Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NANA
NANA 2020
Generate Citations
2020 International Conference on Networking and Network Applications (NaNA)
Dec. 10 2020 to Dec. 13 2020
Haikou City, China
ISBN: 978-1-7281-8954-3
Table of Contents
2020 International Conference on Networking and Network Applications
Freely available from IEEE.
pp. 1-1
2020 International Conference on Networking and Network Applications
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xvi
Greeting Message from General Conference Chairs
Freely available from IEEE.
pp. 1-1
Committees
Freely available from IEEE.
pp. xviii-xix
Edge-Centric Intelligent Computing: Intelligence, Privacy and Applications
Freely available from IEEE.
pp. xx-xx
by
Xiangyang Li
Data-Driven Security Analysis of Machine Learning Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. xxi-xxi
by
Chao Shen
Private and Fast Routing in Credit Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jianwei Long
,
Chi Zhang
,
Chenyu Li
,
Lingbo Wei
,
Qibin Sun
,
Xia Zhang
CARA-BAN: Clone Attack Resistant Authentication Scheme in Body Area Networks Using Channel Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-15
by
Mubarak Umar
,
Xuening Liao
,
Bello Ahmad Muhammad
,
Hafsa Kabir Ahmad
Physical Layer Authentication Utilizing Carrier Frequency Offset in Dynamic MIMO Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Yangyang Liu
,
Pinchang Zhang
Incremental-Compensation based Robust Topology Control for Micro/Nano Satellite Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
by
Yuyu Hu
,
Zhao Li
,
Jingling Li
,
Zhixian Chang
,
Yang Xu
,
Jia Liu
On Eavesdropping Region Characterization in Hybrid Wireless Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Qianyue Qu
,
Yuanyu Zhang
,
Shoji Kasahara
Improve IoT Streaming QoS by Determining the Message Propotion in CoAP
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Ru Yang
,
Sungwon Lee
,
Junho Seo
,
Murad Khan
,
Dongkyun Kim
Design of A Time Synchronization Mechanism for Underwater Acoustic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Jian-Ping Wang
,
Cui-Ling Jiao
On CPRI based Front-hauling over Residential Power Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Mai Hassan
,
Syed Hassan Raza Naqvi
,
Pin-Han Ho
Deep Learning as a Service Based on Encrypted Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Xinhong Hei
,
Xiaolong Liang
,
Yichuan Wang
,
Wenjiang Ji
,
Lei Zhu
Traffic Flow Modeling for UAV-Enabled Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Abderrahmane Abada
,
Bin Yang
,
Tarik Taleb
Online Placing and Pricing for Cloud Container Clusters: An Auction Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-72
by
Renli Zhang
,
Ruiting Zhou
CPWF: Cross-Platform Website Fingerprinting Based on Multi-Similarity Loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
by
Shihao Wang
,
Liangmin Wang
,
Shangnan Yin
,
Hui Zhao
,
Hao Shentu
Differential Privacy Preserving Naive Bayes Classification via Wavelet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-85
by
Wenru Tang
,
Yihui Zhou
,
Mingshuang Li
,
Laifeng Lu
K-modes Based Categorical Data Clustering Algorithms Satisfying Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Mingshuang Li
,
Yihui Zhou
,
Wenru Tang
,
LaiFeng Lu
Time Constrained Emergency Data Backup and Service Migration in Cloud Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-95
by
Lisheng Ma
,
Bin Yang
Intra-Datacenter Bandwidth Resource Allocation for Bursty Large-Scale Traffic in Polled OLT
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-101
by
Guochun Li
,
Binbin Ye
,
Rentao Gu
,
Qize Guo
,
Zhiyun Gu
Adaptive Meek Technology for Anti-Traffic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Haoyao Xie
,
Liangmin Wang
,
Shangnan Yin
,
Hui Zhao
,
Hao Shentu
Energy-saving Hybrid Network Integrating WSNs and Crowd Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Xiao-Xia Song
,
Wen-Mei Nie
,
Hong-Ying Liu
,
Yong Li
Research on SDN intrusion detection based on online ensemble learning algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Zhang Lin
,
Du Hongle
On security of UAV integrated system with network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-123
by
Yanbo Yang
,
Yongxing Du
,
Jiawei Zhang
,
Liyong Zhou
,
Weijian Hu
,
Lingfang Li
On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-129
by
Guozhu Zhao
,
Pinchang Zhang
,
Xiaohong Jiang
Rational Delegation Learning Outsourcing Scheme Based on Game Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-135
by
Kang Xiang
,
Youliang Tian
,
Sheng Gao
,
Changgen Peng
,
Weijie Tan
A Conceptual Framework for Detecting Learning Style in an Online Education Using Graph Representation Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-140
by
Bello Ahmad Muhammad
,
Zhenqiang Wu
,
Hafsa Kabir Ahmad
Pulse-detecting Approach with Adjustable PRIs Using Interferences Blanking in TACAN System
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-146
by
Di Zhao
,
Jichao Jiao
,
Weijie Tan
Adaptive Beamforming Planning for Multicast mmWave Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
Xiaoxiao Liu
,
Haoran Mei
,
Limei Peng
Concentration-Shifting-based Modulation Scheme for Molecular Communication System with a Mobile Transmitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-156
by
Zhen Jia
,
Xuening Liao
,
Xialei Zhang
Protection method of continuous location uploading based on local differential privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
Wang Xiongjian
,
Yang Weidong
On Jamming Power Optimization for Secure and QoS-Aware Routing in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-166
by
Yang Xu
,
Kehan Yang
,
Yu Wang
,
Zhao Li
,
Tao Zhang
,
Jia Liu
A Unified Trust Service Scheme for Heterogeneous Identity Alliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-173
by
Guishan Dong
,
Yuxiang Chen
,
Yao Hao
,
Bai Jian
,
Zhaolei Zhang
,
Liao Sijie
Study on Learner's Facial Expression Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Lei Yang
,
Chao Qi
Message Delivery Probability of 3D MANETs Under Erasure Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Wu Wang
,
Bin Yang
,
Shikai Shen
,
Guoxing Shi
,
Yuejuan Liu
A Blockchain based model for Curbing Doctors Shopping and Ensuring Provenance Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-192
by
Shekha Chenthara
,
Hua Wang
,
Khandakar Ahmed
,
Frank Whittaker
,
Ke Ji
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Shuangrui Zhao
,
Jia Liu
,
Yulong Shen
,
Xiaohong Jiang
UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain Access
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-205
by
Farooq Ahmed
,
Xudong Li
,
Yukun Niu
,
Chi Zhang
,
Lingbo Wei
,
Chengjie Gu
B-SDN: A Novel Blockchain-based Software Defined Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-212
by
Wei Tong
,
Wensheng Tian
,
Xuewen Dong
,
Lingxiao Yang
,
Shiyang Ma
,
Hua Lu
Nesterov Accelerated Gradient-based Algorithm for the Allocation Problem of NFV Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-220
by
Zhonghui Wu
,
Xingyan Chen
,
Changqiao Xu
,
Shujie Yang
Secure Spatial Query Scheme with Access Pattern Obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Qing Ren
,
Feng Tian
,
Laifeng Lu
Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-232
by
Cong Gao
,
Yanping Chen
,
Zhongmin Wang
,
Hong Xia
,
Ning Lv
Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-240
by
Jiaxing Guo
,
Siqi Lu
,
Chunxiang Gu
,
Xi Chen
,
Fushan Wei
VPN Traffic Classification Based on Payload Length Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-247
by
Ping Gao
,
Guangsong Li
,
Yanan Shi
,
Yang Wang
Simulated Annealing Algorithm Based Temperature-Aware Routing Scheme for Intrabody Nanonetworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Shumaila Javaid
,
Zhenqiang Wu
,
Hamza Fahim
,
Farhana Javed
Evolutionary dynamics games based on edge diversity in complex networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-258
by
Jiawang Chen
,
Bo Liu
,
Mubarak Umar
Secure Off-chain Payment in Consortium Blockchain System
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Lingxiao Yang
,
Xuewen Dong
,
Wei Tong
,
Shiyang Ma
,
Hui Qiao
,
Siyu Xing
QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Jun Li
,
Ming Chen
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Mungwarakarama Irenee
,
Xinhong Hei
,
Yichuan Wang
,
Wenjiang Ji
,
Xinyu Jiang
An Invocation Chain Test and Evaluation Method Based on Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Yue Zhao
,
Yarang Yang
,
Bo Tian
,
Tianle Zhang
Adversarial Examples Detection Using Random Projections of Residuals
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Kaijun Wu
,
Anjie Peng
,
Yao Hao
,
Qi Zhao
Optimal Asynchronous FHMA System with Generalized Orthogonal Hopping Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Bo Tian
,
Kaijun Wu
,
Yao Hao
,
Xue Wang
,
Hao Zhang
,
Dongyu Yang
A Framework for Audit Analysis of Heterogeneous Logs from PaaS
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Yanning Du
,
Yichuan Wang
,
Lei Zhu
,
Wenjiang Ji
,
Xin Song
,
Yida Yang
,
Long Pan
Emotion-Related Rich-Club Organization in Dynamic Brain Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Zhongmin Wang
,
Rui Zhou
Fault Diagnosis and Location based on Graph Neural Network in Telecom Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Jiajin He
,
Hui Zhao
Evaluation of Random Forest for Complex Human Activity Recognition Using Wearable Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Aiguo Wang
,
Huihui Chen
,
Chundi Zheng
,
Liang Zhao
,
Jinjun Liu
,
Lulu Wang
MagNet with Randomization Defense against Adversarial Examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-320
by
Fangwei Wang
,
Guofang Chai
,
Qingru Li
,
Changguang Wang
An Adaptive Model Update Object Tracking Algorithm based on DenseNet Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Sugang Ma
,
Lei Zhang
,
Lei Pu
,
Xiaobao Yang
,
Zhiqiang Hou
k
-Anonymity Based Location Data Query Privacy Protection Method in Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-334
by
Hongtao Li
,
Lingxia Gong
,
Bo Wang
,
Feng Guo
,
Jie Wang
,
Tao Zhang
Crowdsourcing Answer Integration Algorithm For Big Data Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-341
by
Hong Xia
,
YongKang Zhang
,
Han Wang
,
YanPing Chen
,
ZhongMin Wang
TMPTCP: A Lightweight Trust Extension for Multipath-TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Boyang Wu
,
Hewu Li
,
Qian Wu
,
Zhou Jiang
,
Jun Liu
Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-354
by
Xindi Ma
,
Junying Zhang
,
Jianfeng Ma
,
Qi Jiang
,
Sheng Gao
,
Kang Xie
A Study of Learned KD Tree Based on Learned Index
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Peng Yongxin
,
Zhou Wei
,
Zhang Lin
,
Du Hongle
High capacity reversible data hiding algorithm based on central prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-367
by
Fang Ren
,
Feiyuan Xue
,
Xuemei Yao
Android Malware Detection Based on Call Graph via Graph Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-374
by
Pengbin Feng
,
Jianfeng Ma
,
Teng Li
,
Xindi Ma
,
Ning Xi
,
Di Lu
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-380
by
Yan Liu
,
Ruizhong Du
JSTIFuzz: Type-Inference-based JavaScript Engine Fuzzing
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-387
by
Yuli Wang
,
Xiaoqing Gong
,
Hao Chen
,
Jing Li
,
Baoying Liu
,
Shuai Cao
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Kun Niu
,
Changgen Peng
,
Youliang Tian
,
Weijie Tan
Experimental Security Analysis of SDN Network by Using Packet Sniffing and Spoofing Technique on POX and Ryu Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-399
by
Yubaraj Gautam
,
Bishnu Prasad Gautam
,
Kazuhiko Sato
A Conceptual Framework for Top- N Recommendation Using Attributed Bipartite Graph Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
by
Hafsa Kabir Ahmad
,
Zhenqiang Wu
,
Bello Ahmad Muhammad
Predict Onset Age of Hypertension Using CatBoost and Medical Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-409
by
Huanhuan Zhao
,
Zuchang Ma
,
Yining Sun
Online Teaching Gestures Recognition Model Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-416
by
Yuying Gu
,
Jingxyan Hu
,
Yihui Zhou
,
Laifeng Lu
Dynamic Action Recognition Under Simulated Prosthetic Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Ying Zhao
,
Dantong Xu
,
Tie Wang
,
Yanchun Ren
Body Part Localization and Pose Tracking by Using Deepercut Algorithm for King Cobra's BBL (Biting Behavior Learning)
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-429
by
Bishnu Prasad Gautam
,
Yusuke Noda
,
Ramji Gautam
,
Hari Prasad Sharma
,
Kazuhiko Sato
,
Sangam B. Neupane
Searchable encryption scheme with limited search scope for group users
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-435
by
HaiYang Peng
,
GuiShan Dong
,
Hao Yao
,
Yue Zhao
,
YuXiang Chen
A study on exercise recommendation method using Knowledge Graph for computer network course
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-442
by
Lei Zhu
,
Yaolin Liu
,
Xinhong Hei
,
Yichuan Wang
,
Haining Meng
,
Jiuyuan Jiao
,
Long Pan
A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal Correlation
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-447
by
Yiqing Diao
,
Ayong Ye
,
Baorong Cheng
,
Jiaomei Zhang
,
Qiang Zhang
Design of Educational Resources-oriented Fair Recommendation System Based on Consortium Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-453
by
Tingting Zhao
,
Guo Sun
,
Xia Feng
,
Liangmin Wang
A Fault Diagnosis Model of Pumping Unit Based on BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-458
by
Liumei Zhang
,
Qiuyuan Du
,
Tianshi Liu
,
Jiao Li
A PUF-based Scheme for Identify Trusted Mobile Phone Accessories
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Liang Li
,
Zhao Huang
,
Yin Chen
,
Maofan Du
,
Quan Wang
,
Jinhui Liu
Resilient Data Retrieval in Vehicular Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Zihan Wu
,
Shunrong Jiang
,
Liangmin Wang
Author Index
Freely available from IEEE.
pp. 1-4
Showing 86 out of 86