network-Coding-Based Multicast Networks. IEEE Trans. Parallel Distributed Syst. 19(5): 627-640 (2008) - [c35]Son-Hong Ngo, Masaru Fukushi, Xiaohong Jiang, Susumu Horiguchi:
Efficient Scheduling Schemes for Sabotage-Tolerance in Volunteer Computing Systems. AINA 2008: 652-658 - [c34]Xiaoliang Wang, Xiaohong Jiang, Susumu Horiguchi:
Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch. AINA 2008: 912-917 - [c33]Yang Wang, Hung Q. Ngo, Xiaohong Jiang:
Strictly Nonblocking Function-Cast d-Ary Multi-Log Networks under Fanout and Crosstalk Constraints. ICC 2008: 5407-5411 - [c32]Dalia Nashat, Xiaohong Jiang, Susumu Horiguchi:
Detecting SYN Flooding Agents under Any Type of IP Spoofing. ICEBE 2008: 499-505 - [c31]Xiaoliang Wang, Xiaohong Jiang, Susumu Horiguchi:
Improved Bounds on the Feedfoward Design of Optical Multiplexers. ISPAN 2008: 178-183 - [c30]Shawish Ahmed, Xiaohong Jiang, Susumu Horiguchi:
Voice Capacity Analysis and Enhancement in Wireless LAN. WCNC 2008: 2153-2157 - [c29]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
Network CodingOpportunity Analysis of COPE in Multihop Wireless Networks. WCNC 2008: 2858-2863 - 2007
- [j20]Xu Zhang, Xiaohong Jiang, Susumu Horiguchi:
Variant X-Tree Clock Distribution Network and Its Performance Evaluations. IEICE Trans. Electron. 90-C(10): 1909-1918 (2007) - [j19]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Minyi Guo:
Restoration Probability Modelling for Active Restoration-Based Optical Networks with Correlation Among Backup Routes. IEEE Trans. Parallel Distributed Syst. 18(11): 1592-1606 (2007) - [c28]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
A General Packet Coding Scheme for Multi-Hop Wireless Networks. GLOBECOM 2007: 1339-1343 - [c27]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
An Improved Topology Design Algorithm for Network Coding-Based Multicast Networks. ICC 2007: 6111-6116 - [c26]Shawish Ahmed, Xiaohong Jiang, Susumu Horiguchi:
Efficient Scheduler for the Growing VoIP Traffic. ICPP Workshops 2007: 12 - [c25]Yusuke Fukushima, Xiaohong Jiang, Susumu Horiguchi:
On the Routing Algorithms for Optical Multi-log2 N Networks. NPC 2007: 91-100 - [c24]Xiaoliang Wang, Xiaohong Jiang, Susumu Horiguchi:
CBX-1 Switch: An Effective Load Balanced Switch. PDCAT 2007: 391-397 - 2006
- [j18]Xiaohong Jiang, Pin-Han Ho, Hong Shen, Susumu Horiguchi:
A Class of Benes-Based Optical Multistage Interconnection Networks for Crosstalk-Free Realization of Permutations. IEICE Trans. Commun. 89-B(1): 19-27 (2006) - [j17]Chen Yu, Xiaohong Jiang, Susumu Horiguchi:
Lower-Bound on Blocking Probability of a Class of Crosstalk-Free Optical Cross-Connects (OXCs). IEICE Trans. Inf. Syst. 89-D(2): 719-727 (2006) - [j16]Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi:
Ant-Based Alternate Routing in All-Optical WDM Networks. IEICE Trans. Commun. 89-B(3): 748-755 (2006) - [j15]Chen Yu, Xiaohong Jiang, Susumu Horiguchi:
Performance modelling for vertically stacked optical banyan networks with extra stage. Int. J. Comput. Sci. Eng. 2(1/2): 81-87 (2006) - [j14]Vinh Trong Le, Xiaohong Jiang, Son-Hong Ngo, Susumu Horiguchi, Yasushi Inoguchi:
A novel dynamic survivable routing in WDM optical networks with/without sparse wavelength conversion. Opt. Switch. Netw. 3(3-4): 173-190 (2006) - [j13]Son Hong Ngo, Xiaohong Jiang, Susumu Horiguchi:
An Ant-Based Approach for Dynamic RWA in Optical WDM Networks. Photonic Netw. Commun. 11(1): 39-48 (2006) - [j12]Son-Hong Ngo, Xiaohong Jiang, Vinh Trong Le, Susumu Horiguchi:
Ant-based survivable routing in dynamic WDM networks with shared backup paths. J. Supercomput. 36(3): 297-307 (2006) - [j11]Chen Yu, Xiaohong Jiang, Susumu Horiguchi, Minyi Guo:
Overall Blocking Behavior Analysis of General Banyan-Based Optical Switching Networks. IEEE Trans. Parallel Distributed Syst. 17(9): 1037-1047 (2006) - [c23]Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi:
Network-coding Based Topology Design for Multicast Networks. BROADNETS 2006 - [c22]Mohamed Mostafa Abdel-Azim, Xiaohong Jiang, Susumu Horiguchi:
On Modeling the Restoration Probability of Active Restoration-Based Optical Networks with Correlation Among Backup Routes. FCST 2006: 23-38 - [c21]Xu Zhang, Xiaohong Jiang, Susumu Horiguchi:
A non-orthogonal clock distribution network and its performance evaluation in presence of process variations and inductive effects. ACM Great Lakes Symposium on VLSI 2006: 336-340 - [c20]Mohamed Mostafa A. Azim, Xiaohong Jiang, Susumu Horiguchi:
Performance Analysis for Active Restoration-Based Optical Networks Incorporating the Correlation Among Backup Routes. ICC 2006: 2483-2488 - [c19]Basem Shihada, Pin-Han Ho, Fen Hou, Xiaohong Jiang, Susumu Horiguchi, Minyi Guo, Hussein T. Mouftah:
BAIMD: A Responsive Rate Control for TCP over Optical Burst Switched (OBS) Networks. ICC 2006: 2550-2555 - 2005
- [j10]Vinh Trong Le, Xiaohong Jiang, Son-Hong Ngo, Susumu Horiguchi:
Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion. IEICE Trans. Inf. Syst. 88-D(9): 2067-2078 (2005) - [j9]Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
Performance Modeling for All-Optical Photonic Switches Based on the Vertical Stacking of Banyan Network Structures. IEEE J. Sel. Areas Commun. 23(8): 1620-1631 (2005) - [j8]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
Models of Restoration Probability in WDM Networks Employing Active Restoration. Photonic Netw. Commun. 10(2): 141-153 (2005) - [j7]Xiaohong Jiang, Susumu Horiguchi:
Design of Optical Rearrangeable Nonblocking MINs Under Various Crosstalk Constraints. Photonic Netw. Commun. 10(2): 225-232 (2005) - [c18]János Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi:
Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. AINA 2005: 655-660 - [c17]Anpeng Huang, Pin-Han Ho, Xiaohong Jiang, Minyi Guo, Susumu Horiguchi:
Optical flooding cluster switching (OFCS). GLOBECOM 2005: 5 - [c16]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
A New Hybrid Architecture for Optical Burst Switching Networks. HPCC 2005: 196-202 - [c15]Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi:
Dynamic Lightpath Protection in WDM optical Networks Using Ant-based Mobile Agents. IAT 2005: 51-57 - [c14]Chen Yu, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Hussein T. Mouftah:
Blocking probability modeling of distensible optical banyan networks. ICC 2005: 1824-1829 - [c13]Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo, Xiaohong Jiang, Jingling Xue, Minglu Li:
Fast Parallel DNA-Based Algorithms for Molecular Computation: Determining a Prime Number. ICITA (1) 2005: 447-452 - [c12]Vinh Trong Le, Xiaohong Jiang, Son-Hong Ngo, Susumu Horiguchi:
Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithm in WDM Networks with Sparse Wavelength Conversion. IPDPS 2005 - [c11]Vinh Trong Le, Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi, Yasushi Inoguchi:
A Hybrid Algorithm for Dynamic Lightpath Protection in Survivable WDM Optical Networks. ISPAN 2005: 484-489 - 2004
- [j6]Md. Mamun-ur-Rashid Khandker, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Hussein T. Mouftah:
Performance of Fast Routing Algorithms in Large Optical Switches Built on the Vertical Stacking of Banyan Structures. Clust. Comput. 7(3): 219-224 (2004) - [c10]Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi, Minyi Guo:
Dynamic Routing and Wavelength Assignment in WDM Networks with Ant-Based Agents. EUC 2004: 829-838 - [c9]János Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi:
A novel distributed control architecture for shared protection. GLOBECOM 2004: 1764-1769 - [c8]Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi:
Adaptive routing and wavelength assignment using ant-based algorithm. ICON 2004: 482-486 - [c7]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
A New Scheme for Lightpath Restoration in WDM Networks. ICPP Workshops 2004: 381-386 - [c6]Vinh Trong Le, Son-Hong Ngo, Xiaohong Jiang, Susumu Horiguchi, Minyi Guo:
A Genetic Algorithm for Dynamic Routing and Wavelength Assignment in WDM Networks. ISPA 2004: 893-902 - 2003
- [j5]Xiaohong Jiang, Hong Shen, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
A New Scheme to Realize Crosstalk-Free Permutation in Vertically Stacked Optical MINs. Photonic Netw. Commun. 5(1): 89-102 (2003) - [j4]Xiaohong Jiang, Hong Shen, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
Blocking behaviors of crosstalk-free optical Banyan networks on vertical stacking. IEEE/ACM Trans. Netw. 11(6): 982-993 (2003) - [c5]Xiaohong Jiang, Hong Shen, Susumu Horiguchi:
Blocking probability of vertically stacked optical banyan networks under random routing. GLOBECOM 2003: 2493-2497 - 2002
- [j3]Xiaohong Jiang, Yue Hao, Susumu Horiguchi:
A new approach for critical area estimation in VLSI. J. Syst. Archit. 47(10): 869-881 (2002) - [c4]Xiaohong Jiang, Hong Shen, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
Vertically Stacked Benes Networks for Crosstalk-Free Permutation. CW 2002: 255-260 - [c3]Xiaohong Jiang, Hong Shen, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
A New Scheme to Realize Crosstalk-free Permutations in Optical MINs with Vertical Stacking. ISPAN 2002: 341- - 2001
- [j2]Md. Mamun-ur-Rashid Khandker, Xiaohong Jiang, Hong Shen, Susumu Horiguchi:
A New Architecture for Nonblocking Optical Switching Networks. Photonic Netw. Commun. 3(4): 393-400 (2001) - [j1]Xiaohong Jiang, Susumu Horiguchi:
Statistical skew modeling for general clock distribution networks in presence of process variations. IEEE Trans. Very Large Scale Integr. Syst. 9(5): 704-717 (2001) - 2000
- [c2]Xiaohong Jiang, Susumu Horiguchi, Yue Hao:
Predicting the Yield Efficacy of a Defect-Tolerant Embedded Core. DFT 2000: 30- - [c1]Xiaohong Jiang, Susumu Horiguchi:
Optimization of Wafer Scale H-Tree Clock Distribution Network Based on a New Statistical Skew Model. DFT 2000: 96-104
Coauthor Index
aka: Son Hong Ngo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint