Παρακολούθηση
Yi Ren
School of Computing Sciences, University of East Anglia
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα uea.ac.uk - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
bcBIM: A blockchain-based big data model for BIM modification audit and provenance in mobile cloud
R Zheng, J Jiang, X Hao, W Ren, F Xiong, Y Ren
Mathematical problems in engineering 2019, 2019
1772019
A novel approach to trust management in unattended wireless sensor networks
Y Ren, VI Zadorozhny, VA Oleshchuk, FY Li
IEEE Transactions on Mobile Computing 13 (7), 1409-1423, 2013
922013
Dynamic auto scaling algorithm (DASA) for 5G mobile networks
Y Ren, T Phung-Duc, JC Chen, ZW Yu
2016 IEEE global communications conference (GLOBECOM), 1-6, 2016
572016
SaaS: A situational awareness and analysis system for massive android malware detection
Y Zhang, W Ren, T Zhu, Y Ren
Future Generation Computer Systems 95, 548-559, 2019
362019
Security in mobile wireless sensor networks-A survey
Y Ren, VA Oleshchuk, FY Li, X Ge
Academy Publisher, 2011
352011
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
Y Ren, VA Oleshchuk, FY Li
Computer Communications 36 (9), 1067-1077, 2013
302013
Deep-learned regularization and proximal operator for image compressive sensing
Z Chen, W Guo, Y Feng, Y Li, C Zhao, Y Ren, L Shao
IEEE Transactions on Image Processing 30, 7112-7126, 2021
282021
A scheme for secure and reliable distributed data storage in unattended WSNs
Y Ren, V Oleshchuk, FY Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
272010
Design and analysis of deadline and budget constrained autoscaling (DBCA) algorithm for 5G mobile networks
T Phung-Duc, Y Ren, JC Chen, ZW Yu
2016 IEEE international conference on cloud computing technology and science …, 2016
242016
How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
W Ren, L Yu, L Ma, Y Ren
International Journal of Distributed Sensor Networks 9 (2), 679450, 2013
232013
Hybrids: A scheme for secure distributed data storage in wsns
W Ren, Y Ren, H Zhang
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
232008
RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications
W Ren, L Yu, L Ma, Y Ren
Tsinghua Science and Technology 18 (1), 100-117, 2013
202013
ASA: Adaptive VNF scaling algorithm for 5G mobile networks
Y Ren, T Phung-Duc, YK Liu, JC Chen, YH Lin
2018 IEEE 7th international conference on cloud networking (CloudNet), 1-4, 2018
182018
Invariant deep compressible covariance pooling for aerial scene categorization
S Wang, Y Ren, G Parr, Y Guan, L Shao
IEEE Transactions on Geoscience and Remote Sensing 59 (8), 6549-6561, 2020
172020
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
Y Ren, V Oleshchuk, FY Li
2009 2nd IFIP Wireless Days (WD), 1-6, 2009
162009
Design and analysis of the key management mechanism in evolved multimedia broadcast/multicast service
Y Ren, JC Chen, JC Chin, YC Tseng
IEEE Transactions on Wireless Communications 15 (12), 8463-8476, 2016
152016
Traceable and authenticated key negotiations via blockchain for vehicular communications
Y Chen, X Hao, W Ren, Y Ren
Mobile Information Systems 2019, 1-10, 2019
142019
eHint: An efficient protocol for uploading small-size IoT data
TY Chan, Y Ren, YC Tseng, JC Chen
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
142017
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
W Ren, J Zhao, Y Ren
J. Commun. 4 (11), 894-901, 2009
142009
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
Y Ren, V Oleshchuk, FY Li, S Sulistyo
2012 IEEE Wireless Communications and Networking Conference (WCNC), 2841-2846, 2012
132012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20