Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daojing He
@article{DBLP:journals/adhoc/WangHYLHC24, author = {Zhendong Wang and Lili Huang and Shuxin Yang and Xiao Luo and Daojing He and Sammy Chan}, title = {Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization}, journal = {Ad Hoc Networks}, volume = {152}, pages = {103308}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103308}, doi = {10.1016/J.ADHOC.2023.103308}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/WangHYLHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeLZCC24, author = {Daojing He and Xin Lv and Shanshan Zhu and Sammy Chan and Kim{-}Kwang Raymond Choo}, title = {A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {2236--2243}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3292171}, doi = {10.1109/JIOT.2023.3292171}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeLZCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeDCG24, author = {Daojing He and Ke Ding and Sammy Chan and Mohsen Guizani}, title = {Unknown Threats Detection Methods of Smart Contracts}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {3}, pages = {4430--4441}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3299492}, doi = {10.1109/JIOT.2023.3299492}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeDCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeGZCG24, author = {Daojing He and Hongjie Gu and Shanshan Zhu and Sammy Chan and Mohsen Guizani}, title = {A Comprehensive Detection Method for the Lateral Movement Stage of {APT} Attacks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {8440--8447}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3322412}, doi = {10.1109/JIOT.2023.3322412}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeGZCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LeiLZLHZG24, author = {Dian Lei and Jinwen Liang and Chuan Zhang and Ximeng Liu and Daojing He and Liehuang Zhu and Song Guo}, title = {Publicly Verifiable and Secure {SVM} Classification for Cloud-Based Health Monitoring Services}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {6}, pages = {9829--9842}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3326358}, doi = {10.1109/JIOT.2023.3326358}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LeiLZLHZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuLHC24, author = {Runmeng Du and Xuru Li and Daojing He and Kim{-}Kwang Raymond Choo}, title = {Toward Secure and Verifiable Hybrid Federated Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2935--2950}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3357288}, doi = {10.1109/TIFS.2024.3357288}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DuLHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15853, author = {Jiawei Zhou and Linye Lyu and Daojing He and Yu Li}, title = {{RAUCA:} {A} Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation}, journal = {CoRR}, volume = {abs/2402.15853}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15853}, doi = {10.48550/ARXIV.2402.15853}, eprinttype = {arXiv}, eprint = {2402.15853}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15853.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/NiuXZHJYX23, author = {Lushuai Niu and Zhi Xu and Longyang Zhao and Daojing He and Jianqiu Ji and Xiaoli Yuan and Mian Xue}, title = {Residual Vector Product Quantization for approximate nearest neighbor search}, journal = {Expert Syst. Appl.}, volume = {232}, pages = {120832}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120832}, doi = {10.1016/J.ESWA.2023.120832}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/NiuXZHJYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/HeYZCG23, author = {Daojing He and Xiaohu Yu and Shanshan Zhu and Sammy Chan and Mohsen Guizani}, title = {Fuzzy Hashing on Firmwares Images: {A} Comparative Analysis}, journal = {{IEEE} Internet Comput.}, volume = {27}, number = {2}, pages = {45--50}, year = {2023}, url = {https://doi.org/10.1109/MIC.2022.3225811}, doi = {10.1109/MIC.2022.3225811}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/HeYZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeZCG23, author = {Daojing He and Ziming Zhao and Sammy Chan and Mohsen Guizani}, title = {A Novel Authentication Protocol for IoT-Enabled Devices}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {1}, pages = {867--876}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3204410}, doi = {10.1109/JIOT.2022.3204410}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeWLCG23, author = {Daojing He and Rui Wu and Xinji Li and Sammy Chan and Mohsen Guizani}, title = {Detection of Vulnerabilities of Blockchain Smart Contracts}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {14}, pages = {12178--12185}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3241544}, doi = {10.1109/JIOT.2023.3241544}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeWLCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TanLDCYZH23, author = {Shuaishuai Tan and Wenyin Liu and Qingkuan Dong and Sammy Chan and Shui Yu and Xiaoxiong Zhong and Daojing He}, title = {Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {23}, pages = {21000--21012}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3284155}, doi = {10.1109/JIOT.2023.3284155}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/TanLDCYZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/0015ZH0ZH23, author = {Jie Zhao and Yifeng Zheng and Hejiao Huang and Jing Wang and Xiaojun Zhang and Daojing He}, title = {Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems}, journal = {J. Syst. Archit.}, volume = {138}, pages = {102860}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102860}, doi = {10.1016/J.SYSARC.2023.102860}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/0015ZH0ZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiHGLCPC23, author = {Xuru Li and Daojing He and Yun Gao and Ximeng Liu and Sammy Chan and Manghan Pan and Kim{-}Kwang Raymond Choo}, title = {{LIGHT:} Lightweight Authentication for Intra Embedded Integrated Electronic Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1088--1103}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3148825}, doi = {10.1109/TDSC.2022.3148825}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiHGLCPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeCZZCG23, author = {Daojing He and Yanchang Cai and Shanshan Zhu and Ziming Zhao and Sammy Chan and Mohsen Guizani}, title = {A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {11}, pages = {7862--7872}, year = {2023}, url = {https://doi.org/10.1109/TWC.2023.3257028}, doi = {10.1109/TWC.2023.3257028}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/HeCZZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/XiangZHZJH23, author = {Wenyu Xiang and Jie Zhao and Hejiao Huang and Xiaojun Zhang and Zoe Lin Jiang and Daojing He}, editor = {Zahir Tari and Keqiu Li and Hongyi Wu}, title = {Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems}, booktitle = {Algorithms and Architectures for Parallel Processing - 23rd International Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14488}, pages = {292--310}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0801-7\_17}, doi = {10.1007/978-981-97-0801-7\_17}, timestamp = {Mon, 11 Mar 2024 15:20:45 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/XiangZHZJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZHXJHWP23, author = {Yuxing Zhang and Xiaogang Zhu and Daojing He and Minhui Xue and Shouling Ji and Mohammad Sayad Haghighi and Sheng Wen and Zhiniang Peng}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Detecting Union Type Confusion in Component Object Model}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4265--4281}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-yuxing}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangZHXJHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WangLHC22, author = {Zhendong Wang and Zeyu Li and Daojing He and Sammy Chan}, title = {A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning}, journal = {Expert Syst. Appl.}, volume = {206}, pages = {117671}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117671}, doi = {10.1016/J.ESWA.2022.117671}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/WangLHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/HeDZZLC22, author = {Daojing He and Runmeng Du and Shanshan Zhu and Min Zhang and Kaitai Liang and Sammy Chan}, title = {Secure Logistic Regression for Vertical Federated Learning}, journal = {{IEEE} Internet Comput.}, volume = {26}, number = {2}, pages = {61--68}, year = {2022}, url = {https://doi.org/10.1109/MIC.2021.3138853}, doi = {10.1109/MIC.2021.3138853}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/HeDZZLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeYLCG22, author = {Daojing He and Xiaohu Yu and Tinghui Li and Sammy Chan and Mohsen Guizani}, title = {Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {17}, pages = {16438--16445}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3152364}, doi = {10.1109/JIOT.2022.3152364}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HeYLCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeLLCG22, author = {Daojing He and Xintong Lu and Xuru Li and Sammy Chan and Mohsen Guizani}, title = {Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {19}, pages = {19238--19245}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3165580}, doi = {10.1109/JIOT.2022.3165580}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HeLLCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeDLZCG22, author = {Daojing He and Jiayu Dai and Xiaoxia Liu and Shanshan Zhu and Sammy Chan and Mohsen Guizani}, title = {Adversarial Attacks for Intrusion Detection Based on Bus Traffic}, journal = {{IEEE} Netw.}, volume = {36}, number = {4}, pages = {203--209}, year = {2022}, url = {https://doi.org/10.1109/MNET.105.2100353}, doi = {10.1109/MNET.105.2100353}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeDLZCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLXYLCG22, author = {Daojing He and Xin Lv and Xueqian Xu and Shui Yu and Dawei Li and Sammy Chan and Mohsen Guizani}, title = {An Effective Double-Layer Detection System Against Social Engineering Attacks}, journal = {{IEEE} Netw.}, volume = {36}, number = {6}, pages = {92--98}, year = {2022}, url = {https://doi.org/10.1109/MNET.105.2100425}, doi = {10.1109/MNET.105.2100425}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HeLXYLCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MinLHHWW22, author = {Weidong Min and Ruikang Liu and Daojing He and Qing Han and Qingting Wei and Qi Wang}, title = {Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {9}, pages = {15794--15807}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3145467}, doi = {10.1109/TITS.2022.3145467}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/MinLHHWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuJZCFHZW22, author = {Chengjin Liu and Zoe Lin Jiang and Xin Zhao and Qian Chen and Junbin Fang and Daojing He and Jun Zhang and Xuan Wang}, title = {Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797933}, doi = {10.1109/INFOCOMWKSHPS54753.2022.9797933}, timestamp = {Tue, 12 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuJZCFHZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03088, author = {Yu Li and Muxi Chen and Yannan Liu and Daojing He and Qiang Xu}, title = {An Empirical Study on the Efficacy of Deep Active Learning for Image Classification}, journal = {CoRR}, volume = {abs/2212.03088}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03088}, doi = {10.48550/ARXIV.2212.03088}, eprinttype = {arXiv}, eprint = {2212.03088}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/LiuHC21, author = {Hankun Liu and Daojing He and Sammy Chan}, title = {Fraudulent News Headline Detection with Attention Mechanism}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {6679661:1--6679661:7}, year = {2021}, url = {https://doi.org/10.1155/2021/6679661}, doi = {10.1155/2021/6679661}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cin/LiuHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLHC21, author = {Zhendong Wang and Yaodi Liu and Daojing He and Sammy Chan}, title = {Intrusion detection methods based on integrated deep learning model}, journal = {Comput. Secur.}, volume = {103}, pages = {102177}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102177}, doi = {10.1016/J.COSE.2021.102177}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiKXQH21, author = {Xiangjun Li and Ke Kong and Su Xu and Pengtao Qin and Daojing He}, title = {Feature selection-based android malware adversarial sample generation and detection method}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {6}, pages = {401--416}, year = {2021}, url = {https://doi.org/10.1049/ise2.12030}, doi = {10.1049/ISE2.12030}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiKXQH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangHHHCG21, author = {Guisong Yang and Ling Hou and Xingyu He and Daojing He and Sammy Chan and Mohsen Guizani}, title = {Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {4}, pages = {2483--2493}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3033285}, doi = {10.1109/JIOT.2020.3033285}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/YangHHHCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiWZDH21, author = {Xiangjun Li and Zijie Wu and Zhibin Zhao and Feng Ding and Daojing He}, title = {A mixed data clustering algorithm with noise-filtered distribution centroid and iterative weight adjustment strategy}, journal = {Inf. Sci.}, volume = {577}, pages = {697--721}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.07.039}, doi = {10.1016/J.INS.2021.07.039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiWZDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeZYCCZG21, author = {Daojing He and Beibei Zhou and Hang Yu and Yao Cheng and Sammy Chan and Min Zhang and Nadra Guizani}, title = {Group-based Password Characteristics Analysis}, journal = {{IEEE} Netw.}, volume = {35}, number = {1}, pages = {311--317}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000354}, doi = {10.1109/MNET.011.2000354}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeZYCCZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeYLCCG21, author = {Daojing He and Guang Yang and Hongyi Li and Sammy Chan and Yao Cheng and Nadra Guizani}, title = {An Effective Countermeasure Against {UAV} Swarm Attack}, journal = {{IEEE} Netw.}, volume = {35}, number = {1}, pages = {380--385}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000380}, doi = {10.1109/MNET.011.2000380}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HeYLCCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeGLD0ZG21, author = {Daojing He and Hongjie Gu and Tinghui Li and Yongliang Du and Xiaolei Wang and Sencun Zhu and Nadra Guizani}, title = {Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware}, journal = {{IEEE} Netw.}, volume = {35}, number = {2}, pages = {202--207}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000450}, doi = {10.1109/MNET.011.2000450}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeGLD0ZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeGLCCLZG21, author = {Daojing He and Yun Gao and Xiaoxia Liu and Sammy Chan and Yao Cheng and Xiaowen Liu and Baokang Zhao and Nadra Guizani}, title = {Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems}, journal = {{IEEE} Netw.}, volume = {35}, number = {4}, pages = {234--240}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000517}, doi = {10.1109/MNET.011.2000517}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeGLCCLZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeYZZZCG21, author = {Daojing He and Hang Yu and Beibei Zhou and Shanshan Zhu and Min Zhang and Sammy Chan and Mohsen Guizani}, title = {How Does Social Behavior Affect Your Password?}, journal = {{IEEE} Netw.}, volume = {35}, number = {5}, pages = {284--289}, year = {2021}, url = {https://doi.org/10.1109/MNET.101.2000762}, doi = {10.1109/MNET.101.2000762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeYZZZCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WangXHC21, author = {Zhendong Wang and Zhenyu Xu and Daojing He and Sammy Chan}, title = {Deep logarithmic neural network for Internet intrusion detection}, journal = {Soft Comput.}, volume = {25}, number = {15}, pages = {10129--10152}, year = {2021}, url = {https://doi.org/10.1007/s00500-021-05987-9}, doi = {10.1007/S00500-021-05987-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/WangXHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LinWHJWMHZZ21, author = {Yaguang Lin and Xiaoming Wang and Fei Hao and Yichuan Jiang and Yulei Wu and Geyong Min and Daojing He and Sencun Zhu and Wei Zhao}, title = {Dynamic Control of Fraud Information Spreading in Mobile Social Networks}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {51}, number = {6}, pages = {3725--3738}, year = {2021}, url = {https://doi.org/10.1109/TSMC.2019.2930908}, doi = {10.1109/TSMC.2019.2930908}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/LinWHJWMHZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/SongWXLZHYC21, author = {Yan Song and Binbin Wang and Xiaohu Yu and Tinghui Li and Shanshan Zhu and Daojing He and Guisong Yang and Sammy Chan}, title = {Review of Firmware Homology Detection: a System Aspect}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {556--563}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00088}, doi = {10.1109/DSC53577.2021.00088}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/SongWXLZHYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/SunDHZWC21, author = {Litong Sun and Runmeng Du and Daojing He and Shanshan Zhu and Rui Wang and Sammy Chan}, title = {Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning}, booktitle = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications; 7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021}, pages = {487--494}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00088}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00088}, timestamp = {Thu, 09 Jun 2022 16:39:42 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/SunDHZWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/PanHLCPG21, author = {Menghan Pan and Daojing He and Xuru Li and Sammy Chan and Emmanouil Panaousis and Yun Gao}, title = {A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2021, Athens, Greece, September 5-8, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCC53001.2021.9631436}, doi = {10.1109/ISCC53001.2021.9631436}, timestamp = {Fri, 17 Dec 2021 09:27:20 +0100}, biburl = {https://dblp.org/rec/conf/iscc/PanHLCPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PanHX21, author = {Kaiyun Pan and Daojing He and Chuan Xu}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Local Model Privacy-Preserving Study for Federated Learning}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, pages = {287--307}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9\_15}, doi = {10.1007/978-3-030-90019-9\_15}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PanHX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuLHHZC20, author = {Guangfu Wu and Yijie Lv and Daojing He and Jiguang He and Huan Zhou and Sammy Chan}, title = {Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory}, journal = {{IEEE} Access}, volume = {8}, pages = {26764--26772}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2971393}, doi = {10.1109/ACCESS.2020.2971393}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuLHHZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangMHZHZL20, author = {Qi Wang and Weidong Min and Daojing He and Song Zou and Tiemei Huang and Yu Zhang and Ruikang Liu}, title = {Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {11}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2811-8}, doi = {10.1007/S11432-019-2811-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangMHZHZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/YangHCHHC20, author = {Guisong Yang and Ling Hou and Hao Cheng and Xingyu He and Daojing He and Sammy Chan}, title = {Computation offloading time optimisation via Q-learning in opportunistic edge computing}, journal = {{IET} Commun.}, volume = {14}, number = {21}, pages = {3898--3906}, year = {2020}, url = {https://doi.org/10.1049/iet-com.2020.0765}, doi = {10.1049/IET-COM.2020.0765}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/YangHCHHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/LiHZYHC20, author = {Jun Li and Xingyu He and Dan Zhao and Guisong Yang and Daojing He and Sammy Chan}, title = {Delay-aware and cost-efficient probabilistic transmission for opportunistic networks}, journal = {{IET} Networks}, volume = {9}, number = {6}, pages = {372--377}, year = {2020}, url = {https://doi.org/10.1049/iet-net.2020.0082}, doi = {10.1049/IET-NET.2020.0082}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/LiHZYHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HanLZXRHWS20, author = {Song Han and Jianhong Lin and Shuai Zhao and Guangquan Xu and Siqi Ren and Daojing He and Licheng Wang and Leyun Shi}, title = {Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {8}, pages = {7550--7563}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2985454}, doi = {10.1109/JIOT.2020.2985454}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HanLZXRHWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeYZWCG20, author = {Daojing He and Xiao Yang and Beibei Zhou and Yu Wu and Yao Cheng and Nadra Guizani}, title = {Password Enhancement Based on Semantic Transformation}, journal = {{IEEE} Netw.}, volume = {34}, number = {1}, pages = {116--121}, year = {2020}, url = {https://doi.org/10.1109/MNET.2019.1900033}, doi = {10.1109/MNET.2019.1900033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeYZWCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeQGCZG20, author = {Daojing He and Qi Qiao and Jiahao Gao and Sammy Chan and Kangfeng Zheng and Nadra Guizani}, title = {Simulation Design for Security Testing of Integrated Electronic Systems}, journal = {{IEEE} Netw.}, volume = {34}, number = {1}, pages = {159--165}, year = {2020}, url = {https://doi.org/10.1109/MNET.2019.1900196}, doi = {10.1109/MNET.2019.1900196}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeQGCZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLZCZMG20, author = {Daojing He and Xiaoxia Liu and Jiajia Zheng and Sammy Chan and Sencun Zhu and Weidong Min and Nadra Guizani}, title = {A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems}, journal = {{IEEE} Netw.}, volume = {34}, number = {4}, pages = {173--179}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900480}, doi = {10.1109/MNET.001.1900480}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeLZCZMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeZYCCG20, author = {Daojing He and Beibei Zhou and Xiao Yang and Sammy Chan and Yao Cheng and Nadra Guizani}, title = {Group Password Strength Meter Based on Attention Mechanism}, journal = {{IEEE} Netw.}, volume = {34}, number = {4}, pages = {196--202}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900482}, doi = {10.1109/MNET.001.1900482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeZYCCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HePHCCLG20, author = {Daojing He and Menghan Pan and Kai Hong and Yao Cheng and Sammy Chan and Xiaowen Liu and Nadra Guizani}, title = {Fake Review Detection Based on {PU} Learning and Behavior Density}, journal = {{IEEE} Netw.}, volume = {34}, number = {4}, pages = {298--303}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900542}, doi = {10.1109/MNET.001.1900542}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HePHCCLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeDZCCG20, author = {Daojing He and Zhi Deng and Yuxing Zhang and Sammy Chan and Yao Cheng and Nadra Guizani}, title = {Smart Contract Vulnerability Analysis and Security Audit}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {276--282}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900656}, doi = {10.1109/MNET.001.1900656}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeDZCCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeZLCCG20, author = {Daojing He and Yuxing Zhang and Tinghui Li and Sammy Chan and Yao Cheng and Nadra Guizani}, title = {Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {315--321}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900666}, doi = {10.1109/MNET.001.1900666}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeZLCCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLLZCMG20, author = {Daojing He and Shihao Li and Cong Li and Sencun Zhu and Sammy Chan and Weidong Min and Nadra Guizani}, title = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications}, journal = {{IEEE} Netw.}, volume = {34}, number = {6}, pages = {114--119}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.2000025}, doi = {10.1109/MNET.011.2000025}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tds/LiLLLH20, author = {Xiangjun Li and Sifan Li and Shengnan Liu and Lingfeng Liu and Daojing He}, title = {A Malicious Webpage Detection Algorithm Based on Image Semantics}, journal = {Traitement du Signal}, volume = {37}, number = {1}, pages = {113--118}, year = {2020}, url = {https://doi.org/10.18280/ts.370115}, doi = {10.18280/TS.370115}, timestamp = {Tue, 07 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tds/LiLLLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/LiHLZCC20, author = {Cong Li and Daojing He and Shihao Li and Sencun Zhu and Sammy Chan and Yao Cheng}, title = {Android-based Cryptocurrency Wallets: Attacks and Countermeasures}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {9--16}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00010}, doi = {10.1109/BLOCKCHAIN50366.2020.00010}, timestamp = {Fri, 30 Apr 2021 12:35:39 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/LiHLZCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/QiaoHGZGC20, author = {Qi Qiao and Daojing He and Yun Gao and Sencun Zhu and Jiahao Gao and Sammy Chan}, title = {Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems}, booktitle = {17th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2020, Virtual Event, Italy, June 22-25, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SECON48991.2020.9158421}, doi = {10.1109/SECON48991.2020.9158421}, timestamp = {Wed, 03 Feb 2021 13:40:37 +0100}, biburl = {https://dblp.org/rec/conf/secon/QiaoHGZGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LiuHGZC20, author = {Xiaoxia Liu and Daojing He and Yun Gao and Sencun Zhu and Sammy Chan}, title = {{TLP-IDS:} {A} Two-layer Intrusion Detection System for Integrated Electronic Systems}, booktitle = {International Symposium on Reliable Distributed Systems, {SRDS} 2020, Shanghai, China, September 21-24, 2020}, pages = {205--214}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SRDS51746.2020.00028}, doi = {10.1109/SRDS51746.2020.00028}, timestamp = {Thu, 19 Nov 2020 10:52:27 +0100}, biburl = {https://dblp.org/rec/conf/srds/LiuHGZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuCDH19, author = {Zhangjie Fu and Yiming Chen and Yongjie Ding and Daojing He}, title = {Pollution Source Localization Based on Multi-UAV Cooperative Communication}, journal = {{IEEE} Access}, volume = {7}, pages = {29304--29312}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2900475}, doi = {10.1109/ACCESS.2019.2900475}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FuCDH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuMHYX19, author = {Zhangjie Fu and Yuanhang Mao and Daojing He and Jingnan Yu and Guowu Xie}, title = {Secure Multi-UAV Collaborative Task Allocation}, journal = {{IEEE} Access}, volume = {7}, pages = {35579--35587}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2902221}, doi = {10.1109/ACCESS.2019.2902221}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FuMHYX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangXHC19, author = {Zhendong Wang and Huamao Xie and Daojing He and Sammy Chan}, title = {Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms}, journal = {{IEEE} Access}, volume = {7}, pages = {180590--180608}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2959949}, doi = {10.1109/ACCESS.2019.2959949}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangXHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FanLXLH19, author = {Qiang Fan and Wang Luo and Yuan Xia and Guozhi Li and Daojing He}, title = {metrics and methods of video quality assessment: a brief review}, journal = {Multim. Tools Appl.}, volume = {78}, number = {22}, pages = {31019--31033}, year = {2019}, url = {https://doi.org/10.1007/s11042-017-4848-x}, doi = {10.1007/S11042-017-4848-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FanLXLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeQCDCZG19, author = {Daojing He and Yinrong Qiao and Shiqing Chen and Xiao Du and Wenjie Chen and Sencun Zhu and Mohsen Guizani}, title = {A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles}, journal = {{IEEE} Netw.}, volume = {33}, number = {2}, pages = {146--151}, year = {2019}, url = {https://doi.org/10.1109/MNET.2018.1800065}, doi = {10.1109/MNET.2018.1800065}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeQCDCZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLCG19, author = {Daojing He and Hong Liu and Sammy Chan and Mohsen Guizani}, title = {How to Govern the Non-Cooperative Amateur Drones?}, journal = {{IEEE} Netw.}, volume = {33}, number = {3}, pages = {184--189}, year = {2019}, url = {https://doi.org/10.1109/MNET.2019.1800156}, doi = {10.1109/MNET.2019.1800156}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeLCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeQGZCLG19, author = {Daojing He and Qi Qiao and Yun Gao and Jiajia Zheng and Sammy Chan and Jinxiang Li and Nadra Guizani}, title = {Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems}, journal = {{IEEE} Netw.}, volume = {33}, number = {6}, pages = {64--69}, year = {2019}, url = {https://doi.org/10.1109/MNET.001.1900105}, doi = {10.1109/MNET.001.1900105}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeQGZCLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeHCTG19, author = {Daojing He and Kai Hong and Yao Cheng and Zongli Tang and Mohsen Guizani}, title = {Detecting Promotion Attacks in the App Market Using Neural Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {26}, number = {4}, pages = {110--116}, year = {2019}, url = {https://doi.org/10.1109/MWC.2019.1800322}, doi = {10.1109/MWC.2019.1800322}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeHCTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCQG18, author = {Daojing He and Sammy Chan and Yinrong Qiao and Nadra Guizani}, title = {Imminent Communication Security for Smart Communities}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {1}, pages = {99--103}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1700587}, doi = {10.1109/MCOM.2018.1700587}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCQG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeYCGX18, author = {Daojing He and Ran Ye and Sammy Chan and Mohsen Guizani and Yanping Xu}, title = {Privacy in the Internet of Things for Smart Healthcare}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {4}, pages = {38--44}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1700809}, doi = {10.1109/MCOM.2018.1700809}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeYCGX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeQCG18, author = {Daojing He and Yinrong Qiao and Sammy Chan and Nadra Guizani}, title = {Flight Security and Safety of Drones in Airborne Fog Computing Systems}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {5}, pages = {66--71}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1700916}, doi = {10.1109/MCOM.2018.1700916}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeQCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCG18, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Security in the Internet of Things Supported by Mobile Edge Computing}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {8}, pages = {56--61}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1701132}, doi = {10.1109/MCOM.2018.1701132}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/HeCG18, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Privacy-friendly and efficient secure communication framework for {V2G} networks}, journal = {{IET} Commun.}, volume = {12}, number = {3}, pages = {304--309}, year = {2018}, url = {https://doi.org/10.1049/iet-com.2017.0608}, doi = {10.1049/IET-COM.2017.0608}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/HeCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeLCGG18, author = {Daojing He and Xuru Li and Sammy Chan and Jiahao Gao and Mohsen Guizani}, title = {Security Analysis of a Space-Based Wireless Network}, journal = {{IEEE} Netw.}, volume = {33}, number = {1}, pages = {36--43}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1800194}, doi = {10.1109/MNET.2018.1800194}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeLCGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCG17, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Drone-Assisted Public Safety Networks: The Security Aspect}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {8}, pages = {218--223}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600799CM}, doi = {10.1109/MCOM.2017.1600799CM}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeCNG17, author = {Daojing He and Sammy Chan and Xiejun Ni and Mohsen Guizani}, title = {Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {6}, pages = {1890--1898}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2017.2694702}, doi = {10.1109/JIOT.2017.2694702}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HeCNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeCG17, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Win-Win Security Approaches for Smart Grid Communications Networks}, journal = {{IEEE} Netw.}, volume = {31}, number = {6}, pages = {122--128}, year = {2017}, url = {https://doi.org/10.1109/MNET.2017.1700065}, doi = {10.1109/MNET.2017.1700065}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeCG17, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Communication Security of Unmanned Aerial Vehicles}, journal = {{IEEE} Wirel. Commun.}, volume = {24}, number = {4}, pages = {134--139}, year = {2017}, url = {https://doi.org/10.1109/MWC.2016.1600073WC}, doi = {10.1109/MWC.2016.1600073WC}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeCG17a, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring}, journal = {{IEEE} Wirel. Commun.}, volume = {24}, number = {6}, pages = {98--103}, year = {2017}, url = {https://doi.org/10.1109/MWC.2017.1600283WC}, doi = {10.1109/MWC.2017.1600283WC}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeCG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/ChenTHT17, author = {Jiahui Chen and Shaohua Tang and Daojing He and Yang Tan}, title = {Online/offline signature based on {UOV} in wireless sensor networks}, journal = {Wirel. Networks}, volume = {23}, number = {6}, pages = {1719--1730}, year = {2017}, url = {https://doi.org/10.1007/s11276-016-1245-8}, doi = {10.1007/S11276-016-1245-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/ChenTHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/XuPWHZLWN17, author = {Dan Xu and Yao Peng and Wei Wang and Daojing He and Xia Zheng and Zhanglei Li and Anwen Wang and Weike Nie}, title = {RePC: {A} Localization Method Based on Regional Partition and Cooperation in Communication Networks}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {4}, pages = {5409--5435}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3748-0}, doi = {10.1007/S11277-016-3748-0}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/XuPWHZLWN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenHZY17, author = {Hao Chen and Daojing He and Sencun Zhu and Jingshun Yang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {58--70}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053022}, doi = {10.1145/3052973.3053022}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenHZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ChenMCCH17, author = {Wenjie Chen and Yangyang Ma and Zhilei Chai and Mingsong Chen and Daojing He}, editor = {Shadi Ibrahim and Kim{-}Kwang Raymond Choo and Zheng Yan and Witold Pedrycz}, title = {An FPGA-Based Real-Time Moving Object Tracking Approach}, booktitle = {Algorithms and Architectures for Parallel Processing - 17th International Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10393}, pages = {65--80}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65482-9\_5}, doi = {10.1007/978-3-319-65482-9\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ChenMCCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCG16, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Securing software defined wireless networks}, journal = {{IEEE} Commun. Mag.}, volume = {54}, number = {1}, pages = {20--25}, year = {2016}, url = {https://doi.org/10.1109/MCOM.2016.7378421}, doi = {10.1109/MCOM.2016.7378421}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HeCG16, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {65}, number = {3}, pages = {1605--1614}, year = {2016}, url = {https://doi.org/10.1109/TVT.2015.2406671}, doi = {10.1109/TVT.2015.2406671}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HeCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NiHCA16, author = {Xiejun Ni and Daojing He and Sammy Chan and Farooq Ahmad}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {212--227}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_12}, doi = {10.1007/978-3-319-39555-5\_12}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/NiHCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ChenDCHZZPL16, author = {Wenjie Chen and Shuaishuai Ding and Zhilei Chai and Daojing He and Weihua Zhang and Guanhua Zhang and Qiwei Peng and Wang Luo}, title = {FPGA-Based Parallel Implementation of {SURF} Algorithm}, booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2016, Wuhan, China, December 13-16, 2016}, pages = {308--315}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICPADS.2016.0049}, doi = {10.1109/ICPADS.2016.0049}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ChenDCHZZPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/GuizaniHRRCZ15, author = {Mohsen Guizani and Daojing He and Kui Ren and Joel J. P. C. Rodrigues and Sammy Chan and Yan Zhang}, title = {Security and privacy in emerging networks: Part 1 [Guest Editorial]}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {4}, pages = {18--19}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7081098}, doi = {10.1109/MCOM.2015.7081098}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/GuizaniHRRCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/GuizaniHRRCZ15a, author = {Mohsen Guizani and Daojing He and Kui Ren and Joel J. P. C. Rodrigues and Sammy Chan and Yan Zhang}, title = {Security and privacy in emerging networks: Part {II} [Guest Editorial]}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {8}, pages = {40--41}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7180505}, doi = {10.1109/MCOM.2015.7180505}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/GuizaniHRRCZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCG15, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Privacy and incentive mechanisms in people-centric sensing networks}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {10}, pages = {200--206}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7295484}, doi = {10.1109/MCOM.2015.7295484}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeCG15, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Handover authentication for mobile networks: security and efficiency aspects}, journal = {{IEEE} Netw.}, volume = {29}, number = {3}, pages = {96--103}, year = {2015}, url = {https://doi.org/10.1109/MNET.2015.7113232}, doi = {10.1109/MNET.2015.7113232}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuTXH15, author = {Niu Liu and Shaohua Tang and Lingling Xu and Daojing He}, title = {Analyses of several recently proposed group key management schemes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {136--148}, year = {2015}, url = {https://doi.org/10.1002/sec.966}, doi = {10.1002/SEC.966}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuTXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/XiaWZHK15, author = {Feng Xia and Linqiang Wang and Daqiang Zhang and Daojing He and Xiangjie Kong}, title = {An adaptive {MAC} protocol for real-time and reliable communications in medical cyber-physical systems}, journal = {Telecommun. Syst.}, volume = {58}, number = {2}, pages = {125--138}, year = {2015}, url = {https://doi.org/10.1007/s11235-014-9895-2}, doi = {10.1007/S11235-014-9895-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/XiaWZHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/HeCGYZ15, author = {Daojing He and Sammy Chan and Mohsen Guizani and Haomiao Yang and Boyang Zhou}, title = {Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {26}, number = {4}, pages = {1129--1139}, year = {2015}, url = {https://doi.org/10.1109/TPDS.2014.2316830}, doi = {10.1109/TPDS.2014.2316830}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/HeCGYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeCG15, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {14}, number = {1}, pages = {389--398}, year = {2015}, url = {https://doi.org/10.1109/TWC.2014.2347311}, doi = {10.1109/TWC.2014.2347311}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeCG15, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {User privacy and data trustworthiness in mobile crowd sensing}, journal = {{IEEE} Wirel. Commun.}, volume = {22}, number = {1}, pages = {28--34}, year = {2015}, url = {https://doi.org/10.1109/MWC.2015.7054716}, doi = {10.1109/MWC.2015.7054716}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeCG15a, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Mobile application security: malware threats and defenses}, journal = {{IEEE} Wirel. Commun.}, volume = {22}, number = {1}, pages = {138--144}, year = {2015}, url = {https://doi.org/10.1109/MWC.2015.7054729}, doi = {10.1109/MWC.2015.7054729}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeCG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenHC15, author = {Depeng Chen and Daojing He and Sammy Chan}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {421--435}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_36}, doi = {10.1007/978-3-319-29814-6\_36}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/HeCZWW14, author = {Daojing He and Sammy Chan and Yan Zhang and Chunming Wu and Bing Wang}, title = {How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?}, journal = {{IEEE} Intell. Syst.}, volume = {29}, number = {5}, pages = {14--21}, year = {2014}, url = {https://doi.org/10.1109/MIS.2013.105}, doi = {10.1109/MIS.2013.105}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/HeCZWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeCZGCB14, author = {Daojing He and Sammy Chan and Yan Zhang and Mohsen Guizani and Chun Chen and Jiajun Bu}, title = {An enhanced public key infrastructure to secure smart grid wireless communication networks}, journal = {{IEEE} Netw.}, volume = {28}, number = {1}, pages = {10--16}, year = {2014}, url = {https://doi.org/10.1109/MNET.2014.6724101}, doi = {10.1109/MNET.2014.6724101}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeCZGCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCT14, author = {Daojing He and Sammy Chan and Shaohua Tang}, title = {A Novel and Lightweight System to Secure Wireless Medical Sensor Networks}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {18}, number = {1}, pages = {316--326}, year = {2014}, url = {https://doi.org/10.1109/JBHI.2013.2268897}, doi = {10.1109/JBHI.2013.2268897}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/HeCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCZY14, author = {Daojing He and Sammy Chan and Yan Zhang and Haomiao Yang}, title = {Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {18}, number = {2}, pages = {440--448}, year = {2014}, url = {https://doi.org/10.1109/JBHI.2013.2293620}, doi = {10.1109/JBHI.2013.2293620}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/HeCZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeCG14, author = {Daojing He and Sammy Chan and Mohsen Guizani}, title = {Small data dissemination for wireless sensor networks: The security aspect}, journal = {{IEEE} Wirel. Commun.}, volume = {21}, number = {3}, pages = {110--116}, year = {2014}, url = {https://doi.org/10.1109/MWC.2014.6845055}, doi = {10.1109/MWC.2014.6845055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/HeCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCBCZ13, author = {Daojing He and Chun Chen and Jiajun Bu and Sammy Chan and Yan Zhang}, title = {Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects}, journal = {{IEEE} Commun. Mag.}, volume = {51}, number = {2}, pages = {142--150}, year = {2013}, url = {https://doi.org/10.1109/MCOM.2013.6461199}, doi = {10.1109/MCOM.2013.6461199}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCBCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HeCMCB13, author = {Daojing He and Chun Chen and Maode Ma and Sammy Chan and Jiajun Bu}, title = {A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks}, journal = {Int. J. Commun. Syst.}, volume = {26}, number = {4}, pages = {495--504}, year = {2013}, url = {https://doi.org/10.1002/dac.1355}, doi = {10.1002/DAC.1355}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HeCMCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HeCCB13, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu}, title = {Strong roaming authentication technique for wireless and mobile networks}, journal = {Int. J. Commun. Syst.}, volume = {26}, number = {8}, pages = {1028--1037}, year = {2013}, url = {https://doi.org/10.1002/dac.1387}, doi = {10.1002/DAC.1387}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HeCCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HeBCC13, author = {Daojing He and Jiajun Bu and Sammy Chan and Chun Chen}, title = {Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks}, journal = {{IEEE} Trans. Computers}, volume = {62}, number = {3}, pages = {616--622}, year = {2013}, url = {https://doi.org/10.1109/TC.2011.258}, doi = {10.1109/TC.2011.258}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HeBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/HeCCBY13, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu and Laurence T. Yang}, title = {Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {60}, number = {11}, pages = {5348--5354}, year = {2013}, url = {https://doi.org/10.1109/TIE.2012.2218562}, doi = {10.1109/TIE.2012.2218562}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/HeCCBY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCCBZ13, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu and Pingxin Zhang}, title = {Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {17}, number = {3}, pages = {664--674}, year = {2013}, url = {https://doi.org/10.1109/JBHI.2012.2235180}, doi = {10.1109/JBHI.2012.2235180}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/HeCCBZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiuNZHXY13, author = {Hong Liu and Huansheng Ning and Yan Zhang and Daojing He and Qingxu Xiong and Laurence T. Yang}, title = {Grouping-Proofs-Based Authentication Protocol for Distributed {RFID} Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {7}, pages = {1321--1330}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.218}, doi = {10.1109/TPDS.2012.218}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LiuNZHXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeCTG13, author = {Daojing He and Sammy Chan and Shaohua Tang and Mohsen Guizani}, title = {Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {12}, number = {9}, pages = {4638--4646}, year = {2013}, url = {https://doi.org/10.1109/TWC.2013.090413.130072}, doi = {10.1109/TWC.2013.090413.130072}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeCTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/LiTH13, author = {Weijian Li and Shaohua Tang and Daojing He}, editor = {Changshe Ma and Jian Weng}, title = {A Survey of Side Channel Attacks on MPKCs potential for {RFID}}, booktitle = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013}, series = {Cryptology and Information Security Series}, volume = {11}, pages = {123--131}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-328-5-123}, doi = {10.3233/978-1-61499-328-5-123}, timestamp = {Wed, 13 May 2020 07:48:31 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/LiTH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HeCBCZG12, author = {Daojing He and Chun Chen and Jiajun Bu and Sammy Chan and Yan Zhang and Mohsen Guizani}, title = {Secure service provision in smart grid communications}, journal = {{IEEE} Commun. Mag.}, volume = {50}, number = {8}, pages = {53--61}, year = {2012}, url = {https://doi.org/10.1109/MCOM.2012.6257527}, doi = {10.1109/MCOM.2012.6257527}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HeCBCZG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/HeCCB12, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu}, title = {Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks}, journal = {{IEEE} Commun. Lett.}, volume = {16}, number = {8}, pages = {1270--1273}, year = {2012}, url = {https://doi.org/10.1109/LCOMM.2012.061912.120941}, doi = {10.1109/LCOMM.2012.061912.120941}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/HeCCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeCMB12, author = {Daojing He and Chun Chen and Maode Ma and Jiajun Bu}, title = {Cryptanalysis of some conference schemes for mobile communications}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {107--112}, year = {2012}, url = {https://doi.org/10.1002/sec.284}, doi = {10.1002/SEC.284}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeCMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeCCB12, author = {Daojing He and Sammy Chan and Chun Chen and Jiajun Bu}, title = {Secure and efficient dynamic program update in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {5}, number = {7}, pages = {823--830}, year = {2012}, url = {https://doi.org/10.1002/sec.377}, doi = {10.1002/SEC.377}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeCCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/HeCCB12, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu}, title = {{SDRP:} {A} Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {59}, number = {11}, pages = {4155--4163}, year = {2012}, url = {https://doi.org/10.1109/TIE.2011.2178214}, doi = {10.1109/TIE.2011.2178214}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/HeCCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCCBV12, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu and Athanasios V. Vasilakos}, title = {ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks}, journal = {{IEEE} Trans. Inf. Technol. Biomed.}, volume = {16}, number = {4}, pages = {623--632}, year = {2012}, url = {https://doi.org/10.1109/TITB.2012.2194788}, doi = {10.1109/TITB.2012.2194788}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/HeCCBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCCBV12a, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu and Athanasios V. Vasilakos}, title = {A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks}, journal = {{IEEE} Trans. Inf. Technol. Biomed.}, volume = {16}, number = {6}, pages = {1164--1175}, year = {2012}, url = {https://doi.org/10.1109/TITB.2012.2199996}, doi = {10.1109/TITB.2012.2199996}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/HeCCBV12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeCCB12, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu}, title = {Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {1}, pages = {48--53}, year = {2012}, url = {https://doi.org/10.1109/TWC.2011.110811.111240}, doi = {10.1109/TWC.2011.110811.111240}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeCCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeCCB12a, author = {Daojing He and Chun Chen and Sammy Chan and Jiajun Bu}, title = {DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {5}, pages = {1946--1956}, year = {2012}, url = {https://doi.org/10.1109/TWC.2012.030812.111857}, doi = {10.1109/TWC.2012.030812.111857}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeCCB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HeMZCB11, author = {Daojing He and Maode Ma and Yan Zhang and Chun Chen and Jiajun Bu}, title = {A strong user authentication scheme with smart cards for wireless communications}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {367--374}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.02.031}, doi = {10.1016/J.COMCOM.2010.02.031}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HeMZCB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ChenHCBGF11, author = {Chun Chen and Daojing He and Sammy Chan and Jiajun Bu and Yi Gao and Rong Fan}, title = {Lightweight and provably secure user authentication with anonymity for the global mobility network}, journal = {Int. J. Commun. Syst.}, volume = {24}, number = {3}, pages = {347--362}, year = {2011}, url = {https://doi.org/10.1002/dac.1158}, doi = {10.1002/DAC.1158}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/ChenHCBGF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BuYHXC11, author = {Jiajun Bu and Mingjian Yin and Daojing He and Feng Xia and Chun Chen}, title = {{SEF:} {A} Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {7}, number = {1}, year = {2011}, url = {https://doi.org/10.1155/2011/126407}, doi = {10.1155/2011/126407}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BuYHXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/FanHPP11, author = {Rong Fan and Daojing He and Xue{-}zeng Pan and Ling{-}di Ping}, title = {An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks}, journal = {J. Zhejiang Univ. Sci. {C}}, volume = {12}, number = {7}, pages = {550--560}, year = {2011}, url = {https://doi.org/10.1631/jzus.C1000377}, doi = {10.1631/JZUS.C1000377}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/FanHPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeBCCY11, author = {Daojing He and Jiajun Bu and Sammy Chan and Chun Chen and Mingjian Yin}, title = {Privacy-Preserving Universal Authentication Protocol for Wireless Communications}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {2}, pages = {431--436}, year = {2011}, url = {https://doi.org/10.1109/TWC.2010.120610.101018}, doi = {10.1109/TWC.2010.120610.101018}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeBCCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeBZCC11, author = {Daojing He and Jiajun Bu and Sencun Zhu and Sammy Chan and Chun Chen}, title = {Distributed Access Control with Privacy Support in Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {10}, pages = {3472--3481}, year = {2011}, url = {https://doi.org/10.1109/TWC.2011.072511.102283}, doi = {10.1109/TWC.2011.072511.102283}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeBZCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HeCCCBY11, author = {Daojing He and Caixia Chi and Sammy Chan and Chun Chen and Jiajun Bu and Mingjian Yin}, title = {A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks}, journal = {Wirel. Pers. Commun.}, volume = {59}, number = {2}, pages = {361--373}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-9922-x}, doi = {10.1007/S11277-010-9922-X}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HeCCCBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HeCCBF11, author = {Daojing He and Sammy Chan and Chun Chen and Jiajun Bu and Rong Fan}, title = {Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks}, journal = {Wirel. Pers. Commun.}, volume = {61}, number = {2}, pages = {465--476}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-0033-5}, doi = {10.1007/S11277-010-0033-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HeCCBF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeBZYGWCC11, author = {Daojing He and Jiajun Bu and Sencun Zhu and Mingjian Yin and Yi Gao and Haodong Wang and Sammy Chan and Chun Chen}, title = {Distributed privacy-preserving access control in a single-owner multi-user sensor network}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {331--335}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935176}, doi = {10.1109/INFCOM.2011.5935176}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/HeBZYGWCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/GaoCBDH11, author = {Yi Gao and Chun Chen and Jiajun Bu and Wei Dong and Daojing He}, title = {{ICAD:} Indirect correlation based anomaly detection in dynamic WSNs}, booktitle = {2011 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2011, Proceedings, Cancun, Mexico, 28-31 March, 2011}, pages = {647--652}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/WCNC.2011.5779209}, doi = {10.1109/WCNC.2011.5779209}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/GaoCBDH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/HeGCCB10, author = {Daojing He and Yi Gao and Sammy Chan and Chun Chen and Jiajun Bu}, title = {An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {10}, number = {4}, pages = {361--371}, year = {2010}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-10-number-4/ahswn-10-4-p-343-359-2/}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ahswn/HeGCCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/HeC10, author = {Daojing He and Sammy Chan}, editor = {Tomoya Enokido and Fatos Xhafa and Leonard Barolli and Makoto Takizawa and Minoru Uehara and Arjan Durresi}, title = {A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network}, booktitle = {The 13th International Conference on Network-Based Information Systems, NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010}, pages = {305--312}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NBiS.2010.34}, doi = {10.1109/NBIS.2010.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/HeC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/HeCHM09, author = {Daojing He and Lin Cui and Hejiao Huang and Maode Ma}, title = {Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {20}, number = {7}, pages = {1050--1058}, year = {2009}, url = {https://doi.org/10.1109/TPDS.2008.166}, doi = {10.1109/TPDS.2008.166}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/HeCHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HeCHM09, author = {Daojing He and Lin Cui and Hejiao Huang and Maode Ma}, title = {Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {50}, number = {4}, pages = {545--561}, year = {2009}, url = {https://doi.org/10.1007/s11277-008-9623-x}, doi = {10.1007/S11277-008-9623-X}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HeCHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.