学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 沈玉龙的留言板
学术论文

近年来主持和参与国家级或省部级科研项目20余项,获国家技术发明二等奖1项,省部级科技奖励一等奖4项,二等奖3项,在国内外重要期刊和学术会议上发表论文100余篇,参与制定标准多项,申请技术发明专利70余项,国际PCT专利5项,登记软件著作权30余件。

 

已录用论文:

[1] Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:Diamond Sketch: Accurate Per-flow Measurement for Real IP Streams.INFORCOM (CCF A类) 论文下载.pdf

[2] Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen and Jianfeng Ma:SALUTE: A Strategy-Proof Auction Mechanism for Flexible Multichannel Allocation.INFORCOM (CCF A类) 论文下载.pdf

[3] Junjie Xie, Deke Guo, Xiaozhou Li, Yulong Shen, Xiaohong Jiang: Cutting Long-tail Latency of Routing Response in Software Defined Networks.IEEE Journal of Selected Areas in Communications (CCF A类) 论文下载.pdf

[4] Xu Lin, Deke Guo, Yulong Shen, Guoming Tang,Bangbang Ren: Optimal Embedding of Hybrid Service Function Chain with DAG Abstraction. 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)

[5] Xu Lin, Deke Guo, Yulong Shen, Guoming Tang, Bangbang Ren,DAG-SFC: Minimize the Embedding Cost of SFC with Parallel VNFs.International Conference on Parallel Processing

 

2018年发表论文:

[6] Xiaochen Li, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang:Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Networks 72: 105-114 (2018)

[7] Yongzhi Wang, Yulong Shen, Xiaohong Jiang:Practical Verifiable Computation-A MapReduce Case Study. IEEE Trans. Information Forensics and Security 13(6): 1376-1391 (2018) (CCF A类,中科院分区二区) 论文下载.pdf

[8] Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang:On Secure Wireless Communications for Service Oriented Computing. IEEE Trans. Services Computing 11(2): 318-328 (2018)(CCF B类,中科院分区二区)论文下载.pdf

[9] Bin Yang, Yulong Shen, Xiaohong Jiang, Tarik Taleb:Generalized Cooperative Multicast in Mobile Ad Hoc Networks. IEEE Trans. Vehicular Technology 67(3): 2631-2643 (2018)(中科院分区二区) 论文下载.pdf

[10] Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura:On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection. IEEE Trans. Wireless Communications 17(3): 1893-1906 (2018)(中科院分区二区) 论文下载.pdf

[11] Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) 论文下载.pdf

 

2017年发表论文:

[12] Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017)

[13] Yulong Shen, Tao Zhang, Yongzhi Wang, Hua Wang, Xiaohong Jiang:MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation. IEEE Communications Magazine 55(9): 86-93 (2017)(中科院分区一区)论文下载.pdf

[14] Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori:Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks 123: 77-87 (2017) (CCF B类)论文下载.pdf

[15] Yongzhi Wang, Yulong Shen, Xiaopeng Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu:Exploiting Content Delivery Networks for covert channel communications. Computer Communications 99: 84-92 (2017)  论文下载.pdf

[16] Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:Distributed Secure Service Composition with Declassification in Mobile Clouds. Mobile Information Systems 2017: 7469342:1-7469342:13 (2017) 论文下载.pdf

[17] Le Xiao, Wei Wei, Weidong Yang, Yulong Shen, Xianglin Wu:A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput. 21(13): 3713-3721 (2017)  论文下载.pdf

[18] Jia Liu, Yang Xu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:On Performance Modeling for MANETs Under General Limited Buffer Constraint. IEEE Trans. Vehicular Technology 66(10): 9483-9497 (2017)(中科院分区二区)论文下载.pdf

[19] Yang Xu, Jia Liu, Yulong Shen, Xiangning Li, Xiaohong Jiang:On throughput capacity of large-scale ad hoc networks with realistic buffer constraint. Wireless Networks 23(1): 193-204 (2017) 论文下载.pdf

[20] Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:Improving Database Storage Usability with the Cloud-Based Architecture. DSC 2017: 494-499 论文下载.pdf

[21] Shuangrui Zhao, Jia Liu, Xiaochen Li, Yulong Shen, Xiaohong Jiang:Secure Beamforming for Full-Duplex MIMO Two-Way Communication via Untrusted Relaying. GLOBECOM Workshops 2017: 1-6 论文下载.pdf

[22] Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen, Xiaoming Li, Bin Cui, Gaogang Xie:SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items. ICDE 2017: 103-106 (CCF A类) 论文下载.pdf

 

2016年发表论文:

[23] Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:Toward integrity assurance of outsourced computing - a game theoretic perspective. Future Generation Comp. Syst. 55: 87-100 (2016) (中科院分区二区)论文下载.pdf

[24] Fangwei Wang, Wen-Yan Huang, Yulong Shen, Changguang Wang:Analysis of SVEIR worm attack model with saturated incidence and partial immunization. J. Comm. Inform. Networks 1(4): 105-115 (2016)  论文下载.pdf

[25] Yuanyu Zhang, Yulong Shen, Hua Wang, Jianming Yong, Xiaohong Jiang:On Secure Wireless Communications for IoT Under Eavesdropper Collusion. IEEE Trans. Automation Science and Engineering 13(3): 1281-1293 (2016) (CCF B类,中科院分区二区)论文下载.pdf

[26] Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang, Hideyuki Tokuda:On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks. IEEE Trans. Communications 64(4): 1646-1659 (2016) (CCF B类)论文下载.pdf

[27] Yongzhi Wang, Yulong Shen:POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. ACM Conference on Computer and Communications Security 2016: 1799-1801(CCF A类) 论文下载.pdf

[28] Yang Xu, Jia Liu, Yulong Shen, Xiaohong Jiang, Tarik Taleb:Security/QoS-aware route selection in multi-hop wireless ad hoc networks. ICC 2016: 1-6 论文下载.pdf

[29] Bin Yang, Yulong Shen, Guilin Chen, Yuanyuan Fan:Multicast Delivery Probability of MANETs with Limited Packet Redundancy. NaNA 2016: 48-52 论文下载.pdf

[30] Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks. NaNA 2016: 64-68 论文下载.pdf

[31] Xiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:Exact Secrecy Throughput of MANETs with Guard Zone. NaNA 2016: 167-172 论文下载.pdf

[32] Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259 论文下载.pdf

 

2015年发表论文:

[33] Juntao Gao, Yulong Shen, Xiaohong Jiang, Jie Li:Source delay in mobile ad hoc networks. Ad Hoc Networks 24: 109-120 (2015)  论文下载.pdf

[34] Yuanyu Zhang, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming. Ad Hoc & Sensor Wireless Networks 29(1-4): 113-131 (2015)

[35] Juntao Gao, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach. Ad Hoc & Sensor Wireless Networks 29(1-4): 265-285 (2015)

[36] Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen:Secure service composition with information flow control in service clouds. Future Generation Comp. Syst. 49: 142-148 (2015) (中科院分区二区)论文下载.pdf

[37] Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process. Wireless Networks 21(8): 2453-2466 (2015)  论文下载.pdf

[38] Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang:Modeling the success transmission rate in Aloha MANETs with Binomial point process. ICMU 2015: 36-41 论文下载.pdf

 

2014年发表论文:

[39] Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:Secrecy transmission capacity in noisy wireless ad hoc networks. Ad Hoc Networks 21: 123-133 (2014) 论文下载.pdf

[40] Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel. IEICE Transactions 97-B(2): 396-407 (2014)

[41] Yulong Shen, Yuanyu Zhang:Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. Inf. Sci. 281: 201-210 (2014)(CCF B类,中科院分区二区) 论文下载.pdf

[42] Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma:The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. J. Inf. Sci. Eng. 30(3): 875-893 (2014)

[43] Yulong Shen, Yuanyu Zhang:Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks. EAI Endorsed Trans. Scalable Information Systems 1(2): e2 (2014)

[44] Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. CIS 2014: 603-607 论文下载.pdf

 

2013年发表论文:

[45] Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang:Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. IJDSN 9 (2013) 论文下载.pdf

[46] Yongzhao Zhan, Lu Liu, Liang-min Wang, Yulong Shen:Wireless Sensor Networks for the Internet of Things. IJDSN 9 (2013)

[47] Yulong Shen, Xiaohong Jiang, Jianfeng Ma:Flexible relay selection for secure communication in two-hop wireless networks. WiOpt 2013: 648-651 论文下载.pdf

 

2012年发表论文:

[48] Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma:Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks. IJDSN 8 (2012) 论文下载.pdf

[49] Yulong Shen, Qingqi Pei, Qijian Xu, Zhiwei Zhang:The multimedia service session handoff method in heterogeneous wireless networks. IJGUC 3(1): 68-77 (2012)

[50] Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:Security Information Flow Control Model and Method in MILS. CIS 2012: 591-595 论文下载.pdf

[51] Xinghua Li, Jianfeng Ma, Yulong Shen:An efficient WLAN initial access authentication protocol. GLOBECOM 2012: 1035-1040 论文下载.pdf

[52] Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu:The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. INCoS 2012: 185-192 论文下载.pdf

 

2011年发表论文:

[53] Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. CIS 2011: 545-549 论文下载.pdf

[54] Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. CIS 2011: 635-639 论文下载.pdf

[55] Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. CIS 2011: 731-735 论文下载.pdf

[56] Yulong Shen, Qingzhen Liu, Wenzhong Guo:Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization. ICNC 2011: 2179-2183 论文下载.pdf

[57] Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. INCoS 2011: 251-257 论文下载.pdf

[58] Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. INCoS 2011: 320-327 论文下载.pdf

版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
西安电子科技大学个人主页 站点地图 | | 沈玉龙的留言板 | 更新日期 :2018-06-22 | |
Copyright © 2011-2016 西安电子科技大学 版权所有 陕ICP备021284(05016169) Powered by 信息化建设处 & 电院网络中心