On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems
暂无分享,去创建一个
Lu Liu | Yanjun Li | Kai Lin | Honglong Chen | Xin Ai | Rongjie Che
[1] Weiping Zhu,et al. Accurate and Efficient Object Tracking Based on Passive RFID , 2015, IEEE Transactions on Mobile Computing.
[2] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[3] Bo Sheng,et al. Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.
[4] Alex X. Liu,et al. Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild , 2016, IEEE/ACM Transactions on Networking.
[5] Victor C. M. Leung,et al. A Time-Ordered Aggregation Model-Based Centrality Metric for Mobile Social Networks , 2018, IEEE Access.
[6] Jie Wu,et al. RFID cardinality estimation with blocker tags , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[7] Zhihong Qian,et al. Fast unknown tag identification in large-scale RFID systems , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).
[8] Ming Zhang,et al. Efficient information collection protocols for sensor-augmented RFID networks , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Bo Sheng,et al. Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Shaojie Tang,et al. RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems , 2009, 2009 17th IEEE International Conference on Network Protocols.
[11] Feng Xia,et al. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.
[12] Keqiu Li,et al. Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way , 2015, IEEE Transactions on Computers.
[13] Victor C. M. Leung,et al. Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.
[14] Ching-Hsien Hsu,et al. Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems , 2011, Inf. Syst. Frontiers.
[15] Xiao Lu,et al. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.
[16] Giuseppe Bianchi,et al. Revisiting an RFID Identification-Free Batch Authentication Approach , 2011, IEEE Communications Letters.
[17] Meng Wang,et al. Modeling and Analysis of Large-Scale Urban Mobility for Green Transportation , 2018, IEEE Transactions on Industrial Informatics.
[18] Ivan Stojmenovic,et al. Sampling Bloom Filter-Based Detection of Unknown RFID Tags , 2015, IEEE Transactions on Communications.
[19] Hairong Qi,et al. Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing , 2019, IEEE Transactions on Mobile Computing.
[20] Lin Chen,et al. Finding Needles in a Haystack: Missing Tag Detection in Large RFID Systems , 2015, IEEE Transactions on Communications.
[21] Yong,et al. Study on RFID Authentication Protocol Theory , 2011 .
[22] Hairong Qi,et al. Cost-effective barrier coverage formation in heterogeneous wireless sensor networks , 2017, Ad Hoc Networks.
[23] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[24] Shigeng Zhang,et al. Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.
[25] Honglong Chen,et al. Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.
[26] Andrea Zanella. Adaptive Batch Resolution Algorithm with Deferred Feedback for Wireless Systems , 2012, IEEE Transactions on Wireless Communications.
[27] Jiguo Yu,et al. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.
[28] Jiguo Yu,et al. Efficient 3-dimensional localization for RFID systems using jumping probe , 2017, Pervasive Mob. Comput..
[29] Yuguang Fang,et al. An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel , 2013, IEEE/ACM Transactions on Networking.
[30] Hairong Qi,et al. Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.
[31] Alex X. Liu,et al. Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.
[32] Victor C. M. Leung,et al. A Survey on Mobile Data Offloading Technologies , 2018, IEEE Access.
[33] Hairong Qi,et al. Achieving location error tolerant barrier coverage for wireless sensor networks , 2017, Comput. Networks.
[34] Keqiu Li,et al. Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[35] Feng Xia,et al. Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems , 2017, IEEE Transactions on Vehicular Technology.
[36] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[37] Lei Zhu,et al. Optimal Framed Aloha Based Anti-Collision Algorithms for RFID Systems , 2010, IEEE Transactions on Communications.
[38] Jing Sun,et al. Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .
[39] Daqiang Zhang,et al. TIP: Time-Efficient Identification Protocol for Unknown RFID Tags Using Bloom Filters , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).
[40] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[41] Shaojie Tang,et al. Reader Activation Scheduling in Multi-reader RFID Systems: A Study of General Case , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.