default search action
Shengling Wang 0001
Person information
- unicode name: 王胜灵
- affiliation: Beijing Normal University, College of Information Science and Technology, China
- affiliation (2010 - 2013): Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- affiliation (2008 - 2010): Tsinghua University, Department of Computer Science and Technology, Beijing, China
- affiliation (PhD 2008): Xi'an Jiaotong University, China
- not to be confused with: Shenling Wang 0001
Other persons with the same name
- Shengling Wang 0002 — Nanyang Technological University, Division of Mathematical Sciences, Singapore
- Shengling Wang 0003 — University of Sheffield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Jiguo Yu, Biwei Yan, Huayi Qi, Shengling Wang, Wei Cheng:
An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT. IEEE Trans. Computers 73(1): 178-191 (2024) - [j61]Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lyu:
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 23(5): 6133-6148 (2024) - [j60]Baobao Chai, Jiguo Yu, Biwei Yan, Yong Yu, Shengling Wang:
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(4): 4006-4023 (2024) - [j59]Shengling Wang, Lina Shi, Hongwei Shi, Yifang Zhang, Qin Hu, Xiuzhen Cheng:
Proof of User Similarity: The Spatial Measurer of Blockchain. IEEE Trans. Serv. Comput. 17(3): 1114-1125 (2024) - [j58]Yu Guo, Yuxin Xi, Yifang Zhang, Mingyue Wang, Shengling Wang, Xiaohua Jia:
Toward Efficient and Reliable Private Set Computation in Decentralized Storage. IEEE Trans. Serv. Comput. 17(5): 2945-2958 (2024) - [c44]Yifang Zhang, Mingyue Wang, Fangda Guo, Xidi Qu, Yu Guo, Shengling Wang:
OblivChain: Enabling Oblivious Queries for Blockchain Light Clients with Malicious Security. DASFAA (4) 2024: 3-19 - 2023
- [j57]Yifang Zhang, Shengling Wang, Xidi Qu, Chunxiao Li, Enliang Xu:
Toward Secure and Efficient Collaborative Cached Data Auditing for Distributed Fog Computing. IEEE Internet Things J. 10(23): 20941-20954 (2023) - [j56]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [j55]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Black Swan in Blockchain: Micro Analysis of Natural Forking. IEEE Trans. Dependable Secur. Comput. 20(6): 4443-4454 (2023) - [j54]Qin Hu, Shengling Wang, Zehui Xiong, Xiuzhen Cheng:
Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning. IEEE Trans. Mob. Comput. 22(5): 2850-2861 (2023) - [j53]Shengling Wang, Xidi Qu, Qin Hu, Xia Wang, Xiuzhen Cheng:
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain. IEEE/ACM Trans. Netw. 31(5): 2376-2388 (2023) - [i15]Kun Li, Shengling Wang, Hongwei Shi, Xiuzhen Cheng, Minghui Xu:
Spatial Crowdsourcing Task Allocation Scheme for Massive Data with Spatial Heterogeneity. CoRR abs/2310.12433 (2023) - 2022
- [j52]Chun-Chi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, Xiuzhen Cheng:
Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE). IEEE Trans. Computers 71(12): 3268-3280 (2022) - [j51]Kun Li, Shengling Wang, Xiuzhen Cheng, Qin Hu:
A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification. IEEE Trans. Mob. Comput. 21(9): 3084-3095 (2022) - [i14]Qin Hu, Minghui Xu, Shengling Wang, Shaoyong Guo:
Sync or Fork: Node-Level Synchronization Analysis of Blockchain. CoRR abs/2206.06210 (2022) - [i13]Shengling Wang, Ying Wang, Hongwei Shi, Qin Hu:
Active Defense Analysis of Blockchain Forking through the Spatial-Temporal Lens. CoRR abs/2209.08463 (2022) - [i12]Shengling Wang, Lina Shi, Hongwei Shi, Yifang Zhang, Qin Hu, Xiuzhen Cheng:
Proof of User Similarity: the Spatial Measurer of Blockchain. CoRR abs/2211.01143 (2022) - 2021
- [j50]Shengling Wang, Yu Pu, Hongwei Shi, Jianhui Huang, Yinhao Xiao:
A differential game view of antagonistic dynamics for cybersecurity. Comput. Networks 200: 108494 (2021) - [j49]Wei Li, Xiuzhen Cheng, Zhi Tian, Shengling Wang, Rongfang Bie, Jiguo Yu:
Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices. IEEE Trans. Cogn. Commun. Netw. 7(1): 157-170 (2021) - [j48]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Junshan Zhang, Jiguo Yu:
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain. IEEE Trans. Dependable Secur. Comput. 18(4): 1580-1590 (2021) - [j47]Shengling Wang, Lina Shi, Qin Hu, Junshan Zhang, Xiuzhen Cheng, Jiguo Yu:
Privacy-Aware Data Trading. IEEE Trans. Inf. Forensics Secur. 16: 3916-3927 (2021) - [j46]Qin Hu, Shengling Wang, Xiuzhen Cheng, Junshan Zhang, Weifeng Lv:
Cost-Efficient Mobile Crowdsensing With Spatial-Temporal Awareness. IEEE Trans. Mob. Comput. 20(3): 928-938 (2021) - [j45]Xidi Qu, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm. IEEE Trans. Parallel Distributed Syst. 32(8): 2074-2085 (2021) - [c43]Zhuoming Zhu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
AERM: An Attribute-Aware Economic Robust Spectrum Auction Mechanism. WASA (3) 2021: 142-153 - [i11]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory. CoRR abs/2105.09535 (2021) - [i10]Chun-Chi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, Xiuzhen Cheng:
Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example. CoRR abs/2106.15934 (2021) - [i9]Qin Hu, Shengling Wang, Zeihui Xiong, Xiuzhen Cheng:
Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning. CoRR abs/2110.08330 (2021) - 2020
- [j44]Xidi Qu, Qin Hu, Shengling Wang:
Privacy-preserving model training architecture for intelligent edge computing. Comput. Commun. 162: 94-101 (2020) - [j43]Shengling Wang, Hongwei Shi, Qin Hu, Bin Lin, Xiuzhen Cheng:
Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory. IEEE Internet Things J. 7(1): 661-668 (2020) - [j42]Suhui Liu, Jiguo Yu, Yinhao Xiao, Zhiguo Wan, Shengling Wang, Biwei Yan:
BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet Things J. 7(9): 7851-7867 (2020) - [j41]Hongwei Shi, Shengling Wang, Yinhao Xiao:
Queuing Without Patience: A Novel Transaction Selection Mechanism in Blockchain for IoT Enhancement. IEEE Internet Things J. 7(9): 7941-7948 (2020) - [j40]Jiguo Yu, Suhui Liu, Shengling Wang, Yinghao Xiao, Biwei Yan:
LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT. IEEE Internet Things J. 7(9): 7949-7966 (2020) - [j39]Qin Hu, Shengling Wang, Xiuzhen Cheng, Liran Ma, Rongfang Bie:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. IEEE Trans. Inf. Forensics Secur. 15: 1778-1789 (2020) - [j38]Qin Hu, Shengling Wang, Peizi Ma, Xiuzhen Cheng, Weifeng Lv, Rongfang Bie:
Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies. IEEE Trans. Knowl. Data Eng. 32(5): 998-1009 (2020) - [j37]Minghui Xu, Shengling Wang, Qin Hu, Hao Sheng, Xiuzhen Cheng:
Quantum Analysis on Task Allocation and Quality Control for Crowdsourcing With Homogeneous Workers. IEEE Trans. Netw. Sci. Eng. 7(4): 2830-2839 (2020) - [j36]Shengling Wang, Weiman Sun, Liran Ma, Weifeng Lv, Xiuzhen Cheng:
Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services. IEEE Trans. Parallel Distributed Syst. 31(1): 159-170 (2020) - [c42]Qin Hu, Minghui Xu, Shengling Wang, Shaoyong Guo:
Sync or Fork: Node-Level Synchronization Analysis of Blockchain. WASA (1) 2020: 170-181 - [i8]Shengling Wang, Peizi Ma, Qin Hu, Xiuzhen Cheng, Weifeng Lv:
Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems. CoRR abs/2001.02324 (2020) - [i7]Kun Li, Shengling Wang, Xiuzhen Cheng, Qin Hu:
A Misreport- and Collusion-Proof Crowdsourcing Mechanism without Quality Verification. CoRR abs/2003.11814 (2020) - [i6]Shengling Wang, Lina Shi, Junshan Zhang, Xiuzhen Cheng, Jiguo Yu:
Privacy-aware Data Trading. CoRR abs/2003.13897 (2020) - [i5]Chun-Chi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv:
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things. CoRR abs/2011.04919 (2020) - [i4]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Jianhui Huang:
Cap the Gap: Solving the Egoistic Dilemma under the Transaction Fee-Incentive Bitcoin. CoRR abs/2012.14561 (2020)
2010 – 2019
- 2019
- [j35]Kun Li, Shengling Wang, Xiuzhen Cheng:
Crowdsourcee evaluation based on persuasion game. Comput. Networks 159: 1-9 (2019) - [j34]Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, Shengling Wang:
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet Things J. 6(3): 4556-4560 (2019) - [j33]Chun-Chi Liu, Yinhao Xiao, Vishesh Javangula, Qin Hu, Shengling Wang, Xiuzhen Cheng:
NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce. IEEE Internet Things J. 6(3): 4680-4693 (2019) - [c41]Shengling Wang, Shasha Chen, Xiuzhen Cheng, Weifeng Lv, Jiguo Yu:
Analysis of Antagonistic Dynamics for Rumor Propagation. ICDCS 2019: 1253-1263 - [c40]Shengling Wang, Chenyu Wang, Qin Hu:
Corking by Forking: Vulnerability Analysis of Blockchain. INFOCOM 2019: 829-837 - [c39]Qin Hu, Shengling Wang, Xiuzhen Cheng:
A game theoretic analysis on block withholding attacks using the zero-determinant strategy. IWQoS 2019: 41:1-41:10 - [c38]Shasha Chen, Shengling Wang, Jianghui Huang:
Analysis of Best Network Routing Structure for IoT. WASA 2019: 556-563 - [c37]Liu Hui, Shengling Wang:
Optimal Routing of Tight Optimal Bidirectional Double-Loop Networks. WASA 2019: 587-595 - [i3]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Junshan Zhang, Jiguo Yu:
Hopping-Proof and Fee-Free Pooled Mining in Blockchain. CoRR abs/1912.11575 (2019) - [i2]Shengling Wang, Xidi Qu, Qin Hu, Weifeng Lv:
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain. CoRR abs/1912.11620 (2019) - [i1]Xidi Qu, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm. CoRR abs/1912.11745 (2019) - 2018
- [j32]Waqas Ahmad, Shengling Wang, Ata Ullah, Sheharyar, Zahid Mahmood:
Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing. IEEE Access 6: 46363-46381 (2018) - [j31]Shengling Wang, Chenyu Wang, Shenling Wang, Liran Ma:
Big data analysis for evaluating bioinvasion risk. BMC Bioinform. 19-S(9): 151-159 (2018) - [j30]Shengling Wang, Qin Hu, Yunchuan Sun, Jianhui Huang:
Privacy Preservation in Location-Based Services. IEEE Commun. Mag. 56(3): 134-140 (2018) - [j29]Chun-Chi Liu, Rong Du, Shengling Wang, Rongfang Bie:
Cooperative Stackelberg game based optimal allocation and pricing mechanism in crowdsensing. Int. J. Sens. Networks 28(1): 57-68 (2018) - [j28]Weicheng Wang, Shengling Wang, Jianhui Huang:
Privacy Preservation for Friend-Recommendation Applications. Secur. Commun. Networks 2018: 1265352:1-1265352:11 (2018) - [j27]Waqas Ahmad, Shengling Wang, Ata Ullah, Sheharyar, Muhammad Yasir Shabir:
Reputation-Aware Recruitment and Credible Reporting for Platform Utility in Mobile Crowd Sensing with Smart Devices in IoT. Sensors 18(10): 3305 (2018) - [j26]Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shengling Wang, Rongfang Bie:
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds. IEEE Trans. Big Data 4(3): 341-355 (2018) - [j25]Shengling Wang, Xiangheng Meng, Jiguo Yu, Rongfang Bie, Yunchuan Sun, Xiuzhen Cheng:
N-in-One: A Novel Location-Based Service. IEEE Trans. Veh. Technol. 67(6): 5274-5286 (2018) - [j24]Qin Hu, Shengling Wang, Chunqiang Hu, Jian-Hui Huang, Wei Li, Xiuzhen Cheng:
Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services. IEEE Trans. Veh. Technol. 67(8): 7698-7711 (2018) - [c36]Korn Sooksatra, Wei Li, Bo Mei, Arwa Alrawais, Shengling Wang, Jiguo Yu:
Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy. WASA 2018: 425-437 - 2017
- [j23]Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Xiaobo Zhou, Keqiu Li, Shengling Wang, Rongfang Bie:
Perturbation-Based Private Profile Matching in Social Networks. IEEE Access 5: 19720-19732 (2017) - [j22]Shengling Wang, Luyun Li, Weiman Sun, Junqi Guo, Rongfang Bie, Kai Lin:
Context Sensing System Analysis for Privacy Preservation Based on Game Theory. Sensors 17(2): 339 (2017) - [j21]Qin Hu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy. Sensors 17(5): 1012 (2017) - [j20]Shengling Wang, Xia Wang, Xiuzhen Cheng, Jian-Hui Huang, Rongfang Bie, Feng Zhao:
Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility. IEEE Trans. Veh. Technol. 66(5): 4173-4187 (2017) - [c35]Weiman Sun, Shengling Wang:
General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective. ICDCS 2017: 517-526 - [c34]Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng:
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy. ICDCS 2017: 1137-1146 - [c33]Waqas Ahmad, Shengling Wang, Sheharyar, Zahid Mahmood:
Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing. IIKI 2017: 128-134 - [c32]Weicheng Wang, Shengling Wang:
Privacy Preservation for Dating Applications. IIKI 2017: 263-269 - [c31]Chun-Chi Liu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu:
Mechanism design games for thwarting malicious behavior in crowdsourcing applications. INFOCOM 2017: 1-9 - [c30]Jiguo Yu, Xueli Ning, Yunchuan Sun, Shengling Wang, Yawei Wang:
Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR. INFOCOM 2017: 1-9 - [c29]Shengling Wang, Jian-Hui Huang, Luyun Li, Liran Ma, Xiuzhen Cheng:
Quantum Game Analysis of Privacy-Leakage for Application Ecosystems. MobiHoc 2017: 13:1-13:10 - [c28]Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Shengling Wang, Rongfang Bie:
Poster: Perturbation Based Private Profile Matching in Social Networks. PAC 2017: 198-199 - [c27]Lei Lu, Wei Li, Shengling Wang, Rongfang Bie, Bowu Zhang:
Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks. WASA 2017: 83-95 - 2016
- [j19]Li Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang:
Analysis and optimization of delayed channel access for wireless cyber-physical systems. EURASIP J. Wirel. Commun. Netw. 2016: 60 (2016) - [j18]Shengling Wang, Rongfang Bie, Feng Zhao, Nan Zhang, Xiuzhen Cheng, Hyeong-Ah Choi:
Security in wearable communications. IEEE Netw. 30(5): 61-67 (2016) - [j17]Shengling Wang, Xia Wang, Jian-Hui Huang, Rongfang Bie, Zhi Tian, Feng Zhao:
The Potential of Mobile Opportunistic Networks for Data Disseminations. IEEE Trans. Veh. Technol. 65(2): 912-922 (2016) - [j16]Jian-Hui Huang, Shengling Wang, Xiuzhen Cheng, Jingping Bi:
Big data routing in D2D communications with cognitive radio capability. IEEE Wirel. Commun. 23(4): 45-51 (2016) - [c26]Chun-Chi Liu, Rong Du, Shengling Wang, Chenyu Wang, Rongfang Bie, Cheonshik Kim:
Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired. BDCloud-SocialCom-SustainCom 2016: 185-192 - [c25]Chun-Chi Liu, Shengling Wang, Chenyu Wang, Rongfang Bie, Dongkyoo Shin:
Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing. BDCloud-SocialCom-SustainCom 2016: 193-200 - [c24]Xiangheng Meng, Shengling Wang, Waqas Ahmad, Yijun Chen:
A Sequential Multi-type POI Recommendation Service Based on Location. IIKI 2016: 325-331 - [c23]Xiaosheng Wu, Shengling Wang, Chun-Chi Liu, Weiman Sun, Chenyu Wang:
Stackelberg Game Based Tasks Assignment Mechanism Using Reputation in Crowdsourcing. IIKI 2016: 332-339 - [c22]Xuan Yu, Shengling Wang, Chun-Chi Liu, Chenyu Wang, Weiman Sun:
Circle-Covering Algorithm for Multiple-POI Searching. IIKI 2016: 357-360 - [c21]Zhi Lin, Shengling Wang, Chun-Chi Liu, Madiha Ikram:
A Mechanism Design Solution for DTN Routing. IIKI 2016: 361-369 - [c20]Tianyi Song, Xiuzhen Cheng, Hongjuan Li, Jiguo Yu, Shengling Wang, Rongfang Bie:
Detecting driver phone calls in a moving vehicle based on voice features. INFOCOM 2016: 1-9 - [c19]Qin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie:
Solving the crowdsourcing dilemma using the zero-determinant strategy: poster. MobiHoc 2016: 373-374 - [c18]Luyun Li, Shengling Wang, Junqi Guo, Rongfang Bie, Kai Lin:
Extensive Form Game Analysis Based on Context Privacy Preservation for Smart Phone Applications. WASA 2016: 389-400 - 2015
- [j15]Shengling Wang, Xia Wang, Jian-Hui Huang, Rongfang Bie, Xiuzhen Cheng:
Analyzing the potential of mobile opportunistic networks for big data applications. IEEE Netw. 29(5): 57-63 (2015) - [j14]Xia Wang, Shengling Wang, Wenshuang Liang, Rongfang Bie, Feng Zhao:
The dissemination distance of mobile opportunistic networks. Pers. Ubiquitous Comput. 19(7): 1011-1019 (2015) - [c17]Qin Hu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
Low Price to Win: Interactive scheme in cooperative cognitive radio networks. ICC 2015: 7546-7551 - [c16]Jiguo Yu, Lili Jia, Wei Li, Xiuzhen Cheng, Shengling Wang, Rongfang Bie, Dongxiao Yu:
A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model. ICDCS 2015: 792-793 - [c15]Li Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang:
Impact of a Deterministic Delay in the DCA Protocol. WASA 2015: 134-144 - 2014
- [j13]Wei Cheng, Shengling Wang, Xiuzhen Cheng:
Virtual track: applications and challenges of the RFID system on roads. IEEE Netw. 28(1): 42-47 (2014) - [j12]Wei Li, Shengling Wang, Xiuzhen Cheng, Rongfang Bie:
Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 18(1): 3-13 (2014) - [j11]Wei Li, Shengling Wang, Yong Cui, Xiuzhen Cheng, Ran Xin, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
AP Association for Proportional Fairness in Multirate WLANs. IEEE/ACM Trans. Netw. 22(1): 191-202 (2014) - [j10]Jian-Hui Huang, Shengling Wang, Xiuzhen Cheng, Min Liu, Zhongcheng Li, Biao Chen:
Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks. IEEE Trans. Parallel Distributed Syst. 25(11): 2956-2968 (2014) - [j9]Shengling Wang, Jian-Hui Huang, Xiuzhen Cheng, Biao Chen:
Coverage adjustment for load balancing with an AP service availability guarantee in WLANs. Wirel. Networks 20(3): 475-491 (2014) - [c14]Xiao Chen, Shengling Wang, Min Liu, Chao Huang, Yaqin Zhou, Zhongcheng Li:
Partner-recruitment: Incentive mechanism for content offloading. ICC 2014: 2538-2543 - [c13]Shengling Wang, Xia Wang, Xiuzhen Cheng, Jian-Hui Huang, Rongfang Bie:
The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility. ICDCS 2014: 124-133 - [c12]Xia Wang, Shengling Wang, Wenshuang Liang, Rongfang Bie, Feng Zhao:
The Dissemination Distance of Mobile Opportunistic Networks. IIKI 2014: 286-290 - [c11]Xia Wang, Shengling Wang, Wenshuang Liang, Jian-Hui Huang, Rongfang Bie, Dechang Chen:
The Tempo-spatial Properties of Information Dissemination to Time-Varying Destination Areas in Mobile Opportunistic Networks. WASA 2014: 436-445 - 2013
- [j8]Shengling Wang, Min Liu, Xiuzhen Cheng, Zhongcheng Li, Jian-Hui Huang, Biao Chen:
Opportunistic Routing in Intermittently Connected Mobile P2P Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 369-378 (2013) - [c10]Wei Li, Shengling Wang, Xiuzhen Cheng:
Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks. CRAB@MobiCom 2013: 21-30 - 2012
- [j7]Shengling Wang, Min Liu, Xiuzhen Cheng, Min Song:
Routing in pocket switched networks. IEEE Wirel. Commun. 19(1): 67-73 (2012) - [j6]Shengling Wang, Yong Cui, Sajal K. Das, Jianping Wu:
Dynamic region-based mobile multicast. Wirel. Commun. Mob. Comput. 12(10): 875-890 (2012) - [c9]Shengling Wang, Min Liu, Xiuzhen Cheng, Zhongcheng Li, Jian-Hui Huang, Biao Chen:
HERO - A Home Based Routing in Pocket Switched Networks. WASA 2012: 20-30 - 2011
- [j5]Min Liu, Xiao-Bing Guo, Anfu Zhou, Shengling Wang, Zhongcheng Li, Eryk Dutkiewicz:
Low latency IP mobility management: protocol and analysis. EURASIP J. Wirel. Commun. Netw. 2011: 25 (2011) - [j4]Yong Cui, Shengling Wang, Sajal K. Das:
Distributed dynamic mobile multicast. J. Parallel Distributed Comput. 71(9): 1215-1224 (2011) - [j3]Shengling Wang, Yong Cui, Sajal K. Das, Wei Li, Jianping Wu:
Mobility in IPv6: Whether and How to Hierarchize the Network? IEEE Trans. Parallel Distributed Syst. 22(10): 1722-1729 (2011) - 2010
- [c8]Peng Wu, Yong Cui, Mingwei Xu, Jianping Wu, Xing Li, Chris Metz, Shengling Wang:
PET: Prefixing, Encapsulation and Translation for IPv4-IPv6 Coexistence. GLOBECOM 2010: 1-5 - [c7]Wei Li, Yong Cui, Shengling Wang, Xiuzhen Cheng:
Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs. WASA 2010: 36-46
2000 – 2009
- 2009
- [c6]Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu:
Proportional fairness of call blocking probability. ICIS 2009: 47-52 - [c5]Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Shengling Wang:
Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. QSHINE 2009: 34-51 - [c4]Shengling Wang, Yong Cui, Ke Xu, Sajal K. Das, Jianping Wu, Yanping Xiao:
Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells. QSHINE 2009: 203-217 - 2008
- [j2]Shengling Wang, Yong Cui, Rajeev Koodli, Yibin Hou, Zhangqin Huang:
Dynamic Multiple-Threshold Call Admission Control Based on Optimized Genetic Algorithm in Wireless/Mobile Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1597-1608 (2008) - [c3]Jian-Hui Huang, Depei Qian, Shengling Wang:
A fast handoff scheme for MPLS-based Mobile IPv6 Network. ICNSC 2008: 257-261 - [c2]Shengling Wang, Yong Cui, Sajal K. Das:
Intelligent Mobility Support for IPv6. LCN 2008: 403-410 - 2007
- [j1]Jian-Hui Huang, Depei Qian, Shengling Wang:
Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network. J. Comput. Sci. Technol. 22(4): 527-531 (2007) - 2006
- [c1]Shengling Wang, Yibin Hou, Jian-Hui Huang, Zhangqin Huang:
Adaptive Call Admission Control Based on Enhanced Genetic Algorithm in Wireless/Mobile Network. ICTAI 2006: 3-9
Coauthor Index
aka: Chunchi Liu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint