Guoliang Xue
#144,744
Most Influential Person Now
Guoliang Xue's AcademicInfluence.com Rankings
Guoliang Xuecomputer-science Degrees
Computer Science
#7185
World Rank
#7565
Historical Rank
Networking
#10
World Rank
#10
Historical Rank
Database
#4243
World Rank
#4413
Historical Rank

Download Badge
Computer Science
Guoliang Xue's Degrees
- Bachelors Computer Science University of Science and Technology of China
Similar Degrees You Can Earn
Why Is Guoliang Xue Influential?
(Suggest an Edit or Addition)Guoliang Xue's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Smart Grid — The New and Improved Power Grid: A Survey (2012) (2675)
- Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing (2012) (972)
- Interference-aware topology control and QoS routing in multi-channel wireless mesh networks (2005) (593)
- A survey of multimedia streaming in wireless sensor networks (2008) (445)
- Relay Node Placement in Wireless Sensor Networks (2011) (424)
- TPS: a time-based positioning scheme for outdoor wireless sensor networks (2004) (366)
- Incentive Mechanisms for Crowdsensing: Crowdsourcing With Smartphones (2016) (342)
- Aggregation tree construction in sensor networks (2003) (308)
- Spatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approach (2017) (232)
- Unobservable Re-authentication for Smartphones (2013) (220)
- PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs (2011) (220)
- Sensing as a Service: Challenges, Solutions and Future Directions (2013) (197)
- Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and Approximations (2010) (193)
- Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach (2013) (190)
- Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms (2007) (178)
- Fault-tolerant relay node placement in wireless sensor networks: formulation and approximation (2004) (159)
- Truthful incentive mechanisms for crowdsourcing (2015) (153)
- Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements (2008) (150)
- Truthful auction for cooperative communications (2011) (149)
- Polynomial Time Approximation Algorithms for Multi-Constrained QoS Routing (2008) (147)
- Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations (2012) (139)
- Link scheduling with power control for throughput enhancement in multihop wireless networks (2005) (135)
- Maximum Throughput and Fair Bandwidth Allocation in Multi-Channel Wireless Mesh Networks (2006) (130)
- Managing smart grid information in the cloud: opportunities, model, and applications (2012) (128)
- Joint spectrum allocation and scheduling for fair spectrum sharing in cognitive radio wireless networks (2008) (116)
- Finding a Path Subject to Many Additive QoS Constraints (2007) (115)
- Truthful incentive mechanisms for k-anonymity location privacy (2013) (113)
- Quality-of-service and quality-of-protection issues in preplanned recovery schemes using redundant trees (2003) (107)
- The Electric Vehicle Shortest-Walk Problem With Battery Exchanges (2016) (90)
- Experience-Driven Congestion Control: When Multi-Path TCP Meets Deep Reinforcement Learning (2019) (90)
- Application Provisioning in FOG Computing-enabled Internet-of-Things: A Network Perspective (2018) (89)
- Survivable Virtual Infrastructure Mapping in Virtualized Data Centers (2012) (85)
- An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications (2017) (83)
- Efficient anonymity schemes for clustered wireless sensor networks (2006) (83)
- Minimum-cost QoS multicast and unicast routing in communication networks (2003) (83)
- Joint Scheduling and Beamforming Coordination in Cloud Radio Access Networks With QoS Guarantees (2016) (76)
- Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing (2016) (75)
- HERA: An Optimal Relay Assignment Scheme for Cooperative Networks (2012) (73)
- Game theory in cooperative communications (2012) (72)
- On disjoint path pairs with wavelength continuity constraint in WDM networks (2004) (70)
- Frameworks for Privacy-Preserving Mobile Crowdsensing Incentive Mechanisms (2018) (70)
- OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks (2011) (69)
- Interference-aware routing in multihop wireless networks using directional antennas (2005) (66)
- Intelligent Disaster Response via Social Media Analysis A Survey (2017) (65)
- Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective (2013) (64)
- Network function virtualization in the multi-tenant cloud (2015) (63)
- BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks (2011) (62)
- Fair Bandwidth Allocation in Wireless Mesh Networks With Cognitive Radios (2010) (61)
- Incentive mechanism for proximity-based Mobile Crowd Service systems (2016) (59)
- The Constrained Shortest Path Problem: Algorithmic Approaches and an Algebraic Study with Generalization ∗ (2005) (56)
- Sensing as a service: A cloud computing system for mobile phone sensing (2012) (56)
- Keep Your Promise: Mechanism Design Against Free-Riding and False-Reporting in Crowdsourcing (2015) (54)
- Achieving sustainable transport through resource scheduling: A case study for electric vehicle charging stations (2019) (52)
- Polynomial Time Approximations for Multi-Path Routing with Bandwidth and Delay Constraints (2009) (51)
- Towards energy-efficient task scheduling on smartphones in mobile crowd sensing systems (2017) (49)
- QoS Routing in Wireless Mesh Networks with Cognitive Radios (2008) (49)
- PROMISE: A framework for truthful and profit maximizing spectrum double auctions (2014) (47)
- Secure and Robust Localization in a Wireless Ad Hoc Environment (2009) (47)
- End-to-end data paths: quickest or most reliable? (1998) (46)
- Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing (2020) (46)
- Cross-Layer Design for End-to-End Throughput and Fairness Enhancement in Multi-Channel Wireless Mesh Networks (2007) (46)
- Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical Networks (2009) (45)
- Wireless Resource Scheduling in Virtualized Radio Access Networks Using Stochastic Learning (2018) (45)
- Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Efficient Approximations (2010) (43)
- Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags (2017) (42)
- Optimal transmission power control in the presence of a smart jammer (2012) (42)
- DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks (2012) (41)
- Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks (2017) (41)
- Enhancing software-defined RAN with collaborative caching and scalable video coding (2016) (40)
- Sybil-proof incentive mechanisms for crowdsensing (2017) (40)
- Faster Algorithms for Construction of Recovery Trees Enhancing QoP and QoS (2008) (38)
- Channel allocation in non-cooperative multi-radio multi-channel wireless networks (2012) (38)
- Computing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes (2012) (36)
- Reliable routing in mobile ad hoc networks based on mobility prediction (2004) (36)
- CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks (2018) (36)
- Leveraging GPS-Less Sensing Scheduling for Green Mobile Crowd Sensing (2014) (36)
- Applying two-level simulated annealing on Bayesian structure learning to infer genetic networks (2004) (35)
- QoS-Aware and Reliable Traffic Steering for Service Function Chaining in Mobile Networks (2017) (35)
- Angle routing protocol: location aided routing for mobile ad-hoc networks using dynamic angle selection (2002) (34)
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments (2016) (33)
- A parallel algorithm for extracting transcriptional regulatory network motifs (2005) (33)
- Logical topology augmentation for guaranteed survivability under multiple failures in IP-over-WDM optical network (2009) (33)
- Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS (2005) (32)
- Optimal routing for fast transfer of bulk data files in time-varying networks (2004) (32)
- Truthful auction for cooperative communications with revenue maximization (2012) (32)
- Load Balancing for Interdependent IoT Microservices (2019) (31)
- Primal-dual algorithms for computing weight-constrained shortest paths and weight-constrained minimum spanning trees (2000) (31)
- Consort: Node-Constrained Opportunistic Routing in wireless mesh networks (2011) (30)
- Online Strategizing Distributed Renewable Energy Resource Access in Islanded Microgrids (2011) (29)
- Checking in without worries: Location privacy in location based social networks (2013) (29)
- Group Buying Spectrum Auctions in Cognitive Radio Networks (2017) (29)
- Cross-layer optimization for end-to-end rate allocation in multi-radio wireless mesh networks (2009) (28)
- Interference-aware routing and bandwidth allocation for QoS provisioning in multihop wireless networks (2005) (28)
- Joint Clustering and Optimal Cooperative Routing in Wireless Sensor Networks (2008) (28)
- Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach (2013) (27)
- Relay Station Placement for Cooperative Communications in WiMAX Networks (2010) (26)
- Sybil-Proof Online Incentive Mechanisms for Crowdsensing (2018) (26)
- Primal meets dual: A generalized theory of logical topology survivability in IP-over-WDM optical networks (2010) (26)
- Linear time algorithms for computing the most reliable source on an unreliable tree network (1997) (25)
- IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes (2020) (25)
- DARP: Distance-aware relay placement in WiMAX mesh networks (2011) (25)
- MIMO-Pipe Modeling and Scheduling for Efficient Interference Management in Multihop MIMO Networks (2010) (25)
- Distributed Algorithms for Multipath Routing in Full-Duplex Wireless Networks (2011) (24)
- MAP: Multiconstrained Anypath Routing in Wireless Mesh Networks (2013) (24)
- Dynamic light trail routing and protection issues in WDM optical networks (2005) (23)
- Multi-Constrained Anypath Routing in Wireless Mesh Networks (2010) (23)
- A linear time algorithm for computing a most reliable source on a tree network with faulty nodes (2011) (23)
- Delay reduction in redundant trees for preplanned protection against single link/node failure in 2-connected graphs (2002) (22)
- Constrained shortest link-disjoint paths selection: a network programming based approach (2006) (22)
- Truthful group buying-based spectrum auction design for cognitive radio networks (2014) (22)
- Computing hexagonal Steiner trees using PCx [for VLSI] (1999) (22)
- Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing (2019) (22)
- Lightpaths routing for single link failure survivability in IP-over-WDM networks (2007) (21)
- BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms (2016) (21)
- Optimal lightpath routing and rerouting in WDM networks (2001) (20)
- A distributed ADMM approach for mobile data offloading in software defined network (2015) (20)
- QUAC: Quality-Aware Contract-Based Incentive Mechanisms for Crowdsensing (2017) (20)
- End-to-end rate allocation in multi-radio wireless mesh networks: cross-layer schemes (2006) (19)
- Node-disjoint path routing in wireless networks: tradeoff between path lifetime and total energy (2004) (19)
- QoS issues in redundant trees for protection in vertex-redundant or edge-redundant graphs (2002) (19)
- Routing with many additive QoS constraints (2003) (17)
- Unified mathematical programming frameworks for survivable logical topology routing in IP-over-WDM optical networks (2014) (17)
- Computational Drug Discovery with Dyadic Positive-Unlabeled Learning (2017) (17)
- Novel Survivable Logical Topology Routing by Logical Protecting Spanning Trees in IP-Over-WDM Networks (2017) (17)
- CheaPay: An Optimal Algorithm for Fee Minimization in Blockchain-Based Payment Channel Networks (2019) (17)
- A PTAS for weight constrained Steiner trees in series-parallel graphs (2003) (17)
- ESPN: Efficient server placement in probabilistic networks with budget constraint (2011) (17)
- Approximation and heuristic algorithms for delay constrained path selection under inaccurate state information (2004) (16)
- QoS routing in communication networks: approximation algorithms based on the primal simplex method of linear programming (2006) (16)
- Multiconstrained QoS Routing: A Norm Approach (2007) (16)
- Novel survivable logical topology routing in IP-over-WDM networks by logical protecting spanning tree set (2012) (16)
- Robust Incentive Tree Design for Mobile Crowdsensing (2017) (16)
- Cross-layer network survivability under multiple cross-layer metrics (2015) (16)
- A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model (2009) (15)
- Efficient Anonymous Message Submission (2012) (15)
- Powering Smart Homes with Information-Centric Networking (2019) (15)
- K-pair delay constrained minimum cost routing in undirected networks (2001) (15)
- An improved random walk model for PCS networks (2002) (15)
- Cooperative Geographic Routing in Wireless Sensor Networks (2006) (15)
- Taming Wheel of Fortune in the Air: An Algorithmic Framework for Channel Selection Strategy in Cognitive Radio Networks (2013) (15)
- The Fog of Things Paradigm: Road toward On-Demand Internet of Things (2018) (15)
- Multiconstrained QoS Routing: Greedy is Good (2007) (14)
- Near field authentication for smart devices (2013) (14)
- Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing (2017) (14)
- GEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem Under Multiple Additive Constraints (2005) (14)
- ROSETTA: Robust And Secure Mobile Target Tracking In A Wireless Ad Hoc Environment (2006) (14)
- Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers (2016) (13)
- An Adaptive Robustness Evolution Algorithm with Self-Competition for Scale-Free Internet of Things (2020) (13)
- Reliable Ad Hoc Routing Based on Mobility Prediction (2006) (13)
- Authenticating strangers in Online Social Networks (2011) (13)
- Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios (2009) (13)
- Optimal multichannel data transmission in computer networks (2003) (13)
- Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks (2011) (13)
- A Polynomial Time Approximation Scheme for Minimum Cost Delay-Constrained Multicast Tree under a Steiner Topology (2004) (13)
- Revocable anonymity based authentication for vehicle to grid (V2G) communications (2016) (13)
- Simple and Effective Scheduling in Wireless Networks under the Physical Interference Model (2010) (12)
- SAS: A Simple Anonymity Scheme for Clustered Wireless Sensor Networks (2006) (12)
- You better be honest: Discouraging free-riding and false-reporting in mobile crowdsourcing (2014) (12)
- Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges (2011) (12)
- Deploying Robust Security in Internet of Things (2018) (12)
- Game-theory-based batch identification of invalid signatures in wireless mobile networks (2015) (12)
- A Sybil-Proof and Time-Sensitive Incentive Tree Mechanism for Crowdsourcing (2014) (12)
- Multidimensional Behavioral Profiling of Internet-of-Things in Edge Networks (2019) (11)
- Joint Base Station Placement and Fault-Tolerant Routing in Wireless Sensor Networks (2009) (11)
- Optimal multi-path end-to-end data transmission in networks (2000) (11)
- ON THE PARTIAL PATH PROTECTION SCHEME FOR WDM OPTICAL NETWORKS AND POLYNOMIAL TIME COMPUTABILITY OF PRIMARY AND SECONDARY PATHS (2007) (11)
- Quality of service routing: heuristics and approximation schemes with a comparative evaluation (2002) (11)
- Computing the Shortest Network under a Fixed Topology (2002) (11)
- Tradeoff Between Location Quality and Privacy in Crowdsensing: An Optimization Perspective (2020) (10)
- Leveraging Coupled BBR and Adaptive Packet Scheduling to Boost MPTCP (2020) (10)
- Energy efficient survivable broadcasting and multicasting in wireless ad hoc networks (2004) (10)
- OPN07-3: Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation (2006) (10)
- Optimal placement of wavelength converters in WDM optical networks with a general tree of rings topology (2000) (10)
- Maximizing Capacity in Cognitive Radio Networks Under Physical Interference Model (2017) (10)
- HSDRAN: Hierarchical Software-Defined Radio Access Network for Distributed Optimization (2018) (10)
- Capacity-aware cost-efficient network reconstruction for post-disaster scenario (2016) (10)
- Establishment of survivable connections in WDM networks using partial path protection (2005) (9)
- Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors (2007) (9)
- The Power of Whispering: Near Field Assertions via Acoustic Communications (2015) (9)
- Intelligent Post-Disaster Networking by Exploiting Crowd Big Data (2020) (9)
- MAP : Multi-Constrained Anypath Routing in Wireless Mesh Networks (2012) (9)
- A Sybil-Resistant Truth Discovery Framework for Mobile Crowdsensing (2019) (9)
- Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks (2021) (9)
- IoTAthena: Unveiling IoT Device Activities From Network Traffic (2021) (8)
- Distributed Topology Control in Wireless Ad Hoc Networks using β-Skeletons (2005) (8)
- On current areas of interest in wireless sensor networks designs (2006) (8)
- A Proximity Authentication System for Smartphones (2016) (8)
- Enabling Green Mobile Crowd Sensing via Optimized Task Scheduling on Smartphones (2014) (8)
- Checks and balances: A tripartite public key infrastructure for secure web-based connections (2017) (8)
- Cost minimization in redundant trees for protection in vertex-redundant or edge-redundant graphs (2002) (8)
- Provably good approximation to minimum cost delay-constrained multicast trees (1999) (8)
- Provisioning QoS-Aware and Robust Applications in Internet of Things: A Network Perspective (2019) (7)
- An Actor-Critic-Based Transfer Learning Framework for Experience-Driven Networking (2021) (7)
- A Game-Theoretic Approach to Stable Routing in Max-Min Fair Networks (2013) (7)
- Power efficient broadcasting and multicasting in wireless networks with directional antennas (2005) (7)
- Minimum diameter cost-constrained Steiner trees (2014) (7)
- Adapting Downlink Power in Fronthaul-Constrained Hierarchical Software-Defined RANs (2017) (7)
- Non-Preemptive Coflow Scheduling and Routing (2016) (7)
- Guest Editorial Multimedia Communication in the Internet of Things (2017) (6)
- Bottom-up construction of dynamic multicast trees in WDM networks (2003) (6)
- A Co-Scheduling Framework for DNN Models on Mobile and Edge Devices With Heterogeneous Hardware (2021) (6)
- Optimum logical topology routing in an IP-over-WDM optical network and physical link failure localization: An integrated approach (2013) (6)
- QoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm (2016) (6)
- Routing in max-min fair networks: A game theoretic approach (2010) (6)
- Robustness of logical topology mapping algorithms for survivability against multiple failures in an IP-over-WDM optical network (2012) (5)
- Guest editorial - 50th anniversary of clos networks (2003) (5)
- Efficient construction of virtual p-cycles protecting all cycle-protectible working links (2003) (5)
- A lightweight system to authenticate smartphones in the near field without NFC chips (2013) (5)
- Electric Vehicle Shortest-Walk Problem (2013) (5)
- ReCARL: Resource Allocation in Cloud RANs With Deep Reinforcement Learning (2020) (5)
- Resource allocation in load-constrained multihopwireless networks (2012) (5)
- Authenticating Strangers in Fast Mixing Online Social Networks (2011) (5)
- Transmitting and Sharing: A Truthful Double Auction for Cognitive Radio Networks (2018) (5)
- Strategizing surveillance for resource-constrained event monitoring (2012) (5)
- Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity (2008) (5)
- Robust Revocable Anonymous Authentication for Vehicle to Grid Communications (2020) (5)
- Distributed topology control in wireless ad hoc networks using /spl beta/-skeletons (2005) (5)
- DART: Directional Anypath Routing in Wireless Mesh Networks (2011) (5)
- Population-Aware Relay Placement for Wireless Multi-Hop Based Network Disaster Recovery (2017) (5)
- SAMA: Serverless Anonymous Mutual Authentication for Low-Cost RFID Tags (2011) (4)
- Pathbook: Cross-layer optimization for full-duplex wireless networks (2013) (4)
- The primal simplex approach to the QoS routing problem (2004) (4)
- An identity authentication protocol in online social networks (2012) (4)
- A cost-minimization algorithm for fast location tracking in mobile wireless networks (2006) (4)
- An FPTAS for Weight-Constrained Steiner Trees in Series-Parallel Graphs (2001) (4)
- An efficient privacy preserving location based service system (2014) (4)
- Privacy-Preserving and Trustworthy Mobile Sensing with Fair Incentives (2019) (4)
- SOR: An Objective Ranking System Based on Mobile Phone Sensing (2014) (4)
- Towards Min-Cost Virtual Infrastructure Embedding (2014) (4)
- Spectrum Auctions Under Physical Interference Model (2017) (4)
- CluRoL: Clustering based Robust Localization in Wireless Sensor Networks (2007) (4)
- A Spectrum Auction under Physical Interference Model (2016) (4)
- Improved approximation algorithms for single-tiered relay placement (2016) (4)
- A Polynomial-Time Algorithm for Computing Disjoint Lightpath Pairs in Minimum Isolated-Failure-Immune WDM Optical Networks (2014) (3)
- Maximizing influence propagation for new agents in Competitive Environments (2014) (3)
- Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service (2015) (3)
- A Divide-and-Conquer Algorithm for Computing a Most Reliable Source on an Unreliable Ring-Embedded Tree (2010) (3)
- Broadcasting, Multicasting, and Geocasting (2009) (3)
- A Divide-and-Conquer Algorithm for Finding a Most Reliable Source on a Ring-Embedded Tree Network with Unreliable Edges (2011) (3)
- Interference-aware routing and bandwidth allocation for QoS provisioning in multihop wireless networks: Research Articles (2005) (3)
- LIPS: Lifestyle Learning via Mobile Phone Sensing (2016) (3)
- A Fast Parallel Algorithm for Finding a Most Reliable Source on a General Ring-Tree Graph with Unreliable Edges (2011) (3)
- Searching in the dark: A framework for authenticating unknown users in online social networks (2012) (3)
- The Handbook of Graph Algorithms and Applications , Volume 1: Theory and Optimization (2010) (3)
- Server cost minimization in a distributed servers architecture for on-demand video services (2003) (3)
- Computational Intelligence for Internet of Things in the Big Data Era (Part II) [Guest Editorial] (2020) (3)
- Privacy Preserving Group Ranking (2012) (3)
- Advances in QoS path(s) selection problem (2005) (3)
- TSA: A framework of truthful spectrum auctions under the physical interference model (2015) (3)
- Secure cloud-assisted location based reminder (2013) (3)
- Robust resource provisioning in time-varying edge networks (2020) (2)
- Spectrum allocation and scheduling in dynamic spectrum access wireless networks (2007) (2)
- Computational Intelligence for Internet of Things in the Big Data Era (Part I) [Guest Editorial] (2019) (2)
- IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes (2022) (2)
- An Effective Machine Learning Based Algorithm for Inferring User Activities From IoT Device Events (2022) (2)
- TAFS: A Truthful Auction for IoT Application Offloading in Fog Computing Networks (2023) (2)
- SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags (2009) (2)
- Privacy-Enhanced and Practical Truth Discovery in Two-Server Mobile Crowdsensing (2022) (2)
- Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks (2021) (2)
- PnP-DRL: A Plug-and-Play Deep Reinforcement Learning Approach for Experience-Driven Networking (2021) (2)
- Keeping identity secret in online social networks (2012) (2)
- A Distributed Algorithm for Multi-Constrained Anypath Routing in Wireless Mesh Networks (2011) (2)
- Blockchain-Based Reliable and Privacy-Aware Crowdsourcing With Truth and Fairness Assurance (2022) (2)
- Dynamic Wavelength Routing in WDM Networks under Multiple Signal Quality Constraints (2008) (2)
- RemindU: A secure and efficient location based reminder system (2014) (2)
- Order Matters: On the Impact of Swapping Order on an Entanglement Path in a Quantum Network (2022) (1)
- A Technique to Enhance Localization in the Presence of NLOS Errors (2007) (1)
- Recent advances in wireless ad hoc networks (2006) (1)
- A Budget Feasible Mechanism for k-Topic Influence Maximization in Social Networks (2019) (1)
- EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems (2020) (1)
- A Linear Time Algorithm for Computing the Most Reliable Source on a Tree with Faulty Vertices (2009) (1)
- Optimizing Location Quality in Privacy Preserving Crowdsensing (2019) (1)
- On the Minimum Diameter Cost-Constrained Steiner Tree Problem (2012) (1)
- How Would you Like Your Packets Delivered? An SDN-Enabled Open Platform for QoS Routing (2018) (1)
- The Critical Network Flow Problem: Migratability and Survivability (2017) (1)
- Cumulonimbus: An Incentive Mechanism for Crypto Capital Commitment in Payment Channel Networks* (2022) (0)
- IEEE GLOBECOM 2009 Symposiums Program (2009) (0)
- Robustness and Survivability Issues in Wireless Ad Hoc Networks (2008) (0)
- Welcome to the 2008 international conference on high performance switching and routing (HPSR'2008)! (2008) (0)
- IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in a Weighted Attack Graph (2023) (0)
- P4PCN: Privacy-Preserving Path Probing for Payment Channel Networks (2019) (0)
- Economical Aspects of Resource Allocation under Discounts (2015) (0)
- Authenticated Live Integration and Verification Scheme in Hybrid Content Delivery Networks (2016) (0)
- Principles and Practices for Application-Network Co-Design in Edge Computing (2022) (0)
- Circuits/cutsets duality and theoretical foundation of a structural approach to survivable logical topology mapping in IP-over-WDM optical networks (2021) (0)
- The President's Page (1979) (0)
- IEEE TCCN Special Section Editorial: Intelligent Resource Management for 5G and Beyond (2020) (0)
- EdAR: An Experience-driven Multipath Scheduler for Seamless Handoff in Mobile Networks (2023) (0)
- Platform Users Task and Contract Publication Contract Item Selection & Task Data Submission Data Quality Validation & Payment Transaction (2017) (0)
- Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities (2022) (0)
- Conference Proceedings of the 2001 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (2001) (0)
- Approximation Schemes for Finding a Path Subject to Many Additive Quality of Service Constraints (2005) (0)
- Sas: security, anonymity, and survivability in wireless sensor and ad hoc networks (2009) (0)
- AI-enabled Experience-driven Networking: Vision, State-of-the-Art and Future Directions (2022) (0)
- Guest Editorial Special Issue on Energy-Efficient Reconfigurable Wireless Communication and Networks (2022) (0)
- Modelling gene functional linkages using yeast microarray data (2007) (0)
- An improved algorithm for optimal lightpath establishment on a tree topology (2006) (0)
- A Polynomial Time Algorithm for Computing Disjoint Lightpaths in Minimum Isolated Failure Immune WDM Optical Networks (2011) (0)
- Personalized POI Recommendation on Location-Based Social Networks Disseration Prospectus (2013) (0)
- Data-Driven Edge Resource Provisioning for Inter-Dependent Microservices with Dynamic Load (2021) (0)
- Constructing min-cost single failure immune recovery trees: Computational complexity and approximation algorithms (2010) (0)
- Editorial for the Special Issue of ACM/Springer Mobile Networks and Applications - Selected Papers from Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2007) (2007) (0)
- Host Based Detection of Advanced MiniDuke Style Bots in Smartphones through User Profiling (2014) (0)
- Using /spl beta/-skeletons for localized topology control in wireless ad hoc networks (2005) (0)
- Guest Editorial: Quantuam Communications and Networking (2022) (0)
- A Delay-Scaling Multicast Algorithm with Multiple QoS Criteria (2002) (0)
- ENERGY EFFICIENT SURVIVABLE BROADCASTING AND MULTICASTING IN (2004) (0)
- Resource allocation in cooperative networks: The role of games (2011) (0)
- Source-waiting QoS routing in networks with advanced resource reservations (2001) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Guoliang Xue?
Guoliang Xue is affiliated with the following schools: