default search action
Jingsha He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j91]Jiajia Hu, Jingsha He, Nafei Zhu, Lu Qu:
Trajectory privacy preservation model based on LSTM-DCGAN. Future Gener. Comput. Syst. 163: 107496 (2025) - 2024
- [j90]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal:
An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach. Ad Hoc Networks 152: 103331 (2024) - [j89]Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He:
A scalable blockchain storage scheme for VANET. Clust. Comput. 27(4): 3957-3981 (2024) - [j88]Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He:
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications. Clust. Comput. 27(5): 5677-5698 (2024) - [j87]Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6): 8367-8392 (2024) - [j86]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo:
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning. Comput. Commun. 213: 236-245 (2024) - [j85]Xiangjun Ma, Jingsha He, Tiejun Wu, Nafei Zhu, Yakang Hua:
Interaction behavior enhanced community detection in online social networks. Comput. Commun. 219: 92-103 (2024) - [j84]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j83]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Mutiq Almutiq, Fayaz Ali Dharejo, Deepak Kumar Jain, Saqib Hussain, Zulfiqar Ali Zardari:
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j82]Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He:
Modeling the dissemination of privacy information in online social networks. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - [j81]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Faheem Ullah, Sirajuddin Qureshi, Musa Osman:
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intell. Decis. Technol. 18(1): 33-55 (2024) - [j80]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Faheem Ullah, Sirajuddin Qureshi, Xiangjun Ma, Muhammad Salman Pathan:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - [j79]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Ahsan Nazir, Ahsan Wajahat, Faheem Ullah, Abdul Wadud:
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102164 (2024) - [j78]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks. IEEE Trans. Comput. Soc. Syst. 11(3): 4367-4384 (2024) - [j77]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal, Asaad Ahmed:
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach. J. Supercomput. 80(18): 26333-26362 (2024) - [c65]Ahsan Nazir, Jingsha He, Nafei Zhu, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Ahsan Wajahat:
Ensemble Learning Techniques for the Detection of IoT Botnets. CSAIDE 2024: 80-85 - 2023
- [j76]Zhiguang Chu, Jingsha He, Dongdong Peng, Xing Zhang, Nafei Zhu:
Differentially Private Denoise Diffusion Probability Models. IEEE Access 11: 108033-108040 (2023) - [j75]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Comput. Commun. 200: 149-160 (2023) - [j74]Jingsha He, Yue Li, Nafei Zhu:
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks. Future Internet 15(3): 92 (2023) - [j73]Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, Nafei Zhu, Zulfiqar Ali Zardari, Tariq Mahmood, Ahsan Wajahat:
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs. J. Intell. Fuzzy Syst. 44(6): 10675-10687 (2023) - [j72]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j71]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101820 (2023) - [j70]Ruixin Xue, Nafei Zhu, Jingsha He, Lin He:
Bitcoin transaction pattern recognition based on semi-supervised learning. J. Comput. Sci. 71: 102055 (2023) - [c64]Haiyang He, Jingsha He:
Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing. ICCEIC 2023: 20-23 - [c63]Yuzi Yi, Nafei Zhu, Jingsha He, Xiangjun Ma, Yehong Luo:
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks. WISE 2023: 220-234 - 2022
- [j69]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j68]Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. Int. J. Inf. Secur. Priv. 16(1): 1-22 (2022) - [j67]Nafei Zhu, Baocun Chen, Siyu Wang, Da Teng, Jingsha He:
Ontology-Based Approach for the Measurement of Privacy Disclosure. Inf. Syst. Frontiers 24(5): 1689-1707 (2022) - [j66]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Ghulam Ali Mallah, Ziyue Qiao, Amir Haider, Saqib Hussain, Muhammad Iftikhar Hussain, Zulfiqar Ali Zardari:
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs. Microprocess. Microsystems 93: 104617 (2022) - [j65]Yuzi Yi, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. Secur. Priv. 5(2) (2022) - [j64]Hewen Wang, Jingsha He, Nafei Zhu:
Improving Data Utilization of K-anonymity through Clustering Optimization. Trans. Data Priv. 15(3): 177-192 (2022) - 2021
- [j63]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, Ahsan Wajahat:
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks. IEEE Access 9: 73938-73947 (2021) - [j62]Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, Nafei Zhu, Sirajuddin Qureshi:
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access 9: 83654-83665 (2021) - [j61]Gongzheng Liu, Jingsha He, Xinggang Xuan:
A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics. Complex. 2021: 5536326:1-5536326:12 (2021) - [j60]Yajing Wang, Jingsha He, Nafei Zhu, Yuzi Yi, Qingqing Zhang, Hongyu Song, Ruixin Xue:
Security enhancement technologies for smart contracts in the blockchain: A survey. Trans. Emerg. Telecommun. Technol. 32(12) (2021) - [j59]Yanbo Chen, Jingsha He, Wei Wei, Nafei Zhu, Cong Yu:
A Multi-Model Approach for User Portrait. Future Internet 13(6): 147 (2021) - [j58]Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng:
An authorisation certificate-based access control model. Int. J. Secur. Networks 16(4): 258-266 (2021) - [j57]Hongyu Song, Nafei Zhu, Ruixin Xue, Jingsha He, Kun Zhang, Jianyu Wang:
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection. Inf. Process. Manag. 58(3): 102507 (2021) - [j56]Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, Muhammad Salman Pathan:
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. J. Intell. Fuzzy Syst. 41(1): 125-136 (2021) - [j55]Yue Zhou, Xiujun Wang, Shu Guo, Yi Wen, Jingsha He:
A cost-effective adaptive random testing algorithm for object-oriented software testing. J. Intell. Fuzzy Syst. 41(3): 4415-4423 (2021) - 2020
- [j54]Baocun Chen, Nafei Zhu, Jingsha He, Peng He, Shuting Jin, Shijia Pan:
A Semantic Inference Based Method for Privacy Measurement. IEEE Access 8: 200112-200128 (2020) - [j53]Jingsha He, Prasad K. D. V. Yarlagadda, Shengzong Zhou:
Special issue on the application of artificial intelligence in advanced manufacturing. Int. J. Comput. Integr. Manuf. 33(10-11): 947-948 (2020) - [j52]Muhammad Azeem, Jingsha He, Allah Ditta, Faheem Akhtar, Sher Muhammad Daudpota:
A novel approach to secret data concealment with high cover text capacity and security. Int. J. Electron. Secur. Digit. Forensics 12(1): 77-98 (2020) - [j51]Fangbo Cai, Jingsha He, Zulfiqar Ali Zardari, Song Han:
Distributed management of permission for access control model. J. Intell. Fuzzy Syst. 38(2): 1539-1548 (2020) - [j50]Peng Zhai, Jingsha He, Nafei Zhu, Peng He, Yao Liang:
An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress". J. Web Eng. 19(7-8): 230-243 (2020) - [j49]Zhao Li, Jun Wu, Xiaofeng Zhang, Jingsha He, Peng Chen, Keqing He:
Using metadata for recommending business process. J. Supercomput. 76(5): 3729-3748 (2020) - [c62]Xiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou:
Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion. COMPSAC 2020: 255-261
2010 – 2019
- 2019
- [j48]Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu:
Survey of access control models and technologies for cloud computing. Clust. Comput. 22(Supplement): 6111-6122 (2019) - [j47]Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, Zhao Li:
Management of access privileges for dynamic access control. Clust. Comput. 22(Supplement): 8899-8917 (2019) - [j46]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon:
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs. Future Internet 11(3): 61 (2019) - [j45]Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar Rajpoot:
A cryptographic data hiding algorithm with high cover text capacity. Int. J. Electron. Secur. Digit. Forensics 11(2): 225-244 (2019) - [j44]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. Int. J. Netw. Secur. 21(6): 1021-1030 (2019) - [j43]Guorui Li, Jingsha He, Sancheng Peng, Weijia Jia, Cong Wang, Jianwei Niu, Shui Yu:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - [c61]Shaoxun Su, Nafei Zhu, Jingsha He:
Pyramid Text Recognition Based on A New Text Representation Model. ICNSC 2019: 195-199 - [c60]Pengyu Mu, Jingsha He, Nafei Zhu:
Text Classification of Network Pyramid Scheme based on Topic Model. NLPIR 2019: 15-19 - [c59]Zhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He:
Applying Ordered Technique Set for Fault Localization. QRS Companion 2019: 516-517 - 2018
- [j42]Na Huang, Jingsha He, Nafei Zhu, Xinggang Xuan, Gongzheng Liu, Chengyue Chang:
Identification of the source camera of images based on convolutional neural network. Digit. Investig. 26: 72-80 (2018) - [j41]Jingsha He, Xinggang Xuan, Nafei Zhu, Na Huang, Peng He:
Mobile beacon-based adaptive time synchronization for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 220 (2018) - [j40]Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, Muhammad Iftikhar Hussain:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. Future Internet 10(2): 16 (2018) - [j39]Jingsha He, Jianan Wu, Nafei Zhu, Muhammad Salman Pathan:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. Future Internet 10(5): 38 (2018) - [j38]Yameng Li, Jingsha He, Na Huang, Gongzheng Liu:
Recovering multiple versions of YAFFS2 files based on Hash and timestamps. Int. J. Embed. Syst. 10(4): 313-322 (2018) - [j37]Muhammad Qasim Memon, Jingsha He, Mirza Ammar Yasir, Aasma Memon:
Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting. Sensors 18(4): 1185 (2018) - [j36]Nafei Zhu, Siyu Wang, Jingsha He, Da Teng, Peng He, Yuqiang Zhang:
On the Suitability of Applying WordNet to Privacy Measurement. Wirel. Pers. Commun. 103(1): 359-378 (2018) - [c58]Zhao Li, Jun Wu, Shuangmei Peng, Peng Chen, Jingsha He, Yiwang Huang, Keqing He:
MFI-5 Based Similarity Measurement of Business Process Models. ICCCS (1) 2018: 648-661 - [c57]Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. TrustCom/BigDataSE 2018: 1702-1705 - [c56]Anca Delia Jurcut, Madhusanka Liyanage, Jinyong Chen, Cornelia Györödi, Jingsha He:
On the security verification of a short message service protocol. WCNC 2018: 1-6 - 2017
- [j35]Jingsha He, Qi Xiao, Peng He, Muhammad Salman Pathan:
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning. Future Internet 9(1): 7 (2017) - [j34]Seyed Mahmood Hashemi, Jingsha He, Alireza Ebrahimi Basabi:
Multi-objective Optimization for Computer Security and Privacy. Int. J. Netw. Secur. 19(3): 394-405 (2017) - [j33]Seyed Mahmood Hashemi, Jingsha He:
An Evolutionary Multi-objective Approach for Modelling Network Security. Int. J. Netw. Secur. 19(4): 528-536 (2017) - [j32]Seyed Mahmood Hashemi, Jingsha He:
LA-Based Approach for IoT Security. J. Robotics Netw. Artif. Life 3(4): 240-248 (2017) - [c55]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - 2016
- [j31]Jingsha He, Chengyue Chang, Peng He, Muhammad Salman Pathan:
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet 8(4): 54 (2016) - [j30]Bin Zhao, Jingsha He, Yixuan Zhang, Gongzheng Liu, Peng Zhai, Na Huang, Ruohong Liu:
Dynamic trust evaluation in open networks. Intell. Autom. Soft Comput. 22(4): 631-638 (2016) - [j29]Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang:
A Method for Trust Quantification in Cloud Computing Environments. Int. J. Distributed Sens. Networks 12(2): 5052614:1-5052614:7 (2016) - [j28]Jing Xu, Jingsha He, Yuqiang Zhang, Fei Xu, Fangbo Cai:
A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(4): 2080536:1-2080536:8 (2016) - [j27]Yixuan Zhang, Jingsha He, Bin Zhao, Ruohong Liu:
Application of game theory for dynamic access control in security systems. Int. J. High Perform. Comput. Netw. 9(5/6): 451-461 (2016) - [c54]Jingsha He, Qi Xiao, Muhammad Salman Pathan:
A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications. ChinaCom (1) 2016: 200-207 - [c53]Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:
A Novel Storage and Search Scheme in Cloud Computing. CIS 2016: 304-308 - [c52]Yameng Li, Jingsha He, Na Huang, Chengyue Chang:
On the Recoverability of Data in Android YAFFS2. CIS 2016: 665-668 - 2015
- [j26]Yixuan Zhang, Jingsha He, Bin Zhao, Zhiqing Huang, Ruohong Liu:
Towards more pro-active access control in computer systems and networks. Comput. Secur. 49: 132-146 (2015) - [j25]Xuejiao Wan, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, Yonghao Mai:
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices. Int. J. Digit. Crime Forensics 7(1): 1-25 (2015) - [j24]Guorui Li, Jingsha He, Cong Wang:
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 856507:1-856507:12 (2015) - [c51]Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, Na Huang:
A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control. ICA3PP (1) 2015: 317-326 - [c50]Seyed Mahmood Hashemi, Jingsha He:
An evolutionary approach for security metric. ICTC 2015: 1205-1211 - [c49]Rui Liu, Xiaoyang Zhong, Yao Liang, Jingsha He:
Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor Networks. SmartCity 2015: 562-567 - [c48]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - 2014
- [j23]Peng Xiao, Jingsha He, Yingfang Fu:
An access authentication protocol for trusted handoff in wireless mesh networks. Comput. Stand. Interfaces 36(3): 480-488 (2014) - [j22]Feng Gao, Jingsha He, Shunan Ma:
Modelling the relationship between trust and privacy in network environments. Int. J. Comput. Sci. Eng. 9(4): 347-354 (2014) - 2013
- [j21]Hong Yu, Jingsha He, Ruohong Liu, Dajie Ji:
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Peng Xiao, Jingsha He, Yunli Chen, Yingfang Fu:
A new trusted roaming protocol in wireless mesh networks. Int. J. Sens. Networks 14(2): 109-119 (2013) - [j19]Nafei Zhu, Jingsha He, Yue Zhou, Wei Wang:
On the Accuracy of Packet Delay Estimation in Distributed Service Networks. J. Netw. Syst. Manag. 21(4): 623-649 (2013) - [j18]Hong Yu, Jingsha He, Ting Zhang, Peng Xiao, Yuqiang Zhang:
Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16(4): 515-540 (2013) - [c47]Jingsha He, Xuejiao Wan, Gongzheng Liu, Na Huang, Bin Zhao:
On the application of digital forensics in different scenarios. SADFE 2013: 1-5 - [c46]Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He, George Roussos, Wei-Tek Tsai:
Mobile Cloud Computing Research - Issues, Challenges and Needs. SOSE 2013: 442-453 - 2012
- [j17]Guorui Li, Ying Wang, Cuirong Wang, Jingsha He:
EMAP: An efficient mutual authentication protocol for passive RFID tags. Int. J. Autom. Comput. 9(1): 108-112 (2012) - [j16]Ting Zhang, Jingsha He, Yang Zhang:
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network. Int. J. Comput. Intell. Syst. 5(5): 914-923 (2012) - [j15]Shunan Ma, Jingsha He, Xunbo Shuai:
An Access Control Method based on Scenario Trust. Int. J. Comput. Intell. Syst. 5(5): 942-952 (2012) - [j14]Hong Yu, Jingsha He, Ting Zhang, Peng Xiao:
A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario. Int. J. Distributed Sens. Networks 8 (2012) - [j13]Ting Zhang, Jingsha He, Hong Yu:
Secure Localization in Wireless Sensor Networks with Mobile Beacons. Int. J. Distributed Sens. Networks 8 (2012) - [j12]Hong Yu, Jingsha He:
Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN. J. Commun. 7(8): 634-642 (2012) - [j11]Shunan Ma, Jingsha He, Feng Gao:
An Access Control Model based on Multi-factors Trust. J. Networks 7(1): 173-178 (2012) - [j10]Peng Xiao, Jingsha He, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. J. Networks 7(2): 267-274 (2012) - [j9]Feng Gao, Jingsha He, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. J. Networks 7(2): 322-328 (2012) - [j8]Nafei Zhu, Jingsha He:
Experimental Study of the Similarity of Network Nodes based on RTT. J. Networks 7(9): 1423-1430 (2012) - 2011
- [j7]Xing Zhang, Jingsha He, Qian Wei:
EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j6]Shunan Ma, Jingsha He, Xunbo Shuai:
Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification. Int. J. Comput. Intell. Syst. 4(5): 768-776 (2011) - [j5]Xing Zhang, Jingsha He, Qian Wei:
Secure and Energy-Efficient Routing for Wireless Sensor Networks. J. Networks 6(9): 1288-1295 (2011) - [j4]Qian Wei, Jingsha He, Xing Zhang:
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks. J. Networks 6(9): 1351-1358 (2011) - [c45]Ting Zhang, Jingsha He, Yang Zhang:
Trust Based Secure Localization in Wireless Sensor Networks. IPTC 2011: 55-58 - 2010
- [c44]Qian Wei, Jingsha He, Xing Zhang:
Behavioral model for secure group communication in wireless mesh networks. CSIIRW 2010: 81 - [c43]Feng Gao, Jingsha He, Shufen Peng, Xu Wu:
A Quantifying Metric for Privacy Protection Based on Information Theory. IITSI 2010: 216-220 - [c42]Guorui Li, Ying Wang, Jingsha He:
Efficient Group Key Management Scheme in Wireless Sensor Networks. IITSI 2010: 411-415 - [c41]Feng Gao, Jingsha He, Xu Wu:
An approach for tracking privacy disclosure. NCM 2010: 294-299 - [c40]Feng Gao, Jingsha He, Shufen Peng:
User-Centric Privacy Preservation in Data-Sharing Applications. NPC 2010: 423-431 - [c39]Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang:
A trust quantification method based on grey fuzzy theory. SIN 2010: 27-31 - [c38]Feng Gao, Jingsha He, Shunan Ma:
A collaborative approach for identifying privacy disclosure in Web-based services. SOCA 2010: 1-4 - [c37]Shunan Ma, Jingsha He, Xunbo Shuai, Zhao Wang:
Access Control Mechanism Based on Trust Quantification. SocialCom/PASSAT 2010: 1032-1037
2000 – 2009
- 2009
- [j3]Xu Wu, Jingsha He, Fei Xu, Xi Zhang:
A distributed decision-making mechanism for wireless P2P networks. J. Commun. Networks 11(4): 359-367 (2009) - [j2]Guozhong Tian, Jiong Yu, Jingsha He:
Towards critical region reliability support for Grid workflows. J. Parallel Distributed Comput. 69(12): 989-995 (2009) - [c36]Fei Xu, Jingsha He, Xu Wu, Jing Xu:
A Method for Privacy Protection in Location Based Services. CIT (2) 2009: 351-355 - [c35]Xing Zhang, Jingsha He, Qiang Wei:
Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks. AMT 2009: 522-528 - [c34]Xu Wu, Jingsha He, Fei Xu:
A Group-Based Reputation Mechanism for Mobile P2P Networks. GPC 2009: 410-421 - [c33]Xu Wu, Jingsha He, Chia-Hu Chang, Fei Xu:
A Power Peer-Based Reputation Scheme for Mobile P2P Systems. ICA3PP 2009: 615-625 - [c32]Fei Xu, Kam-Pui Chow, Jingsha He, Xu Wu:
Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection. ICPADS 2009: 572-577 - [c31]Xu Wu, Jingsha He, Xi Zhang, Fei Xu:
A Distributed Decision-Making Mechanism for Wireless P2P Networks. ICPP Workshops 2009: 350-355 - [c30]Qian Wei, Jingsha He, Huiying Shao:
A directed signature scheme and its application to group key initial distribution. ICIS 2009: 265-269 - [c29]Xing Zhang, Jingsha He, Qian Wei:
An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor Networks. ISPAN 2009: 238-242 - 2008
- [j1]Guorui Li, Jingsha He, Yingfang Fu:
Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18): 4324-4332 (2008) - [c28]Yingfang Fu, Jingsha He, Liangyu Luan, Rong Wang, Guorui Li:
A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. COMPSAC 2008: 68-71 - [c27]Bo Li, Jingsha He, Henghua Shi:
Improving the Efficiency of Network Topology Discovery. GPC Workshops 2008: 189-194 - [c26]Guorui Li, Jingsha He, Yingfang Fu:
A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks. GPC Workshops 2008: 286-291 - [c25]Yingfang Fu, Jingsha He, Rong Wang, Guorui Li:
Mutual Authentication in Wireless Mesh Networks. ICC 2008: 1690-1694 - [c24]Guorui Li, Jingsha He, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. ICDCS Workshops 2008: 309-314 - [c23]Xu Wu, Jingsha He, Fei Xu:
A New Decision-Making Approach for C2C Electronic Trade. ICNSC 2008: 1222-1226 - [c22]Shufen Peng, Jingsha He, Yao Meng:
Reputation-based Trust Update in Network Environment. ISECS 2008: 118-123 - [c21]Yingfang Fu, Jingsha He, Liangyu Luan, Guorui Li, Rong Wang:
A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. KES-AMSTA 2008: 584-593 - [c20]Xu Wu, Jingsha He, Fei Xu:
An Enhanced Trust Model Based on Reputation for P2P Networks. SUTC 2008: 67-73 - 2007
- [c19]Guorui Li, Jingsha He, Yingfang Fu:
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. AINA Workshops (2) 2007: 127-132 - [c18]Yingfang Fu, Jingsha He, Guorui Li:
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. COMPSAC (2) 2007: 75-80 - [c17]Guorui Li, Jingsha He, Yingfang Fu:
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks. International Conference on Computational Science (4) 2007: 409-416 - [c16]Guorui Li, Jingsha He, Yingfang Fu:
Secure Multiple Deployment in Wireless Sensor Networks. MobiQuitous 2007: 1-4 - [c15]Wei Zhang, Jingsha He:
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks. SNPD (3) 2007: 968-973 - 2006
- [c14]Jerry Gao, Deepa Gopinathan, Quan Mai, Jingsha He:
A Systematic Regression Testing Method and Tool For Software Components. COMPSAC (1) 2006: 455-466 - [c13]Guorui Li, Jingsha He, Yingfang Fu:
A Hexagon-Based Key Predistribution Scheme in Sensor Networks. ICPP Workshops 2006: 175-180 - [c12]Yingfang Fu, Jingsha He, Guorui Li:
A Composite Key Management Scheme for Mobile Ad Hoc Networks. OTM Workshops (1) 2006: 575-584 - [c11]Guorui Li, Jingsha He, Yingfang Fu:
Key Predistribution in Sensor Networks. UIC 2006: 845-853 - [c10]Guorui Li, Jingsha He, Yingfang Fu:
Key Management in Sensor Networks. WASA 2006: 457-466 - 2005
- [c9]Jingsha He, Ran Zhang:
Towards a Formal Framework for Distributed Identity Management. APWeb 2005: 913-924 - [c8]Jerry Gao, Raquel Espinoza, Jingsha He:
Testing Coverage Analysis for Software Component Validation. COMPSAC (1) 2005: 463-470 - 2004
- [c7]Antonio Magnaghi, Jingsha He, Takafumi Chujo, Tsuneo Katsuyama:
Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies. GLOBECOM 2004: 610-616 - [c6]Jingsha He:
Available bandwidth measurement, implementation and evaluation. ICON 2004: 226-230 - [c5]Jingsha He:
On Available Bandwidth Measurement Implementation and Experiment. LCN 2004: 772-773 - 2001
- [c4]Jingsha He, C. Edward Chow, Jihui Yang, Takafumi Chujo:
An Algorithm for Available Bandwidth Measurement. ICN (1) 2001: 753-761 - 2000
- [c3]Jingsha He:
An Architecture for Wide Area Network Load Balancing. ICC (2) 2000: 1169-1173
1990 – 1999
- 1992
- [c2]Jingsha He, Virgil D. Gligor:
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76 - 1990
- [c1]Jingsha He, Virgil D. Gligor:
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint