References(48)
[1]
Y. Zou, D. Yu, L. Wu, J. Yu, Y. Wu, Q. Hua, and F. C. M. Lau, Fast distributed backbone construction despite strong adversarial jamming, presented at the IEEE INFOCOM 2019 - IEEE Conf. on Computer Communications, Paris, France, 2019.
[2]
D. Yu, Y. Zou, J. Yu, Y. Zhang, F. Li, X. Cheng, F. Dressler, and F. C. M. Lau, Implementing abstract MAC layer in dynamic networks, IEEE Transactions on Mobile Computing, vol. 20, no. 5, pp. 1832-1845, 2020.
[3]
F. Kuhn, N. Lynch, and C. Newport, The abstract MAC layer, Distributed Computing, vol. 24, nos. 3 & 4, pp. 187-206, 2011.
[4]
C. Newport, Consensus with an abstract MAC layer, in Proc. of the 2014 ACM symposium on Principles of distributed computing, Paris, France, 2014, pp. 66-75.
[5]
M. Ghaffari, E. Kantor, N. Lynch, and C. Newport, Multimessage broadcast with abstract mac layers and unreliable links, in Proc. of the 2014 ACM symposium on Principles of distributed computing, New York, NY, USA, 2014, pp. 56-65.
[6]
M. M. Halldórsson, S. Holzer, and N. Lynch, A local broadcast layer for the SINR network model, in Proc. of the 2015 ACM Symposium on Principles of Distributed Computing, Donostia-San Sebastián, Spain, 2015, pp. 129-138.
[7]
M. Khabbazian, D. R. Kowalski, F. Kuhn, and N. Lynch, Decomposing broadcast algorithms using abstract MAC layers, in Proc. of the 6th International Workshop on Foundations of Mobile Computing, Cambridge, MA, USA, pp. 13-22.
[8]
D. Yu, Y. Zou, M. Xu, Y. Xu, Y. Zhang, B. Gong, and X. Xing, Competitive age of information in dynamic IoT networks, IEEE Internet of Things Journal, p.1, 2020.
[9]
D. Yu, Y. Zou, Y. Zhang, F. Li, J. Yu, Y. Wu, X. Cheng, and F. C. M. Lau, Distributed dominating set and connected dominating set construction in the dynamic SINR model, presented at the 2019 IEEE International Parallel and Distributed Processing Symposium, Rio de Janeiro, Brazil, 2019.
[10]
J. Li, M. Siddula, X. Cheng, W. Cheng, Z. Tian, and Y. Li, Approximate data aggregation in sensor equipped IoT networks, Tsinghua Science and Technology, vol. 25, no. 1, pp. 44-55, 2020.
[11]
Z. Cai, Q. Chen, L. Cheng, and H. Gao, Latency-and-Coverage aware data aggregation scheduling for multihop battery-free wireless networks, IEEE Transactions on Mobile Computing, .
[12]
Q. Chen, Z. Cai, L. Cheng, and H. Gao, Structure-free general data aggregation scheduling for multihop battery-free wireless networks, IEEE Transactions on Mobile Computing, .
[13]
Z. Cai and T. Shi, Distributed query processing in the edge assisted IoT data monitoring system, IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12679-12693, 2020.
[14]
Z. He, Z. Cai, S. Cheng, and X. Wang, Approximate aggregation for tracking quantiles and range countings in wireless sensor networks, Theoretical Compute Science, vol. 607, no. 3, pp. 381-390, 2015.
[15]
C. Wang, C. Wang, Z. Wang, X. Ye, and P. S. Yu, Edge2vec: Edge-based social network embedding, ACM Transactions on Knowledge Discovery from Data, vol. 14, no. 4, pp. 1-24, 2020.
[16]
C. Wang, C. Wang, Z. Wang, X. Ye, J. X. Yu, and B. Wang, DeepDirect: Learning directions of social ties with edge-based network embedding, IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 12, pp. 2277-2291, 2019.
[17]
J. Yang, C. Ma, J. Man, H. Xu, G. Zheng, and H. Song, Cache-enabled in cooperative cognitive radio networks for transmission performance, Tsinghua Science and Technology, vol. 25, no. 1, pp. 1-11, 2020.
[18]
Z. Cai and Z. He, Trading private range counting over big IoT data, presented at the 2019 IEEE 39th International Conference on Distributed Computing Systems, Dallas, TX, USA, 2019.
[19]
D. Yu, L. Zhang, Q. Luo, X. Cheng, J. Yu, and Z. Cai, Fast skyline community search in multi-valued networks, Big Data Mining and Analytics, vol. 3, no. 3, pp. 171-180, 2020.
[20]
M. Shi, Y. Tang, X. Zhang, Y. Zhang, and J. Xu, Modeling and simulation of packet delivery rate in LTEV network based on Markov chain, Tsinghua Science and Technology, vol. 25, no. 3, pp. 357-367, 2020.
[21]
J. Li, Y. Zhang, M. Shi, Q. Liu, and Y. Chen, Collision avoidance strategy supported by LTE-V-based vehicle automation and communication systems for car following, Tsinghua Science and Technology, vol. 25, no. 1, pp. 127-139, 2020.
[22]
J. Li, A. M. V. V. Sai, X. Cheng, W. Cheng, Z. Tian, and Y. Li, Sampling-based approximate skyline query in sensor equipped IoT networks, Tsinghua Science and Technology, vol. 26, no. 2, pp. 219-229, 2021.
[23]
Z. Hu, D. Li, and D. Guo, Balance resource allocation for spark jobs based on prediction of the optimal resource, Tsinghua Science and Technology, vol. 25, no. 4, pp. 487-497, 2020.
[24]
X. Fan, M. Dai, C. Liu, F. Wu, X. Yan, Y. Feng, Y. Feng, and B. Su, Effect of image noise on the classification of skin lesions using deep convolutional neural networks, Tsinghua Science and Technology, vol. 25, no. 3, pp. 425-434, 2020.
[25]
Q. Hou, M. Han, and Z. Cai, Survey on data analysis in social media: A practical application aspect, Big Data Mining and Analytics, vol. 3, no. 4, pp. 259-279, 2020.
[26]
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, Performance of IEEE 802.11 under jamming, Mobile Networks and Applications, vol. 18, no. 5, pp. 678-696, 2013.
[27]
A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Competitive and fair medium access despite reactive jamming, presented at the 2011 31st International Conference on Distributed Computing Systems, Minneapolis, MN, USA, 2011.
[28]
A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Selfstabilizing leader election for single-hop wireless networks despite jamming, in Proc. of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France, 2011, pp. 1-10.
[29]
A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Competitive throughput in multi-hop wireless networks despite adaptive jamming, Distributed Computing, vol. 26, no. 3, pp. 159-171, 2013.
[30]
G. Alnifie and R. Simon, A multi-channel defense against jamming attacks in wireless sensor networks, in Proc. of the 3rd ACM workshop on QoS and security for wireless and mobile networks, Chania Crete Island, Greece, 2007, pp. 95-104.
[31]
J. Chiang and Y. C. Hu, Cross-layer jamming detection and mitigation in wireless broadcast networks, IEEE/ACM Transactions on Networking, vol. 19, no. 1, pp. 286-298, 2011.
[32]
X. Liu, G. Noubir, R. Sundaram, and S. Tan, Spread: Foiling smart jammers using multi-layer agility, presented at the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007.
[33]
V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, Using channel hopping to increase 802.11 resilience to jamming attacks, presented at the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007.
[34]
M. K. Simon, J. K. Omura, R. A. Schultz, and B.K. Levin, Spread Spectrum Communications Handbook. New York, NY, USA: McGraw-Hill Companies, Inc., 1994.
[35]
A. D. Wood, J. A. Stankovic, and G. Zhou, DEEJAM: Defeating energyefficient jamming in IEEE 802.15.4-based wireless networks, presented at the 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, USA, 2007.
[36]
W. Xu, T. Wood, and Y. Zhang, Channel surfing and spatial retreats: Defenses against wireless denial of service, in Proc. of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 80-89.
[37]
B. Awerbuch, A. Richa, and C. Scheideler, A jamming-resistant mac protocol for single-hop wireless networks, in Proc. of the twenty-seventh ACM symposium on Principles of distributed computing, Toronto, Canada, 2008, pp. 45-54.
[38]
A. Richa, C. Scheideler, S. Schmid, and J. Zhang, A jamming-resistant mac protocol for multi-hop wireless networks, in Proc. of the 24th International Conference on Distributed Computing, Cambridge, MA, USA, 2010, pp. 179-193.
[39]
A. Ogierman, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang. Competitive MAC under adversarial SINR, presented at the IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, Canada, 2014.
[40]
A. Ogierman, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, Sade: Competitive MAC under adversarial SINR, Distributed Computing, vol. 31, no. 3, pp. 241-254, 2018.
[41]
F. Kuhn, N. Lynch, and C. Newport, The abstract MAC layer, Distributed Computing, vol. 24, nos. 3&4, pp. 187-206, 2011.
[42]
S. Daum, S. Gilbert, F. Kuhn, and C. Newport, Broadcast in the Ad Hoc SINR model, in Proc. of the 27th International Symposium on Distributed Computing, Jerusalem, Israel, 2013, pp. 358-372.
[43]
M. Khabbazian, F. Kuhn, D. R. Kowalski, and N. Lynch, Decomposing broadcast algorithms using abstract MAC layers, Ad Hoc Networks, vol. 12, pp. 219-242, 2014.
[44]
M. Khabbazian, F. Kuhn, N. Lynch, M. Médard, and A. ParandehGheibi, MAC design for analog network coding, in Proc. of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing, San Jose, CA, USA, 2011, pp. 42-51.
[45]
D. Yu, Y. Zhang, Y. Huang, H. Jin, J. Yu, and Q. S. Hua, Exact implementation of abstract MAC layer via carrier sensing, presented at the IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, HI, USA, 2018.
[46]
Y. Zou, M. Xu, H. Sheng, X. Xing, Y. Xu, and Y. Zhang, Crowd density computation and diffusi on via Internet of Things, IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8111-8121, 2020.
[47]
D. Yu, Y. Zou, J. Yu, X. Cheng, Q. S. Hua, H. Jin, and F. C. M. Lau, Stable local broadcast in multihop wireless networks under SINR, IEEE/ACM Transactions on Networking, vol. 26, no. 3, pp. 1278-1291, 2018.
[48]
D. Yu, L. Ning, Y. Zou, J. Yu, X. Cheng, and F. C. M. Lau, Distributed spanner construction with physical interference: Constant stretch and linear sparseness, IEEE/ACM Transactions on Networking, vol. 25, no. 4, pp. 2138-2151, 2017.