

{"id":222,"date":"2021-03-08T14:39:44","date_gmt":"2021-03-08T05:39:44","guid":{"rendered":"http:\/\/www.li-nlab.org\/?page_id=222"},"modified":"2021-10-06T23:41:51","modified_gmt":"2021-10-06T14:41:51","slug":"journals","status":"publish","type":"page","link":"http:\/\/www.li-nlab.org\/?page_id=222","title":{"rendered":"Books &#038; Journals"},"content":{"rendered":"\n<p style=\"font-size:26px\"><strong>Books:<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>1.&nbsp;R. Li, and M. Ma, Eds., Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, ICTCE 2017, Osaka, Japan,&nbsp; October 22 &#8211; 24, 2017. ACM 2017, ISBN 978-1-4503-5315-1<\/p>\n\n\n\n<p style=\"font-size:26px\"><br><strong>Book Chapter:<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>1.&nbsp;R. Li,&nbsp;Y. Owada,&nbsp;M.&nbsp;Ohnishi, and H. Harai, &#8220;Security for Regional Network Platform in IoT,&#8221; Elsevier Big Data Analytics in Cyber-Physical Systems, pp.65-89, 2019.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:26px\"><br><strong>Journal Papers:<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">41. G. Qu, N. Cui, H. Wu, R. Li, and Y. Ding, \u201cChainFL: A Simulation Platform for Joint Federated Learning and Blockchain in Edge\/Cloud Computing Environments,\u201d IEEE Transactions on Industrial Informatics, DOI: 10.1109\/TII.2021.3117481, 2021. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">40. M. Dai, Z. Su, R. Li, and S. Yu, \u201cA SDN-Enabled Approach for Edge-Cloud Computing in Internet of Things,\u201d IEEE Network. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">39. M. Xue, H. Wu, R. Li, M. Xu and P. Jiao, \u201cEosDNN: An Efficient Offloading Scheme for DNN Inference Acceleration in Local-Edge-Cloud Collaborative Environment,\u201d IEEE Transactions on Green Communications and Networking, DOI: 10.1109\/TGCN.2021.3111731, 2021. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">38. L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, S. Yu, \u201cSecurity and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures,\u201d IEEE Transactions on Industrial Informatics, DOI: 10.1109\/TII.2021.3107783, 2021. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">37. J. Tao, T. Han, and R. Li, \u201cDeep Reinforcement Learning Based Scheme for Intrusion Detection in Aerial Computing Networks,\u201d IEEE Network, vol. 35, issue 4, July\/August 2021.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">36. G. Qu, H. Wu, R. Li, and P. Jiao, \u201cDMRO: A Deep Meta Reinforcement Learning-based Task Offloading Framework for Edge-Cloud Computing,\u201d IEEE Transactions on Network and Service Management, vol. 18, issue 3, Sept. 2021.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">35. Y. Xing, K. Xue, Y. Zhang, J. Han, J. Li, J. Liu, and R. Li, \u201cA Low-Latency MPTCP Scheduler for Live Video Streaming in Mobile Networks,\u201d IEEE Transactions on Wireless Communications, DOI: 10.1109\/TWC.2021.3081498, 2021.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">34. P. Cong, Y. Zhang, Z. Liu, T. Baker, H. Tawfik, W. Wang, K. Xu, R. Li, and F. Li, \u201cA Deep Reinforcement Learning-based Multi-Optimality Routing Scheme for Dynamic IoT Networks,\u201d Elsevier Computer Networks, vol. 192, 19, June 2021.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">33. D. Zeng, R. Li, Z. Zhou, R. Zhou, R. Langar, and M. Bhuiyan, \u201cEditorial for Special Issue on Flexible Cloud and Edge for Internet-of-Things [Guest Editorial],\u201d Trans. Emerg. Telecommun. Technol. 32(8), 2021.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">32.\u00a0R. Li, K. Matsuzono, H. Asaeda, and X. Fu, \u201cAchieving High Throughput for Heterogeneous Networks with Consecutive Caching and Adaptive Retrieval,\u201d IEEE Transactions on Network Science and Engineering,\u00a0DOI: 10.1109\/TNSE.2020.3010939, 2020. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">31. Z. Su, M. Dai, Q. Xu,&nbsp;R. Li, and H. Zhang, \u201cUAV Enabled Content Distribution for Internet of Connected Vehicles in 5G Heterogeneous Networks,\u201d IEEE Transactions on Intelligent Transportation Systems. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">30.&nbsp;R. Li, K.-C. Leung, M. Nogueira, T. Taleb, and J. Wu, \u201cSmart Systems and Intelligent Networking Powered with Big Data Analytics [Guest Editorial],\u201d IEEE Transactions on Network Science and Engineering.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">29. W. Li, Z. Su,&nbsp;R. Li, K. Zhang, and Y. Wang, \u201cBlockchain Based Data Security for Artificial Intelligence Applications Beyond 5G Networks,\u201d IEEE Network,&nbsp;vol. 34, issue 6, Nov.\/Dec. 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">28.&nbsp;R. Li, H. Song, J. Cao, P. Barnaghi, J. Li, C.&nbsp;Mavromoustakis,&nbsp;&#8220;Big Data Intelligent Networking [Guest Editorial],&#8221; IEEE Network, July\/Aug. 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">27.&nbsp;H. Zhu, Y. Li,&nbsp;R. Li, J. Li, Z. You, and H. Song, \u201cSEDMDroid: An enhanced stacking ensemble of deep learning framework for Android malware detection,\u201d IEEE Transactions on Network Science and Engineering,&nbsp;10.1109\/TNSE.2020.2996379, 2020.&nbsp;&nbsp;&nbsp;[IF: 5.213]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">26.&nbsp;W. Li , Z. Su,&nbsp;R. Li, K. Zhang, and Q. Xu, \u201cAbnormal Crowd Traffic Detection with Crowdsourcing-based RSS Fingerprint Position in Heterogeneous Communications Networks,\u201d IEEE Transactions on Network Science and Engineering. (Accepted)&nbsp;&nbsp;[IF: 5.213]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">25. Y. Qu, J. Zhang,&nbsp;R. Li, X. Zhang, X. Zhai, and&nbsp;S. Yu,&nbsp;&nbsp;\u201cGenerative Adversarial Networks Enhanced Location Privacy in 5G Networks,\u201d SCIENCE CHINA Information Sciences. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">24.&nbsp;M. Dai, Z. Su,&nbsp;R. Li, Y. Wang, J. Ni, and D. Fang, \u201cAn Edge-Driven Security Framework for Intelligent Internet of Things,\u201d IEEE Network. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">23.&nbsp;Z. Su, M. Dai, Q. Xu,&nbsp;R. Li, and Shu Fu, \u201cQ-learning Based Spectrum Access for Content Delivery in Mobile Networks,\u201d IEEE Transactions on Cognitive Communications and Networking,&nbsp;DOI: 10.1109\/TCCN.2020.2971688, 2020.&nbsp;[IF: 8.000]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">22. X. Hu, S. Zheng, G. Zhang, L. Zhao, G. Cheng, J. Gong,&nbsp;R. Li, \u201cAn on-demand off-path cache exploration based multipath forwarding strategy,\u201d Elsevier Computer Networks, vol. 166, January 2020.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">21.&nbsp;R. Li,&nbsp;and H. Asaeda, &#8220;A Blockchain-based Data Lifecycle Protection Framework for Information-Centric Network,&#8221; IEEE Communications Magazine, vol. 57, no. 6, pp. 20-25, June 2019. [IF: 10.356]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">20. H. Asaeda, A. Ooka, and K. Matsuzono, and&nbsp;R. Li, &#8221; Cefore: Software Platform Enabling Content-Centric Networking and Beyond,&#8221; IEICE Transactions on Communications,&nbsp;vol.E102-B, no.9, pp.1792-1803, 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">19. X. Lu, Z. Chen, L. Wang, R. Li, and C. Zhai, \u201cRF-Drone: Multi-tag System for RF-ID Enables Drone Tracking in GPS-denied Environments,\u201d IEICE Transactions on Communications,&nbsp;vol. E102-B, no.10, pp.1941-1950, 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">18. J. Xu, D. Bian, C. Wang, G. Zhang, and R. Li, \u201cSatellite Constellation Based on High Elevation Angle for Broadband LEO Constellation Satellite Communication System,\u201d IEICE Transactions on Communications,&nbsp;vol. E102-B, no.10, pp.1960-1966, 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">17.&nbsp;R. Li, and&nbsp;H. Asaeda,&nbsp;&#8220;MWBS: An Efficient Many-to-Many Wireless Big Data Delivery Scheme,&#8221; IEEE Transactions on Big Data,&nbsp;DOI: 10.1109\/TBDATA.2018.2878584,&nbsp;2018.&nbsp;&nbsp;[IF: 5.670]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">16.&nbsp;R. Li,&nbsp;H. Asaeda, and&nbsp;J.&nbsp;Wu, &#8220;DCAuth: Data-Centric Authentication for Secure In-Network Big-Data Retrieval,&#8221; IEEE Transactions on Network Science and Engineering,&nbsp;DOI: 10.1109\/TNSE.2018.2872049,&nbsp;2018.&nbsp;&nbsp;&nbsp;[IF: 5.213]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">15.&nbsp;X. Fu, D. Kutscher, S. Misra, and&nbsp;R. Li, &#8220;Information-Centric Networking Security [Guest Editorial],&#8221; IEEE Communications Magazine, Nov. 2018.&nbsp;[IF: 10.356]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">14.&nbsp;R. Li,&nbsp;H. Asaeda,&nbsp;J.&nbsp;Li, and X. Fu, &#8220;A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing,&#8221; Elsevier&nbsp;Digital&nbsp;Communications and Networks, vol. 3, issue 4, pp. 226-235,&nbsp;Nov. 2017.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">13.&nbsp;R. Li,&nbsp;H. Asaeda, and&nbsp;J.&nbsp;Li, &#8220;A&nbsp;Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT,&#8221; IEEE Internet of Things Journal, vol. 4, issue 3, pp. 791-803, June 2017. [IF: 9.936]&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">12.&nbsp;R. Li, H. Harai, and H. Asaeda, &#8220;An Aggregatable Name-Based Routing for Energy-Efficient Data&nbsp;Sharing in Big Data Era,&#8221;&nbsp;IEEE Access, vol. 3, pp. 955&#8211;966, July 2015. [IF: 4.098]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">11. H. Yue, L. Guo,&nbsp;R. Li, H. Asaeda, and Y. Fang, &#8220;DataClouds: Enabling Community-based Data-Centric Servcies over Internet of Things,&#8221; IEEE Internet of Things Journal, vol. 1, issue 5, pp. 472-482, Oct. 2014. [IF:&nbsp;9.936]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">10.&nbsp;R. Li, J. Li, and H. Asaeda, &#8220;A Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems,&#8221; IEICE Trans. on Information and Systems, vol. E97-D, no. 10, pp. 2586-2596, Oct. 2014.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">9. H. Asaeda,&nbsp;R. Li, and N. Choi, &#8220;Container-Based Unified Testbed for Information-Centric Networking,&#8221; IEEE Network Magazine, vol. 28, issue 6, pp. 60-66, Nov. 2014. [IF: 7.230]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">8. V. P. Kafle,&nbsp;R. Li, D. Inoue,&nbsp;and H. Harai,&nbsp;&#8220;Design and Implementation of Security for HIMALIS Architecture of Future Networks,&#8221; IEICE Trans. on Communications, vol. E96-D, No.2, Feb. 2013.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">7.&nbsp;R. Li, and M. Inoue, \u201cSecure Sensor Sharing Framework for Mobile and&nbsp;&nbsp;Sensor Access Platform Network,\u201d IEICE Trans. On Communications, vol. E94-B, no. 6, pp. 1565-1576, June 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">6. M. Inoue, M. Ohinishi, C. Peng,&nbsp;R. Li, and Y. Owada, \u201cNerveNet: A Regional Platform Network for Context-Aware Services with Sensors and Actuators,\u201d IEICE Trans. On Communications, vol. E94-B, no.3, pp. 618-629,&nbsp;Mar. 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">5.&nbsp;R. Li, and J. Li, \u201cRequirements and Design for Neutral Trust Management Framework in Unstructured Networks,\u201d The Journal of Super Computing, DOI 10.1007\/s11227-010-0502-3, Nov. 2010. [IF: 2.16]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">4.&nbsp;J. Li,&nbsp;R. Li, and J. Kato, \u201cFuture Trust Management Framework for Mobile Ad Hoc Networks,\u201d IEEE Communications Magazine, Vol. 46, no.4, pp. 108-114, Apr. 2008. [IF: 10.356]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">3.&nbsp;R. Li, J. Li, K. Wu, Y. Xiao, and L.-J. Xie, &#8220;An Enhanced Fast Handover Scheme with Low Latency for Mobile IPv6,&#8221;&nbsp;IEEE Transactions on Wireless Communications, vol.7, issue 1, pp. 334-342, January, 2008. [IF: 6.394]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">2.&nbsp;R. Li, J. Li, and H.-H. Chen,&nbsp;\u201cDKMS: Distributed Hierarchical Access Control for Multimedia&nbsp;Networks,&nbsp;\u201d&nbsp;International Journal of Security and Networks, Vol. 2, no. 1\/2, 2007.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">1.&nbsp;R. Li, J. Li, P. Liu and H.-H. Chen,&nbsp;\u201cOn Demand Public-Key Management for Mobile Ad Hoc&nbsp;Networks,\u201d&nbsp;Wiley&#8217;s Journal of Wireless Communications and Mobile Computing, Vol. 6, no. 3, pp.&nbsp;295-306, May, 2006.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Books: 1.&nbsp;R. Li, and M. Ma, Eds., Proceedings of the 2017 International Conference on Telecommunications  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-222","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=222"}],"version-history":[{"count":4,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":599,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/222\/revisions\/599"}],"up":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/191"}],"wp:attachment":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}