

{"id":273,"date":"2021-03-08T16:48:27","date_gmt":"2021-03-08T07:48:27","guid":{"rendered":"http:\/\/www.li-nlab.org\/?page_id=273"},"modified":"2021-03-08T23:41:07","modified_gmt":"2021-03-08T14:41:07","slug":"international-conferences","status":"publish","type":"page","link":"http:\/\/www.li-nlab.org\/?page_id=273","title":{"rendered":"International Conferences"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">41.&nbsp;R. Li, H. Asaeda, \u201cFSCC: Flexible Smart Contract Interaction with Access Control for Blockchain,\u201d IEEE ICC 2021. (Accepted)&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">40. P. Cong, Y. Zhang, W. Wang, K. Xu,&nbsp;R. Li, and F. Li, \u201cA Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks,\u201d IEEE ICC 2021. (Accepted)&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">39. Q. Xu, Z. Su,&nbsp;R. Li, K. Asatani, \u201cGame Theoretical Secure Bandwidth Allocation in UAV-assisted Heterogeneous Networks,\u201d IEEE ICC 2021. (Accepted)&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">38. S. Gao, S. Yao, and&nbsp;R. Li, \u201cTransferable Adversarial Defense by Fusing Reconstruction Learning and Denoising Learning,\u201d IEEE INFOCOM BigSecurity 2021. (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">37. Y. Wang, Z. Su, Q. Xu,&nbsp;R. Li, H. Luan, &#8220;Lifesaving with RescueChain: Energy-Efficient and Partition-Tolerant Blockchain Based Secure Information Sharing for UAV-Aided Disaster Rescue,&#8221;&nbsp;IEEE International Conference on Computer Communications (IEEE INFOCOM 2021). (Accepted)<\/p>\n\n\n\n<p class=\"has-medium-font-size\">36. X. Huang, K. Xue, Y. Xing, D. Hu,&nbsp;R. Li, Q. Sun, \u201cFSDM: Fast Recovery Saturation Attack Detection and Mitigation Framework in SDN,\u201d The 17th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (IEEE MASS 2020).&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">35. Z. Su, M. Dai, Q. Xu, and&nbsp;R. Li, \u201cA Novel Resource Allocation Scheme With Unmanned Aerial Vehicles in Disaster Relief Networks,\u201d 2020 IEEE\/CIC International Conference on Communications in China (ICCC 2000), 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">34. X. Hu, J. Yin, S. Zheng,&nbsp;R. Li, G. Cheng, and J. Gong, \u201cTowards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission,\u201d IEEE Global Communications Conference 2020 (IEEEE GLOBECOM 2020), Dec. 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">33. Y. Wang, Z. Su, N. Zhang, A. Benslimane,&nbsp;R. Li, and Y. Wang, \u201cSecurity-Aware Resource Sharing in Software Defined Air-Ground Integrated Networks: A Game Approach,\u201d IEEE Global Communications Conference 2020 (IEEE GLOBECOM 2020), Dec. 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">32. X. Hu, J. Yin, S. Zheng,&nbsp;R. Li, G. Cheng, and J. Gong, \u201cA Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN,\u201d IEEE Global Communications Conference 2020 (IEEE GLOBECOM 2020), Dec. 2020.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">31.&nbsp;W. Chen, Z. Su, Q. Xu, T. Luan, and&nbsp;R. Li,\u201cVFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue,\u201d IEEE International Conference on Computer Communications (IEEE INFOCOM 2020), July 2020.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">30.&nbsp;R. Li, and H. Asaeda, \u201cDIBN: A Decentralized Information-Centric Blockchain Network,\u201d IEEE Global Communications Conference 2019 (IEEE GLOBECOM 2019), Hawaii, USA, Dec. 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">29. G. Cheng, X. Zhao, X. Hu, S. Zheng, H. Wu, R. Li, and C. Fan, \u201cDetecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View,\u201d The ICDCS workshop on network meets intelligent computations (NMIC 2019), July 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">28. X. Hu, S. Zheng, J. Gong, G. Cheng, G. Zhang, R. Li, \u201cEnabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking,\u201d The 14th International Conference on Future Internet Technologies (CFI 2019), June 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">27.&nbsp;R. Li, K. Matsuzono, H. Asaeda, and X. Fu, &#8220;Consecutive Caching and Adaptive Retrieval for In-Network Big Data Sharing,&#8221; IEEE International Conference on Communications (IEEE ICC 2018), Kansas, USA, May 2019.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">26.&nbsp;R. Li, and H. Asaeda, &#8220;Secure In-Network Big Data Provision with Suspension Chain Model,&#8221; IEEE Conference on Computer Communications workshop on BigSecurity 2018, Honolulu, Apr. 2018.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">25.&nbsp;R. Li, H. Asaeda, J. Li, and X. Fu, &#8220;A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT,&#8221; IEEE International Conference on Communications (IEEE ICC 2017), Paris, 2017.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">24.&nbsp;R. Li, H. Asaeda,&nbsp;and K.&nbsp;Moessner,&nbsp;\u201cOptimized Root Selection Algorithm for Many-to-Many Communications in ICN,\u201d&nbsp;&nbsp;The 11th International Conference on Future Internet Technologies (CFI 2016), June 15-17 2016.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">23.&nbsp;S. Fu,&nbsp;J. Li,&nbsp;R. Li,&nbsp;and Y. Ji,&nbsp;\u201cA Game Theory based Vertical Handoff Scheme for Wireless Heterogeneous Networks,\u201d&nbsp;The IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN-2014), pp. 220-227, 2014.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">22.&nbsp;R. Li,&nbsp;K. Morioka, Y. Owada, M. Ohishi, and H. Harai,&nbsp;\u201cDesign and Implementation of A Proactive Distributed Authentication Framework (PDAF),\u201d&nbsp;IEEE International Conference on Network Protocols 2013 (ICNP 2013) workshop on Secure Network Protocol, Oct. 2013.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">21.&nbsp;R. Li,&nbsp;H. Asaeda, \u201cA Community-Oriented Route Coordination Using Information Centric Networking Approach,\u201d The 38th IEEE Conference on Local Computer Networks (LCN 2013), Oct. 2013.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">20. F. Ganz,&nbsp;R. Li, P. Barnaghi, and H. Harai, \u201cA Resource Mobility Scheme for Service Continuity in the Internet of Things,\u201d&nbsp;IEEE International Conference on&nbsp;Internet of Things&nbsp;2012 (iThings&nbsp;2012),&nbsp;Nov. 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">19.&nbsp;R. Li, Ved&nbsp;P.&nbsp;Kafle,&nbsp;and H. Harai,&nbsp;\u201cA Proactive Scheme for Securing ID\/Locator Split Architecture,\u201d&nbsp;IEEE International Conference on Network Protocols 2012 (ICNP 2012) workshop on Secure Network Protocol, Oct. 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">18. Ved&nbsp;P.&nbsp;Kafle,&nbsp;R. Li,&nbsp;H. Tazaki, and H. Harai,&nbsp;\u201cNetwork Mobility Management in HIMALIS Architecture of Future Networks,\u201d&nbsp;IEEE Globecom 2012 workshop, The 4<sup>th<\/sup>&nbsp;IEEE International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">17.&nbsp;R. Li,&nbsp;and H. Harai,&nbsp;\u201cANBR: An Aggregatable Named based Routing for Information-Centric Network,\u201d&nbsp;9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT&nbsp;2012), Chile, Nov. 5-9, 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">16.&nbsp;R. Li,&nbsp;M. Ohnishi, Y. Owada, and H. Harai,&nbsp;\u201cPDAF: Proactive Distributed Authentication Framework for Regional Network,\u201d&nbsp;The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), Tokyo, Japan, Aug. 9-10, 2012.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">15.&nbsp;R. Li,&nbsp;and H. Harai,&nbsp;\u201cA&nbsp;Scalable Named Information Network Architecture (NINA),\u201d&nbsp;NDN hand-on research workshop,&nbsp;Seoul&nbsp;National University, Mar. 19-21,&nbsp;2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">14. Ved P. Kafle,&nbsp;R. Li, D. Inoue,&nbsp;and H. Harai,&nbsp;\u201cAn Integrated Security Scheme for ID\/Locator Split Architecture of Future Network,\u201d International Conference on Communications 2012 (ICC 2012) workshop on Future Network (FutureNet V),&nbsp;June&nbsp;2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">13.&nbsp;R. Li, M. Inoue,&nbsp;and Hiroaki Harai,&nbsp;\u201cScalable Named Information Network,\u201d&nbsp;World Telecommunications Congress&nbsp;(WTC&nbsp;2012),&nbsp;Mar.&nbsp;5-6, 2012.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">12.&nbsp;R. Li, and M. Inoue, \u201cSecure Sensor Sharing Framework through Unbundling Sensor Owners and Service Providers,\u201d&nbsp;The 26th International Technical Conference on Circuits\/Systems,<br>Computers and Communications (ITC-CSCC 2011), pp. 65-68, June 19-22, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">11.&nbsp;R. Li, and M. Inoue, \u201cFramework Design for Secure Sensor Sharing,\u201d International Conference on Communications 2011 (ICC 2011) workshop on Future Network (FutureNet IV), June 5-9, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">10.&nbsp;R. Li, M. Ohnishi, C. Peng, V. Kafle, and M. Inoue, \u201cCapacity Determination for Deployment of Managed Mesh Networks,\u201d&nbsp;The 20th Personal, Indoor and Mobile Radio Communications Symposium 2009 (PIMRC\u201909), Sept. 13-19, 2009.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">9.&nbsp;R. Li, J. Li, \u201cTowards Neutral Trust Management Framework in Unstructured Networks,\u201d The 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09), Oct. 12-14, 2009, Macau, China.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">8.&nbsp;R. Li, J. Li, P. Liu,&nbsp;and&nbsp;J. Kato, \u201cA Novel Hybrid Trust Management Framework for MANETs,\u201d International Workshop on Next Generation Network Architecture, in conjunction with ICDCS 2009, June 22, 2009, Montreal, Canada.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">7.&nbsp;W. Wei, W. Wang, and&nbsp;R. Li, \u201cImproving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology,\u201d 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008)APSCC, Dec. 9-12, 2008, Yilan, Taiwan.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">6. W. Wei, Y. Qi, W. Wang,&nbsp;R. Li, Y. Shi, Y. Gu,&nbsp;\u201cVariant Rate Based Cross Layer Time Frame Scheduling in Wireless&nbsp;Sensor Networks,\u201d&nbsp;the 2008 IEEE Wireless Telecommunications Symposium (IEEE WTS 2008), Pomona, California, USA, April 24-26 , 2008<\/p>\n\n\n\n<p class=\"has-medium-font-size\">5.&nbsp;R. Li, J. Li, P. Liu and H.-H. Chen, \u201cAn Objective Trust Management Framework for Mobile Ad&nbsp;Hoc Networks,\u201d 2007 IEEE 65th Vehicular Technology Conference VTC 2007 Spring (IEEE VTC&nbsp;2007 Spring), 23 C 25 April 2007, Dublin, Ireland.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">4.&nbsp;R. Li&nbsp;and J. Li, \u201cAn Enhanced Fast Handover Scheme for Mobile IPv6,\u201d International Wireless&nbsp;Communications and Mobile Computing Conference (IWCMC 2006), July 3 &#8211; 6, 2006, Vancouver, Canada.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">3.&nbsp;R. Li, J. Li, and H.-H. Chen, \u201cAnalysis and Design of Distributed Hierarchical Access Control for&nbsp;Multimedia Networks,\u201d Proceedings of the IEEE 2005 Global Communications Conference (IEEE&nbsp;GlobeCom 2005), Nov. 28 &#8211; Dec. 2, 2005, St. Louis, MO, USA.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">2.&nbsp;R. Li, J. Li and H. Kameda, \u201cDistributed Hierarchical Access Control for Secure Group Communications,\u201d in&nbsp;2005 International Conference on Computer Networks and Mobile Computing (ICCNMC&#8217;05), LNCS 3169, pp. 539-548, Zhangjiajie, China, 2005.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">1.&nbsp;R. Li, J. Li, H. Kameda and P. Liu, \u201cLocalized Public-Key Management for Mobile Ad Hoc Networks,\u201d Proceedings of the IEEE 2004 Global Communications Conference (IEEE GlobeCom 2004),&nbsp;Nov. 29 &#8211; Dec. 3, 2004, Dallas, Texas, USA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>41.&nbsp;R. Li, H. Asaeda, \u201cFSCC: Flexible Smart Contract Interaction with Access Control for Blockchain,\u201d IEE [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":191,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-273","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=273"}],"version-history":[{"count":3,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/273\/revisions"}],"predecessor-version":[{"id":403,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/273\/revisions\/403"}],"up":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/191"}],"wp:attachment":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}