default search action
Jingsha He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j91]Jiajia Hu, Jingsha He, Nafei Zhu, Lu Qu:
Trajectory privacy preservation model based on LSTM-DCGAN. Future Gener. Comput. Syst. 163: 107496 (2025) - 2024
- [j90]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal:
An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach. Ad Hoc Networks 152: 103331 (2024) - [j89]Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He:
A scalable blockchain storage scheme for VANET. Clust. Comput. 27(4): 3957-3981 (2024) - [j88]Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He:
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications. Clust. Comput. 27(5): 5677-5698 (2024) - [j87]Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6): 8367-8392 (2024) - [j86]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo:
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning. Comput. Commun. 213: 236-245 (2024) - [j85]Xiangjun Ma, Jingsha He, Tiejun Wu, Nafei Zhu, Yakang Hua:
Interaction behavior enhanced community detection in online social networks. Comput. Commun. 219: 92-103 (2024) - [j84]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j83]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Mutiq Almutiq, Fayaz Ali Dharejo, Deepak Kumar Jain, Saqib Hussain, Zulfiqar Ali Zardari:
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j82]Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He:
Modeling the dissemination of privacy information in online social networks. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - [j81]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Faheem Ullah, Sirajuddin Qureshi, Musa Osman:
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intell. Decis. Technol. 18(1): 33-55 (2024) - [j80]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Faheem Ullah, Sirajuddin Qureshi, Xiangjun Ma, Muhammad Salman Pathan:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - [j79]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Ahsan Nazir, Ahsan Wajahat, Faheem Ullah, Abdul Wadud:
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102164 (2024) - [j78]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks. IEEE Trans. Comput. Soc. Syst. 11(3): 4367-4384 (2024) - [j77]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal, Asaad Ahmed:
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach. J. Supercomput. 80(18): 26333-26362 (2024) - [c65]Ahsan Nazir, Jingsha He, Nafei Zhu, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Ahsan Wajahat:
Ensemble Learning Techniques for the Detection of IoT Botnets. CSAIDE 2024: 80-85 - 2023
- [j76]Zhiguang Chu, Jingsha He, Dongdong Peng, Xing Zhang, Nafei Zhu:
Differentially Private Denoise Diffusion Probability Models. IEEE Access 11: 108033-108040 (2023) - [j75]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Comput. Commun. 200: 149-160 (2023) - [j74]Jingsha He, Yue Li, Nafei Zhu:
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks. Future Internet 15(3): 92 (2023) - [j73]Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, Nafei Zhu, Zulfiqar Ali Zardari, Tariq Mahmood, Ahsan Wajahat:
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs. J. Intell. Fuzzy Syst. 44(6): 10675-10687 (2023) - [j72]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j71]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101820 (2023) - [j70]Ruixin Xue, Nafei Zhu, Jingsha He, Lin He:
Bitcoin transaction pattern recognition based on semi-supervised learning. J. Comput. Sci. 71: 102055 (2023) - [c64]Haiyang He, Jingsha He:
Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing. ICCEIC 2023: 20-23 - [c63]Yuzi Yi, Nafei Zhu, Jingsha He, Xiangjun Ma, Yehong Luo:
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks. WISE 2023: 220-234 - 2022
- [j69]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j68]Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. Int. J. Inf. Secur. Priv. 16(1): 1-22 (2022) - [j67]Nafei Zhu, Baocun Chen, Siyu Wang, Da Teng, Jingsha He:
Ontology-Based Approach for the Measurement of Privacy Disclosure. Inf. Syst. Frontiers 24(5): 1689-1707 (2022) - [j66]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Ghulam Ali Mallah, Ziyue Qiao, Amir Haider, Saqib Hussain, Muhammad Iftikhar Hussain, Zulfiqar Ali Zardari:
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs. Microprocess. Microsystems 93: 104617 (2022) - [j65]Yuzi Yi, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. Secur. Priv. 5(2) (2022) - [j64]Hewen Wang, Jingsha He, Nafei Zhu:
Improving Data Utilization of K-anonymity through Clustering Optimization. Trans. Data Priv. 15(3): 177-192 (2022) - 2021
- [j63]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, Ahsan Wajahat:
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks. IEEE Access 9: 73938-73947 (2021) - [j62]Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, Nafei Zhu, Sirajuddin Qureshi:
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access 9: 83654-83665 (2021) - [j61]Gongzheng Liu, Jingsha He, Xinggang Xuan:
A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics. Complex. 2021: 5536326:1-5536326:12 (2021) - [j60]Yajing Wang, Jingsha He, Nafei Zhu, Yuzi Yi, Qingqing Zhang, Hongyu Song, Ruixin Xue:
Security enhancement technologies for smart contracts in the blockchain: A survey. Trans. Emerg. Telecommun. Technol. 32(12) (2021) - [j59]Yanbo Chen, Jingsha He, Wei Wei, Nafei Zhu, Cong Yu:
A Multi-Model Approach for User Portrait. Future Internet 13(6): 147 (2021) - [j58]Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng:
An authorisation certificate-based access control model. Int. J. Secur. Networks 16(4): 258-266 (2021) - [j57]Hongyu Song, Nafei Zhu, Ruixin Xue, Jingsha He, Kun Zhang, Jianyu Wang:
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection. Inf. Process. Manag. 58(3): 102507 (2021) - [j56]Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, Muhammad Salman Pathan:
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. J. Intell. Fuzzy Syst. 41(1): 125-136 (2021) - [j55]Yue Zhou, Xiujun Wang, Shu Guo, Yi Wen, Jingsha He:
A cost-effective adaptive random testing algorithm for object-oriented software testing. J. Intell. Fuzzy Syst. 41(3): 4415-4423 (2021) - 2020
- [j54]Baocun Chen, Nafei Zhu, Jingsha He, Peng He, Shuting Jin, Shijia Pan:
A Semantic Inference Based Method for Privacy Measurement. IEEE Access 8: 200112-200128 (2020) - [j53]Jingsha He, Prasad K. D. V. Yarlagadda, Shengzong Zhou:
Special issue on the application of artificial intelligence in advanced manufacturing. Int. J. Comput. Integr. Manuf. 33(10-11): 947-948 (2020) - [j52]Muhammad Azeem, Jingsha He, Allah Ditta, Faheem Akhtar, Sher Muhammad Daudpota:
A novel approach to secret data concealment with high cover text capacity and security. Int. J. Electron. Secur. Digit. Forensics 12(1): 77-98 (2020) - [j51]Fangbo Cai, Jingsha He, Zulfiqar Ali Zardari, Song Han:
Distributed management of permission for access control model. J. Intell. Fuzzy Syst. 38(2): 1539-1548 (2020) - [j50]Peng Zhai, Jingsha He, Nafei Zhu, Peng He, Yao Liang:
An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress". J. Web Eng. 19(7-8): 230-243 (2020) - [j49]Zhao Li, Jun Wu, Xiaofeng Zhang, Jingsha He, Peng Chen, Keqing He:
Using metadata for recommending business process. J. Supercomput. 76(5): 3729-3748 (2020) - [c62]Xiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou:
Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion. COMPSAC 2020: 255-261
2010 – 2019
- 2019
- [j48]Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu:
Survey of access control models and technologies for cloud computing. Clust. Comput. 22(Supplement): 6111-6122 (2019) - [j47]Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, Zhao Li:
Management of access privileges for dynamic access control. Clust. Comput. 22(Supplement): 8899-8917 (2019) - [j46]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon:
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs. Future Internet 11(3): 61 (2019) - [j45]Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar Rajpoot:
A cryptographic data hiding algorithm with high cover text capacity. Int. J. Electron. Secur. Digit. Forensics 11(2): 225-244 (2019) - [j44]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. Int. J. Netw. Secur. 21(6): 1021-1030 (2019) - [j43]Guorui Li, Jingsha He, Sancheng Peng, Weijia Jia, Cong Wang, Jianwei Niu, Shui Yu:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - [c61]Shaoxun Su, Nafei Zhu, Jingsha He:
Pyramid Text Recognition Based on A New Text Representation Model. ICNSC 2019: 195-199 - [c60]Pengyu Mu, Jingsha He, Nafei Zhu:
Text Classification of Network Pyramid Scheme based on Topic Model. NLPIR 2019: 15-19 - [c59]Zhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He:
Applying Ordered Technique Set for Fault Localization. QRS Companion 2019: 516-517 - 2018
- [j42]Na Huang, Jingsha He, Nafei Zhu, Xinggang Xuan, Gongzheng Liu, Chengyue Chang:
Identification of the source camera of images based on convolutional neural network. Digit. Investig. 26: 72-80 (2018) - [j41]Jingsha He, Xinggang Xuan, Nafei Zhu, Na Huang, Peng He:
Mobile beacon-based adaptive time synchronization for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 220 (2018) - [j40]Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, Muhammad Iftikhar Hussain:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. Future Internet 10(2): 16 (2018) - [j39]Jingsha He, Jianan Wu, Nafei Zhu, Muhammad Salman Pathan:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. Future Internet 10(5): 38 (2018) - [j38]Yameng Li, Jingsha He, Na Huang, Gongzheng Liu:
Recovering multiple versions of YAFFS2 files based on Hash and timestamps. Int. J. Embed. Syst. 10(4): 313-322 (2018) - [j37]Muhammad Qasim Memon, Jingsha He, Mirza Ammar Yasir, Aasma Memon:
Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting. Sensors 18(4): 1185 (2018) - [j36]Nafei Zhu, Siyu Wang, Jingsha He, Da Teng, Peng He, Yuqiang Zhang:
On the Suitability of Applying WordNet to Privacy Measurement. Wirel. Pers. Commun. 103(1): 359-378 (2018) - [c58]Zhao Li, Jun Wu, Shuangmei Peng, Peng Chen, Jingsha He, Yiwang Huang, Keqing He:
MFI-5 Based Similarity Measurement of Business Process Models. ICCCS (1) 2018: 648-661 - [c57]Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. TrustCom/BigDataSE 2018: 1702-1705 - [c56]Anca Delia Jurcut, Madhusanka Liyanage, Jinyong Chen, Cornelia Györödi, Jingsha He:
On the security verification of a short message service protocol. WCNC 2018: 1-6 - 2017
- [j35]Jingsha He, Qi Xiao, Peng He, Muhammad Salman Pathan:
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning. Future Internet 9(1): 7 (2017) - [j34]Seyed Mahmood Hashemi, Jingsha He, Alireza Ebrahimi Basabi:
Multi-objective Optimization for Computer Security and Privacy. Int. J. Netw. Secur. 19(3): 394-405 (2017) - [j33]Seyed Mahmood Hashemi, Jingsha He:
An Evolutionary Multi-objective Approach for Modelling Network Security. Int. J. Netw. Secur. 19(4): 528-536 (2017) - [j32]Seyed Mahmood Hashemi, Jingsha He:
LA-Based Approach for IoT Security. J. Robotics Netw. Artif. Life 3(4): 240-248 (2017) - [c55]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - 2016
- [j31]Jingsha He, Chengyue Chang, Peng He, Muhammad Salman Pathan:
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet 8(4): 54 (2016) - [j30]Bin Zhao, Jingsha He, Yixuan Zhang, Gongzheng Liu, Peng Zhai, Na Huang, Ruohong Liu:
Dynamic trust evaluation in open networks. Intell. Autom. Soft Comput. 22(4): 631-638 (2016) - [j29]Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang:
A Method for Trust Quantification in Cloud Computing Environments. Int. J. Distributed Sens. Networks 12(2): 5052614:1-5052614:7 (2016) - [j28]Jing Xu, Jingsha He, Yuqiang Zhang, Fei Xu, Fangbo Cai:
A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(4): 2080536:1-2080536:8 (2016) - [j27]Yixuan Zhang, Jingsha He, Bin Zhao, Ruohong Liu:
Application of game theory for dynamic access control in security systems. Int. J. High Perform. Comput. Netw. 9(5/6): 451-461 (2016) - [c54]Jingsha He, Qi Xiao, Muhammad Salman Pathan:
A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications. ChinaCom (1) 2016: 200-207 - [c53]Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:
A Novel Storage and Search Scheme in Cloud Computing. CIS 2016: 304-308 - [c52]Yameng Li, Jingsha He, Na Huang, Chengyue Chang:
On the Recoverability of Data in Android YAFFS2. CIS 2016: 665-668 - 2015
- [j26]Yixuan Zhang, Jingsha He, Bin Zhao, Zhiqing Huang, Ruohong Liu:
Towards more pro-active access control in computer systems and networks. Comput. Secur. 49: 132-146 (2015) - [j25]Xuejiao Wan, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, Yonghao Mai:
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices. Int. J. Digit. Crime Forensics 7(1): 1-25 (2015) - [j24]Guorui Li, Jingsha He, Cong Wang:
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 856507:1-856507:12 (2015) - [c51]Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, Na Huang:
A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control. ICA3PP (1) 2015: 317-326 - [c50]Seyed Mahmood Hashemi, Jingsha He:
An evolutionary approach for security metric. ICTC 2015: 1205-1211 - [c49]Rui Liu, Xiaoyang Zhong, Yao Liang, Jingsha He:
Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor Networks. SmartCity 2015: 562-567 - [c48]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - 2014
- [j23]Peng Xiao, Jingsha He, Yingfang Fu:
An access authentication protocol for trusted handoff in wireless mesh networks. Comput. Stand. Interfaces 36(3): 480-488 (2014) - [j22]Feng Gao, Jingsha He, Shunan Ma:
Modelling the relationship between trust and privacy in network environments. Int. J. Comput. Sci. Eng. 9(4): 347-354 (2014) - 2013
- [j21]Hong Yu, Jingsha He, Ruohong Liu, Dajie Ji:
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Peng Xiao, Jingsha He, Yunli Chen, Yingfang Fu:
A new trusted roaming protocol in wireless mesh networks. Int. J. Sens. Networks 14(2): 109-119 (2013) - [j19]Nafei Zhu, Jingsha He, Yue Zhou, Wei Wang:
On the Accuracy of Packet Delay Estimation in Distributed Service Networks. J. Netw. Syst. Manag. 21(4): 623-649 (2013) - [j18]Hong Yu, Jingsha He, Ting Zhang, Peng Xiao, Yuqiang Zhang:
Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16(4): 515-540 (2013) - [c47]Jingsha He, Xuejiao Wan, Gongzheng Liu, Na Huang, Bin Zhao:
On the application of digital forensics in different scenarios. SADFE 2013: 1-5 - [c46]Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He, George Roussos, Wei-Tek Tsai:
Mobile Cloud Computing Research - Issues, Challenges and Needs. SOSE 2013: 442-453 - 2012
- [j17]Guorui Li, Ying Wang, Cuirong Wang, Jingsha He:
EMAP: An efficient mutual authentication protocol for passive RFID tags. Int. J. Autom. Comput. 9(1): 108-112 (2012) - [j16]Ting Zhang, Jingsha He, Yang Zhang:
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network. Int. J. Comput. Intell. Syst. 5(5): 914-923 (2012) - [j15]Shunan Ma, Jingsha He, Xunbo Shuai:
An Access Control Method based on Scenario Trust. Int. J. Comput. Intell. Syst. 5(5): 942-952 (2012) - [j14]Hong Yu, Jingsha He, Ting Zhang, Peng Xiao:
A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario. Int. J. Distributed Sens. Networks 8 (2012) - [j13]Ting Zhang, Jingsha He, Hong Yu:
Secure Localization in Wireless Sensor Networks with Mobile Beacons. Int. J. Distributed Sens. Networks 8 (2012) - [j12]Hong Yu, Jingsha He:
Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN. J. Commun. 7(8): 634-642 (2012) - [j11]Shunan Ma, Jingsha He, Feng Gao:
An Access Control Model based on Multi-factors Trust. J. Networks 7(1): 173-178 (2012) - [j10]Peng Xiao, Jingsha He, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. J. Networks 7(2): 267-274 (2012) - [j9]Feng Gao, Jingsha He, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. J. Networks 7(2): 322-328 (2012) - [j8]Nafei Zhu, Jingsha He:
Experimental Study of the Similarity of Network Nodes based on RTT. J. Networks 7(9): 1423-1430 (2012) - 2011
- [j7]Xing Zhang, Jingsha He, Qian Wei:
EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j6]Shunan Ma, Jingsha He, Xunbo Shuai:
Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification. Int. J. Comput. Intell. Syst. 4(5): 768-776 (2011) - [j5]Xing Zhang, Jingsha He, Qian Wei:
Secure and Energy-Efficient Routing for Wireless Sensor Networks. J. Networks 6(9): 1288-1295 (2011) - [j4]Qian Wei, Jingsha He, Xing Zhang:
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks. J. Networks 6(9): 1351-1358 (2011) - [c45]