Junze Han
Junze Han
Verified email at hawk.iit.edu
Title
Cited by
Cited by
Year
Continuous user identification via touch and movement behavioral biometrics
C Bo, L Zhang, T Jung, J Han, XY Li, Y Wang
2014 IEEE 33rd International Performance Computing and Communications …, 2014
612014
Accounttrade: Accountable protocols for big data trading against dishonest consumers
T Jung, XY Li, W Huang, J Qian, L Chen, J Han, J Hou, C Su
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
322017
Social network de-anonymization and privacy inference with knowledge graph model
J Qian, XY Li, C Zhang, L Chen, T Jung, J Han
IEEE Transactions on Dependable and Secure Computing, 2017
322017
Detecting driver’s smartphone usage via nonintrusively sensing driving dynamics
C Bo, X Jian, T Jung, J Han, XY Li, X Mao, Y Wang
IEEE Internet of Things Journal 4 (2), 340-350, 2016
302016
Martian: Message broadcast via LED lights to heterogeneous smartphones
H Du, J Han, X Jian, T Jung, C Bo, Y Wang, XY Li
IEEE Journal on Selected Areas in Communications 35 (5), 1154-1162, 2017
172017
Closing the gap in the multicast capacity of hybrid wireless networks
S Tang, X Mao, T Jung, J Han, XY Li, B Xu, C Ma
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc …, 2012
142012
Network agile preference-based prefetching for mobile devices
JZ Han, XY Li, T Jung, J Zhao, Z Zhao
2014 IEEE 33rd International Performance Computing and Communications …, 2014
92014
RainbowRate: MIMO rate adaptation in 802.11 n WiLD links
Z Zhao, F Zhang, S Guo, XY Li, J Han
2014 IEEE 33rd International Performance Computing and Communications …, 2014
82014
PDA: semantically secure time-series data analytics with dynamic user groups
T Jung, J Han, XY Li
IEEE Transactions on Dependable and Secure Computing 15 (2), 260-274, 2016
72016
AccountTrade: Accountability against dishonest big data buyers and sellers
T Jung, XY Li, W Huang, Z Qiao, J Qian, L Chen, J Han, J Hou
IEEE Transactions on Information Forensics and Security 14 (1), 223-234, 2018
62018
A framework for optimization in big data: Privacy-preserving multi-agent greedy algorithm
T Jung, XY Li, J Han
International Conference on Big Data Computing and Communications, 88-102, 2015
52015
Pickup game: Acquainting neighbors quickly and efficiently in crowd
J Han, XY Li
2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems …, 2014
42014
Infinite choices of data aggregations with linear number of keys
T Jung, XY Li
arXiv preprint arXiv:1308.6198, 2013
32013
Martian--message broadcast via LED lights to heterogeneous smartphones: poster
H Du, J Han, Q Huang, X Jian, C Bo, Y Wang, H Xu, X Li
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
22016
SA-MAC: Self-stabilizing adaptive MAC protocol for wireless sensor networks
C Bo, J Han, X Li, Y Wang, B Xiao
Journal of Computer Science and Technology 29 (4), 605-617, 2014
22014
程序设计在线评测辅助教学系统的设计与实现
韩君泽, 钟美, 刘东升
內蒙古師範大學學報 (自然科學漢文版) 39 (5), 473-476, 2010
22010
程序设计在线评测辅助教学系统的设计与实现
韩君泽, 钟美, 刘东升
內蒙古師範大學學報 (自然科學漢文版) 39 (5), 473-476, 2010
22010
GasNet: Efficient Residential Building Gas Leak Monitoring via Opportunistic Networking
Z Zhao, X Zhang, X Wu, XY Li, J Han
2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems …, 2014
12014
C/C++ 编程风格批注系统的设计与实现
韩君泽, 张良德, 刘东升
内蒙古大学学报: 自然科学版 41 (6), 712-716, 2010
12010
Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics
J Han, T Jung, XY Li, L Du
2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20