default search action
Tianyi Xing
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yimao Sun, K. C. Ho, Tianyi Xing, Yanbing Yang, Liangyin Chen:
Projection-Based Algorithm and Performance Analysis for TDOA Localization in MPR. IEEE Trans. Signal Process. 72: 896-911 (2024) - [c13]Tianyi Xing, Yimao Sun, Lihua Ni, Xiangyu Peng, Kehao Zhang, Qun Wan:
Solution and Analysis For 3-D Localization In Closed-Form Integrating Sa and TDOA Measurements. ICASSP 2024: 8831-8835 - 2023
- [c12]Lihua Ni, Di Zhang, Tianyi Xing, Maoyan Ran, Ning Liu, Qun Wan:
Direct Position Determination with One-Bit Signal for Multiple Targets. ICASSP 2023: 1-5 - 2022
- [c11]Zhi-Jie Chen, Tianyi Xing, Qianwei Zhou, Haigen Hu, Xiao-Xin Li:
Accelerating Deeply Cascaded Convolutional Networks for MRI Reconstruction via Pixel-Unshuffle Caused Feature Squeezing. BIBM 2022: 1505-1510
2010 – 2019
- 2018
- [j5]Yin Zhang, Min Chen, Victor C. M. Leung, Tianyi Xing, Giancarlo Fortino:
Guest Editorial Special Issue on Cognitive Internet of Things. IEEE Internet Things J. 5(4): 2259-2262 (2018) - 2015
- [c10]Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, Kishor S. Trivedi:
SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment. DSN Workshops 2015: 4-11 - 2014
- [b1]Tianyi Xing:
Establishing the Software-Defined Networking Based Defensive System in Clouds. Arizona State University, Tempe, USA, 2014 - [j4]Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi:
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet. Comput. Networks 63: 128-146 (2014) - [c9]Tianyi Xing, Zhengyang Xiong, Dijiang Huang, Deep Medhi:
SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds. CNSM 2014: 308-311 - 2013
- [j3]Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng, Yan Liu:
Adaptive Computing Resource Allocation for Mobile Cloud Computing. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Dijiang Huang, Tianyi Xing, Huijun Wu:
Mobile cloud computing service models: a user-centric approach. IEEE Netw. 27(5): 6-11 (2013) - [j1]Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang:
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. IEEE Trans. Dependable Secur. Comput. 10(4): 198-211 (2013) - [c8]Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar:
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment. GREE 2013: 89-92 - [c7]Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang, Ikuo Oka:
A behavior based policy management for adaptive trustworthiness assignment in future network. IM 2013: 784-787 - 2012
- [c6]Tianyi Xing, Dijiang Huang, Shingo Ata, Deep Medhi:
MobiCloud: A geo-distributed mobile cloud computing platform. CNSM 2012: 164-168 - [c5]Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, Deep Medhi:
Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE). ICC 2012: 5879-5884 - [c4]Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi:
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation. NOMS 2012: 1159-1166 - [c3]Tianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai:
Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing. TrustCom 2012: 1446-1453 - 2010
- [c2]Tianyi Xing, Yuanan Liu, Bihua Tang, Fan Wu:
Dynamic-Adjusting AODV Routing Protocol Based on Max hop count. WCNIS 2010: 535-539
2000 – 2009
- 2009
- [c1]Liang Ma, Tianyi Xing, Xiaoli Wang, Junde Song:
IEEE 802.11b-based access scheme with coordinated sleeping for wireless sensor networks. PIMRC 2009: 2106-2110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint