沈玉龙
- 教授
- 性别:男
- 毕业院校:西安电子科技大学
- 学历:博士研究生毕业
- 学位:博士学位
- 在职信息:在岗
- 所在单位:计算机科学与技术学院
- 学科:计算机系统结构
- 办公地点:西安电子科技大学南校区网安大楼A1-0912
- 联系方式:ylshen@mail.xidian.edu.cn
访问量:
- [21] Exploiting Content Delivery Networks for covert channel communications.Computer Communications (SCI 二区).2017,99 :84-92
- [22] Distributed Secure Service Composition with Declassification in Mobile Clouds.Mobile Information Systems (SCI检索).2017,2017 :13
- [23] A protocol-free detection against cloud oriented reflection DoS attacks.Soft Computing (SCI 检索).2017,21 (13):3713-3721
- [24] On Performance Modeling for MANETs Under General Limited Buffer Constraint.IEEE Transactions on Vehicular Technology (SCI 二区).2017,66 (10):9483-9497
- [25] On throughput capacity of large-scale ad hoc networks with realistic buffer constraint.Wireless Networks (SCI 检索).2017,23 (1):193-204
- [26] Improving Database Storage Usability with the Cloud-Based Architecture.Proceedings - 2017 IEEE 2nd International Conference on Data Science in Cyberspace, DSC 2017.2017
- [27] Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying.2017 IEEE Globecom Workshops, GC Wkshps 2017 - Proceedings.2017
- [28] SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items.Proceedings - International Conference on Data Engineering, 2017.2017
- [29] On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users.Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017.2017
- [30] Empowering Sketches with Machine Learning for Network Measurements.NetAI 2018 - Proceedings of the 2018 Workshop on Network Meets AI and ML, Part of SIGCOMM 2018 (CCF A类).2018
- [31] Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks.CHINESE JOURNAL OF ELECTRONICS.2016,25 (4):746-752
- [32] Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [33] Limits of Covert Communication on Two-Hop AWGN Channels.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [34] Secure Transmission with Limited Feedback in MISOME Wiretap Channels.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [35] Multicast Delivery Delay in General Two-Hop Relay MANETs.NaNA 2017 (EI检索)Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [36] Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [37] D2D Communication for Disaster Recovery in Cellular Networks.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [38] CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [39] Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework.Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017.2017
- [40] Toward integrity assurance of outsourced computing — a game theoretic perspective.Future Generation Computer Systems (SCI 二区,CCF C类).2016,55 :87-100