Retraction Notice to:Mitigating Content Caching Attack in NDN
2018-03-20ZhiqiangRuanHaiboLuoWenzhongLinandJieWang
Zhiqiang Ruan ,Haibo LuoWenzhong Lin and Jie Wang
1 Department of Computer Science,Minjiang University,Wenxian Road No.1,Fuzhou,Fujian,350108,China.
2 Department of Computer Science,University of Massachusetts Lowell,One University Avenue,Lowell,M.A.,01854,USA.
The published article titled“Mitigating Content Caching Attack in NDN”has been retracted from the Computers,Materials & Continua(CMC),Vol.56,No.3 2018.
The author Zhiqiang Ruan has plagiarized parts of a paper that had already appeared in IEEE Transactions on Information Forensics and Security in 2017 titled"Security of Cached Content in NDN." vol.12,no.12,pp.2933-2944,DOI:10.1109/TIFS.2017.2725229.Upon request of original authors,Tech Science Press conducted an institutional investigation which confirmed the misconduct.During the investigation,the corresponding author Zhiqiang Ruan also declared that he submitted the paper without knowledge and permission of Haibo Luo,Wenzhong Lin and Jie Wang in the author list,and used fake email addresses and their signatures on the copyright form.After being informed of the misconduct of the published paper,Zhiqiang Ruan acknowledges the plagiarism and apologizes solemnly to the original authors.In addition,he requests to retract the article from CMC and will take full responsibility for the corrections and retraction.
Tech Science Press is fully committed to enforcing strict ethical policies and follow the COPE Retraction Guidelines.The essential condition of submission of a paper for publication in CMC is that authors must declare explicitly that their works are original and have not been previously published elsewhere.Re-use of any data should be appropriately cited.To set the record straight,we hereby announce the retraction of the paper,and would like to sincerely apologize to our readers for any inconvenience this may have caused.
杂志排行
Computers Materials&Continua的其它文章
- A Virtual Puncture Surgery System Based on Multi-Layer Soft Tissue and Force Mesh
- A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security
- Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol
- Natural Language Semantic Construction Based on CloudDatabase
- Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
- Seed Selection for Data Offloading Based on Social and Interest Graphs