• Publications
  • Influence
A Distributed Energy-Balanced Topology Control Algorithm Based on a Noncooperative Game for Wireless Sensor Networks
TLDR
An Energy Balance Topology control Game algorithm (EBTG), in which, by taking the energy efficiency and energy balance of the nodes into account, the EBTG algorithm can improve the energy balance and energy efficiency, and can prolong the network lifetime in comparison with other topology control algorithms based on game theory. Expand
An Energy-Efficient and Fault-Tolerant Topology Control Game Algorithm for Wireless Sensor Network
TLDR
A practical utility function that can effectively balance transmit power, residual energy, and network connectivity, and then a topology control game model based on non-cooperative game theory is investigated, showing that it is a potential game and can converge to a state of the Nash equilibrium. Expand
Cross-Layer Optimized Energy-Balanced Topology Control Algorithm for WSNs
TLDR
This paper proposes a cross-layer optimized energy-balanced topology control algorithm (COETC), which not only guarantees the network connectivity and robustness while reducing the required node transmitting power but also achieves good energy balance and high energy efficiency. Expand
An Optimal Decision Method for Intrusion Detection System in Wireless Sensor Networks With Enhanced Cooperation Mechanism
TLDR
The optimized algorithm has solved the problem that an excessively large database of attack patterns affects the speed of switching to the optimal defense decision strategy and the learning efficiency of the evolutionary game replicator dynamic mechanism is not fast enough. Expand
Joint Resource Allocation and Mode Selection for Device-to-Device Communication Underlying Cellular Networks
TLDR
This work studies issues pertaining to D2D communication, such as dual mode selection, channel allocation and power control, aiming at the maximization of the overall throughput of the system, while at the same time ensuring that the generated interference is kept minimized. Expand
An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
TLDR
The proposed enhanced dummy-based location privacy-preserving scheme adopts an improved greedy scheme to efficiently select dummy locations to form a k-anonymous set and can resist side information attacks. Expand