262 results on '"Hongke Zhang"'
Search Results
2. DRL-Based Two-Stage SFC Deployment Approach Under Latency Constraints.
3. Multi-Agent DRL-Based Deadline-Aware Routing for Deterministic Wide-Area Networks.
4. Intelligent Traffic-Service Mapping of Network for Advanced Industrial IoT Edge Computing.
5. A Privacy-Preserving Timing Attacks Mitigation in Information-Centric Edge Networks.
6. A Decentralized Quality Management Scheme for Content Moderation.
7. Secure and Reliable Multipath Transmission Scheme Based on Interleaving Network Encoding.
8. Towards Green Cloud Transmission: Observation from Practical Inter-Cloud Links.
9. Enhancing Edge Multipath Data Security Offloading Efficiency via Sequential Reinforcement Learning.
10. A High-Throughput Scheduler based on Multipath-State Machine in Wireless Networks.
11. A Survey on Data Security in Network Storage Systems.
12. ADSA: A Multi-path Transmission Scheduling Algorithm based on Deep Reinforcement Learning in Vehicle Networks.
13. Combating Eavesdropping with Resilient Multipath Transmission for Space/aerial-assisted IoT.
14. DRL-Based Fountain Codes for Concurrent Multipath Transfer in 6G Networks.
15. An FPGA-Based Identifier Mapping Module Design for Space-Air-Ground Integrated Network.
16. Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks.
17. A Bottleneck-Aware Multipath Scheduling Mechanism for Social Networks.
18. Spectrum and Computing Resource Management for Federated Learning in Distributed Industrial IoT.
19. DRLEC: Multi-agent DRL based Elasticity Control for VNF Migration in SDN/NFV Networks.
20. Deep Reinforcement Learning Based Resource Management for DNN Inference in IIoT.
21. An Efficient Network Coding Scheme for Heterogeneous Wireless Networks.
22. P4NIS: Improving network immunity against eavesdropping with programmable data planes.
23. Promoting Network Automation for Heterogeneous Networks Collaboration.
24. QMORA: A Q-Learning based Multi-objective Resource Allocation Scheme for NFV Orchestration.
25. Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission.
26. Deep Learning Based Intelligent Congestion Control for Space Network.
27. Coupled or Uncoupled? Multi-path TCP Congestion Control for High-Speed Railway Networks.
28. A Novel Cache Replacement Scheme against Cache Pollution Attack in Content-Centric Networks.
29. BLAM: Lightweight Bloom-Filter Based DDoS Mitigation for Information-Centric IoT.
30. Efficient Mappings of Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.
31. Hybrid-Aware Collaborative Multipath Communications for Heterogeneous Vehicular Networks.
32. Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario.
33. HCaching: High-Speed Caching for Information-Centric Networking.
34. On the two time scale characteristics of wireless high speed railway networks.
35. Loss-aware adaptive scalable transmission in wireless high-speed railway networks.
36. A preference-aware trajectory privacy-preserving scheme in location-based social networks.
37. Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network.
38. Scalable mobility management for content sources in Named Data Networking.
39. EmuStack: An OpenStack-Based DTN Network Emulation Platform.
40. The Cache Location Selection Based on Group Betweenness Centrality Maximization.
41. A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking.
42. Supporting Multi-Dimensional Naming for NDN Applications.
43. A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows.
44. A smart heuristic for relieving RBB in dependable transmission environment.
45. Energy-efficient cluster management in heterogeneous vehicular networks.
46. A Collision Avoidance Mechanism for Emergency Message Broadcast in Urban VANET.
47. An Enhanced Scheduling Mechanism for Elephant Flows in SDN-Based Data Center.
48. Ports Distribution Management for Privacy Protection inside Local Domain Name System.
49. Network security analyzing and modeling based on Petri net and Attack tree for SDN.
50. Mobility Support for the User in NDN-Based Cloud Storage Service.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.