Lichen Zhang
Lichen Zhang
School of Computer Science, Shaanxi Normal University
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
FakeMask: A Novel Privacy Preserving Approach for Smartphones
L Zhang, Z Cai, X Wang
IEEE Transactions on Network and Service Management 13 (2), 335-348, 2016
Research progress on attribute-based access control
W Xiaoming, FU Hong, Z Lichen
Acta Electronica Sinica 38 (7), 1660-1667, 2010
Mobility-aware routing in delay tolerant networks
L Zhang, Z Cai, J Lu, X Wang
Personal and Ubiquitous Computing 19 (7), 1111-1123, 2015
A novel contact prediction‐based routing scheme for DTNs
L Zhang, X Wang, J Lu, M Ren, Z Duan, Z Cai
Transactions on Emerging Telecommunications Technologies 28 (1), e2889.1-12, 2017
Spectrum-Availability Based Routing for Cognitive Sensor Networks
L Zhang, Z Cai, P Li, L Wang, X Wang
IEEE Access, 2017
An efficient privacy preserving data aggregation approach for mobile sensing
L Zhang, X Wang, J Lu, P Li, Z Cai
Security and Communication Networks 9 (16), 3844-3853, 2016
A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks
X Wang, Y Lin, Y Zhao, L Zhang, J Liang, Z Cai
Peer-to-Peer Networking and Applications 10 (2), 377-394, 2017
Fuzzy random multi-objective optimization based routing for wireless sensor networks
J Lu, X Wang, L Zhang, X Zhao
Soft Computing 18 (5), 981-994, 2014
An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks
Y Lin, X Wang, F Hao, L Wang, L Zhang, R Zhao
Future Generation Computer Systems 82, 220-234, 2018
Computational models and optimal control strategies for emotion contagion in the human population in emergencies
X Wang, L Zhang, Y Lin, Y Zhao, X Hu
Knowledge-Based Systems 109, 35-47, 2016
User social activity-based routing for cognitive radio networks
J Lu, Z Cai, X Wang, L Zhang, P Li, Z He
Personal and Ubiquitous Computing 22 (3), 471-487, 2018
The impact of node velocity diversity on mobile opportunistic network performance
Y Lin, X Wang, L Zhang, P Li, D Zhang, S Liu
Journal of Network and Computer Applications 55, 47-58, 2015
Exploiting Spectrum Availability and Quality in Routing for Multi-hop Cognitive Radio Networks
L Zhang, Z Cai, P Li, X Wang
International Conference on Wireless Algorithms, Systems, and Applications …, 2016
Social identity–aware opportunistic routing in mobile social networks
R Wang, X Wang, F Hao, L Zhang, S Liu, L Wang, Y Lin
Transactions on Emerging Telecommunications Technologies 29 (5), e3297, 2018
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks
X Wang, Z He, L Zhang
Chin. J. Electron 23, 810-815, 2014
Spacial mobility prediction based routing scheme in delay/disruption-tolerant networks
L Zhang, Z Cai, J Lu, X Wang
2014 International Conference on Identification, Information and Knowledge …, 2014
Signal power random fading based interference-aware routing for wireless sensor networks
J Lu, X Wang, L Zhang
Wireless Networks 20 (7), 1715-1727, 2014
A social‐aware probabilistic routing approach for mobile opportunistic social networks
R Zhao, X Wang, L Zhang, Y Lin
Transactions on Emerging Telecommunications Technologies 28 (12), e3230, 2017
Energy‐aware congestion control scheme in opportunistic networks
F Zhang, X Wang, P Li, L Zhang
IEEJ Transactions on Electrical and Electronic Engineering 12 (3), 412-419, 2017
Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules
X Wang, L Zhang, W Dou, X Hu
Information Sciences 232, 225-240, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20