Match!
Xueping Ning
Hunan University
3Publications
2H-index
55Citations
Publications 3
Newest
#1Kun Xie (Hunan University)H-Index: 13
#2Xueping Ning (Hunan University)H-Index: 2
Last.Zheng Qin (Hunan University)H-Index: 3
view all 8 authors...
Due to the strict energy limitation and the common vulnerability of WSNs, providing efficient and security data gathering in WSNs becomes an essential problem. Compressive data gathering, which is based on the recent breakthroughs in compressive sensing theory, has been proposed as a viable approach for data gathering in WSNs at low communication overhead. Nevertheless, compressive data gathering is susceptible to various attacks due to the open wireless medium. To thwart traffic analysis/flow t...
#1Kun Xie (Hunan University)H-Index: 13
#2Xueping Ning (Hunan University)H-Index: 2
Last.Jigang Wen (CAS: Chinese Academy of Sciences)H-Index: 13
view all 7 authors...
Affected by hardware and wireless conditions in WSNs, raw sensory data usually have notable data loss and corruption. Existing studies mainly consider the interpolation of random missing data in the absence of the data corruption. There is also no strategy to handle the successive missing data. To address these problems, this paper proposes a novel approach based on matrix completion (MC) to recover the successive missing and corrupted data. By analyzing a large set of weather data collected fro...
Nov 18, 2015 in ICA3PP (International Conference on Algorithms and Architectures for Parallel Processing)
#1Kun Xie (Hunan University)H-Index: 13
#2Xueping Ning (Hunan University)H-Index: 2
Last.Daqiang Zhang (Tongji University)H-Index: 1
view all 7 authors...
Due to the strict energy limitation and the common vulnerability of WSNs, providing efficient and security data gathering in WSNs becomes an essential problem. Compressive data gathering, which is based on the recent breakthroughs in compressive sensing theory, has been proposed as a viable approach for data gathering in WSNs at low communication overhead. Nevertheless, compressive data gathering is susceptible to various attacks due to the open wireless medium. To thwart traffic analysis/flow t...
1