FakeMask: A Novel Privacy Preserving Approach for Smartphones L Zhang, Z Cai, X Wang IEEE Transactions on Network and Service Management 13 (2), 335-348, 2016 | 131 | 2016 |
Computational models and optimal control strategies for emotion contagion in the human population in emergencies X Wang, L Zhang, Y Lin, Y Zhao, X Hu Knowledge-Based Systems 109, 35-47, 2016 | 56 | 2016 |
A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks X Wang, Y Lin, Y Zhao, L Zhang, J Liang, Z Cai Peer-to-Peer Networking and Applications 10 (2), 377-394, 2017 | 48 | 2017 |
Mobility-aware routing in delay tolerant networks L Zhang, Z Cai, J Lu, X Wang Personal and Ubiquitous Computing 19 (7), 1111-1123, 2015 | 47 | 2015 |
A novel contact prediction‐based routing scheme for DTNs L Zhang, X Wang, J Lu, M Ren, Z Duan, Z Cai Transactions on Emerging Telecommunications Technologies 28 (1), e2889.1-12, 2017 | 43 | 2017 |
Spectrum-Availability Based Routing for Cognitive Sensor Networks L Zhang, Z Cai, P Li, L Wang, X Wang IEEE Access, 2017 | 41 | 2017 |
Fuzzy random multi-objective optimization based routing for wireless sensor networks J Lu, X Wang, L Zhang, X Zhao Soft Computing 18 (5), 981-994, 2014 | 39 | 2014 |
An efficient privacy preserving data aggregation approach for mobile sensing L Zhang, X Wang, J Lu, P Li, Z Cai Security and Communication Networks 9 (16), 3844-3853, 2016 | 38 | 2016 |
Research progress on attribute-based access control W Xiaoming, FU Hong, Z Lichen Acta Electronica Sinica 38 (7), 1660-1667, 2010 | 34 | 2010 |
An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks Y Lin, X Wang, F Hao, L Wang, L Zhang, R Zhao Future Generation Computer Systems 82, 220-234, 2018 | 33 | 2018 |
User social activity-based routing for cognitive radio networks J Lu, Z Cai, X Wang, L Zhang, P Li, Z He Personal and Ubiquitous Computing 22 (3), 471-487, 2018 | 25 | 2018 |
The impact of node velocity diversity on mobile opportunistic network performance Y Lin, X Wang, L Zhang, P Li, D Zhang, S Liu Journal of Network and Computer Applications 55, 47-58, 2015 | 20 | 2015 |
Social identity–aware opportunistic routing in mobile social networks R Wang, X Wang, F Hao, L Zhang, S Liu, L Wang, Y Lin Transactions on Emerging Telecommunications Technologies 29 (5), e3297, 2018 | 19 | 2018 |
Conflict-Aware Participant Recruitment for Mobile Crowdsensing L Zhang, Y Ding, X Wang, L Guo IEEE Transactions on Computational Social Systems 7 (1), 192-204, 2020 | 16 | 2020 |
Exploiting Spectrum Availability and Quality in Routing for Multi-hop Cognitive Radio Networks L Zhang, Z Cai, P Li, X Wang International Conference on Wireless Algorithms, Systems, and Applications …, 2016 | 16 | 2016 |
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks X Wang, Z He, L Zhang Chin. J. Electron 23, 810-815, 2014 | 16 | 2014 |
A social‐aware probabilistic routing approach for mobile opportunistic social networks R Zhao, X Wang, L Zhang, Y Lin Transactions on Emerging Telecommunications Technologies 28 (12), e3230, 2017 | 14 | 2017 |
Signal power random fading based interference-aware routing for wireless sensor networks J Lu, X Wang, L Zhang Wireless Networks 20 (7), 1715-1727, 2014 | 14 | 2014 |
An Efficient Context-Aware Privacy Preserving Approach for Smartphones L Zhang, Y Li, L Wang, J Lu, P Li, X Wang Security and Communication Networks 2017, 2017 | 12 | 2017 |
Spacial mobility prediction based routing scheme in delay/disruption-tolerant networks L Zhang, Z Cai, J Lu, X Wang 2014 International Conference on Identification, Information and Knowledge …, 2014 | 12 | 2014 |