Login / Signup
CCF Trans. Netw.
2020
2020
2020
Keyphrases
Publications
volume 3, number 1, 2020
Qiushi Gong
A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming.
CCF Trans. Netw.
3 (1) (2020)
Soheil Abbasloo
,
H. Jonathan Chao
SharpEdge: an asynchronous and core-agnostic solution to guarantee bounded-delays.
CCF Trans. Netw.
3 (1) (2020)
Chuwen Zhang
,
Yi Wang
,
Ruyi Yao
,
Boyang Zhou
,
Liang Cheng
,
Yang Xu
,
Xiaoguang Li
,
Jian Cheng
,
Bin Liu
Packet-size aware scheduling algorithms in guard band for time sensitive networking.
CCF Trans. Netw.
3 (1) (2020)
Wei Peng
,
Yi Wang
,
Tao Huang
,
Hai Wan
,
David Dai
,
Jianping Wang
Editorial of special issue on time-sensitive networking.
CCF Trans. Netw.
3 (1) (2020)
Wei Quan
,
Wenwen Fu
,
Jinli Yan
,
Zhigang Sun
OpenTSN: an open-source project for time-sensitive networking system development.
CCF Trans. Netw.
3 (1) (2020)
Zonghui Li
,
Hai Wan
,
Yangdong Deng
,
Ke Xiong
,
Xiaoyu Song
A resource-efficient priority scheduler for time-sensitive networking switches.
CCF Trans. Netw.
3 (1) (2020)
Bhupendra Gupta
,
Jyoti Pandey
Resilient and secure wireless sensor network under non-full visibility.
CCF Trans. Netw.
3 (1) (2020)
volume 3, number 2, 2020
Suryadipta Majumdar
A multi-level proactive security auditing framework for clouds through automated dependency building.
CCF Trans. Netw.
3 (2) (2020)
Zhiqi Chen
,
Sheng Zhang
,
Zhuzhong Qian
,
Can Wang
,
Mingjun Xiao
,
Jie Wu
,
Sanglu Lu
Sum of squares: a new metric for NFV service chain placement in edge computing environments and efficient heuristic algorithms.
CCF Trans. Netw.
3 (2) (2020)
Baicheng Chen
,
Kun Woo Cho
,
Chenhan Xu
,
Zhengxiong Li
,
Feng Lin
,
Zhanpeng Jin
,
Wenyao Xu
A stimulus-response based EEG biometric using mallows distance.
CCF Trans. Netw.
3 (2) (2020)
Elisa Bertino
Security of cellular networks position paper.
CCF Trans. Netw.
3 (2) (2020)
Xingliang Yuan
,
Chengjun Cai
,
Cong Wang
,
Qian Wang
A scalable ledger-assisted architecture for secure query processing over distributed IoT data.
CCF Trans. Netw.
3 (2) (2020)
volume 3, number 3-4, 2020
Ju Ren
,
Hongbo Jiang
,
Xuemin Shen
,
John C. S. Lui
,
Arun K. Lyengar
Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing.
CCF Trans. Netw.
3 (3-4) (2020)
Majd Latah
,
Levent Toker
An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks.
CCF Trans. Netw.
3 (3-4) (2020)
Yichuan Wang
,
Yuying Tian
,
Xinyue Yin
,
Xinhong Hei
A trusted recommendation scheme for privacy protection based on federated learning.
CCF Trans. Netw.
3 (3-4) (2020)
Zhiguang Qin
,
Yuedi Li
,
Xin Ye
,
Jin Zhou
,
Minsheng Cao
,
Dajiang Chen
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks.
CCF Trans. Netw.
3 (3-4) (2020)
Sultan Alasmari
,
Weichao Wang
,
Tuanfa Qin
,
Yu Wang
Proof of outsourced encryption: cross verification of security service level agreement.
CCF Trans. Netw.
3 (3-4) (2020)
Urmila Bhanja
,
Chinmayee Panda
Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication.
CCF Trans. Netw.
3 (3-4) (2020)
Xiaoyi Pang
,
Dengfeng Guo
,
Zhibo Wang
,
Peng Sun
,
Liqiang Zhang
Towards fair and efficient task allocation in blockchain-based crowdsourcing.
CCF Trans. Netw.
3 (3-4) (2020)
Jingrong Wang
,
Kaiyang Liu
,
George Tzanetakis
,
Jianping Pan
Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems.
CCF Trans. Netw.
3 (3-4) (2020)
Xueshuo Xie
,
Yaozheng Fang
,
Zhaolong Jian
,
Ye Lu
,
Tao Li
,
Guiling Wang
Blockchain-driven anomaly detection framework on edge intelligence.
CCF Trans. Netw.
3 (3-4) (2020)
Koffka Khan
,
Wayne Goodridge
QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols.
CCF Trans. Netw.
3 (3-4) (2020)
volume 2, number 1, 2019
Dan Wang
,
Fangming Liu
,
Wei Bao
,
Lin Wang
,
Jiangchuan Liu
,
Yuanyuan Yang
,
Weisong Shi
Editorial of CCF transactions on networking: special issue on edge computing and networking.
CCF Trans. Netw.
2 (1) (2019)
Hongzi Zhu
,
Fan Wu
,
Siyuan Cao
,
Shan Chang
,
Li Lu
Edge-empowered accurate urban vehicle localization with cellular-aware trajectories.
CCF Trans. Netw.
2 (1) (2019)
Tong Liu
,
Yanmin Zhu
,
Yuanyuan Yang
,
Fan Ye
,
Jiadi Yu
Online task dispatching and pricing for quality-of-service-aware sensing data collection for mobile edge clouds.
CCF Trans. Netw.
2 (1) (2019)
Tingting Liu
,
Jun Li
,
Feng Shu
,
Yu Du
,
Zhu Han
Distributed resource allocation in caching-enabled heterogeneous cellular networks based on matching theory.
CCF Trans. Netw.
2 (1) (2019)
Xiaoyi Fan
,
Yutao Huang
,
Xiaoqiang Ma
,
Jiangchuan Liu
,
Victor C. M. Leung
Exploiting the edge power: an edge deep learning framework.
CCF Trans. Netw.
2 (1) (2019)
Tong Li
,
Kezhi Wang
,
Ke Xu
,
Kun Yang
,
Chathura M. Sarathchandra Magurawalage
,
Haiyang Wang
Communication and computation cooperation in cloud radio access network with mobile edge computing.
CCF Trans. Netw.
2 (1) (2019)
Hongji Zhang
,
Wenzhong Li
,
Sanglu Lu
Asynchronous side information attack from the edge: an approach to identify participants from anonymous mobility traces.
CCF Trans. Netw.
2 (1) (2019)
volume 2, number 2, 2019
Zohar Naor
Cost-adaptive load sharing for geographically distributed data center network.
CCF Trans. Netw.
2 (2) (2019)
Degan Zhang
,
Xiao-huan Liu
,
Yu-ya Cui
,
Lu Chen
,
Ting Zhang
A kind of novel RSAR protocol for mobile vehicular Ad hoc network.
CCF Trans. Netw.
2 (2) (2019)
RETRACTED ARTICLE: An offline space division multiplexing based elastic optical network model with modulation format adaptation and flexible spectrum and spatial assignment.
CCF Trans. Netw.
2 (2) (2019)
Shuai Zhang
,
Sheng Zhang
,
Zhuzhong Qian
,
Xiaoda Zhang
,
Mingjun Xiao
,
Jie Wu
,
Jidong Ge
,
Xiaoliang Wang
Efficient scheduling for multi-stage coflows.
CCF Trans. Netw.
2 (2) (2019)
Xuyang Meng
,
Yabin Xu
Research on sensitive content detection in social networks.
CCF Trans. Netw.
2 (2) (2019)
volume 2, number 3-4, 2019
Guang Cheng
,
Chunsheng Guo
,
Yongning Tang
dptCry: an approach to decrypting ransomware WannaCry based on API hooking.
CCF Trans. Netw.
2 (3-4) (2019)
Qi Tan
,
Yi Qu
,
Ke Xu
,
Haiyang Wang
,
Dan Wang
,
Meng Shen
Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks.
CCF Trans. Netw.
2 (3-4) (2019)
Jian Wang
,
Xuewei Zhang
,
Xiaoliang Wang
,
Sheng Zhang
,
Zhuzhong Qian
,
Sanglu Lu
Joint virtual middlebox and application placement with bandwidth guarantees in multi-tenant datacenter.
CCF Trans. Netw.
2 (3-4) (2019)
XiaoDong Zang
,
Jian Gong
,
Siyi Huang
,
Xiaoyan Hu
,
Yun Yang
IP backbone traffic behavior characteristic spectrum composing and role mining.
CCF Trans. Netw.
2 (3-4) (2019)
Jinshu Su
,
Wen Wang
,
Cong Liu
A survey of control consistency in Software-Defined Networking.
CCF Trans. Netw.
2 (3-4) (2019)
volume 1, number 1-4, 2019
Linghe Kong
,
Fan Wu
,
Xiaofeng Gao
,
Min-You Wu
,
Guihai Chen
Enhancing data delivery in vehicular networks using dual-radio architecture.
CCF Trans. Netw.
1 (1-4) (2019)
Yang Cheng
,
Jinkun Geng
,
Yanshu Wang
,
Junfeng Li
,
Dan Li
,
Jianping Wu
Bridging machine learning and computer network research: a survey.
CCF Trans. Netw.
1 (1-4) (2019)
Ziqian Meng
,
Zhong Chen
,
Zhi Guan
Peer-to-peer file sharing in next generation eXpressive Internet Architecture.
CCF Trans. Netw.
1 (1-4) (2019)
Sneha K. Thombre
,
Lalit M. Patnaik
,
Anil S. Tavildar
Effect of multiplexing TCP flows on delay sensitivity in the internet communications.
CCF Trans. Netw.
1 (1-4) (2019)
Tong Yang
,
Jinyang Li
,
Chenxingyu Zhao
,
Gaogang Xie
,
Xiaoming Li
Mathematical analysis on forwarding information base compression.
CCF Trans. Netw.
1 (1-4) (2019)
Fan He
,
Haiping Huang
,
Ruchuan Wang
,
Lingyun Jiang
Data fusion-oriented cluster routing protocol for multimedia sensor networks based on the degree of image difference.
CCF Trans. Netw.
1 (1-4) (2019)