liang hongbin
liang hongbin
Verified email at
Cited by
Cited by
An SMDP-based service model for interdomain resource allocation in mobile cloud networks
H Liang, LX Cai, D Huang, X Shen, D Peng
IEEE transactions on vehicular technology 61 (5), 2222-2232, 2012
Resource allocation for security services in mobile cloud computing
H Liang, D Huang, LX Cai, X Shen, D Peng
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
SMDP-based coordinated virtual machine allocations in cloud-fog computing systems
Q Li, L Zhao, J Gao, H Liang, L Zhao, X Tang
IEEE Internet of Things Journal 5 (3), 1977-1988, 2018
An SMDP-based prioritized channel allocation scheme in cognitive enabled vehicular ad hoc networks
M Li, L Zhao, H Liang
IEEE Transactions on Vehicular Technology 66 (9), 7925-7933, 2017
A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks
L Xiong, D Peng, T Peng, H Liang, Z Liu
Sensors 17 (11), 2681, 2017
A novel adaptive resource allocation model based on SMDP and reinforcement learning algorithm in vehicular cloud system
H Liang, X Zhang, J Zhang, Q Li, S Zhou, L Zhao
IEEE Transactions on Vehicular Technology 68 (10), 10018-10029, 2019
MTD analysis and evaluation framework in software defined network (MASON)
A Chowdhary, A Alshamrani, D Huang, H Liang
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
On economic mobile cloud computing model
H Liang, D Huang, D Peng
International Conference on Mobile Computing, Applications, and Services …, 2010
A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks
ZC Liu, L Xiong, T Peng, DY Peng, HB Liang
IEEE Access 6, 26307-26317, 2018
Adaptive computing resource allocation for mobile cloud computing
H Liang, T Xing, LX Cai, D Huang, D Peng, Y Liu
International Journal of Distributed Sensor Networks 9 (4), 181426, 2013
An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services
L Xiong, D Peng, T Peng, H Liang
KSII Transactions on Internet and Information Systems (TIIS) 11 (12), 6169-6187, 2017
Associating MIMO beamforming with security codes to achieve unconditional communication security
J Tang, H Wen, L Hu, H Song, G Zhang, F Pan, H Liang
Iet Communications 10 (12), 1522-1531, 2016
Optimal power allocation for wireless sensor powered by dedicated RF energy source
Q Li, J Gao, H Liang, L Zhao, X Tang
IEEE Transactions on Vehicular Technology 68 (3), 2791-2801, 2019
Cellular automata–based modeling and simulation of a mixed traffic flow of manual and automated vehicles
D Yang, X Qiu, L Ma, D Wu, L Zhu, H Liang
Transportation Research Record 2622 (1), 105-116, 2017
Constructions of optimal 2-D optical orthogonal codes via generalized cyclotomic classes
H Cai, H Liang, X Tang
IEEE Transactions on Information Theory 61 (1), 688-695, 2014
Reinforcement learning enabled dynamic resource allocation in the Internet of vehicles
H Liang, X Zhang, X Hong, Z Zhang, M Li, G Hu, F Hou
IEEE Transactions on Industrial Informatics 17 (7), 4957-4967, 2020
SFPM: A secure and fine-grained privacy-preserving matching protocol for mobile social networking
X Yang, R Lu, H Liang, X Tang
Big data research 3, 2-9, 2016
Geographic-based service request scheduling model for mobile cloud computing
T Xing, H Liang, D Huang, LX Cai
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
-Safe ( )-Diversity Privacy Model for Sequential Publication With High Utility
H Zhu, HB Liang, L Zhao, DY Peng, L Xiong
IEEE Access 7, 687-701, 2018
Constructions of optimal low-hit-zone frequency hopping sequence sets
L Zhou, D Peng, H Liang, C Wang, Z Ma
Designs, Codes and Cryptography 85 (2), 219-232, 2017
The system can't perform the operation now. Try again later.
Articles 1–20