Name
Affiliation
Papers
JUNHUA TANG
School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China
31
Collaborators
Citations 
PageRank 
53
63
12.59
Referers 
Referees 
References 
212
545
242
Search Limit
100545
Title
Citations
PageRank
Year
PHGNN: Position-aware Graph Neural Network for Heterogeneous Graph Embedding00.342021
KCC Method: Unknown Intrusion Detection Based on Open Set Recognition00.342021
Cmaps: A Chess-Based Multi-Facet Password Scheme For Mobile Devices10.342018
A lightweight authentication scheme based on self-updating strategy for space information network.30.392017
Matrix Based Community Evolution Events Detection In Online Social Networks20.362015
Overlapping Community Detection Using NVPA00.342015
Detecting community structure via synchronous label propagation.90.522015
A neighborhood vector propagation algorithm for community detection30.442014
Optimal power allocation over multiple identical Gilbert-Elliott channels.00.342013
Power allocation over two identical Gilbert-Elliott channels10.362013
Optimal power allocation policy over two identical Gilbert-Elliott channels10.382012
Comprehensive Evaluation and Selection System of Coal Distributors with Analytic Hierarchy Process and Artificial Neural Network.20.442011
Gossip-based scalable directed diffusion for wireless sensor networks160.712011
Interleaving embedding scheme for ECC-based multimedia fingerprinting00.342010
Enhancing Ddos Flood Attack Detection Via Intelligent Fuzzy Logic70.512010
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed00.342010
Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks10.362010
An Efficient and Robust Self-Storage P2P Reputation System10.512009
Authentication tests based on test type matrix00.342009
A Dynamic Scheme For Authenticated Group Key Agreement Protocol00.342008
Providing Differentiated Services Over Shared Wireless Downlink Through Buffer Management40.532008
A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties20.392008
A Grid Trust Model Based On MADM Theory10.392008
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink00.342008
An opportunistic video scheduling algorithm over shared wireless downlink20.402006
An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink20.402006
A new joint packet scheduling/admission control framework for multi-service wireless networks.00.342005
Optical nonlinear effects on the performance of IP traffic over GMPLS-based DWDM networks10.382003
Characterization and performance study of IP traffic in WDM networks10.372001
The effect of IP traffic on WDM-based networks20.652000
Effect of IP Traffic on Optical QoS in DWDM Networks10.382000