default search action
Daojing He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j129]Zhendong Wang, Lili Huang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan:
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization. Ad Hoc Networks 152: 103308 (2024) - [j128]Zhendong Wang, Donghui Dai, Zhiyuan Zeng, Daojing He, Sammy Chan:
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems. Clust. Comput. 27(8): 10671-10715 (2024) - [j127]Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo:
A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. IEEE Internet Things J. 11(2): 2236-2243 (2024) - [j126]Daojing He, Ke Ding, Sammy Chan, Mohsen Guizani:
Unknown Threats Detection Methods of Smart Contracts. IEEE Internet Things J. 11(3): 4430-4441 (2024) - [j125]Daojing He, Hongjie Gu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
A Comprehensive Detection Method for the Lateral Movement Stage of APT Attacks. IEEE Internet Things J. 11(5): 8440-8447 (2024) - [j124]Dian Lei, Jinwen Liang, Chuan Zhang, Ximeng Liu, Daojing He, Liehuang Zhu, Song Guo:
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services. IEEE Internet Things J. 11(6): 9829-9842 (2024) - [j123]Chenfei Hu, Zihan Li, Yuhua Xu, Chuan Zhang, Ximeng Liu, Daojing He, Liehuang Zhu:
Multiround Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems. IEEE Internet Things J. 11(10): 17210-17222 (2024) - [j122]Jie Zhao, Hejiao Huang, Xiaojun Zhang, Daojing He, Kim-Kwang Raymond Choo, Zoe Lin Jiang:
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks. IEEE Internet Things J. 11(10): 18647-18662 (2024) - [j121]Daojing He, Zhiyong Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Special Characters Usage and Its Effect on Password Security. IEEE Internet Things J. 11(11): 19440-19453 (2024) - [j120]Jie Zhao, Hejiao Huang, Daojing He, Xiaojun Zhang, Yuan Zhang, Kim-Kwang Raymond Choo:
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage. IEEE Internet Things J. 11(16): 27214-27231 (2024) - [j119]Runmeng Du, Daojing He, Zikang Ding, Miao Wang, Sammy Chan, Xuru Li:
GSASG: Global Sparsification With Adaptive Aggregated Stochastic Gradients for Communication-Efficient Federated Learning. IEEE Internet Things J. 11(17): 28253-28266 (2024) - [j118]Zhendong Wang, Weibing Zeng, Shuxin Yang, Daojing He, Sammy Chan:
UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks. IEEE Internet Things J. 11(17): 29001-29019 (2024) - [j117]Guangfu Wu, Haiping Wang, Xin Lai, Mengmeng Wang, Daojing He, Sammy Chan:
A comprehensive survey of smart contract security: State of the art and research directions. J. Netw. Comput. Appl. 226: 103882 (2024) - [j116]Shuaishuai Tan, Daojing He, Sammy Chan, Mohsen Guizani:
FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows. IEEE Netw. 38(4): 268-274 (2024) - [j115]Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu:
Improving byzantine fault tolerance based on stake evaluation and consistent hashing. Peer Peer Netw. Appl. 17(4): 1963-1975 (2024) - [j114]Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan:
A hierarchical hybrid intrusion detection model for industrial internet of things. Peer Peer Netw. Appl. 17(5): 3385-3407 (2024) - [j113]Zikang Ding, Daojing He, Qi Qiao, Xuru Li, Yun Gao, Sammy Chan, Kim-Kwang Raymond Choo:
A Lightweight and Secure Communication Protocol for the IoT Environment. IEEE Trans. Dependable Secur. Comput. 21(3): 1050-1067 (2024) - [j112]Shuaishuai Tan, Shui Yu, Wenyin Liu, Daojing He, Sammy Chan:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. IEEE Trans. Dependable Secur. Comput. 21(3): 1210-1223 (2024) - [j111]Runmeng Du, Xuru Li, Daojing He, Kim-Kwang Raymond Choo:
Toward Secure and Verifiable Hybrid Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 2935-2950 (2024) - [j110]Daojing He, Xin Lv, Xueqian Xu, Sammy Chan, Kim-Kwang Raymond Choo:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. IEEE Trans. Inf. Forensics Secur. 19: 4741-4751 (2024) - [c22]Jiawei Zhou, Linye Lyu, Daojing He, Yu Li:
RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation. ICML 2024 - [c21]Zefei Luo, Yu Li, Shuaishuai Tan, Daojing He:
Enhancing Flow Embedding Through Trace: A Novel Self-supervised Approach for Encrypted Traffic Classification. IJCNN 2024: 1-8 - [c20]Yukai Wang, Qisheng Huang, Long Shi, Ting Wu, Junping Ji, Daojing He:
Optimal Offering Strategies for Renewable Energy Producers: A Coalitional Game Approach. SmartGridComm 2024: 452-457 - [i4]Jiawei Zhou, Linye Lyu, Daojing He, Yu Li:
RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation. CoRR abs/2402.15853 (2024) - [i3]Xin Chen, Zhili Chen, Benchang Dong, Shiwen Wei, Lin Chen, Daojing He:
FOBNN: Fast Oblivious Binarized Neural Network Inference. CoRR abs/2405.03136 (2024) - [i2]Guodong Du, Junlin Lee, Jing Li, Runhua Jiang, Yifei Guo, Shuyang Yu, Hanting Liu, Sim Kuan Goh, Ho-Kin Tang, Daojing He, Min Zhang:
Parameter Competition Balancing for Model Merging. CoRR abs/2410.02396 (2024) - 2023
- [j109]Lushuai Niu, Zhi Xu, Longyang Zhao, Daojing He, Jianqiu Ji, Xiaoli Yuan, Mian Xue:
Residual Vector Product Quantization for approximate nearest neighbor search. Expert Syst. Appl. 232: 120832 (2023) - [j108]Zhendong Wang, Jingfei Li, Zhenyu Xu, Shuxin Yang, Daojing He, Sammy Chan:
Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection. Int. J. Intell. Syst. 2023: 1-33 (2023) - [j107]Daojing He, Xiaohu Yu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Fuzzy Hashing on Firmwares Images: A Comparative Analysis. IEEE Internet Comput. 27(2): 45-50 (2023) - [j106]Daojing He, Ziming Zhao, Sammy Chan, Mohsen Guizani:
A Novel Authentication Protocol for IoT-Enabled Devices. IEEE Internet Things J. 10(1): 867-876 (2023) - [j105]Daojing He, Rui Wu, Xinji Li, Sammy Chan, Mohsen Guizani:
Detection of Vulnerabilities of Blockchain Smart Contracts. IEEE Internet Things J. 10(14): 12178-12185 (2023) - [j104]Shuaishuai Tan, Wenyin Liu, Qingkuan Dong, Sammy Chan, Shui Yu, Xiaoxiong Zhong, Daojing He:
Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly. IEEE Internet Things J. 10(23): 21000-21012 (2023) - [j103]Jie Zhao, Yifeng Zheng, Hejiao Huang, Jing Wang, Xiaojun Zhang, Daojing He:
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems. J. Syst. Archit. 138: 102860 (2023) - [j102]Daojing He, Jiayu Dai, Hongjie Gu, Shanshan Zhu, Sammy Chan, Jingyong Su, Mohsen Guizani:
A Malicious Domains Detection Method Based on File Sandbox Traffic. IEEE Netw. 37(6): 182-188 (2023) - [j101]Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. IEEE Trans. Dependable Secur. Comput. 20(2): 1088-1103 (2023) - [j100]Daojing He, Yanchang Cai, Shanshan Zhu, Ziming Zhao, Sammy Chan, Mohsen Guizani:
A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT. IEEE Trans. Wirel. Commun. 22(11): 7862-7872 (2023) - [c19]Wenyu Xiang, Jie Zhao, Hejiao Huang, Xiaojun Zhang, Zoe Lin Jiang, Daojing He:
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems. ICA3PP (2) 2023: 292-310 - [c18]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - 2022
- [j99]Zhendong Wang, Zeyu Li, Daojing He, Sammy Chan:
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning. Expert Syst. Appl. 206: 117671 (2022) - [j98]Daojing He, Runmeng Du, Shanshan Zhu, Min Zhang, Kaitai Liang, Sammy Chan:
Secure Logistic Regression for Vertical Federated Learning. IEEE Internet Comput. 26(2): 61-68 (2022) - [j97]Daojing He, Xiaohu Yu, Tinghui Li, Sammy Chan, Mohsen Guizani:
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices. IEEE Internet Things J. 9(17): 16438-16445 (2022) - [j96]Daojing He, Xintong Lu, Xuru Li, Sammy Chan, Mohsen Guizani:
Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme. IEEE Internet Things J. 9(19): 19238-19245 (2022) - [j95]Daojing He, Jiayu Dai, Xiaoxia Liu, Shanshan Zhu, Sammy Chan, Mohsen Guizani:
Adversarial Attacks for Intrusion Detection Based on Bus Traffic. IEEE Netw. 36(4): 203-209 (2022) - [j94]Daojing He, Xin Lv, Xueqian Xu, Shui Yu, Dawei Li, Sammy Chan, Mohsen Guizani:
An Effective Double-Layer Detection System Against Social Engineering Attacks. IEEE Netw. 36(6): 92-98 (2022) - [j93]Weidong Min, Ruikang Liu, Daojing He, Qing Han, Qingting Wei, Qi Wang:
Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location. IEEE Trans. Intell. Transp. Syst. 23(9): 15794-15807 (2022) - [c17]Chengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen, Junbin Fang, Daojing He, Jun Zhang, Xuan Wang:
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption. INFOCOM Workshops 2022: 1-6 - [i1]Yu Li, Muxi Chen, Yannan Liu, Daojing He, Qiang Xu:
An Empirical Study on the Efficacy of Deep Active Learning for Image Classification. CoRR abs/2212.03088 (2022) - 2021
- [j92]Hankun Liu, Daojing He, Sammy Chan:
Fraudulent News Headline Detection with Attention Mechanism. Comput. Intell. Neurosci. 2021: 6679661:1-6679661:7 (2021) - [j91]Zhendong Wang, Yaodi Liu, Daojing He, Sammy Chan:
Intrusion detection methods based on integrated deep learning model. Comput. Secur. 103: 102177 (2021) - [j90]Xiangjun Li, Ke Kong, Su Xu, Pengtao Qin, Daojing He:
Feature selection-based android malware adversarial sample generation and detection method. IET Inf. Secur. 15(6): 401-416 (2021) - [j89]Guisong Yang, Ling Hou, Xingyu He, Daojing He, Sammy Chan, Mohsen Guizani:
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing. IEEE Internet Things J. 8(4): 2483-2493 (2021) - [j88]Xiangjun Li, Zijie Wu, Zhibin Zhao, Feng Ding, Daojing He:
A mixed data clustering algorithm with noise-filtered distribution centroid and iterative weight adjustment strategy. Inf. Sci. 577: 697-721 (2021) - [j87]Daojing He, Beibei Zhou, Hang Yu, Yao Cheng, Sammy Chan, Min Zhang, Nadra Guizani:
Group-based Password Characteristics Analysis. IEEE Netw. 35(1): 311-317 (2021) - [j86]Daojing He, Guang Yang, Hongyi Li, Sammy Chan, Yao Cheng, Nadra Guizani:
An Effective Countermeasure Against UAV Swarm Attack. IEEE Netw. 35(1): 380-385 (2021) - [j85]Daojing He, Hongjie Gu, Tinghui Li, Yongliang Du, Xiaolei Wang, Sencun Zhu, Nadra Guizani:
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware. IEEE Netw. 35(2): 202-207 (2021) - [j84]Daojing He, Yun Gao, Xiaoxia Liu, Sammy Chan, Yao Cheng, Xiaowen Liu, Baokang Zhao, Nadra Guizani:
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems. IEEE Netw. 35(4): 234-240 (2021) - [j83]Daojing He, Hang Yu, Beibei Zhou, Shanshan Zhu, Min Zhang, Sammy Chan, Mohsen Guizani:
How Does Social Behavior Affect Your Password? IEEE Netw. 35(5): 284-289 (2021) - [j82]Zhendong Wang, Zhenyu Xu, Daojing He, Sammy Chan:
Deep logarithmic neural network for Internet intrusion detection. Soft Comput. 25(15): 10129-10152 (2021) - [j81]Yaguang Lin, Xiaoming Wang, Fei Hao, Yichuan Jiang, Yulei Wu, Geyong Min, Daojing He, Sencun Zhu, Wei Zhao:
Dynamic Control of Fraud Information Spreading in Mobile Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(6): 3725-3738 (2021) - [c16]Yan Song, Binbin Wang, Xiaohu Yu, Tinghui Li, Shanshan Zhu, Daojing He, Guisong Yang, Sammy Chan:
Review of Firmware Homology Detection: a System Aspect. DSC 2021: 556-563 - [c15]Litong Sun, Runmeng Du, Daojing He, Shanshan Zhu, Rui Wang, Sammy Chan:
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning. HPCC/DSS/SmartCity/DependSys 2021: 487-494 - [c14]Menghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao:
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments. ISCC 2021: 1-7 - [c13]Kaiyun Pan, Daojing He, Chuan Xu:
Local Model Privacy-Preserving Study for Federated Learning. SecureComm (1) 2021: 287-307 - 2020
- [j80]Guangfu Wu, Yijie Lv, Daojing He, Jiguang He, Huan Zhou, Sammy Chan:
Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory. IEEE Access 8: 26764-26772 (2020) - [j79]Qi Wang, Weidong Min, Daojing He, Song Zou, Tiemei Huang, Yu Zhang, Ruikang Liu:
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking. Sci. China Inf. Sci. 63(11) (2020) - [j78]Guisong Yang, Ling Hou, Hao Cheng, Xingyu He, Daojing He, Sammy Chan:
Computation offloading time optimisation via Q-learning in opportunistic edge computing. IET Commun. 14(21): 3898-3906 (2020) - [j77]Jun Li, Xingyu He, Dan Zhao, Guisong Yang, Daojing He, Sammy Chan:
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks. IET Networks 9(6): 372-377 (2020) - [j76]Song Han, Jianhong Lin, Shuai Zhao, Guangquan Xu, Siqi Ren, Daojing He, Licheng Wang, Leyun Shi:
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing. IEEE Internet Things J. 7(8): 7550-7563 (2020) - [j75]Daojing He, Xiao Yang, Beibei Zhou, Yu Wu, Yao Cheng, Nadra Guizani:
Password Enhancement Based on Semantic Transformation. IEEE Netw. 34(1): 116-121 (2020) - [j74]Daojing He, Qi Qiao, Jiahao Gao, Sammy Chan, Kangfeng Zheng, Nadra Guizani:
Simulation Design for Security Testing of Integrated Electronic Systems. IEEE Netw. 34(1): 159-165 (2020) - [j73]Daojing He, Xiaoxia Liu, Jiajia Zheng, Sammy Chan, Sencun Zhu, Weidong Min, Nadra Guizani:
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems. IEEE Netw. 34(4): 173-179 (2020) - [j72]Daojing He, Beibei Zhou, Xiao Yang, Sammy Chan, Yao Cheng, Nadra Guizani:
Group Password Strength Meter Based on Attention Mechanism. IEEE Netw. 34(4): 196-202 (2020) - [j71]Daojing He, Menghan Pan, Kai Hong, Yao Cheng, Sammy Chan, Xiaowen Liu, Nadra Guizani:
Fake Review Detection Based on PU Learning and Behavior Density. IEEE Netw. 34(4): 298-303 (2020) - [j70]Daojing He, Zhi Deng, Yuxing Zhang, Sammy Chan, Yao Cheng, Nadra Guizani:
Smart Contract Vulnerability Analysis and Security Audit. IEEE Netw. 34(5): 276-282 (2020) - [j69]Daojing He, Yuxing Zhang, Tinghui Li, Sammy Chan, Yao Cheng, Nadra Guizani:
Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras. IEEE Netw. 34(5): 315-321 (2020) - [j68]Daojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, Nadra Guizani:
Security Analysis of Cryptocurrency Wallets in Android-Based Applications. IEEE Netw. 34(6): 114-119 (2020) - [j67]Xiangjun Li, Sifan Li, Shengnan Liu, Lingfeng Liu, Daojing He:
A Malicious Webpage Detection Algorithm Based on Image Semantics. Traitement du Signal 37(1): 113-118 (2020) - [c12]Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, Yao Cheng:
Android-based Cryptocurrency Wallets: Attacks and Countermeasures. Blockchain 2020: 9-16 - [c11]Qi Qiao, Daojing He, Yun Gao, Sencun Zhu, Jiahao Gao, Sammy Chan:
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems. SECON 2020: 1-9 - [c10]Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan:
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems. SRDS 2020: 205-214
2010 – 2019
- 2019
- [j66]Zhangjie Fu, Yiming Chen, Yongjie Ding, Daojing He:
Pollution Source Localization Based on Multi-UAV Cooperative Communication. IEEE Access 7: 29304-29312 (2019) - [j65]Zhangjie Fu, Yuanhang Mao, Daojing He, Jingnan Yu, Guowu Xie:
Secure Multi-UAV Collaborative Task Allocation. IEEE Access 7: 35579-35587 (2019) - [j64]Zhendong Wang, Huamao Xie, Daojing He, Sammy Chan:
Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms. IEEE Access 7: 180590-180608 (2019) - [j63]Qiang Fan, Wang Luo, Yuan Xia, Guozhi Li, Daojing He:
metrics and methods of video quality assessment: a brief review. Multim. Tools Appl. 78(22): 31019-31033 (2019) - [j62]Daojing He, Yinrong Qiao, Shiqing Chen, Xiao Du, Wenjie Chen, Sencun Zhu, Mohsen Guizani:
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles. IEEE Netw. 33(2): 146-151 (2019) - [j61]Daojing He, Hong Liu, Sammy Chan, Mohsen Guizani:
How to Govern the Non-Cooperative Amateur Drones? IEEE Netw. 33(3): 184-189 (2019) - [j60]Daojing He, Qi Qiao, Yun Gao, Jiajia Zheng, Sammy Chan, Jinxiang Li, Nadra Guizani:
Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems. IEEE Netw. 33(6): 64-69 (2019) - [j59]Daojing He, Kai Hong, Yao Cheng, Zongli Tang, Mohsen Guizani:
Detecting Promotion Attacks in the App Market Using Neural Networks. IEEE Wirel. Commun. 26(4): 110-116 (2019) - 2018
- [j58]Daojing He, Sammy Chan, Yinrong Qiao, Nadra Guizani:
Imminent Communication Security for Smart Communities. IEEE Commun. Mag. 56(1): 99-103 (2018) - [j57]Daojing He, Ran Ye, Sammy Chan, Mohsen Guizani, Yanping Xu:
Privacy in the Internet of Things for Smart Healthcare. IEEE Commun. Mag. 56(4): 38-44 (2018) - [j56]Daojing He, Yinrong Qiao, Sammy Chan, Nadra Guizani:
Flight Security and Safety of Drones in Airborne Fog Computing Systems. IEEE Commun. Mag. 56(5): 66-71 (2018) - [j55]Daojing He, Sammy Chan, Mohsen Guizani:
Security in the Internet of Things Supported by Mobile Edge Computing. IEEE Commun. Mag. 56(8): 56-61 (2018) - [j54]Daojing He, Sammy Chan, Mohsen Guizani:
Privacy-friendly and efficient secure communication framework for V2G networks. IET Commun. 12(3): 304-309 (2018) - [j53]Daojing He, Xuru Li, Sammy Chan, Jiahao Gao, Mohsen Guizani:
Security Analysis of a Space-Based Wireless Network. IEEE Netw. 33(1): 36-43 (2018) - 2017
- [j52]Daojing He, Sammy Chan, Mohsen Guizani:
Drone-Assisted Public Safety Networks: The Security Aspect. IEEE Commun. Mag. 55(8): 218-223 (2017) - [j51]Daojing He, Sammy Chan, Xiejun Ni, Mohsen Guizani:
Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation. IEEE Internet Things J. 4(6): 1890-1898 (2017) - [j50]Daojing He, Sammy Chan, Mohsen Guizani:
Win-Win Security Approaches for Smart Grid Communications Networks. IEEE Netw. 31(6): 122-128 (2017) - [j49]Daojing He, Sammy Chan, Mohsen Guizani:
Communication Security of Unmanned Aerial Vehicles. IEEE Wirel. Commun. 24(4): 134-139 (2017) - [j48]Daojing He, Sammy Chan, Mohsen Guizani:
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring. IEEE Wirel. Commun. 24(6): 98-103 (2017) - [j47]Jiahui Chen, Shaohua Tang, Daojing He, Yang Tan:
Online/offline signature based on UOV in wireless sensor networks. Wirel. Networks 23(6): 1719-1730 (2017) - [j46]Dan Xu, Yao Peng, Wei Wang, Daojing He, Xia Zheng, Zhanglei Li, Anwen Wang, Weike Nie:
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks. Wirel. Pers. Commun. 96(4): 5409-5435 (2017) - [c9]Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang:
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. AsiaCCS 2017: 58-70 - [c8]Wenjie Chen, Yangyang Ma, Zhilei Chai, Mingsong Chen, Daojing He:
An FPGA-Based Real-Time Moving Object Tracking Approach. ICA3PP 2017: 65-80 - 2016
- [j45]Daojing He, Sammy Chan, Mohsen Guizani:
Securing software defined wireless networks. IEEE Commun. Mag. 54(1): 20-25 (2016) - [j44]Daojing He, Sammy Chan, Mohsen Guizani:
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks. IEEE Trans. Veh. Technol. 65(3): 1605-1614 (2016) - [c7]Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad:
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. ACNS 2016: 212-227 - [c6]Wenjie Chen, Shuaishuai Ding, Zhilei Chai, Daojing He, Weihua Zhang, Guanhua Zhang, Qiwei Peng, Wang Luo:
FPGA-Based Parallel Implementation of SURF Algorithm. ICPADS 2016: 308-315 - 2015
- [j43]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part 1 [Guest Editorial]. IEEE Commun. Mag. 53(4): 18-19 (2015) - [j42]Mohsen Guizani, Daojing He, Kui Ren, Joel J. P. C. Rodrigues, Sammy Chan, Yan Zhang:
Security and privacy in emerging networks: Part II [Guest Editorial]. IEEE Commun. Mag. 53(8): 40-41 (2015) - [j41]Daojing He, Sammy Chan, Mohsen Guizani:
Privacy and incentive mechanisms in people-centric sensing networks. IEEE Commun. Mag. 53(10): 200-206 (2015) - [j40]Daojing He, Sammy Chan, Mohsen Guizani:
Handover authentication for mobile networks: security and efficiency aspects. IEEE Netw. 29(3): 96-103 (2015) - [j39]Niu Liu, Shaohua Tang, Lingling Xu, Daojing He:
Analyses of several recently proposed group key management schemes. Secur. Commun. Networks 8(2): 136-148 (2015) - [j38]Feng Xia, Linqiang Wang, Daqiang Zhang, Daojing He, Xiangjie Kong:
An adaptive MAC protocol for real-time and reliable communications in medical cyber-physical systems. Telecommun. Syst. 58(2): 125-138 (2015) - [j37]Daojing He, Sammy Chan, Mohsen Guizani, Haomiao Yang, Boyang Zhou:
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 1129-1139 (2015) - [j36]Daojing He, Sammy Chan, Mohsen Guizani:
Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 14(1): 389-398 (2015) - [j35]Daojing He, Sammy Chan, Mohsen Guizani:
User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1): 28-34 (2015) - [j34]Daojing He, Sammy Chan, Mohsen Guizani:
Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22(1): 138-144 (2015) - [c5]Depeng Chen, Daojing He, Sammy Chan:
Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks. ICICS 2015: 421-435 - 2014
- [j33]Daojing He, Sammy Chan, Yan Zhang, Chunming Wu, Bing Wang:
How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway? IEEE Intell. Syst. 29(5): 14-21 (2014) - [j32]Daojing He, Sammy Chan, Yan Zhang, Mohsen Guizani, Chun Chen, Jiajun Bu:
An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Netw. 28(1): 10-16 (2014) - [j31]Daojing He, Sammy Chan, Shaohua Tang:
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE J. Biomed. Health Informatics 18(1): 316-326 (2014) - [j30]Daojing He, Sammy Chan, Yan Zhang, Haomiao Yang:
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks. IEEE J. Biomed. Health Informatics 18(2): 440-448 (2014) - [j29]Daojing He, Sammy Chan, Mohsen Guizani:
Small data dissemination for wireless sensor networks: The security aspect. IEEE Wirel. Commun. 21(3): 110-116 (2014) - 2013
- [j28]Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang:
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Commun. Mag. 51(2): 142-150 (2013) - [j27]Daojing He, Chun Chen, Maode Ma, Sammy Chan, Jiajun Bu:
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. Int. J. Commun. Syst. 26(4): 495-504 (2013) - [j26]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Strong roaming authentication technique for wireless and mobile networks. Int. J. Commun. Syst. 26(8): 1028-1037 (2013) - [j25]Daojing He, Jiajun Bu, Sammy Chan, Chun Chen:
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks. IEEE Trans. Computers 62(3): 616-622 (2013) - [j24]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Laurence T. Yang:
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Trans. Ind. Electron. 60(11): 5348-5354 (2013) - [j23]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Pingxin Zhang:
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks. IEEE J. Biomed. Health Informatics 17(3): 664-674 (2013) - [j22]Hong Liu, Huansheng Ning, Yan Zhang, Daojing He, Qingxu Xiong, Laurence T. Yang:
Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems. IEEE Trans. Parallel Distributed Syst. 24(7): 1321-1330 (2013) - [j21]Daojing He, Sammy Chan, Shaohua Tang, Mohsen Guizani:
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(9): 4638-4646 (2013) - [c4]Weijian Li, Shaohua Tang, Daojing He:
A Survey of Side Channel Attacks on MPKCs potential for RFID. RFIDSec Asia 2013: 123-131 - 2012
- [j20]Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang, Mohsen Guizani:
Secure service provision in smart grid communications. IEEE Commun. Mag. 50(8): 53-61 (2012) - [j19]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks. IEEE Commun. Lett. 16(8): 1270-1273 (2012) - [j18]Daojing He, Chun Chen, Maode Ma, Jiajun Bu:
Cryptanalysis of some conference schemes for mobile communications. Secur. Commun. Networks 5(1): 107-112 (2012) - [j17]Daojing He, Sammy Chan, Chun Chen, Jiajun Bu:
Secure and efficient dynamic program update in wireless sensor networks. Secur. Commun. Networks 5(7): 823-830 (2012) - [j16]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Trans. Ind. Electron. 59(11): 4155-4163 (2012) - [j15]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Athanasios V. Vasilakos:
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 16(4): 623-632 (2012) - [j14]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Athanasios V. Vasilakos:
A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 16(6): 1164-1175 (2012) - [j13]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions. IEEE Trans. Wirel. Commun. 11(1): 48-53 (2012) - [j12]Daojing He, Chun Chen, Sammy Chan, Jiajun Bu:
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 11(5): 1946-1956 (2012) - 2011
- [j11]Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu:
A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3): 367-374 (2011) - [j10]Chun Chen, Daojing He, Sammy Chan, Jiajun Bu, Yi Gao, Rong Fan:
Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3): 347-362 (2011) - [j9]Jiajun Bu, Mingjian Yin, Daojing He, Feng Xia, Chun Chen:
SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks. Int. J. Distributed Sens. Networks 7(1) (2011) - [j8]Rong Fan, Daojing He, Xue-zeng Pan, Ling-di Ping:
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejiang Univ. Sci. C 12(7): 550-560 (2011) - [j7]Daojing He, Jiajun Bu, Sammy Chan, Chun Chen, Mingjian Yin:
Privacy-Preserving Universal Authentication Protocol for Wireless Communications. IEEE Trans. Wirel. Commun. 10(2): 431-436 (2011) - [j6]Daojing He, Jiajun Bu, Sencun Zhu, Sammy Chan, Chun Chen:
Distributed Access Control with Privacy Support in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 10(10): 3472-3481 (2011) - [j5]Daojing He, Caixia Chi, Sammy Chan, Chun Chen, Jiajun Bu, Mingjian Yin:
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks. Wirel. Pers. Commun. 59(2): 361-373 (2011) - [j4]Daojing He, Sammy Chan, Chun Chen, Jiajun Bu, Rong Fan:
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 61(2): 465-476 (2011) - [c3]Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan, Chun Chen:
Distributed privacy-preserving access control in a single-owner multi-user sensor network. INFOCOM 2011: 331-335 - [c2]Yi Gao, Chun Chen, Jiajun Bu, Wei Dong, Daojing He:
ICAD: Indirect correlation based anomaly detection in dynamic WSNs. WCNC 2011: 647-652 - 2010
- [j3]Daojing He, Yi Gao, Sammy Chan, Chun Chen, Jiajun Bu:
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 10(4): 361-371 (2010) - [c1]Daojing He, Sammy Chan:
A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network. NBiS 2010: 305-312
2000 – 2009
- 2009
- [j2]Daojing He, Lin Cui, Hejiao Huang, Maode Ma:
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 20(7): 1050-1058 (2009) - [j1]Daojing He, Lin Cui, Hejiao Huang, Maode Ma:
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks. Wirel. Pers. Commun. 50(4): 545-561 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint