Browsing byAuthorYang, LT

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 20
Issue DateTitleAuthor(s)
2010-11-19Accuracy enhancement for license plate recognitionZheng, L; He, X; Samali, B; Yang, LT
2018-09-04Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheelsBhoi, SK; Puthal, D; Khilar, PM; Rodrigues, JJPC; Panda, SK; Yang, LT
2013-03-01An algorithm for accuracy enhancement of license plate recognitionZheng, L; He, X; Samali, B; Yang, LT
2020-01-01An Open Identity Authentication Scheme Based on BlockchainChen, Y; Dong, G; Hao, Y; Zhang, Z; Peng, H; Yu, S; Wen, S; Zomaya, A; Yang, LT
2019-02-01Analytical Model for Sybil Attack Phases in Internet of ThingsMishra, AK; Tripathy, AK; Puthal, D; Yang, LT
2018-09-01Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile ServicesWang, W; Xu, P; Yang, LT; Chen, J
2011-01Connceptualization of a Context Aware Cloud Adaptation (CACA) FrameworkGill, AQ; Bunker, D; Chen, J; Dou, W; Liu, J; Yang, LT; Ma, J
2020-04-01Energy Management for Cyber-Physical Cloud SystemsKumar, N; Vasilakos, AV; Choo, KKR; Yang, LT
2022-07-01Guest Editorial: Trust, Security and Privacy of 6GYan, Z; Yang, LT; Li, T; Miche, Y; Yu, S; Yau, SS
2018-04-01A Holistic Approach for Distributed Dimensionality Reduction of Big DataKuang, L; Yang, LT; Chen, J; Hao, F; Luo, C
2020-04-01HostWatcher: Protecting hosts in cloud data centers through software-defined networkingYuan, B; Zou, D; Jin, H; Yu, S; Yang, LT
2017-05-01Message from GreenCom 2016 Steering CommitteeYang, LT; Wu, J; Ma, J; Chen, J; Honggang, Z
2020-10-01Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource ManagementYuan, B; Zhao, H; Lin, C; Zou, D; Yang, LT; Jin, H; He, L; Yu, S
2018-06-01A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined NetworksYuan, B; Jin, H; Zou, D; Yang, LT; Yu, S
2018-09-01Response time optimization for cloudlets in Mobile Edge ComputingTiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT
2019-03-20S2R: Service trading based response time optimization in mobile edge computingMishra, P; Tiwary, M; Yang, LT; Puthal, D
2016-01-01A Secure Big Data Stream Analytics Framework for Disaster Management on the CloudPuthal, D; Nepal, S; Ranjan, R; Chen, J; Chen, J; Yang, LT
2017-01-01Securely reinforcing synchronization for embedded online contestsWang, W; Xu, P; Yang, LT; Susilo, W; Chen, J
2020-08-01Security, Trust and Privacy in Cyber (STPCyber): Future trends and challengesNanda, P; He, X; Yang, LT
2019-07-01Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social NetworksFu, C; Liu, XY; Yang, J; Yang, LT; Yu, S; Zhu, T