BibTeX records: Daojing He

download as .bib file

@article{DBLP:journals/adhoc/WangHYLHC24,
  author       = {Zhendong Wang and
                  Lili Huang and
                  Shuxin Yang and
                  Xiao Luo and
                  Daojing He and
                  Sammy Chan},
  title        = {Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs
                  coverage optimization},
  journal      = {Ad Hoc Networks},
  volume       = {152},
  pages        = {103308},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103308},
  doi          = {10.1016/J.ADHOC.2023.103308},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/WangHYLHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeLZCC24,
  author       = {Daojing He and
                  Xin Lv and
                  Shanshan Zhu and
                  Sammy Chan and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {2236--2243},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3292171},
  doi          = {10.1109/JIOT.2023.3292171},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeLZCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeDCG24,
  author       = {Daojing He and
                  Ke Ding and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Unknown Threats Detection Methods of Smart Contracts},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {3},
  pages        = {4430--4441},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3299492},
  doi          = {10.1109/JIOT.2023.3299492},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeDCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeGZCG24,
  author       = {Daojing He and
                  Hongjie Gu and
                  Shanshan Zhu and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {A Comprehensive Detection Method for the Lateral Movement Stage of
                  {APT} Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {8440--8447},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3322412},
  doi          = {10.1109/JIOT.2023.3322412},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeGZCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LeiLZLHZG24,
  author       = {Dian Lei and
                  Jinwen Liang and
                  Chuan Zhang and
                  Ximeng Liu and
                  Daojing He and
                  Liehuang Zhu and
                  Song Guo},
  title        = {Publicly Verifiable and Secure {SVM} Classification for Cloud-Based
                  Health Monitoring Services},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {6},
  pages        = {9829--9842},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3326358},
  doi          = {10.1109/JIOT.2023.3326358},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LeiLZLHZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuLHC24,
  author       = {Runmeng Du and
                  Xuru Li and
                  Daojing He and
                  Kim{-}Kwang Raymond Choo},
  title        = {Toward Secure and Verifiable Hybrid Federated Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2935--2950},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3357288},
  doi          = {10.1109/TIFS.2024.3357288},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DuLHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15853,
  author       = {Jiawei Zhou and
                  Linye Lyu and
                  Daojing He and
                  Yu Li},
  title        = {{RAUCA:} {A} Novel Physical Adversarial Attack on Vehicle Detectors
                  via Robust and Accurate Camouflage Generation},
  journal      = {CoRR},
  volume       = {abs/2402.15853},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15853},
  doi          = {10.48550/ARXIV.2402.15853},
  eprinttype    = {arXiv},
  eprint       = {2402.15853},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15853.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/NiuXZHJYX23,
  author       = {Lushuai Niu and
                  Zhi Xu and
                  Longyang Zhao and
                  Daojing He and
                  Jianqiu Ji and
                  Xiaoli Yuan and
                  Mian Xue},
  title        = {Residual Vector Product Quantization for approximate nearest neighbor
                  search},
  journal      = {Expert Syst. Appl.},
  volume       = {232},
  pages        = {120832},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120832},
  doi          = {10.1016/J.ESWA.2023.120832},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/NiuXZHJYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/HeYZCG23,
  author       = {Daojing He and
                  Xiaohu Yu and
                  Shanshan Zhu and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Fuzzy Hashing on Firmwares Images: {A} Comparative Analysis},
  journal      = {{IEEE} Internet Comput.},
  volume       = {27},
  number       = {2},
  pages        = {45--50},
  year         = {2023},
  url          = {https://doi.org/10.1109/MIC.2022.3225811},
  doi          = {10.1109/MIC.2022.3225811},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/HeYZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeZCG23,
  author       = {Daojing He and
                  Ziming Zhao and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {A Novel Authentication Protocol for IoT-Enabled Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {1},
  pages        = {867--876},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3204410},
  doi          = {10.1109/JIOT.2022.3204410},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeWLCG23,
  author       = {Daojing He and
                  Rui Wu and
                  Xinji Li and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Detection of Vulnerabilities of Blockchain Smart Contracts},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {14},
  pages        = {12178--12185},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3241544},
  doi          = {10.1109/JIOT.2023.3241544},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeWLCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TanLDCYZH23,
  author       = {Shuaishuai Tan and
                  Wenyin Liu and
                  Qingkuan Dong and
                  Sammy Chan and
                  Shui Yu and
                  Xiaoxiong Zhong and
                  Daojing He},
  title        = {Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on
                  the Fly},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {23},
  pages        = {21000--21012},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3284155},
  doi          = {10.1109/JIOT.2023.3284155},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/TanLDCYZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/0015ZH0ZH23,
  author       = {Jie Zhao and
                  Yifeng Zheng and
                  Hejiao Huang and
                  Jing Wang and
                  Xiaojun Zhang and
                  Daojing He},
  title        = {Lightweight certificateless privacy-preserving integrity verification
                  with conditional anonymity for cloud-assisted medical cyber-physical
                  systems},
  journal      = {J. Syst. Archit.},
  volume       = {138},
  pages        = {102860},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102860},
  doi          = {10.1016/J.SYSARC.2023.102860},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/0015ZH0ZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiHGLCPC23,
  author       = {Xuru Li and
                  Daojing He and
                  Yun Gao and
                  Ximeng Liu and
                  Sammy Chan and
                  Manghan Pan and
                  Kim{-}Kwang Raymond Choo},
  title        = {{LIGHT:} Lightweight Authentication for Intra Embedded Integrated
                  Electronic Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1088--1103},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3148825},
  doi          = {10.1109/TDSC.2022.3148825},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiHGLCPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeCZZCG23,
  author       = {Daojing He and
                  Yanchang Cai and
                  Shanshan Zhu and
                  Ziming Zhao and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {A Lightweight Authentication and Key Exchange Protocol With Anonymity
                  for IoT},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {11},
  pages        = {7862--7872},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2023.3257028},
  doi          = {10.1109/TWC.2023.3257028},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/HeCZZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XiangZHZJH23,
  author       = {Wenyu Xiang and
                  Jie Zhao and
                  Hejiao Huang and
                  Xiaojun Zhang and
                  Zoe Lin Jiang and
                  Daojing He},
  editor       = {Zahir Tari and
                  Keqiu Li and
                  Hongyi Wu},
  title        = {Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for
                  Cloud Storage Systems},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 23rd International
                  Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14488},
  pages        = {292--310},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0801-7\_17},
  doi          = {10.1007/978-981-97-0801-7\_17},
  timestamp    = {Mon, 11 Mar 2024 15:20:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XiangZHZJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZHXJHWP23,
  author       = {Yuxing Zhang and
                  Xiaogang Zhu and
                  Daojing He and
                  Minhui Xue and
                  Shouling Ji and
                  Mohammad Sayad Haghighi and
                  Sheng Wen and
                  Zhiniang Peng},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Detecting Union Type Confusion in Component Object Model},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4265--4281},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-yuxing},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZHXJHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WangLHC22,
  author       = {Zhendong Wang and
                  Zeyu Li and
                  Daojing He and
                  Sammy Chan},
  title        = {A lightweight approach for network intrusion detection in industrial
                  cyber-physical systems based on knowledge distillation and deep metric
                  learning},
  journal      = {Expert Syst. Appl.},
  volume       = {206},
  pages        = {117671},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.117671},
  doi          = {10.1016/J.ESWA.2022.117671},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/WangLHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/HeDZZLC22,
  author       = {Daojing He and
                  Runmeng Du and
                  Shanshan Zhu and
                  Min Zhang and
                  Kaitai Liang and
                  Sammy Chan},
  title        = {Secure Logistic Regression for Vertical Federated Learning},
  journal      = {{IEEE} Internet Comput.},
  volume       = {26},
  number       = {2},
  pages        = {61--68},
  year         = {2022},
  url          = {https://doi.org/10.1109/MIC.2021.3138853},
  doi          = {10.1109/MIC.2021.3138853},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/HeDZZLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeYLCG22,
  author       = {Daojing He and
                  Xiaohu Yu and
                  Tinghui Li and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Firmware Vulnerabilities Homology Detection Based on Clonal Selection
                  Algorithm for IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {17},
  pages        = {16438--16445},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3152364},
  doi          = {10.1109/JIOT.2022.3152364},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HeYLCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeLLCG22,
  author       = {Daojing He and
                  Xintong Lu and
                  Xuru Li and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {19},
  pages        = {19238--19245},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3165580},
  doi          = {10.1109/JIOT.2022.3165580},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HeLLCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeDLZCG22,
  author       = {Daojing He and
                  Jiayu Dai and
                  Xiaoxia Liu and
                  Shanshan Zhu and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Adversarial Attacks for Intrusion Detection Based on Bus Traffic},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {4},
  pages        = {203--209},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.105.2100353},
  doi          = {10.1109/MNET.105.2100353},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeDLZCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLXYLCG22,
  author       = {Daojing He and
                  Xin Lv and
                  Xueqian Xu and
                  Shui Yu and
                  Dawei Li and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {An Effective Double-Layer Detection System Against Social Engineering
                  Attacks},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {6},
  pages        = {92--98},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.105.2100425},
  doi          = {10.1109/MNET.105.2100425},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/HeLXYLCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/MinLHHWW22,
  author       = {Weidong Min and
                  Ruikang Liu and
                  Daojing He and
                  Qing Han and
                  Qingting Wei and
                  Qi Wang},
  title        = {Traffic Sign Recognition Based on Semantic Scene Understanding and
                  Structural Traffic Sign Location},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {9},
  pages        = {15794--15807},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2022.3145467},
  doi          = {10.1109/TITS.2022.3145467},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/MinLHHWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuJZCFHZW22,
  author       = {Chengjin Liu and
                  Zoe Lin Jiang and
                  Xin Zhao and
                  Qian Chen and
                  Junbin Fang and
                  Daojing He and
                  Jun Zhang and
                  Xuan Wang},
  title        = {Efficient and Privacy-Preserving Logistic Regression Scheme based
                  on Leveled Fully Homomorphic Encryption},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5,
                  2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797933},
  doi          = {10.1109/INFOCOMWKSHPS54753.2022.9797933},
  timestamp    = {Tue, 12 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuJZCFHZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-03088,
  author       = {Yu Li and
                  Muxi Chen and
                  Yannan Liu and
                  Daojing He and
                  Qiang Xu},
  title        = {An Empirical Study on the Efficacy of Deep Active Learning for Image
                  Classification},
  journal      = {CoRR},
  volume       = {abs/2212.03088},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.03088},
  doi          = {10.48550/ARXIV.2212.03088},
  eprinttype    = {arXiv},
  eprint       = {2212.03088},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-03088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/LiuHC21,
  author       = {Hankun Liu and
                  Daojing He and
                  Sammy Chan},
  title        = {Fraudulent News Headline Detection with Attention Mechanism},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {6679661:1--6679661:7},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6679661},
  doi          = {10.1155/2021/6679661},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cin/LiuHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLHC21,
  author       = {Zhendong Wang and
                  Yaodi Liu and
                  Daojing He and
                  Sammy Chan},
  title        = {Intrusion detection methods based on integrated deep learning model},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102177},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102177},
  doi          = {10.1016/J.COSE.2021.102177},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiKXQH21,
  author       = {Xiangjun Li and
                  Ke Kong and
                  Su Xu and
                  Pengtao Qin and
                  Daojing He},
  title        = {Feature selection-based android malware adversarial sample generation
                  and detection method},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {6},
  pages        = {401--416},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12030},
  doi          = {10.1049/ISE2.12030},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiKXQH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangHHHCG21,
  author       = {Guisong Yang and
                  Ling Hou and
                  Xingyu He and
                  Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Offloading Time Optimization via Markov Decision Process in Mobile-Edge
                  Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {4},
  pages        = {2483--2493},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3033285},
  doi          = {10.1109/JIOT.2020.3033285},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/YangHHHCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWZDH21,
  author       = {Xiangjun Li and
                  Zijie Wu and
                  Zhibin Zhao and
                  Feng Ding and
                  Daojing He},
  title        = {A mixed data clustering algorithm with noise-filtered distribution
                  centroid and iterative weight adjustment strategy},
  journal      = {Inf. Sci.},
  volume       = {577},
  pages        = {697--721},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.07.039},
  doi          = {10.1016/J.INS.2021.07.039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiWZDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeZYCCZG21,
  author       = {Daojing He and
                  Beibei Zhou and
                  Hang Yu and
                  Yao Cheng and
                  Sammy Chan and
                  Min Zhang and
                  Nadra Guizani},
  title        = {Group-based Password Characteristics Analysis},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {1},
  pages        = {311--317},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000354},
  doi          = {10.1109/MNET.011.2000354},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeZYCCZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeYLCCG21,
  author       = {Daojing He and
                  Guang Yang and
                  Hongyi Li and
                  Sammy Chan and
                  Yao Cheng and
                  Nadra Guizani},
  title        = {An Effective Countermeasure Against {UAV} Swarm Attack},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {1},
  pages        = {380--385},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000380},
  doi          = {10.1109/MNET.011.2000380},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/HeYLCCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeGLD0ZG21,
  author       = {Daojing He and
                  Hongjie Gu and
                  Tinghui Li and
                  Yongliang Du and
                  Xiaolei Wang and
                  Sencun Zhu and
                  Nadra Guizani},
  title        = {Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {2},
  pages        = {202--207},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000450},
  doi          = {10.1109/MNET.011.2000450},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeGLD0ZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeGLCCLZG21,
  author       = {Daojing He and
                  Yun Gao and
                  Xiaoxia Liu and
                  Sammy Chan and
                  Yao Cheng and
                  Xiaowen Liu and
                  Baokang Zhao and
                  Nadra Guizani},
  title        = {Design of Attack and Defense Framework for 1553B-based Integrated
                  Electronic Systems},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {4},
  pages        = {234--240},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000517},
  doi          = {10.1109/MNET.011.2000517},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeGLCCLZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeYZZZCG21,
  author       = {Daojing He and
                  Hang Yu and
                  Beibei Zhou and
                  Shanshan Zhu and
                  Min Zhang and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {How Does Social Behavior Affect Your Password?},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {5},
  pages        = {284--289},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.101.2000762},
  doi          = {10.1109/MNET.101.2000762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeYZZZCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangXHC21,
  author       = {Zhendong Wang and
                  Zhenyu Xu and
                  Daojing He and
                  Sammy Chan},
  title        = {Deep logarithmic neural network for Internet intrusion detection},
  journal      = {Soft Comput.},
  volume       = {25},
  number       = {15},
  pages        = {10129--10152},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00500-021-05987-9},
  doi          = {10.1007/S00500-021-05987-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WangXHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LinWHJWMHZZ21,
  author       = {Yaguang Lin and
                  Xiaoming Wang and
                  Fei Hao and
                  Yichuan Jiang and
                  Yulei Wu and
                  Geyong Min and
                  Daojing He and
                  Sencun Zhu and
                  Wei Zhao},
  title        = {Dynamic Control of Fraud Information Spreading in Mobile Social Networks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {51},
  number       = {6},
  pages        = {3725--3738},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSMC.2019.2930908},
  doi          = {10.1109/TSMC.2019.2930908},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/LinWHJWMHZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/SongWXLZHYC21,
  author       = {Yan Song and
                  Binbin Wang and
                  Xiaohu Yu and
                  Tinghui Li and
                  Shanshan Zhu and
                  Daojing He and
                  Guisong Yang and
                  Sammy Chan},
  title        = {Review of Firmware Homology Detection: a System Aspect},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {556--563},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00088},
  doi          = {10.1109/DSC53577.2021.00088},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/SongWXLZHYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/SunDHZWC21,
  author       = {Litong Sun and
                  Runmeng Du and
                  Daojing He and
                  Shanshan Zhu and
                  Rui Wang and
                  Sammy Chan},
  title        = {Feature Engineering Framework based on Secure Multi-Party Computation
                  in Federated Learning},
  booktitle    = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications;
                  7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart
                  City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys),
                  Haikou, Hainan, China, December 20-22, 2021},
  pages        = {487--494},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00088},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00088},
  timestamp    = {Thu, 09 Jun 2022 16:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/SunDHZWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/PanHLCPG21,
  author       = {Menghan Pan and
                  Daojing He and
                  Xuru Li and
                  Sammy Chan and
                  Emmanouil Panaousis and
                  Yun Gao},
  title        = {A Lightweight Certificateless Non-interactive Authentication and Key
                  Exchange Protocol for IoT Environments},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2021, Athens,
                  Greece, September 5-8, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCC53001.2021.9631436},
  doi          = {10.1109/ISCC53001.2021.9631436},
  timestamp    = {Fri, 17 Dec 2021 09:27:20 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/PanHLCPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PanHX21,
  author       = {Kaiyun Pan and
                  Daojing He and
                  Chuan Xu},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Local Model Privacy-Preserving Study for Federated Learning},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  pages        = {287--307},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9\_15},
  doi          = {10.1007/978-3-030-90019-9\_15},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/PanHX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WuLHHZC20,
  author       = {Guangfu Wu and
                  Yijie Lv and
                  Daojing He and
                  Jiguang He and
                  Huan Zhou and
                  Sammy Chan},
  title        = {Deterministic Algorithms for Solving Boolean Polynomial Equations
                  Based on Channel Coding Theory},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {26764--26772},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2971393},
  doi          = {10.1109/ACCESS.2020.2971393},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WuLHHZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangMHZHZL20,
  author       = {Qi Wang and
                  Weidong Min and
                  Daojing He and
                  Song Zou and
                  Tiemei Huang and
                  Yu Zhang and
                  Ruikang Liu},
  title        = {Discriminative fine-grained network for vehicle re-identification
                  using two-stage re-ranking},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {11},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2811-8},
  doi          = {10.1007/S11432-019-2811-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangMHZHZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/YangHCHHC20,
  author       = {Guisong Yang and
                  Ling Hou and
                  Hao Cheng and
                  Xingyu He and
                  Daojing He and
                  Sammy Chan},
  title        = {Computation offloading time optimisation via Q-learning in opportunistic
                  edge computing},
  journal      = {{IET} Commun.},
  volume       = {14},
  number       = {21},
  pages        = {3898--3906},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-com.2020.0765},
  doi          = {10.1049/IET-COM.2020.0765},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/YangHCHHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/LiHZYHC20,
  author       = {Jun Li and
                  Xingyu He and
                  Dan Zhao and
                  Guisong Yang and
                  Daojing He and
                  Sammy Chan},
  title        = {Delay-aware and cost-efficient probabilistic transmission for opportunistic
                  networks},
  journal      = {{IET} Networks},
  volume       = {9},
  number       = {6},
  pages        = {372--377},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-net.2020.0082},
  doi          = {10.1049/IET-NET.2020.0082},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/LiHZYHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HanLZXRHWS20,
  author       = {Song Han and
                  Jianhong Lin and
                  Shuai Zhao and
                  Guangquan Xu and
                  Siqi Ren and
                  Daojing He and
                  Licheng Wang and
                  Leyun Shi},
  title        = {Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {7550--7563},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2985454},
  doi          = {10.1109/JIOT.2020.2985454},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HanLZXRHWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeYZWCG20,
  author       = {Daojing He and
                  Xiao Yang and
                  Beibei Zhou and
                  Yu Wu and
                  Yao Cheng and
                  Nadra Guizani},
  title        = {Password Enhancement Based on Semantic Transformation},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {1},
  pages        = {116--121},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.2019.1900033},
  doi          = {10.1109/MNET.2019.1900033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeYZWCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeQGCZG20,
  author       = {Daojing He and
                  Qi Qiao and
                  Jiahao Gao and
                  Sammy Chan and
                  Kangfeng Zheng and
                  Nadra Guizani},
  title        = {Simulation Design for Security Testing of Integrated Electronic Systems},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {1},
  pages        = {159--165},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.2019.1900196},
  doi          = {10.1109/MNET.2019.1900196},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeQGCZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLZCZMG20,
  author       = {Daojing He and
                  Xiaoxia Liu and
                  Jiajia Zheng and
                  Sammy Chan and
                  Sencun Zhu and
                  Weidong Min and
                  Nadra Guizani},
  title        = {A Lightweight and Intelligent Intrusion Detection System for Integrated
                  Electronic Systems},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {4},
  pages        = {173--179},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900480},
  doi          = {10.1109/MNET.001.1900480},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeLZCZMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeZYCCG20,
  author       = {Daojing He and
                  Beibei Zhou and
                  Xiao Yang and
                  Sammy Chan and
                  Yao Cheng and
                  Nadra Guizani},
  title        = {Group Password Strength Meter Based on Attention Mechanism},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {4},
  pages        = {196--202},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900482},
  doi          = {10.1109/MNET.001.1900482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeZYCCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HePHCCLG20,
  author       = {Daojing He and
                  Menghan Pan and
                  Kai Hong and
                  Yao Cheng and
                  Sammy Chan and
                  Xiaowen Liu and
                  Nadra Guizani},
  title        = {Fake Review Detection Based on {PU} Learning and Behavior Density},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {4},
  pages        = {298--303},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900542},
  doi          = {10.1109/MNET.001.1900542},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HePHCCLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeDZCCG20,
  author       = {Daojing He and
                  Zhi Deng and
                  Yuxing Zhang and
                  Sammy Chan and
                  Yao Cheng and
                  Nadra Guizani},
  title        = {Smart Contract Vulnerability Analysis and Security Audit},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {276--282},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900656},
  doi          = {10.1109/MNET.001.1900656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeDZCCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeZLCCG20,
  author       = {Daojing He and
                  Yuxing Zhang and
                  Tinghui Li and
                  Sammy Chan and
                  Yao Cheng and
                  Nadra Guizani},
  title        = {Vulnerability Analysis and Security Compliance Testing for Networked
                  Surveillance Cameras},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {315--321},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900666},
  doi          = {10.1109/MNET.001.1900666},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeZLCCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLLZCMG20,
  author       = {Daojing He and
                  Shihao Li and
                  Cong Li and
                  Sencun Zhu and
                  Sammy Chan and
                  Weidong Min and
                  Nadra Guizani},
  title        = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {6},
  pages        = {114--119},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.2000025},
  doi          = {10.1109/MNET.011.2000025},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tds/LiLLLH20,
  author       = {Xiangjun Li and
                  Sifan Li and
                  Shengnan Liu and
                  Lingfeng Liu and
                  Daojing He},
  title        = {A Malicious Webpage Detection Algorithm Based on Image Semantics},
  journal      = {Traitement du Signal},
  volume       = {37},
  number       = {1},
  pages        = {113--118},
  year         = {2020},
  url          = {https://doi.org/10.18280/ts.370115},
  doi          = {10.18280/TS.370115},
  timestamp    = {Tue, 07 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tds/LiLLLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LiHLZCC20,
  author       = {Cong Li and
                  Daojing He and
                  Shihao Li and
                  Sencun Zhu and
                  Sammy Chan and
                  Yao Cheng},
  title        = {Android-based Cryptocurrency Wallets: Attacks and Countermeasures},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00010},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00010},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LiHLZCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/QiaoHGZGC20,
  author       = {Qi Qiao and
                  Daojing He and
                  Yun Gao and
                  Sencun Zhu and
                  Jiahao Gao and
                  Sammy Chan},
  title        = {Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems},
  booktitle    = {17th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2020, Virtual Event, Italy, June 22-25, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SECON48991.2020.9158421},
  doi          = {10.1109/SECON48991.2020.9158421},
  timestamp    = {Wed, 03 Feb 2021 13:40:37 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/QiaoHGZGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LiuHGZC20,
  author       = {Xiaoxia Liu and
                  Daojing He and
                  Yun Gao and
                  Sencun Zhu and
                  Sammy Chan},
  title        = {{TLP-IDS:} {A} Two-layer Intrusion Detection System for Integrated
                  Electronic Systems},
  booktitle    = {International Symposium on Reliable Distributed Systems, {SRDS} 2020,
                  Shanghai, China, September 21-24, 2020},
  pages        = {205--214},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SRDS51746.2020.00028},
  doi          = {10.1109/SRDS51746.2020.00028},
  timestamp    = {Thu, 19 Nov 2020 10:52:27 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LiuHGZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FuCDH19,
  author       = {Zhangjie Fu and
                  Yiming Chen and
                  Yongjie Ding and
                  Daojing He},
  title        = {Pollution Source Localization Based on Multi-UAV Cooperative Communication},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {29304--29312},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2900475},
  doi          = {10.1109/ACCESS.2019.2900475},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FuCDH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FuMHYX19,
  author       = {Zhangjie Fu and
                  Yuanhang Mao and
                  Daojing He and
                  Jingnan Yu and
                  Guowu Xie},
  title        = {Secure Multi-UAV Collaborative Task Allocation},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {35579--35587},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2902221},
  doi          = {10.1109/ACCESS.2019.2902221},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FuMHYX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangXHC19,
  author       = {Zhendong Wang and
                  Huamao Xie and
                  Daojing He and
                  Sammy Chan},
  title        = {Wireless Sensor Network Deployment Optimization Based on Two Flower
                  Pollination Algorithms},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {180590--180608},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2959949},
  doi          = {10.1109/ACCESS.2019.2959949},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangXHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FanLXLH19,
  author       = {Qiang Fan and
                  Wang Luo and
                  Yuan Xia and
                  Guozhi Li and
                  Daojing He},
  title        = {metrics and methods of video quality assessment: a brief review},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {22},
  pages        = {31019--31033},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-017-4848-x},
  doi          = {10.1007/S11042-017-4848-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FanLXLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeQCDCZG19,
  author       = {Daojing He and
                  Yinrong Qiao and
                  Shiqing Chen and
                  Xiao Du and
                  Wenjie Chen and
                  Sencun Zhu and
                  Mohsen Guizani},
  title        = {A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian
                  Unmanned Aerial Vehicles},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {2},
  pages        = {146--151},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.2018.1800065},
  doi          = {10.1109/MNET.2018.1800065},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeQCDCZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLCG19,
  author       = {Daojing He and
                  Hong Liu and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {How to Govern the Non-Cooperative Amateur Drones?},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {3},
  pages        = {184--189},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.2019.1800156},
  doi          = {10.1109/MNET.2019.1800156},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeLCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeQGZCLG19,
  author       = {Daojing He and
                  Qi Qiao and
                  Yun Gao and
                  Jiajia Zheng and
                  Sammy Chan and
                  Jinxiang Li and
                  Nadra Guizani},
  title        = {Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare
                  Systems},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {6},
  pages        = {64--69},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.001.1900105},
  doi          = {10.1109/MNET.001.1900105},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeQGZCLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeHCTG19,
  author       = {Daojing He and
                  Kai Hong and
                  Yao Cheng and
                  Zongli Tang and
                  Mohsen Guizani},
  title        = {Detecting Promotion Attacks in the App Market Using Neural Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {26},
  number       = {4},
  pages        = {110--116},
  year         = {2019},
  url          = {https://doi.org/10.1109/MWC.2019.1800322},
  doi          = {10.1109/MWC.2019.1800322},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeHCTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCQG18,
  author       = {Daojing He and
                  Sammy Chan and
                  Yinrong Qiao and
                  Nadra Guizani},
  title        = {Imminent Communication Security for Smart Communities},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {1},
  pages        = {99--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700587},
  doi          = {10.1109/MCOM.2018.1700587},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCQG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeYCGX18,
  author       = {Daojing He and
                  Ran Ye and
                  Sammy Chan and
                  Mohsen Guizani and
                  Yanping Xu},
  title        = {Privacy in the Internet of Things for Smart Healthcare},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {4},
  pages        = {38--44},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700809},
  doi          = {10.1109/MCOM.2018.1700809},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeYCGX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeQCG18,
  author       = {Daojing He and
                  Yinrong Qiao and
                  Sammy Chan and
                  Nadra Guizani},
  title        = {Flight Security and Safety of Drones in Airborne Fog Computing Systems},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {5},
  pages        = {66--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700916},
  doi          = {10.1109/MCOM.2018.1700916},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeQCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCG18,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Security in the Internet of Things Supported by Mobile Edge Computing},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {8},
  pages        = {56--61},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1701132},
  doi          = {10.1109/MCOM.2018.1701132},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/HeCG18,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Privacy-friendly and efficient secure communication framework for
                  {V2G} networks},
  journal      = {{IET} Commun.},
  volume       = {12},
  number       = {3},
  pages        = {304--309},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-com.2017.0608},
  doi          = {10.1049/IET-COM.2017.0608},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/HeCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLCGG18,
  author       = {Daojing He and
                  Xuru Li and
                  Sammy Chan and
                  Jiahao Gao and
                  Mohsen Guizani},
  title        = {Security Analysis of a Space-Based Wireless Network},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {1},
  pages        = {36--43},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1800194},
  doi          = {10.1109/MNET.2018.1800194},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeLCGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCG17,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Drone-Assisted Public Safety Networks: The Security Aspect},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {8},
  pages        = {218--223},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600799CM},
  doi          = {10.1109/MCOM.2017.1600799CM},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeCNG17,
  author       = {Daojing He and
                  Sammy Chan and
                  Xiejun Ni and
                  Mohsen Guizani},
  title        = {Software-Defined-Networking-Enabled Traffic Anomaly Detection and
                  Mitigation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {6},
  pages        = {1890--1898},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2017.2694702},
  doi          = {10.1109/JIOT.2017.2694702},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HeCNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeCG17,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Win-Win Security Approaches for Smart Grid Communications Networks},
  journal      = {{IEEE} Netw.},
  volume       = {31},
  number       = {6},
  pages        = {122--128},
  year         = {2017},
  url          = {https://doi.org/10.1109/MNET.2017.1700065},
  doi          = {10.1109/MNET.2017.1700065},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeCG17,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Communication Security of Unmanned Aerial Vehicles},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {24},
  number       = {4},
  pages        = {134--139},
  year         = {2017},
  url          = {https://doi.org/10.1109/MWC.2016.1600073WC},
  doi          = {10.1109/MWC.2016.1600073WC},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeCG17a,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Cyber Security Analysis and Protection of Wireless Sensor Networks
                  for Smart Grid Monitoring},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {24},
  number       = {6},
  pages        = {98--103},
  year         = {2017},
  url          = {https://doi.org/10.1109/MWC.2017.1600283WC},
  doi          = {10.1109/MWC.2017.1600283WC},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeCG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/ChenTHT17,
  author       = {Jiahui Chen and
                  Shaohua Tang and
                  Daojing He and
                  Yang Tan},
  title        = {Online/offline signature based on {UOV} in wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {23},
  number       = {6},
  pages        = {1719--1730},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11276-016-1245-8},
  doi          = {10.1007/S11276-016-1245-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/ChenTHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XuPWHZLWN17,
  author       = {Dan Xu and
                  Yao Peng and
                  Wei Wang and
                  Daojing He and
                  Xia Zheng and
                  Zhanglei Li and
                  Anwen Wang and
                  Weike Nie},
  title        = {RePC: {A} Localization Method Based on Regional Partition and Cooperation
                  in Communication Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {4},
  pages        = {5409--5435},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3748-0},
  doi          = {10.1007/S11277-016-3748-0},
  timestamp    = {Fri, 14 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/XuPWHZLWN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenHZY17,
  author       = {Hao Chen and
                  Daojing He and
                  Sencun Zhu and
                  Jingshun Yang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Toward Detecting Collusive Ranking Manipulation Attackers in Mobile
                  App Markets},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {58--70},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053022},
  doi          = {10.1145/3052973.3053022},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenHZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenMCCH17,
  author       = {Wenjie Chen and
                  Yangyang Ma and
                  Zhilei Chai and
                  Mingsong Chen and
                  Daojing He},
  editor       = {Shadi Ibrahim and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Yan and
                  Witold Pedrycz},
  title        = {An FPGA-Based Real-Time Moving Object Tracking Approach},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 17th International
                  Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10393},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65482-9\_5},
  doi          = {10.1007/978-3-319-65482-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenMCCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCG16,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Securing software defined wireless networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {54},
  number       = {1},
  pages        = {20--25},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCOM.2016.7378421},
  doi          = {10.1109/MCOM.2016.7378421},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HeCG16,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {An Accountable, Privacy-Preserving, and Efficient Authentication Framework
                  for Wireless Access Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {65},
  number       = {3},
  pages        = {1605--1614},
  year         = {2016},
  url          = {https://doi.org/10.1109/TVT.2015.2406671},
  doi          = {10.1109/TVT.2015.2406671},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HeCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NiHCA16,
  author       = {Xiejun Ni and
                  Daojing He and
                  Sammy Chan and
                  Farooq Ahmad},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Network Anomaly Detection Using Unsupervised Feature Selection and
                  Density Peak Clustering},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {212--227},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_12},
  doi          = {10.1007/978-3-319-39555-5\_12},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NiHCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ChenDCHZZPL16,
  author       = {Wenjie Chen and
                  Shuaishuai Ding and
                  Zhilei Chai and
                  Daojing He and
                  Weihua Zhang and
                  Guanhua Zhang and
                  Qiwei Peng and
                  Wang Luo},
  title        = {FPGA-Based Parallel Implementation of {SURF} Algorithm},
  booktitle    = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  pages        = {308--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICPADS.2016.0049},
  doi          = {10.1109/ICPADS.2016.0049},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ChenDCHZZPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/GuizaniHRRCZ15,
  author       = {Mohsen Guizani and
                  Daojing He and
                  Kui Ren and
                  Joel J. P. C. Rodrigues and
                  Sammy Chan and
                  Yan Zhang},
  title        = {Security and privacy in emerging networks: Part 1 [Guest Editorial]},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {4},
  pages        = {18--19},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7081098},
  doi          = {10.1109/MCOM.2015.7081098},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/GuizaniHRRCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/GuizaniHRRCZ15a,
  author       = {Mohsen Guizani and
                  Daojing He and
                  Kui Ren and
                  Joel J. P. C. Rodrigues and
                  Sammy Chan and
                  Yan Zhang},
  title        = {Security and privacy in emerging networks: Part {II} [Guest Editorial]},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {8},
  pages        = {40--41},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7180505},
  doi          = {10.1109/MCOM.2015.7180505},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/GuizaniHRRCZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCG15,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Privacy and incentive mechanisms in people-centric sensing networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {10},
  pages        = {200--206},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7295484},
  doi          = {10.1109/MCOM.2015.7295484},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeCG15,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Handover authentication for mobile networks: security and efficiency
                  aspects},
  journal      = {{IEEE} Netw.},
  volume       = {29},
  number       = {3},
  pages        = {96--103},
  year         = {2015},
  url          = {https://doi.org/10.1109/MNET.2015.7113232},
  doi          = {10.1109/MNET.2015.7113232},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuTXH15,
  author       = {Niu Liu and
                  Shaohua Tang and
                  Lingling Xu and
                  Daojing He},
  title        = {Analyses of several recently proposed group key management schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {136--148},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.966},
  doi          = {10.1002/SEC.966},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuTXH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/XiaWZHK15,
  author       = {Feng Xia and
                  Linqiang Wang and
                  Daqiang Zhang and
                  Daojing He and
                  Xiangjie Kong},
  title        = {An adaptive {MAC} protocol for real-time and reliable communications
                  in medical cyber-physical systems},
  journal      = {Telecommun. Syst.},
  volume       = {58},
  number       = {2},
  pages        = {125--138},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11235-014-9895-2},
  doi          = {10.1007/S11235-014-9895-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/XiaWZHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/HeCGYZ15,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani and
                  Haomiao Yang and
                  Boyang Zhou},
  title        = {Secure and Distributed Data Discovery and Dissemination in Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {26},
  number       = {4},
  pages        = {1129--1139},
  year         = {2015},
  url          = {https://doi.org/10.1109/TPDS.2014.2316830},
  doi          = {10.1109/TPDS.2014.2316830},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/HeCGYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeCG15,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Accountable and Privacy-Enhanced Access Control in Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {14},
  number       = {1},
  pages        = {389--398},
  year         = {2015},
  url          = {https://doi.org/10.1109/TWC.2014.2347311},
  doi          = {10.1109/TWC.2014.2347311},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeCG15,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {User privacy and data trustworthiness in mobile crowd sensing},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {22},
  number       = {1},
  pages        = {28--34},
  year         = {2015},
  url          = {https://doi.org/10.1109/MWC.2015.7054716},
  doi          = {10.1109/MWC.2015.7054716},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeCG15a,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Mobile application security: malware threats and defenses},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {22},
  number       = {1},
  pages        = {138--144},
  year         = {2015},
  url          = {https://doi.org/10.1109/MWC.2015.7054729},
  doi          = {10.1109/MWC.2015.7054729},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeCG15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenHC15,
  author       = {Depeng Chen and
                  Daojing He and
                  Sammy Chan},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor
                  Networks},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {421--435},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_36},
  doi          = {10.1007/978-3-319-29814-6\_36},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/HeCZWW14,
  author       = {Daojing He and
                  Sammy Chan and
                  Yan Zhang and
                  Chunming Wu and
                  Bing Wang},
  title        = {How Effective Are the Prevailing Attack-Defense Models for Cybersecurity
                  Anyway?},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {29},
  number       = {5},
  pages        = {14--21},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIS.2013.105},
  doi          = {10.1109/MIS.2013.105},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/HeCZWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeCZGCB14,
  author       = {Daojing He and
                  Sammy Chan and
                  Yan Zhang and
                  Mohsen Guizani and
                  Chun Chen and
                  Jiajun Bu},
  title        = {An enhanced public key infrastructure to secure smart grid wireless
                  communication networks},
  journal      = {{IEEE} Netw.},
  volume       = {28},
  number       = {1},
  pages        = {10--16},
  year         = {2014},
  url          = {https://doi.org/10.1109/MNET.2014.6724101},
  doi          = {10.1109/MNET.2014.6724101},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeCZGCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCT14,
  author       = {Daojing He and
                  Sammy Chan and
                  Shaohua Tang},
  title        = {A Novel and Lightweight System to Secure Wireless Medical Sensor Networks},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {18},
  number       = {1},
  pages        = {316--326},
  year         = {2014},
  url          = {https://doi.org/10.1109/JBHI.2013.2268897},
  doi          = {10.1109/JBHI.2013.2268897},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/HeCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCZY14,
  author       = {Daojing He and
                  Sammy Chan and
                  Yan Zhang and
                  Haomiao Yang},
  title        = {Lightweight and Confidential Data Discovery and Dissemination for
                  Wireless Body Area Networks},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {18},
  number       = {2},
  pages        = {440--448},
  year         = {2014},
  url          = {https://doi.org/10.1109/JBHI.2013.2293620},
  doi          = {10.1109/JBHI.2013.2293620},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/HeCZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeCG14,
  author       = {Daojing He and
                  Sammy Chan and
                  Mohsen Guizani},
  title        = {Small data dissemination for wireless sensor networks: The security
                  aspect},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {21},
  number       = {3},
  pages        = {110--116},
  year         = {2014},
  url          = {https://doi.org/10.1109/MWC.2014.6845055},
  doi          = {10.1109/MWC.2014.6845055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/HeCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCBCZ13,
  author       = {Daojing He and
                  Chun Chen and
                  Jiajun Bu and
                  Sammy Chan and
                  Yan Zhang},
  title        = {Security and efficiency in roaming services for wireless networks:
                  challenges, approaches, and prospects},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {2},
  pages        = {142--150},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6461199},
  doi          = {10.1109/MCOM.2013.6461199},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCBCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HeCMCB13,
  author       = {Daojing He and
                  Chun Chen and
                  Maode Ma and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {A secure and efficient password-authenticated group key exchange protocol
                  for mobile ad hoc networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {26},
  number       = {4},
  pages        = {495--504},
  year         = {2013},
  url          = {https://doi.org/10.1002/dac.1355},
  doi          = {10.1002/DAC.1355},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/HeCMCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HeCCB13,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {Strong roaming authentication technique for wireless and mobile networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {26},
  number       = {8},
  pages        = {1028--1037},
  year         = {2013},
  url          = {https://doi.org/10.1002/dac.1387},
  doi          = {10.1002/DAC.1387},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/HeCCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HeBCC13,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sammy Chan and
                  Chun Chen},
  title        = {Handauth: Efficient Handover Authentication with Conditional Privacy
                  for Wireless Networks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {62},
  number       = {3},
  pages        = {616--622},
  year         = {2013},
  url          = {https://doi.org/10.1109/TC.2011.258},
  doi          = {10.1109/TC.2011.258},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HeBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/HeCCBY13,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu and
                  Laurence T. Yang},
  title        = {Security Analysis and Improvement of a Secure and Distributed Reprogramming
                  Protocol for Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {60},
  number       = {11},
  pages        = {5348--5354},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIE.2012.2218562},
  doi          = {10.1109/TIE.2012.2218562},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/HeCCBY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCCBZ13,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu and
                  Pingxin Zhang},
  title        = {Secure and Lightweight Network Admission and Transmission Protocol
                  for Body Sensor Networks},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {17},
  number       = {3},
  pages        = {664--674},
  year         = {2013},
  url          = {https://doi.org/10.1109/JBHI.2012.2235180},
  doi          = {10.1109/JBHI.2012.2235180},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/HeCCBZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiuNZHXY13,
  author       = {Hong Liu and
                  Huansheng Ning and
                  Yan Zhang and
                  Daojing He and
                  Qingxu Xiong and
                  Laurence T. Yang},
  title        = {Grouping-Proofs-Based Authentication Protocol for Distributed {RFID}
                  Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {7},
  pages        = {1321--1330},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2012.218},
  doi          = {10.1109/TPDS.2012.218},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LiuNZHXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeCTG13,
  author       = {Daojing He and
                  Sammy Chan and
                  Shaohua Tang and
                  Mohsen Guizani},
  title        = {Secure Data Discovery and Dissemination based on Hash Tree for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {12},
  number       = {9},
  pages        = {4638--4646},
  year         = {2013},
  url          = {https://doi.org/10.1109/TWC.2013.090413.130072},
  doi          = {10.1109/TWC.2013.090413.130072},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeCTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/LiTH13,
  author       = {Weijian Li and
                  Shaohua Tang and
                  Daojing He},
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {A Survey of Side Channel Attacks on MPKCs potential for {RFID}},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  pages        = {123--131},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-328-5-123},
  doi          = {10.3233/978-1-61499-328-5-123},
  timestamp    = {Wed, 13 May 2020 07:48:31 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/LiTH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HeCBCZG12,
  author       = {Daojing He and
                  Chun Chen and
                  Jiajun Bu and
                  Sammy Chan and
                  Yan Zhang and
                  Mohsen Guizani},
  title        = {Secure service provision in smart grid communications},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {50},
  number       = {8},
  pages        = {53--61},
  year         = {2012},
  url          = {https://doi.org/10.1109/MCOM.2012.6257527},
  doi          = {10.1109/MCOM.2012.6257527},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HeCBCZG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/HeCCB12,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {Analysis and Improvement of a Secure and Efficient Handover Authentication
                  for Wireless Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {16},
  number       = {8},
  pages        = {1270--1273},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCOMM.2012.061912.120941},
  doi          = {10.1109/LCOMM.2012.061912.120941},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/HeCCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeCMB12,
  author       = {Daojing He and
                  Chun Chen and
                  Maode Ma and
                  Jiajun Bu},
  title        = {Cryptanalysis of some conference schemes for mobile communications},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {107--112},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.284},
  doi          = {10.1002/SEC.284},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeCMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeCCB12,
  author       = {Daojing He and
                  Sammy Chan and
                  Chun Chen and
                  Jiajun Bu},
  title        = {Secure and efficient dynamic program update in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {7},
  pages        = {823--830},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.377},
  doi          = {10.1002/SEC.377},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeCCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/HeCCB12,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {{SDRP:} {A} Secure and Distributed Reprogramming Protocol for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {59},
  number       = {11},
  pages        = {4155--4163},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIE.2011.2178214},
  doi          = {10.1109/TIE.2011.2178214},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/HeCCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCCBV12,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu and
                  Athanasios V. Vasilakos},
  title        = {ReTrust: Attack-Resistant and Lightweight Trust Management for Medical
                  Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},
  volume       = {16},
  number       = {4},
  pages        = {623--632},
  year         = {2012},
  url          = {https://doi.org/10.1109/TITB.2012.2194788},
  doi          = {10.1109/TITB.2012.2194788},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/HeCCBV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCCBV12a,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu and
                  Athanasios V. Vasilakos},
  title        = {A Distributed Trust Evaluation Model and Its Application Scenarios
                  for Medical Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},
  volume       = {16},
  number       = {6},
  pages        = {1164--1175},
  year         = {2012},
  url          = {https://doi.org/10.1109/TITB.2012.2199996},
  doi          = {10.1109/TITB.2012.2199996},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/HeCCBV12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeCCB12,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {Secure and Efficient Handover Authentication Based on Bilinear Pairing
                  Functions},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {48--53},
  year         = {2012},
  url          = {https://doi.org/10.1109/TWC.2011.110811.111240},
  doi          = {10.1109/TWC.2011.110811.111240},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeCCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeCCB12a,
  author       = {Daojing He and
                  Chun Chen and
                  Sammy Chan and
                  Jiajun Bu},
  title        = {DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {11},
  number       = {5},
  pages        = {1946--1956},
  year         = {2012},
  url          = {https://doi.org/10.1109/TWC.2012.030812.111857},
  doi          = {10.1109/TWC.2012.030812.111857},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeCCB12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HeMZCB11,
  author       = {Daojing He and
                  Maode Ma and
                  Yan Zhang and
                  Chun Chen and
                  Jiajun Bu},
  title        = {A strong user authentication scheme with smart cards for wireless
                  communications},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {367--374},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.031},
  doi          = {10.1016/J.COMCOM.2010.02.031},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/HeMZCB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ChenHCBGF11,
  author       = {Chun Chen and
                  Daojing He and
                  Sammy Chan and
                  Jiajun Bu and
                  Yi Gao and
                  Rong Fan},
  title        = {Lightweight and provably secure user authentication with anonymity
                  for the global mobility network},
  journal      = {Int. J. Commun. Syst.},
  volume       = {24},
  number       = {3},
  pages        = {347--362},
  year         = {2011},
  url          = {https://doi.org/10.1002/dac.1158},
  doi          = {10.1002/DAC.1158},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ChenHCBGF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BuYHXC11,
  author       = {Jiajun Bu and
                  Mingjian Yin and
                  Daojing He and
                  Feng Xia and
                  Chun Chen},
  title        = {{SEF:} {A} Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered
                  Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {7},
  number       = {1},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/126407},
  doi          = {10.1155/2011/126407},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BuYHXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/FanHPP11,
  author       = {Rong Fan and
                  Daojing He and
                  Xue{-}zeng Pan and
                  Ling{-}di Ping},
  title        = {An efficient and DoS-resistant user authentication scheme for two-tiered
                  wireless sensor networks},
  journal      = {J. Zhejiang Univ. Sci. {C}},
  volume       = {12},
  number       = {7},
  pages        = {550--560},
  year         = {2011},
  url          = {https://doi.org/10.1631/jzus.C1000377},
  doi          = {10.1631/JZUS.C1000377},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/FanHPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeBCCY11,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sammy Chan and
                  Chun Chen and
                  Mingjian Yin},
  title        = {Privacy-Preserving Universal Authentication Protocol for Wireless
                  Communications},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {2},
  pages        = {431--436},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2010.120610.101018},
  doi          = {10.1109/TWC.2010.120610.101018},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeBCCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeBZCC11,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sencun Zhu and
                  Sammy Chan and
                  Chun Chen},
  title        = {Distributed Access Control with Privacy Support in Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {10},
  pages        = {3472--3481},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2011.072511.102283},
  doi          = {10.1109/TWC.2011.072511.102283},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeBZCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HeCCCBY11,
  author       = {Daojing He and
                  Caixia Chi and
                  Sammy Chan and
                  Chun Chen and
                  Jiajun Bu and
                  Mingjian Yin},
  title        = {A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless
                  Mobile Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {59},
  number       = {2},
  pages        = {361--373},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-010-9922-x},
  doi          = {10.1007/S11277-010-9922-X},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HeCCCBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HeCCBF11,
  author       = {Daojing He and
                  Sammy Chan and
                  Chun Chen and
                  Jiajun Bu and
                  Rong Fan},
  title        = {Design and Validation of an Efficient Authentication Scheme with Anonymity
                  for Roaming Service in Global Mobility Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {61},
  number       = {2},
  pages        = {465--476},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-010-0033-5},
  doi          = {10.1007/S11277-010-0033-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HeCCBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeBZYGWCC11,
  author       = {Daojing He and
                  Jiajun Bu and
                  Sencun Zhu and
                  Mingjian Yin and
                  Yi Gao and
                  Haodong Wang and
                  Sammy Chan and
                  Chun Chen},
  title        = {Distributed privacy-preserving access control in a single-owner multi-user
                  sensor network},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {331--335},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935176},
  doi          = {10.1109/INFCOM.2011.5935176},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/HeBZYGWCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/GaoCBDH11,
  author       = {Yi Gao and
                  Chun Chen and
                  Jiajun Bu and
                  Wei Dong and
                  Daojing He},
  title        = {{ICAD:} Indirect correlation based anomaly detection in dynamic WSNs},
  booktitle    = {2011 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2011, Proceedings, Cancun, Mexico, 28-31 March, 2011},
  pages        = {647--652},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/WCNC.2011.5779209},
  doi          = {10.1109/WCNC.2011.5779209},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/GaoCBDH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/HeGCCB10,
  author       = {Daojing He and
                  Yi Gao and
                  Sammy Chan and
                  Chun Chen and
                  Jiajun Bu},
  title        = {An Enhanced Two-factor User Authentication Scheme in Wireless Sensor
                  Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {10},
  number       = {4},
  pages        = {361--371},
  year         = {2010},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-10-number-4/ahswn-10-4-p-343-359-2/},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ahswn/HeGCCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/HeC10,
  author       = {Daojing He and
                  Sammy Chan},
  editor       = {Tomoya Enokido and
                  Fatos Xhafa and
                  Leonard Barolli and
                  Makoto Takizawa and
                  Minoru Uehara and
                  Arjan Durresi},
  title        = {A Secure and Lightweight User Authentication Scheme with Anonymity
                  for the Global Mobility Network},
  booktitle    = {The 13th International Conference on Network-Based Information Systems,
                  NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010},
  pages        = {305--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NBiS.2010.34},
  doi          = {10.1109/NBIS.2010.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/HeC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/HeCHM09,
  author       = {Daojing He and
                  Lin Cui and
                  Hejiao Huang and
                  Maode Ma},
  title        = {Design and Verification of Enhanced Secure Localization Scheme in
                  Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {20},
  number       = {7},
  pages        = {1050--1058},
  year         = {2009},
  url          = {https://doi.org/10.1109/TPDS.2008.166},
  doi          = {10.1109/TPDS.2008.166},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/HeCHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HeCHM09,
  author       = {Daojing He and
                  Lin Cui and
                  Hejiao Huang and
                  Maode Ma},
  title        = {Secure and Efficient Localization Scheme in Ultra-Wideband Sensor
                  Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {50},
  number       = {4},
  pages        = {545--561},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11277-008-9623-x},
  doi          = {10.1007/S11277-008-9623-X},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HeCHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics