Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NANA
NANA 2021
Generate Citations
2021 International Conference on Networking and Network Applications (NaNA)
Oct. 29 2021 to Nov. 1 2021
Lijiang City, China
ISBN: 978-1-6654-4158-2
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 3-3
Copyright
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-18
Message from the General Conference Chairs
Freely available from IEEE.
pp. 19-19
Committees
Freely available from IEEE.
pp. 20-21
Reviewers
Freely available from IEEE.
pp. 22-25
Keynotes
Freely available from IEEE.
pp. 26-29
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Wendi Sun
,
Xiaoying Liu
,
Kechen Zheng
,
Yang Xu
,
Jia Liu
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-14
by
Yuanyu Zhang
,
Ji He
,
Qianyue Qu
,
Zhiwei Zhang
Covert Communication in D2D Underlaying Cellular Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Ranran Sun
,
Bin Yang
,
Shenghui Zhao
Calibrating Privacy Budgets for Locally Private Graph Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-29
by
Wentao Du
,
Xinyu Ma
,
Wenxiang Dong
,
Dong Zhang
,
Chi Zhang
,
Qibin Sun
Physical Layer Authentication Using MmWave Channel State Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
Yangyang Liu
,
Pinchang Zhang
,
Xufei Li
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-40
by
Yanwen Liu
,
Wei Su
,
Lizhuang Tan
Covert Authentication at the Physical Layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Xufei Li
,
Shuiguang Zeng
,
YangYang Liu
Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-51
by
Shiyi Zou
,
Lingge Jiang
,
Pingping Ji
,
Chen He
,
Di He
,
Guorong Zhang
Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-58
by
Ze Yang
,
Youliang Tian
Energy-efficient UAV Trajectory Planning Based On Flexible Data Rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Muhammad Fawad Khan
,
Limei Peng
Covert MIMO Communication in Two-hop Relay Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
He Zhu
,
Huihui Wu
,
Xiaohong Jiang
Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Cheng Zhang
,
Xuening Liao
,
Zhenqiang Wu
,
Guoyong Qiu
Privacy-Preserving Federated Generative Adversarial Network for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Hui Wang
,
Yani Han
,
Shaojing Yang
,
Anxiao Song
,
Tao Zhang
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-87
by
Mubarak Umar
,
Xuening Liao
,
Jiawang Chen
Random verifiable multi-server searchable encryption scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-93
by
Yu He
,
Youliang Tian
,
Hua Xu
Detecting Http Flooding Attacks Based on Uniform Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Dalia Nashat
,
S. Khairy
Privacy-Preserving Proximity Detection Framework for Location-Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Chen Yang
,
Zhen Jia
,
Shundong Li
Comparative study of symmetric cryptographic algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Alibek Nurgaliyev
,
Hua Wang
Research on PDCCH Channel in 5G NR System
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Liang Tianyi
,
Zhu Huijie
Exact Evaluation of Total Variation Distance in Covert Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Ahmed Salem
,
Huihui Wu
,
Xiaohong Jiang
A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-442
by
Jiahui Sun
,
Ningchun Liu
,
Shuai Gao
,
Wei Su
Privacy protection scheme for edge computing based on function encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-135
by
Yuanhang He
,
Lei Chen
,
Yi Ni
,
Yuyao Wang
,
Jiangtao Li
,
Yufeng Li
Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-143
by
Jingping She
,
Ne Wang
,
Ruiting Zhou
,
Chen Tian
Emergency Virtual Machine Online Migration in Cloud Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Zhonghua Xie
,
Tao Tao
,
Lisheng Ma
Energy-saving mechanism based on tidal characteristic in computing power network
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-154
by
Ran Pang
,
Hui Li
,
Yuefeng Ji
,
Guangquan Wang
,
Chang Cao
Petri net modeling and vulnerability analysis of the Heartbleed
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Yichuan Wang
,
He Wang
,
Xinhong Hei
,
Wenjiang Ji
,
Lei Zhu
A fine-grained petri model for SQL time-blind injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-167
by
Guiling Zhang
,
Yaling Zhang
,
Yichuan Wang
,
Lei Zhu
,
Wenjiang Ji
Dynamic Overhead Queue-based Efficient Service Delivery at Edge for Adaptive Live Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Zichen Feng
,
Changqiao Xu
,
Han Xiao
,
Yongpu Jia
,
Zhongyi Ding
,
Zhaoyang Liu
A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-180
by
Gaofeng Hong
,
Qili Wen
,
Wei Su
A Game Theory Perspective on IP Routing Protocols Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Pin Chen
,
Naijie Gu
Research on Data Security of Unmanned Aerial Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Yuxiang Chen
,
Yao Hao
,
Kaijun Wu
,
Zhongqiang Yi
,
Haiyang Peng
,
Liao Sijie
CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Zhongyi Ding
,
Shujie Yang
,
Zhaoyang Liu
,
Tengchao Ma
,
Zichen Feng
,
Mingze Wang
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Guozhu Zhao
,
Pinchang Zhang
,
Lisheng Ma
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Jiaqing Bai
,
Ji He
,
Xiaohong Jiang
,
Lijun Chen
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-216
by
Yue Zhao
,
Yarang Yang
,
Yiru Niu
,
Dongyu Yang
,
Bo Tian
,
Yao Hao
,
Kaijun Wu
Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-221
by
Yanchun Kong
,
Weibin Su
,
Gang Xu
Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-226
by
Mingbo Pan
,
Weibin Su
,
Yikai Wang
Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound API
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-230
by
Yanxia Tan
,
Yong Zhang
,
Yanlei Zheng
,
Yacheng Liu
,
Guangquan Wang
,
Yuefeng Ji
Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Zhi Qiao
,
Bo Liu
,
Bo Tian
,
Yu Liu
A Method for Fast Outlier Detection in High Dimensional Database Log
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
Xin Song
,
Yichuan Wang
,
Lei Zhu
,
Wenjiang Ji
,
Yanning Du
,
Feixiong Hu
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Liumei Zhang
,
Xi Deng
,
Yichuan Wang
Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic Fluid
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Wu Wang
,
Yuejuan Liu
,
Shikai Shen
Multi-domain Feature Extraction for Human Activity Recognition Using Wearable Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Aiguo Wang
,
Yue Meng
,
Jinjun Liu
,
Shenghui Zhao
,
Guilin Chen
CLSDRL:A routing optimization method for traffic feature extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-264
by
Hong Xia
,
Jianguo Li
,
Yanping Chen
,
Ning Lv
,
ZhongMin Wang
,
Qingyi Dong
A Proposal of Large Scale Network Route Optimization Technique Based on Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-271
by
Yusuke Noda
,
Bishnu P. Gautam
Fatigue Detection Technology for Online Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
JunJie Lu
,
Chao Qi
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-281
by
Xu An Wang
,
Yunxuan Su
,
Jindan Zhang
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Sugang Ma
,
Zixian Zhang
,
Lei Zhang
,
Yanping Chen
,
Xiaobao Yang
,
Lei Pu
,
Zhiqiang Hou
A Modified K-means User Grouping Design for HAP Massive MIMO Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Guorong Zhang
,
Lingge Jiang
,
Pingping Ji
,
Shiyi Zou
,
Chen He
,
Di He
A New Symmetric Information Hiding Scheme Based on Cover Randomness
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-300
by
Fang Ren
,
Mingyu Yu
,
Haiyan Xiu
,
Wei Hou
Network Traffic Oriented Malware Detection in IoT (Internet-of-Things)
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-307
by
Wang Wangwang
,
Zhang Yunchun
,
Li Chengjie
,
Sun Xuchenming
,
Zhong Yuting
,
Zhang Xin
An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Kaijun Wu
,
Wanli Dong
,
Yunfei Cao
,
Xue Wang
,
Qi Zhao
A Recommendation Scheme with Reputation-Based Incentive Mechanism on Consortium Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-318
by
Qingyi Ye
,
Tingting Zhao
,
Guo Sun
,
Xia Feng
A survey on security and privacy threats to federated learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-326
by
Junpeng Zhang
,
Mengqian Li
,
Shuiguang Zeng
,
Bin Xie
,
Dongmei Zhao
NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-333
by
Yuanqing Liu
,
Ning Xi
,
Yongbo Zhi
Research on A Vulnerability Detection Technology for Network Topology Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-337
by
Jianxin Ji
,
Chunli Xia
,
Tong Zhang
,
Yichuan Wang
,
Sheng Liu
Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-344
by
Zhang Lin
TPLI:A Traceable Privacy-preserving Logistics Information Scheme via Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Xiaoguo Lin
,
Pujie Jing
,
Chuntang Yu
,
Xia Feng
Network application vulnerability detection based on fuzzing technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Chen Chong
,
Zou Ping
An efficient authentication scheme based on Zero Trust for UAV swarm
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-360
by
Dongyu Yang
,
Yue Zhao
,
Kaijun Wu
,
Xiaoyu Guo
,
Haiyang Peng
Expression Tree-based Policy Conflict Detection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Xue Wang
,
Hao Zhang
,
Kaijun Wu
On the Robustness of Complex System With Percolation Theory Under Node Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Xiaoteng Yang
,
Wenbo Zhang
,
Bo Liu
,
Hong Su
The Trade-off Between Privacy and Utility in Local Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-378
by
Mengqian Li
,
Youliang Tian
,
Junpeng Zhang
,
Dandan Fan
,
Dongmei Zhao
Access Control Scheme Supporting Attribute Revocation in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
YaChen He
,
GuiShan Dong
,
Dong Liu
,
HaiYang Peng
,
YuXiang Chen
The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-389
by
Rui Li
,
Zilan Yang
Implementation and Analysis of Hybrid DRAM PUFs on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-394
by
Yu Zheng
,
Zhao Huang
,
Liang Li
,
Changjian Xie
,
Quan Wang
,
Zili Wu
Graph Neural Networks for Privacy-Preserving Recommendation with Secure Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-400
by
Sisong Ru
,
Bingbing Zhang
,
Yixin Jie
,
Chi Zhang
,
Lingbo Wei
,
Chengjie Gu
Exploration of Simulation Teaching Mode for Intelligent Information Network Course
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-407
by
Yue He
,
Hui Li
,
Yiming Li
,
Qiang Wu
,
Yuefeng Ji
,
Rentao Gu
,
Shaobin Fan
Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Zhihui Wang
,
Jianrui Chen
,
Peijie Wang
,
Tingting Zhu
You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Zhihao Xu
,
Kezhang Lin
,
Zhiwei Zhang
,
Wangzhe Xu
,
Kui Liu
,
Bin Wang
,
Xinghui Zhu
,
Jiadong Chen
Chinese named entity recognition method for the field of network security based on RoBERTa
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Xiaoyan Zhu
,
Yu Zhang
,
Lei Zhu
,
Xinhong Hei
,
Yichuan Wang
,
Feixiong Hu
,
Yanni Yao
Design of Binocular Stereo Vision System Via CNN-based Stereo Matching Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
Yan Jiao
,
Pin-Han Ho
Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-436
by
Chun-Jen Lin
,
Yan Luo
,
Liang-min Wang
A Fine-tuning-based Adversarial Network for Member Privacy Preserving
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-442
by
Xiangyi Lu
,
Qing Ren
,
Feng Tian
Signature Scheme Based on The SM2 Algorithm in Fabric
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-448
by
Yaling Zhang
,
Hongyun Wang
,
Yichuan Wang
,
Wenjiang Ji
,
Lei Zhu
Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-455
by
Yubaraj Gautam
,
Kazuhiko Sato
,
Bishnu Prasad Gautam
,
Norio Shiratori
UAV Deployment with Flexible Height Under SINR Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-460
by
Ke Zhao
,
Limei Peng
Cold-start Recommendation Method Based on Homomorphic Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-465
by
Tianci Zhou
,
Yong Zeng
,
Yixin Li
,
Zhongyuan Jiang
,
Zhihong Liu
,
Teng Li
Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-471
by
Lingling An
,
Zhuo Wang
,
Jiahao Yue
,
Xiaoliang Ma
Network Construction Using Overlapping Histogram under Local Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-479
by
Cuicui Niu
,
Zhengzhi Pan
,
Wuchao Shi
,
Hai Liu
AttentionAE: Autoencoder for Anomaly Detection in Attributed Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-484
by
Kenan Qin
,
Yihui Zhou
,
Bo Tian
,
Rui Wang
Construction of MDS Matrices Based on the Primitive Elements of the Finite Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-488
by
Wu You
,
Dong Xin-feng
,
Wang Jin-bo
,
Zhang Wen-zheng
Privacy-Preserving and Efficient Range Counting in IoT Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-494
by
Ruiyang Qin
,
Bowen Deng
,
Lele Zheng
,
Xutong Mu
A permission generation and configuration method based on Rules and FP-Growth algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-500
by
Lei Zhu
,
Ziheng Zhang
,
Xinhong Hei
,
Yichuan Wang
,
Ziliang Yang
,
Feixiong Hu
,
Ping He
Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-506
by
Yongchao Dang
,
Chafika Benzaïd
,
Bin Yang
,
Tarik Taleb
Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase Interferometers
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-512
by
M.–Y. You
,
B.–H. Shi
,
Y.–X. Ye
,
K. Huang
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-519
by
Xinhong Hei
,
Hao Zhang
,
Wenjiang Ji
,
Yichuan Wang
,
Lei Zhu
,
Yuan Qiu
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-526
by
Wenjiang Ji
,
Jiangcheng Yang
,
Yichuan Wang
,
Lei Zhu
,
Yuan Qiu
,
Xinhong Hei
Wet Aggregate Stability Predicting of Soil in Multiple Land-Uses Based on Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-531
by
Rui-zhi Zhai
,
De-shun Yin
,
Jian-ping Wang
,
Li-li Yuan
,
Ziheng Shangguan
Author Index
Freely available from IEEE.
pp. 533-536
Showing 98 out of 98