supported by National Key R&D Program of China ( 2020YFB1807204)。
The sub-6 G band is too crowded to accommodate higher data rate, while the millimeter wave(mmWave) bands have abundant spectrum resources and massive MIMO can provide high spectral and energy efficiency. Therefore, th...
supported by National Key Research and Development Project of China(2019YFB1802501);Research and Development Program in Key Areas of Guangdong Province(2018B010113001);Open Foundation of Science and Technology on Communication Networks Laboratory(No.6142104180106)。
Cloud providers(e.g.,Google,Alibaba,Amazon)own large-scale datacenter networks that comprise thousands of switches and links.A loadbalancing mechanism is supposed to effectively utilize the bisection bandwidth.Both Eq...
A key challenge to the scalable deployment of the energy self-sustainability(ESS)Internet of Everything(IoE)for sixth-generation(6G)networks is juggling massive connectivity and high spectral efficiency(SE).Cell-free ...
supported by the National Key Research and Development Program of China (2018YFB0804004);the Foundation of the National Natural Science Foundation of China (61602509);the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003);the Key Technologies Research and Development Program of Henan Province of China (172102210615)
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi...
supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (Grant No. 2016YFB0800100, No. 2016YFB0800101);the National Natural Science Foundation of China (Grant No. 61521003);the National Key R&D Program of China (Grant No. 61309020)
Dynamic Controller Provisioning Problem(DCPP) is a key problem for scalable SDN. Previously, the solution to this problem focused on adapting the number of controllers and their locations with changing network conditi...
supported in part by National High-Tech Research and Development Program of China(“863”Program)under Grant No.2015AA016004;National Natural Science Foundation of China under Grants No.61173154,61272451,61572380
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented...
supported by Program for National Basic Research Program of China (973 Program) "Reconfigurable Network Emulation Testbed for Basic Network Communication"
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali...
supported by the Doctoral Fund of Northeastern University of Qinhuangdao(No.XNB201410);the Fundamental Research Funds for the Central Universities(No.N130323005);the Natural Science Foundation of Hebei Province of China(No.F2015501122);the Doctoral Scientific Research Foundation of Liaoning Province(No.201501143)
Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the ...
Acknowledgements This work was supported by the Hi-Tech Research and Development Program of China under Grant No.2007AA01Z407; the Co-Funding Project of Beijing Municipal education Commission under Grant No.JD100060630; National Foundation Research Project; the National Natural Science Foundation Project under Grant No. 61170295; the Project of Aeronautical Science Foundation of China under Caant No.2011ZC51024; and the Fundamental Research Funds for the Central Universities.
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ...
Secure multicasting is one of the major requirementsfor today’s communication arena.And for any kindof secure communication,a key-distribution schemeis the most sensible part.Being a highly promising,low-cost,and eme...