


default search action
Chunming Rong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i12]Jungwon Seo, Ferhat Özgür Çatak, Chunming Rong:
Understanding Federated Learning from IID to Non-IID dataset: An Experimental Study. CoRR abs/2502.00182 (2025) - 2024
- [j80]Muhammad Sulaiman
, Erik Finnesand, Mina Farmanbar, Ahmed Nabil Belbachir
, Chunming Rong
:
Building Precision: Efficient Encoder-Decoder Networks for Remote Sensing Based on Aerial RGB and LiDAR Data. IEEE Access 12: 60329-60346 (2024) - [j79]Zheyi Chen
, Junjie Zhang
, Xianghan Zheng, Geyong Min
, Jie Li
, Chunming Rong
:
Profit-Aware Cooperative Offloading in UAV-Enabled MEC Systems Using Lightweight Deep Reinforcement Learning. IEEE Internet Things J. 11(12): 21325-21336 (2024) - [j78]Yuxi Lu
, Chunxiao Jiang
, Lizhuang Tan
, Jianyong Zhang, Peiying Zhang
, Chunming Rong
:
UAV Dynamic Service Function Chains Deployment Based on Security Considerations: A Reinforcement Learning Method. IEEE Internet Things J. 11(24): 39731-39743 (2024) - [j77]Neel Kanwal, Farbod Khoraminia, Umay Kiraz, Andrés Mosquera-Zamudio, Carlos Monteagudo, Emiel A. M. Janssen, Tahlita C. M. Zuiverloon, Chunming Rong, Kjersti Engan:
Equipping computational pathology systems with artifact processing pipelines: a showcase for computation and performance trade-offs. BMC Medical Informatics Decis. Mak. 24(1): 288 (2024) - [j76]Muhammad Sulaiman
, Mina Farmanbar
, Ahmed Nabil Belbachir, Chunming Rong:
Genetic Algorithm Empowering Unsupervised Learning for Optimizing Building Segmentation from Light Detection and Ranging Point Clouds. Remote. Sens. 16(19): 3603 (2024) - [j75]Jiahui Geng
, Yongli Mou
, Qing Li
, Feifei Li
, Oya Beyan, Stefan Decker
, Chunming Rong
:
Improved Gradient Inversion Attacks and Defenses in Federated Learning. IEEE Trans. Big Data 10(6): 839-850 (2024) - [j74]Yi Zhang
, Peiying Zhang
, Chunxiao Jiang
, Shangguang Wang
, Hongxia Zhang
, Chunming Rong
:
QoS Aware Virtual Network Embedding in Space-Air-Ground-Ocean Integrated Network. IEEE Trans. Serv. Comput. 17(4): 1712-1723 (2024) - [c130]Yuandou Wang
, Neel Kanwal
, Kjersti Engan
, Chunming Rong
, Paola Grosso
, Zhiming Zhao
:
PriCE: Privacy-Preserving and Cost-Effective Scheduling for Parallelizing the Large Medical Image Processing Workflow over Hybrid Clouds. Euro-Par (1) 2024: 210-224 - [i11]Yuandou Wang, Neel Kanwal, Kjersti Engan, Chunming Rong, Paola Grosso, Zhiming Zhao:
Towards Privacy-, Budget-, and Deadline-Aware Service Optimization for Large Medical Image Processing across Hybrid Clouds. CoRR abs/2401.12597 (2024) - [i10]Jungwon Seo, Chunming Rong, Minhoe Kim:
FedShift: Tackling Dual Heterogeneity Problem of Federated Learning via Weight Shift Aggregation. CoRR abs/2402.01070 (2024) - [i9]Neel Kanwal, Farbod Khoraminia, Umay Kiraz, Andrés Mosquera-Zamudio, Carlos Monteagudo, Emiel A. M. Janssen, Tahlita C. M. Zuiverloon, Chunming Rong, Kjersti Engan:
Equipping Computational Pathology Systems with Artifact Processing Pipelines: A Showcase for Computation and Performance Trade-offs. CoRR abs/2403.07743 (2024) - [i8]Yuandou Wang, Neel Kanwal, Kjersti Engan, Chunming Rong, Paola Grosso, Zhiming Zhao:
PriCE: Privacy-Preserving and Cost-Effective Scheduling for Parallelizing the Large Medical Image Processing Workflow over Hybrid Clouds. CoRR abs/2405.15398 (2024) - 2023
- [j73]Xing Chen
, Zewei Yao
, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Load Balancing for Multiedge Collaboration in Wireless Metropolitan Area Networks: A Two-Stage Decision-Making Approach. IEEE Internet Things J. 10(19): 17124-17136 (2023) - [j72]Yang Yang
, Robert H. Deng
, Wenzhong Guo
, Hongju Cheng
, Xiangyang Luo
, Xianghan Zheng, Chunming Rong
:
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer. IEEE Trans. Cloud Comput. 11(1): 247-262 (2023) - [j71]Xing Chen
, Lijian Yang, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach. IEEE Trans. Cloud Comput. 11(2): 1871-1885 (2023) - [j70]Shanchen Pang
, Xiao He
, Ching-Hsien Hsu
, Chunming Rong
, Hailong Zhu
, Peiying Zhang
:
Joint Trajectory and Energy Consumption Optimization Based on UAV Wireless Charging in Cloud Computing System. IEEE Trans. Cloud Comput. 11(4): 3426-3438 (2023) - [j69]Zhousheng Wang
, Geng Yang
, Hua Dai
, Chunming Rong
:
Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training. IEEE Trans. Inf. Forensics Secur. 18: 1539-1553 (2023) - [j68]Yang Yang
, Chunming Rong
, Xianghan Zheng, Hongju Cheng
, Victor Chang
, Xiangyang Luo
, Zuoyong Li
:
Time Controlled Expressive Predicate Query With Accountable Anonymity. IEEE Trans. Serv. Comput. 16(2): 1444-1457 (2023) - [c129]Ali Gohar, Chunming Rong, Sanghwan Lee:
An Isolation-aware Online Virtual Network Embedding via Deep Reinforcement Learning. CCGridW 2023: 89-95 - [c128]Jungwon Seo, Nan Zhang, Chunming Rong:
Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection. CloudCom 2023: 341-349 - [c127]Yuandou Wang, Neel Kanwal, Kjersti Engan, Chunming Rong, Zhiming Zhao:
Towards a Privacy-Preserving Distributed Cloud Service for Preprocessing Very Large Medical Images. ICDH 2023: 325-327 - [c126]Jiahui Geng, Zongxiong Chen, Yuandou Wang, Herbert Woisetschlaeger
, Sonja Schimmler, Ruben Mayer, Zhiming Zhao, Chunming Rong:
A Survey on Dataset Distillation: Approaches, Applications and Future Directions. IJCAI 2023: 6610-6618 - [c125]Qing Li, Jiahui Geng, Steinar Evje, Chunming Rong:
Solving Nonlinear Conservation Laws of Partial Differential Equations Using Graph Neural Networks. NLDL 2023 - [c124]Yongli Mou
, Jiahui Geng
, Feng Zhou
, Oya Beyan
, Chunming Rong
, Stefan Decker
:
pFedV: Mitigating Feature Distribution Skewness via Personalized Federated Learning with Variational Distribution Constraints. PAKDD (2) 2023: 283-294 - [c123]Chunming Rong, Yuanqiu Luo, Fengbiao Zan:
Welcome Message from the General Chairs. SmartIoT 2023: xiii - [i7]Jiahui Geng, Zongxiong Chen, Yuandou Wang, Herbert Woisetschlaeger, Sonja Schimmler, Ruben Mayer, Zhiming Zhao, Chunming Rong:
A Survey on Dataset Distillation: Approaches, Applications and Future Directions. CoRR abs/2305.01975 (2023) - [i6]Zongxiong Chen, Jiahui Geng, Derui Zhu, Herbert Woisetschlaeger, Qing Li, Sonja Schimmler, Ruben Mayer, Chunming Rong:
A Comprehensive Study on Dataset Distillation: Performance, Privacy, Robustness and Fairness. CoRR abs/2305.03355 (2023) - [i5]Yuandou Wang, Neel Kanwal, Kjersti Engan, Chunming Rong, Zhiming Zhao:
Towards a privacy-preserving distributed cloud service for preprocessing very large medical images. CoRR abs/2307.06266 (2023) - [i4]Muhammad Sulaiman, Mina Farmanbar, Ahmed Nabil Belbachir, Chunming Rong:
Precision in Building Extraction: Comparing Shallow and Deep Models using LiDAR Data. CoRR abs/2309.12027 (2023) - 2022
- [j67]Wei Gao, Liqun Chen
, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu
:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - [j66]Chunming Rong, Jiahui Geng
, Thomas J. Hacker, Haakon Bryhni, Martin Gilje Jaatun:
OpenIaC: open infrastructure as code - the network is my computer. J. Cloud Comput. 11: 12 (2022) - [j65]Zheyi Chen
, Hongqiang Zheng, Jianshan Zhang
, Xianghan Zheng, Chunming Rong
:
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems. Peer-to-Peer Netw. Appl. 15(1): 194-205 (2022) - [j64]Xing Chen
, Fangning Zhu, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning. IEEE Trans. Cloud Comput. 10(2): 1117-1129 (2022) - [j63]Yang Yang
, Robert H. Deng
, Ximeng Liu
, Yongdong Wu, Jian Weng
, Xianghan Zheng, Chunming Rong
:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. IEEE Trans. Cloud Comput. 10(3): 2020-2037 (2022) - [j62]Xuelong Dai
, Hua Dai
, Chunming Rong
, Geng Yang
, Fu Xiao
, Bin Xiao
:
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 10(4): 2595-2612 (2022) - [j61]Jingjing Zhang
, Yingyao Rong, Jiannong Cao
, Chunming Rong, Jing Bian
, Weigang Wu
:
DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation. IEEE Trans. Dependable Secur. Comput. 19(5): 3387-3400 (2022) - [j60]Shuangjie Bai
, Geng Yang
, Guoxiu Liu, Hua Dai
, Chunming Rong
:
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 19(4): 3750-3763 (2022) - [c122]Jiahui Geng, Ali Akbar Rehman, Yongli Mou, Stefan Decker, Chunming Rong:
Blockchain-based Cross-organizational Workflow Platform. CloudCom 2022: 53-59 - [c121]Hanif Tadjik, Jiahui Geng, Martin Gilje Jaatun, Chunming Rong:
Blockchain Empowered and Self-sovereign Access Control System. CloudCom 2022: 74-82 - [c120]Asahi Cantu, Jiahui Geng, Chunming Rong:
NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework. CloudCom 2022: 97-104 - [c119]Chunming Rong, Jiahui Geng, Martin Gilje Jaatun:
Managing Digital Objects with Decentralised Identifiers based on NFT-like schema. CloudCom 2022: 246-251 - [c118]Neel Kanwal
, Saul Fuster, Farbod Khoraminia, Tahlita C. M. Zuiverloon, Chunming Rong, Kjersti Engan
:
Quantifying the effect of color processing on blood and damaged tissue detection in Whole Slide Images. IVMSP 2022: 1-5 - 2021
- [j59]Aida Mehdipour Pirbazari
, Ekanki Sharma
, Antorweep Chakravorty, Wilfried Elmenreich, Chunming Rong
:
An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities. IEEE Access 9: 36218-36240 (2021) - [j58]Wenbing Zhao
, Chunming Rong
, Jun Wu, Zhixin Sun, Srinivas Sampalli:
IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications. IEEE Access 9: 110006-110010 (2021) - [j57]Kaifeng Yue
, Yuanyuan Zhang, Yanru Chen
, Yang Li, Lian Zhao
, Chunming Rong
, Liangyin Chen
:
A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective. IEEE Commun. Surv. Tutorials 23(4): 2191-2217 (2021) - [j56]Chunming Rong
, Zhiming Zhao:
Welcome to the new Journal of Cloud Computing by Springer. J. Cloud Comput. 10(1): 49 (2021) - [j55]Nikita Karandikar
, Antorweep Chakravorty, Chunming Rong
:
Blockchain Based Transaction System with Fungible and Non-Fungible Tokens for a Community-Based Energy Infrastructure. Sensors 21(11): 3822 (2021) - [c117]Rituka Jaiswal, Fadwa Maatug, Reggie Davidrajuh, Chunming Rong:
Anomaly Detection in Smart Meter Data for Preventing Potential Smart Grid Imbalance. AICCC 2021: 150-159 - [c116]Jiahui Geng
, Neel Kanwal
, Martin Gilje Jaatun, Chunming Rong
:
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities. EASE 2021: 329-335 - [c115]Yongli Mou, Jiahui Geng, Sascha Welten, Chunming Rong
, Stefan Decker, Oya Beyan:
Optimized Federated Learning on Class-Biased Distributed Data Sources. PKDD/ECML Workshops (1) 2021: 146-158 - [i3]Jiahui Geng, Neel Kanwal, Martin Gilje Jaatun, Chunming Rong:
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities. CoRR abs/2105.08671 (2021) - [i2]Jiahui Geng, Yongli Mou, Feifei Li, Qing Li, Oya Beyan, Stefan Decker, Chunming Rong:
Towards General Deep Leakage in Federated Learning. CoRR abs/2110.09074 (2021) - 2020
- [j54]Zheyi Chen
, Lijian Yang, Yinhao Huang, Xing Chen
, Xianghan Zheng, Chunming Rong
:
PSO-GA-Based Resource Allocation Strategy for Cloud-Based Software Services With Workload-Time Windows. IEEE Access 8: 151500-151510 (2020) - [j53]Zheyi Chen
, Kai Lin, Bing Lin
, Xing Chen
, Xianghan Zheng, Chunming Rong
:
Adaptive Resource Allocation and Consolidation for Scientific Workflow Scheduling in Multi-Cloud Environments. IEEE Access 8: 190173-190183 (2020) - [j52]Rituka Jaiswal
, Reggie Davidrajuh
, Chunming Rong
:
Fog Computing for Realizing Smart Neighborhoods in Smart Grids. Comput. 9(3): 76 (2020) - [j51]Shuangjie Bai, Geng Yang, Chunming Rong
, Guoxiu Liu, Hua Dai:
QHSE: An efficient privacy-preserving scheme for blockchain-based transactions. Future Gener. Comput. Syst. 112: 930-944 (2020) - [j50]Bin Yuan
, Chen Lin, Huan Zhao, Deqing Zou
, Laurence Tianruo Yang
, Hai Jin
, Chunming Rong
:
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services. IEEE Internet Things J. 7(9): 7967-7981 (2020) - [j49]Yang Yang
, Xianghan Zheng, Chunming Rong
, Wenzhong Guo
:
Efficient Regular Language Search for Secure Cloud Storage. IEEE Trans. Cloud Comput. 8(3): 805-818 (2020) - [j48]Yang Yang
, Ximeng Liu
, Xianghan Zheng, Chunming Rong
, Wenzhong Guo
:
Efficient Traceable Authorization Search System for Secure Cloud Storage. IEEE Trans. Cloud Comput. 8(3): 819-832 (2020) - [j47]Yong Yuan, Shouyang Wang, David L. Olson, James H. Lambert, Fei-Yue Wang, Chunming Rong
, Angelos Stavrou
, Jun Zhang, Qiang Tang, Foteini Baldimtsi, Laurence T. Yang, Desheng Wu:
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation. IEEE Trans. Syst. Man Cybern. Syst. 50(1): 2-8 (2020) - [c114]Rituka Jaiswal, Antorweep Chakravorty, Chunming Rong
:
Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter Data. BigDataService 2020: 1-8 - [c113]Dhanya Therese Jose, Antorweep Chakravorty, Chunming Rong
:
Distributed computational framework in TOTEM architecture enabled by blockchain. ICCSE 2020: 83-88 - [c112]Zhiming Zhao, Chunming Rong
, Martin Gilje Jaatun:
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud. ICPADS 2020: 617-624 - [c111]Nikita Karandikar, Antorweep Chakravorty, Chunming Rong
:
RenewLedger : Renewable energy management powered by Hyperledger Fabric. ISCC 2020: 1-6 - [c110]Aida Mehdipour Pirbazari, Mina Farmanbar
, Antorweep Chakravorty, Chunming Rong
:
Improving Load Forecast Accuracy of Households Using Load Disaggregation Techniques. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 843-851 - [c109]Songpu Ai, Diankai Hu, Tong Zhang, Yunpeng Jiang, Chunming Rong
, Junwei Cao:
Blockchain based Power Transaction Asynchronous Settlement System. VTC Spring 2020: 1-6 - [i1]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. CoRR abs/2005.11688 (2020)
2010 – 2019
- 2019
- [j46]Cristina Heghedus
, Anton Shchipanov, Chunming Rong
:
Advancing Deep Learning to Improve Upstream Petroleum Monitoring. IEEE Access 7: 106248-106259 (2019) - [j45]Xianghan Zheng
, Chunming Rong
, Tuyatsetseg Badarch
:
Foreword to the special issue of green cloud computing: Methodology and practice. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j44]Qing Yang
, Rongxing Lu, Chunming Rong
, Yacine Challal
, Maryline Laurent
, Shengling Wang:
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet Things J. 6(3): 4556-4560 (2019) - [j43]Mingli Wu, Kun Wang
, Xiaoqin Cai
, Song Guo
, Minyi Guo
, Chunming Rong
:
A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond. IEEE Internet Things J. 6(5): 8114-8154 (2019) - [j42]Songpu Ai
, Antorweep Chakravorty, Chunming Rong
:
Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures. Sensors 19(3): 721 (2019) - [j41]Thomas J. Hacker
, Rui Pais, Chunming Rong
:
A Markov Random Field Based Approach for Analyzing Supercomputer System Logs. IEEE Trans. Cloud Comput. 7(3): 611-624 (2019) - [c108]Aida Mehdipour Pirbazari, Antorweep Chakravorty, Chunming Rong
:
Evaluating Feature Selection Methods for Short-Term Load Forecasting. BigComp 2019: 1-8 - [c107]Chunlei Li, Chunming Rong
, Martin Gilje Jaatun:
A Cost-efficient Protocol for Open Blockchains. Cyber Security 2019: 1-7 - [c106]Songpu Ai, Antorweep Chakravorty, Chunming Rong
:
Evolutionary Ensemble LSTM based Household Peak Demand Prediction. ICAIIC 2019: 1-6 - [c105]Dhanya Therese Jose, Antorweep Chakravorty, Chunming Rong
:
TOTEM : Token for controlled computation: Integrating Blockchain with Big Data. ICCCNT 2019: 1-7 - [c104]Nikita Karandikar, Antorweep Chakravorty, Chunming Rong
:
Transactive Energy on Hyperledger Fabric. IoTSMS 2019: 539-546 - [c103]Cristina Heghedus, Antorweep Chakravorty, Chunming Rong
:
Neural Network Frameworks. Comparison on Public Transportation Prediction. IPDPS Workshops 2019: 842-849 - [c102]Cristina Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong
:
Neural Network Architectures for Electricity Consumption Forecasting. iThings/GreenCom/CPSCom/SmartData 2019: 776-783 - [c101]Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong
, Jing Bian, Weigang Wu:
DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation. SRDS 2019: 123-132 - 2018
- [j40]Hongbing Cheng
, Chunming Rong
, Manyun Qian, Weihong Wang:
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption. IEEE Access 6: 37869-37882 (2018) - [j39]Fei-Yue Wang
, Yong Yuan, Chunming Rong
, Jun Jason Zhang:
Parallel Blockchain: An Architecture for CPSS-Based Smart Societies. IEEE Trans. Comput. Soc. Syst. 5(2): 303-310 (2018) - [j38]Yuanlong Yu, Zhifan Ye, Xianghan Zheng, Chunming Rong
:
An efficient cascaded method for network intrusion detection based on extreme learning machines. J. Supercomput. 74(11): 5797-5812 (2018) - [c100]Cristina Heghedus, Antorweep Chakravorty, Chunming Rong
:
Energy Informatics Applicability; Machine Learning and Deep Learning. BCD 2018: 97-101 - [c99]Jayachander Surbiryala, Chunming Rong
:
Secure customer data over cloud forensic reconstruction. ICCE 2018: 1-4 - [c98]Jayachander Surbiryala, Bikash Agrawal, Chunming Rong
:
Improve Security Over Multiple Cloud Service Providers for Resource Allocation. ICDIS 2018: 145-148 - [c97]Jayachander Surbiryala, Chunming Rong
:
Data Recovery and Security in Cloud. IISA 2018: 1-5 - 2017
- [j37]Xin Hong, Hui-Zhen Zhang, Chunming Rong
:
Mobile contact synchronous with cloud server. Appl. Soft Comput. 56: 514-519 (2017) - [j36]Bikash Agrawal
, Tomasz Wiktorski, Chunming Rong
:
Adaptive real-time anomaly detection in cloud infrastructures. Concurr. Comput. Pract. Exp. 29(24) (2017) - [j35]Xing Chen, Shihong Chen, Xue'e Zeng, Xianghan Zheng, Ying Zhang, Chunming Rong
:
Framework for context-aware computation offloading in mobile cloud computing. J. Cloud Comput. 6: 1 (2017) - [c96]Antorweep Chakravorty, Chunming Rong
, K. R. Jayaram, Shu Tao:
Scalable, Efficient Anonymization with INCOGNITO - Framework & Algorithm. BigData Congress 2017: 39-48 - [c95]Bikash Agrawal, Jayachander Surbiryala, Chunming Rong
:
Resource Allocation in Cloud-Based Distributed Cameras. BigData Congress 2017: 153-160 - [c94]Antorweep Chakravorty, Chunming Rong
:
Ushare: user controlled social media based on blockchain. IMCOM 2017: 99 - 2016
- [j34]Chunming Rong
, Lu Liu
, Guolong Chen:
Big data and smart computing: methodology and practice. Concurr. Comput. Pract. Exp. 28(11): 3077-3078 (2016) - [j33]Chengwei Xiao, Jiaqi Ye, Rui Máximo Esteves, Chunming Rong
:
Using Spearman's correlation coefficients for exploratory data analysis on big dataset. Concurr. Comput. Pract. Exp. 28(14): 3866-3878 (2016) - [j32]Aryan TaheriMonfared, Chunming Rong:
Flexible Building Blocks for Software Defined Network Function Virtualization. EAI Endorsed Trans. Cloud Syst. 2(7): e4 (2016) - [j31]Feng Zhang
, Ti Gong, Victor E. Lee, Gansen Zhao, Chunming Rong
, Guangzhi Qu:
Fast algorithms to evaluate collaborative filtering recommender systems. Knowl. Based Syst. 96: 96-103 (2016) - [j30]Xianghan Zheng, Xueying Zhang, Yuanlong Yu, M. Tahar Kechadi
, Chunming Rong
:
ELM-based spammer detection in social networks. J. Supercomput. 72(8): 2991-3005 (2016) - [c93]Bikash Agrawal, Raymond A. Hansen, Chunming Rong
, Tomasz Wiktorski:
SD-HDFS: Secure Deletion in Hadoop Distributed File System. BigData Congress 2016: 181-189 - [c92]Chunming Rong
, Hongbing Cheng, Martin Gilje Jaatun:
Securing big data in the Cloud by protected mapping over multiple providers. DMIAF 2016: 166-171 - [c91]Xinjiao Chen, Chunlei Li, Chunming Rong
:
Perfect Gaussian integer sequences from cyclic difference sets. ISIT 2016: 115-119 - [c90]Bikash Agrawal, Tomasz Wiktorski, Chunming Rong
:
Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis. ISPDC 2016: 100-106 - [c89]Xin Hong, Chenhui Yang, Chunming Rong
:
Smart Home Security Monitor System. ISPDC 2016: 247-251 - [c88]Kun Li, Xianghan Zheng, Chunming Rong
, Yuanlong Yu, Riqing Chen:
Protein Function Detection Based on Machine Learning: Survey and Possible Solutions. ISPDC 2016: 327-333 - [c87]Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Chunming Rong
:
Enrichment of machine learning based activity classification in smart homes using ensemble learning. UCC 2016: 196-201 - [e5]Riqing Chen, Chunming Rong, Dan Grigoras:
15th International Symposium on Parallel and Distributed Computing, ISPDC 2016, Fuzhou, China, July 8-10, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4152-7 [contents] - 2015
- [j29]Xianghan Zheng
, Zhipeng Zeng, Zheyi Chen, Yuanlong Yu, Chunming Rong
:
Detecting spammers on social networks. Neurocomputing 159: 27-34 (2015) - [j28]Quan Zhou, Chunming Tang, Xianghan Zheng, Chunming Rong:
A secure user authentication protocol for sensor network in data capturing. J. Cloud Comput. 4: 6 (2015) - [j27]Gansen Zhao, Zhongjie Ba, Jiahua Du, Xinming Wang, Ziliu Li, Chunming Rong
, Changqin Huang
:
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data. Int. J. Data Warehous. Min. 11(3): 49-67 (2015) - [c86]Dongyun An, Xianghan Zheng, Chunming Rong
, M. Tahar Kechadi
, Chongcheng Chen:
Gaussian Mixture Model Based Interest Prediction In Social Networks. CloudCom 2015: 196-201 - [c85]Jie Cheng, Chunming Rong
, Huijuan Ye, Xianghan Zheng:
Risk Management Using Big Real Time Data. CloudCom 2015: 542-547 - [c84]Jiangyong Chen, Xianghan Zheng, Chunming Rong
:
Survey on Software-Defined Networking. CloudCom-Asia 2015: 115-124 - [c83]Bikash Agrawal, Tomasz Wiktorski, Chunming Rong
:
Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model. CloudCom-Asia 2015: 232-246 - [c82]Jiaqi Ye, Chengwei Xiao, Rui Máximo Esteves, Chunming Rong
:
Time Series Similarity Evaluation Based on Spearman's Correlation Coefficients and Distance Measures. CloudCom-Asia 2015: 319-331 - [c81]Girma Kejela, Chunming Rong
:
Cross-Device Consumer Identification. ICDM Workshops 2015: 1687-1689 - [c80]Lars Ropeid Selsaas, Bikash Agrawal, Chunming Rong
, Tomasz Wiktorski:
AFFM: Auto Feature Engineering in Field-Aware Factorization Machines for Predictive Analytics. ICDM Workshops 2015: 1705-1709 - [c79]Kun Li, Xianghan Zheng, Chunming Rong
:
Machine Learning Based Scalable and Adaptive Network Function Virtualization. MIWAI 2015: 397-404 - [c78]Aryan TaheriMonfared, Chunming Rong
:
Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants. WWIC 2015: 165-179 - 2014
- [j26]Rui Máximo Esteves, Thomas J. Hacker, Chunming Rong:
A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means. Int. J. Big Data Intell. 1(1/2): 50-64 (2014) - [j25]Quan Zhou, Daixian Wu, Chunming Tang, Chunming Rong
:
STSHC: secure and trusted scheme for Hadoop cluster. Int. J. High Perform. Syst. Archit. 5(1): 63-69 (2014) - [j24]Xing Chen, Ying Zhang, Gang Huang, Xianghan Zheng, Wenzhong Guo, Chunming Rong
:
Architecture-based integrated management of diverse cloud resources. J. Cloud Comput. 3: 11 (2014) - [j23]Son Thanh Nguyen, Erdal Cayirci, Chunming Rong
:
A secure many-to-many routing protocol for wireless sensor and actuator networks. Secur. Commun. Networks 7(1): 88-98 (2014) - [c77]Xin Hong, Chunming Rong
:
Multiple Data Integration Service. AINA Workshops 2014: 860-865 - [c76]Girma Kejela, Rui Máximo Esteves, Chunming Rong
:
Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques. CloudCom 2014: 626-631 - [c75]Bing Lin, Wenzhong Guo, Xianghan Zheng, Hong Zhang, Chunming Rong
, Guolong Chen:
Optimization Scheduling for Scientific Applications with Different Priorities across Multiple Clouds. CloudCom 2014: 769-774 - [c74]Bikash Agrawal, Antorweep Chakravorty, Chunming Rong
, Tomasz Wiktor Wlodarczyk:
R2Time: A Framework to Analyse Open TSDB Time-Series Data in HBase. CloudCom 2014: 970-975 - [c73]Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud. IC2E 2014: 424-431 - [c72]Aryan TaheriMonfared, Chunming Rong
:
Flexible building blocks for software defined network function virtualization. QSHINE 2014: 37-43 - [c71]Antorweep Chakravorty, Chunming Rong
, Pål Evensen, Tomasz Wiktor Wlodarczyk:
A distributed gaussian-means clustering algorithm for forecasting domestic energy usage. SMARTCOMP 2014: 229-236 - 2013
- [j22]Chunming Rong
, Son Thanh Nguyen, Martin Gilje Jaatun
:
Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1): 47-54 (2013) - [j21]Jianguo Li, Gansen Zhao, Chunming Rong
, Yong Tang:
Semantic description of scholar-oriented social network cloud. J. Supercomput. 65(1): 410-425 (2013) - [j20]Victor C. M. Leung
, Yonggang Wen, Min Chen, Chunming Rong
:
Mobile cloud computing [Guest Editorial]. IEEE Wirel. Commun. 20(3): 1-0 (2013) - [c70]Gansen Zhao, Haiyu Wang, Chunming Rong
, Yong Tang:
Resource Pool Oriented Trust Management for Cloud Infrastructure. ARES 2013: 268-273 - [c69]Ming Hao, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Performance Analysis and Optimization of Map Only Left Outer Join. AINA Workshops 2013: 625-631 - [c68]Rui Máximo Esteves, Thomas J. Hacker, Chunming Rong
:
Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets. CloudCom (1) 2013: 17-24 - [c67]Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework. CloudCom (1) 2013: 258-265 - [c66]Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Safer@Home Analytics: A Big Data Analytical Solution for Smart Homes. CloudCom (1) 2013: 705-710 - [c65]Quan Zhou, Deqin Xiao, Daixian Wu, Chunming Tang, Chunming Rong
:
TSHC: Trusted Scheme for Hadoop Cluster. EIDWT 2013: 344-349 - [c64]Aryan TaheriMonfared, Chunming Rong
:
Multi-tenant Network Monitoring Based on Software Defined Networking. OTM Conferences 2013: 327-341 - [c63]Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Privacy Preserving Data Analytics for Smart Homes. IEEE Symposium on Security and Privacy Workshops 2013: 23-27 - 2012
- [j19]Tomasz Wiktor Wlodarczyk, Han Yi, Xiao Yu, Chunming Rong:
Evaluation of some optimisation techniques for semantic query answering on shared-nothing architecture. Int. J. Space Based Situated Comput. 2(1): 12-22 (2012) - [j18]Martin Gilje Jaatun
, Costas Lambrinoudakis
, Chunming Rong
:
Special issue on security in cloud computing. J. Cloud Comput. 1: 17 (2012) - [j17]Lili Sun, Hua Wang
, Jeffrey Soar
, Chunming Rong
:
Purpose Based Access Control for Privacy Protection in E-Healthcare Services. J. Softw. 7(11): 2443-2449 (2012) - [j16]Chunming Rong
, Frode Eika Sandnes
, Rajkumar Buyya:
Preface to special issue on Advances in Cloud Computing. J. Supercomput. 61(2): 249-250 (2012) - [j15]Gansen Zhao, Chunming Rong
, Martin Gilje Jaatun
, Frode Eika Sandnes
:
Reference deployment models for eliminating user concerns on cloud security. J. Supercomput. 61(2): 337-352 (2012) - [c62]Byambajargal Byambajav, Tomasz Wiktor Wlodarczyk, Chunming Rong
, Paea LePendu
, Nigam Shah:
Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. AINA Workshops 2012: 1075-1080 - [c61]Chunming Rong
, Hongbing Cheng:
Authenticated health monitoring scheme for wireless body sensor networks. BODYNETS 2012: 31-35 - [c60]Erdal Cayirci, Chunming Rong
, Maciej Koczur, Kai Hwang:
A multi-criteria design scheme for service federating inter-cloud applications. CloudCom 2012: 129-134 - [c59]Rui Máximo Esteves, Thomas J. Hacker, Chunming Rong:
Cluster analysis for the cloud: Parallel Competitive Fitness and parallel K-means++ for large dataset analysis. CloudCom 2012: 177-184 - [c58]Jin Liu, Chunming Rong
, Gansen Zhao:
A fast estimation of shortest path distance for power-law network predominant cloud service. CloudCom 2012: 480-487 - [c57]Siani Pearson
, Vasilios Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva
, Christoph Reich
, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun
, Ronald Leenes, Chunming Rong
, Javier López
:
Accountability for cloud and other future Internet services. CloudCom 2012: 629-632 - [c56]Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong
:
A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. CSS 2012: 123-138 - 2011
- [c55]Hongbing Cheng, Chunming Rong
, Geng Yang:
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. AINA 2011: 475-480 - [c54]Tomasz Wiktor Wlodarczyk, Yi Han, Chunming Rong
:
Performance Analysis of Hadoop for Query Processing. AINA Workshops 2011: 507-513 - [c53]Rui Máximo Esteves, Rui Pais, Chunming Rong
:
K-means Clustering in the Cloud - A Mahout Test. AINA Workshops 2011: 514-519 - [c52]Ching-Hsien Hsu, Shih-Chang Chen, Chih-Chun Lee, Hsi-Ya Chang, Kuan-Chou Lai, Kuan-Ching Li
, Chunming Rong
:
Energy-Aware Task Consolidation Technique for Cloud Computing. CloudCom 2011: 115-121 - [c51]Yuri Demchenko
, Canh Ngo, Cees de Laat, Tomasz Wiktor Wlodarczyk, Chunming Rong
, Wolfgang Ziegler:
Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services. CloudCom 2011: 255-263 - [c50]Rui Máximo Esteves, Chunming Rong
:
Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud. CloudCom 2011: 565-569 - [c49]Tomasz Wiktor Wlodarczyk, Chunming Rong
:
An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing. CloudCom 2011: 612-617 - [c48]Son Thanh Nguyen, Semere Tsehaye Ghebregiorgish, Nour Alabbasi, Chunming Rong
:
Integer Factorization Using Hadoop. CloudCom 2011: 628-633 - [c47]Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Applying SWRL-F to intercloud constraints analysis. HPCS 2011: 391-396 - [c46]Erdal Cayirci, Chunming Rong
:
Intercloud for simulation federations. HPCS 2011: 397-404 - [c45]Liang Yan, Hongbo Guo, Min Chen, Chunming Rong
, Victor C. M. Leung
:
Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System. Networking Workshops 2011: 243-250 - [c44]Tomasz Wiktor Wlodarczyk, Chunming Rong
, Martin J. O'Connor, Mark A. Musen
:
SWRL-F: a fuzzy logic extension of the semantic web rule language. WIMS 2011: 39 - 2010
- [j14]Dingyi Pei, Jun-Wu Dong, Chunming Rong
:
A novel key pre-distribution scheme for wireless distributed sensor networks. Sci. China Inf. Sci. 53(2): 288-298 (2010) - [c43]Wei Sun, Naixue Xiong, Laurence Tianruo Yang, Chunming Rong
:
Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. CIT 2010: 1735-1742 - [c42]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong
, Wenjun Li, Lianzhang Tang, Yong Tang:
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96 - [c41]Gansen Zhao, Chunming Rong
, Jin Li, Feng Zhang, Yong Tang:
Trusted Data Sharing over Untrusted Cloud Storage Providers. CloudCom 2010: 97-103 - [c40]Baodong Jia, Tomasz Wiktor Wlodarczyk, Chunming Rong
:
Performance Considerations of Data Acquisition in Hadoop System. CloudCom 2010: 545-549 - [c39]Rui Máximo Esteves, Chunming Rong
:
Social Impact of Privacy in Cloud Computing. CloudCom 2010: 593-596 - [c38]Tomasz Wiktor Wlodarczyk, Chunming Rong
:
On the Sustainability Impacts of Cloud-Enabled Cyber Physical Space. CloudCom 2010: 597-602 - [c37]Gansen Zhao, Chunming Rong
, Martin Gilje Jaatun
, Frode Eika Sandnes
:
Deployment models: Towards eliminating security concerns from cloud computing. HPCS 2010: 189-195 - [c36]Tomasz Wiktor Wlodarczyk, Chunming Rong
, Csongor Nyulas, Mark A. Musen
:
An efficient approach to intelligent real-time monitoring using ontologies and Hadoop. HPCS 2010: 209-215 - [c35]Tomasz Wiktor Wlodarczyk, Martin J. O'Connor, Chunming Rong, Mark A. Musen:
SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language. URSW 2010: 97-100 - [c34]Tomasz Wiktor Wlodarczyk, Chunming Rong
, Baodong Jia, Laurentiu Cocanu, Csongor Nyulas, Mark A. Musen
:
DataStorm. SERVICES 2010: 123-127 - [e4]Tai-Hoon Kim, Alan Chin-Chen Chang, Mingchu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2 [contents]
2000 – 2009
- 2009
- [j13]Son Thanh Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong
:
A shadow zone aware routing protocol for acoustic underwater sensor networks. IEEE Commun. Lett. 13(5): 366-368 (2009) - [c33]Kari Anne Haaland Thorsen, Trygve Eftestøl, Chunming Rong
, Petter Andreas Steen:
An Integrated Information Sharing Structure for Resuscitation Data. AINA Workshops 2009: 7-12 - [c32]Chunming Rong
:
An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf. CloudCom 2009: 19-23 - [c31]Erdal Cayirci, Chunming Rong
, Wim Huiskamp, Cor Verkoelen:
Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. CloudCom 2009: 57-68 - [c30]Liang Yan, Chunming Rong
, Gansen Zhao:
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. CloudCom 2009: 167-177 - [c29]Tomasz Wiktor Wlodarczyk, Chunming Rong
, Kari Anne Haaland Thorsen:
Industrial Cloud: Toward Inter-enterprise Integration. CloudCom 2009: 460-471 - [c28]Kari Anne Haaland Thorsen, Odd Frode Torbjørnse, Chunming Rong
:
Automatic Web Service Detection in Oil and Gas. FGIT-FGCN 2009: 193-200 - [c27]Rui Máximo Esteves, Tomasz Wiktor Wlodarczyk, Chunming Rong
, Einar Landre:
Bayesian Networks for Fault Detection under Lack of Historical Data. ISPAN 2009: 732-736 - [c26]Erdal Cayirci, Son Thanh Nguyen, Chunming Rong
:
Secure many to many routing for wireless sensor and actuator networks. SIN 2009: 172-178 - [e3]Martin Gilje Jaatun, Gansen Zhao, Chunming Rong:
Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings. Lecture Notes in Computer Science 5931, Springer 2009, ISBN 978-3-642-10664-4 [contents] - 2008
- [j12]Kari Anne Haaland Thorsen, Chunming Rong:
On Ubiquitous Integrated Computing. Int. J. Comput. Sci. Appl. 5(3): 46-55 (2008) - [j11]George O. M. Yee, Chunming Rong
, Laurence Tianruo Yang:
Guest Editors' Introduction. J. Comput. Secur. 16(3): 261-264 (2008) - [j10]Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong
:
Protection against unauthorized access and computer crime in Norwegian enterprises. J. Comput. Secur. 16(3): 341-366 (2008) - [c25]Yi Wang, Furong Wang, Chunming Rong
, Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. AINA Workshops 2008: 639-643 - [c24]Furong Wang, Chen Huang, Jing Zhao, Chunming Rong
:
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. AINA 2008: 978-984 - [c23]Kari Anne Haaland Thorsen, Chunming Rong:
Data Integration in Oil and Gas at Norwegian Continental Shelf. AINA Workshops 2008: 1597-1602 - [c22]Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong
:
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. ATC 2008: 134-148 - [c21]Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong
:
Di-GAFR: Directed Greedy Adaptive Face-Based Routing. ATC 2008: 555-566 - [c20]Kui Xu, Fan Zhang, Chunming Rong
, Bin Dai, Benxiong Huang:
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. FGCN (1) 2008: 321-324 - [c19]Xin Yu, Chunming Rong
, Benxiong Huang:
A Flexible Garbage Collect Algorithm for Flash Storage Management. FGCN (1) 2008: 354-357 - [c18]Tomomi Kawashima, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Chunming Rong
:
A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space. ICESS 2008: 229-236 - [c17]Liang Yan, Chunming Rong
:
RFID System Security Using Identity-Based Cryptography. UIC 2008: 482-489 - [c16]Kari Anne Haaland Thorsen, Chunming Rong
:
Towards Dataintegration from WITSML to ISO 15926. UIC 2008: 626-635 - [e2]Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma:
Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5060, Springer 2008, ISBN 978-3-540-69294-2 [contents] - [e1]Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang, Jianhua Ma:
Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5061, Springer 2008, ISBN 978-3-540-69292-8 [contents] - 2007
- [c15]Chunming Rong
, Won-Chol Kim:
Effective Storage Security in Incompletely Trusted Environment. AINA Workshops (1) 2007: 432-437 - [c14]Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong
:
Information Security Threats and Access Control Practices in Norwegian Businesses. AINA Workshops (1) 2007: 470-476 - [c13]Chunming Rong
, Hein Meling, Dagfinn Waage:
Towards Integrated Services for Health Monitoring. AINA Workshops (2) 2007: 776-781 - [c12]Son Thanh Nguyen, Chunming Rong:
ZigBee Security Using Identity-Based Cryptography. ATC 2007: 3-12 - [c11]Son Thanh Nguyen, Chunming Rong:
Electronic Payment Scheme Using Identity-Based Cryptography. EuroPKI 2007: 330-337 - 2006
- [j9]Anne Marie Hegland, Eli Winjum, Stig Fr. Mjølsnes
, Chunming Rong
, Øivind Kure, Pål Spilling:
A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials 8(1-4): 48-66 (2006) - [c10]Anne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong
, Øivind Kure:
Analysis of IBS for MANET Security in Emergency and Rescue Operations. AINA (2) 2006: 155-159 - [c9]Christian Veigner, Chunming Rong:
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ATC 2006: 521-530 - [c8]Peng Jiang, Geng Yang, Chunming Rong
:
Combined Method for Nonlinear Systems of Equations. International Conference on Computational Science (4) 2006: 693-699 - [c7]Peng Jiang, Geng Yang, Chunming Rong
:
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. International Conference on Computational Science (1) 2006: 794-797 - [c6]Christian Veigner, Chunming Rong:
On Use of Identity-Based Encryption for Secure Emailing. SECRYPT 2006: 289-296 - [c5]Kari Anne Haaland, Chunming Rong:
Securing Web Services Using Identity-Based Encryption (IBE). SECRYPT 2006: 413-418 - 2005
- [c4]Christian Veigner, Chunming Rong:
Flooding attack on the binding cache in mobile IPv6. ICETE 2005: 36-43 - [c3]Christian Veigner, Chunming Rong
:
Flooding Attack on the Binding Cache in Mobile IPv6. ICETE (Selected Papers) 2005: 187-200 - [c2]Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
:
A Scalable Security Architecture for Grid. PDCAT 2005: 89-93 - 2003
- [j8]Chunming Rong:
On Probabilistic Scheme for Encryption Using Nonlinear Codes Mapped from ℤ4 Linear Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(9): 2248-2250 (2003) - [j7]Stig Fr. Mjølsnes, Chunming Rong:
On-Line E-Wallet System with Decentralized Credential Keepers. Mob. Networks Appl. 8(1): 87-99 (2003) - [c1]Geng Yang, Chunming Rong
, Yunping Dai:
A Distributed Honeypot System for Grid Security. GCC (1) 2003: 1083-1086 - 2001
- [j6]Tor Helleseth, Chunming Rong
, Kyeongcheol Yang:
New 3-designs from Goethals codes over Z4. Discret. Math. 226(1-3): 403-409 (2001) - [j5]Tor Helleseth, Chunming Rong
, Kyeongcheol Yang:
On t-designs from codes over Z4. Discret. Math. 238(1-3): 67-80 (2001)
1990 – 1999
- 1999
- [j4]Iwan M. Duursma, Tor Helleseth, Chunming Rong
, Kyeongcheol Yang:
Split Weight Enumerators for the Preparata Codes with Applications to Designs. Des. Codes Cryptogr. 18(1/3): 103-124 (1999) - [j3]Tor Helleseth, Chunming Rong
, Kyeongcheol Yang:
New infinite families of 3-designs from preparata codes over Z4. Discret. Math. 195(1-3): 139-156 (1999) - [j2]Tor Helleseth, Chunming Rong
, Daniel Sandberg:
New Families of Almost Perfect Nonlinear Power Mappings. IEEE Trans. Inf. Theory 45(2): 475-485 (1999) - [j1]Chunming Rong
, Tor Helleseth, Jyrki T. Lahtonen:
On algebraic decoding of the Z4-linear Calderbank-McGuire code. IEEE Trans. Inf. Theory 45(5): 1423-1434 (1999)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint