default search action
Junhua Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Xin Song, Lixing Chen, Junhua Tang, Jianhua Li, Yang Bai, Wu Yang:
Adaptively Compressed Swarm Learning for Distributed Traffic Prediction over IoV-Web3.0. IJCNN 2024: 1-8 - 2023
- [c28]Jiajin Yang, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks. ICC 2023: 384-390 - [c27]Xuewei Hou, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction. ICC 2023: 4144-4149 - 2022
- [c26]Xuewei Hou, Lixing Chen, Junhua Tang, Jianhua Li:
Multi-Agent Learning Automata for Online Adaptive Control of Large-Scale Traffic Signal Systems. GLOBECOM 2022: 1497-1502 - [c25]Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu:
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. SecureComm 2022: 72-88 - 2021
- [c24]Futai Zou, Yundong Ren, Jiachen Zhu, Junhua Tang:
Detecting Data Leakage in DNS Traffic based on Time Series Anomaly Detection. HPCC/DSS/SmartCity/DependSys 2021: 503-510 - [c23]Jingsong Li, Junhua Tang, Jianhua Li, Futai Zou:
Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV. ICC Workshops 2021: 1-7 - [c22]Shuyuan Xu, Linsen Li, Hangjun Yang, Junhua Tang:
KCC Method: Unknown Intrusion Detection Based on Open Set Recognition. ICTAI 2021: 1343-1347 - [c21]Hangjun Yang, Linsen Li, Lingxuan Zhang, Junhua Tang, Zhongwei Chen:
PHGNN: Position-aware Graph Neural Network for Heterogeneous Graph Embedding. IJCNN 2021: 1-8
2010 – 2019
- 2018
- [j13]Ye Zhu, Jonathan Gurary, George P. Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang:
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices. IEEE Access 6: 54795-54810 (2018) - [c20]Junhua Tang, Shuli Zhao, Yue Wu, Jianhua Li:
Caching Strategy for Scalable Video Coding in Information-Centric Networking. SSIC 2018: 1-6 - [c19]Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li:
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. SSIC 2018: 1-6 - 2017
- [j12]Yuchen Liu, Aixin Zhang, Shenghong Li, Junhua Tang, Jianhua Li:
A lightweight authentication scheme based on self-updating strategy for space information network. Int. J. Satell. Commun. Netw. 35(3): 231-248 (2017) - 2016
- [c18]Junhua Tang, Shujun Lin, Cunqing Hua, Yue Wu, Jianhua Li:
Channel aware resource allocation for device-to-device communication underlaying cellular networks. SSIC 2016: 1-5 - 2015
- [j11]Shenghong Li, Hao Lou, Wen Jiang, Junhua Tang:
Detecting community structure via synchronous label propagation. Neurocomputing 151: 1063-1075 (2015) - [c17]Keke Gu, Junhua Tang, Li Pan, Jianhua Li:
Overlapping Community Detection Using NVPA. SmartCity 2015: 197-202 - [c16]Yang Sun, Junhua Tang, Li Pan, Jianhua Li:
Matrix Based Community Evolution Events Detection in Online Social Networks. SmartCity 2015: 465-470 - 2014
- [c15]Xiao Liang, Junhua Tang, Li Pan:
A neighborhood vector propagation algorithm for community detection. GLOBECOM 2014: 2923-2928 - 2013
- [c14]Jiaming Li, Junhua Tang, Bhaskar Krishnamachari:
Optimal power allocation over multiple identical Gilbert-Elliott channels. GLOBECOM 2013: 3655-3660 - [c13]Junhua Tang, Parisa Mansourifard, Bhaskar Krishnamachari:
Power allocation over two identical Gilbert-Elliott channels. ICC 2013: 5888-5892 - [c12]Wei Jiang, Junhua Tang, Bhaskar Krishnamachari:
Optimal power allocation policy over two identical Gilbert-Elliott channels. ICC 2013: 5893-5897 - [i3]Jiaming Li, Junhua Tang, Bhaskar Krishnamachari:
Optimal Power Allocation over Multiple Identical Gilbert-Elliott Channels. CoRR abs/1303.6771 (2013) - 2012
- [i2]Junhua Tang, Bhaskar Krishnamachari:
Power Allocation over Two Identical Gilbert-Elliott Channels. CoRR abs/1203.6630 (2012) - [i1]Wei Jiang, Junhua Tang, Bhaskar Krishnamachari:
Optimal Power Allocation Policy over Two Identical Gilbert-Elliott Channels. CoRR abs/1210.3609 (2012) - 2011
- [j10]Junhua Tang, Sisi Dai, Jianhua Li, Shenghong Li:
Gossip-based scalable directed diffusion for wireless sensor networks. Int. J. Commun. Syst. 24(11): 1418-1430 (2011) - [j9]Junhua Tang, Jinhai Xu, Shiwen Wan, Dan Ma:
Comprehensive Evaluation and Selection System of Coal Distributors with Analytic Hierarchy Process and Artificial Neural Network. J. Comput. 6(2): 208-215 (2011) - 2010
- [j8]Zhengmin Xia, Songnian Lu, Jianhua Li, Junhua Tang:
Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic. Informatica (Slovenia) 34(4): 497-507 (2010) - [c11]Yang Liu, Yue Wu, Junhua Tang:
Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks. IAS 2010: 155-160 - [c10]Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, Junhua Tang:
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed. AINA Workshops 2010: 345-350 - [c9]Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang:
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting. IWDW 2010: 211-223
2000 – 2009
- 2009
- [j7]Liming Hao, Songnian Lu, Junhua Tang, Shutang Yang:
An Efficient and Robust Self-Storage P2P Reputation System. Int. J. Distributed Sens. Networks 5(1): 40 (2009) - [c8]Ling Tie, Di He, Jianhua Li, Junhua Tang:
Performance Analysis of Authentication Method for Proxy Mobile IP Protocol. BMEI 2009: 1-4 - [c7]Aixin Zhang, Junhua Tang, Peng Wang:
Authentication Tests Based on Test Type Matrix. ICC 2009: 1-6 - 2008
- [j6]Junhua Tang, Gang Feng, Chee Kheong Siew, Liren Zhang:
Providing Differentiated Services Over Shared Wireless Downlink Through Buffer Management. IEEE Trans. Veh. Technol. 57(1): 548-555 (2008) - [c6]Yang Yu, Aixin Zhang, Junhua Tang, Haopeng Chen:
A Dynamic Scheme For Authenticated Group Key Agreement Protocol. TeNe 2008: 245-250 - [c5]Yiyu Yu, Junhua Tang, Liming Hao, Sisi Dai, Yue Wu:
A Grid Trust Model Based On MADM Theory. GLOBECOM 2008: 2133-2137 - [c4]Liming Hao, Songnian Lu, Junhua Tang, Aixin Zhang:
A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties. GLOBECOM 2008: 2201-2205 - [c3]Junhua Tang, Yue Wu, Linsen Li, Ping Yi:
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink. GLOBECOM 2008: 5091-5095 - 2006
- [j5]Junhua Tang, Liren Zhang, Chee Kheong Siew:
An opportunistic video scheduling algorithm over shared wireless downlink. Comput. Commun. 29(11): 1917-1926 (2006) - [c2]Junhua Tang, Liren Zhang, Chee Kheong Siew:
An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink. ICC 2006: 872-877 - 2005
- [j4]Fei Long, Gang Feng, Junhua Tang:
A new joint packet scheduling/admission control framework for multi-service wireless networks. J. Commun. Networks 7(4): 408-416 (2005) - 2003
- [j3]Junhua Tang, Chee Kheong Siew, Liren Zhang:
Optical nonlinear effects on the performance of IP traffic over GMPLS-based DWDM networks. Comput. Commun. 26(12): 1330-1340 (2003) - 2001
- [j2]Liren Zhang, Junhua Tang:
Characterization and performance study of IP traffic in WDM networks. Comput. Commun. 24(17): 1702-1713 (2001) - 2000
- [j1]Liren Zhang, Junhua Tang:
The effect of IP traffic on WDM-based networks. IEEE Commun. Lett. 4(9): 295-297 (2000) - [c1]Junhua Tang, Liren Zhang:
Effect of IP traffic on optical QoS in DWDM networks. ICON 2000: 370-374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint