2025
A timely personalized comments generation assistant based on LSTM-SNP.
Knowl. Inf. Syst., February, 2025
A Collaborative Jade Recognition System for Mobile Devices Based on Lightweight and Large Models.
CoRR, February, 2025
A 0.05-1.5-GHz PVT-Insensitive Digital-to-Time Converter for QKD Applications.
IEEE Trans. Very Large Scale Integr. Syst., January, 2025
2024
Exploring neuro-symbolic AI applications in geoscience: implications and future directions for mineral prediction.
Earth Sci. Informatics, June, 2024
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android.
J. Comput. Secur., 2024
Pythagorean Z-linguistic VIKOR method based on modified value function under Pythagorean Z-linguistic environment and its application on smart healthcare.
Comput. Appl. Math., 2024
BlockFL: A Blockchain-enabled Federated Learning System for Securing IoVs.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Lightweight Secure Communication Scheme Based on PUF for In-vehicle Controller Area Networks.
Proceedings of the IEEE International Performance, 2024
2023
Artificial Intelligence Security: Threats and Countermeasures.
ACM Comput. Surv., 2023
2022
DroidEnemy: Battling adversarial example attacks for Android malware detection.
Digit. Commun. Networks, December, 2022
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction.
IEEE Open J. Commun. Soc., 2022
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022
Few-shot learning for name entity recognition in geological text based on GeoBERT.
Earth Sci. Informatics, 2022
Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2021
AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology.
IEEE Internet Things J., 2021
A multi-granularity knowledge association model of geological text based on hypernetwork.
Earth Sci. Informatics, 2021
Deep Learning-Based Task Offloading for Vehicular Edge Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021
A Robust Malware Detection Approach for Android System Based on Ensemble Learning.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Discovering Coherent Topics from Urdu Text.
Proceedings of the 2021 International Symposium on Advanced Technologies and Applications in the Internet of Things, 2021
2020
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks.
Softw. Pract. Exp., 2020
Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services.
Sensors, 2020
Editorial: Multimedia and Social Data Processing in Vehicular Networks.
Mob. Networks Appl., 2020
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020
2019
Corrections to "Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes".
IEEE Trans. Comput. Soc. Syst., 2019
Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks.
Sensors, 2019
Geoscience keyphrase extraction algorithm using enhanced word embedding.
Expert Syst. Appl., 2019
BiLSTM-CRF for geological named entity recognition from the geoscience literature.
Earth Sci. Informatics, 2019
Ontology-based question understanding with the constraint of Spatio-temporal geological knowledge.
Earth Sci. Informatics, 2019
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019
Joint interference optimization and user satisfaction improvement for multicast routing and channel assignment in wireless mesh networks.
Clust. Comput., 2019
An Improved Process for Generating Uniform PSSMs and Its Application in Protein Subcellular Localization via Various Global Dimension Reduction Techniques.
IEEE Access, 2019
Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing Environment.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
An Efficient Mobile Server Task Scheduling Algorithm in D2D Environment.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019
2018
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes.
IEEE Trans. Comput. Soc. Syst., 2018
Cyberspace Security for Future Internet.
Secur. Commun. Networks, 2018
Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities.
IEEE Internet Things J., 2018
DGeoSegmenter: A dictionary-based Chinese word segmenter for the geoscience domain.
Comput. Geosci., 2018
Matching Descriptions to Spatial Entities Using a Siamese Hierarchical Attention Network.
IEEE Access, 2018
Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Deep Learning-Based Sentiment Analysis for Roman Urdu Text.
Proceedings of the 2018 International Conference on Identification, 2018
An Android Malware Detection Approach Using Weight-Adjusted Deep Learning.
Proceedings of the 2018 International Conference on Computing, 2018
A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.
Sensors, 2017
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Secur. Commun. Networks, 2017
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst., 2017
Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Inf., 2017
Prediction of Television Audience Rating Based on Fuzzy Cognitive Maps with Forward Stepwise Regression.
Int. J. Pattern Recognit. Artif. Intell., 2017
Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks.
Proceedings of the 2017 International Conference on Identification, 2017
A Dynamic Human Contacts Prediction Method in Mobile Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017
2016
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016
Channel Assignment with User Coverage Priority and Interference Optimization for Multicast Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
DroidDeepLearner: Identifying Android malware using deep learning.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
A Novel Social-Based Clustering and Routing Scheme in Mobile Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016
An Enhanced Community-Based Routing with Ferry in Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016
BAN-trust: An attack-resilient malicious node detection scheme for body area networks.
Proceedings of the 2016 International Conference on Computing, 2016
Driver identification and authentication with active behavior modeling.
Proceedings of the 12th International Conference on Network and Service Management, 2016
Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
AndroGenerator: An automated and configurable android app network traffic generation system.
Secur. Commun. Networks, 2015
SVM-based malware detection for Android applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015
Detecting Malware for Android Platform: An SVM-Based Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Data Center Heat Monitoring Using Wireless Sensor Networks.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed Parallel Databases, 2013
Trustworthy data management for wireless networks in Cyber-Physical Systems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Finding abnormal data in vehicular cyber physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
2012
Security Through Collaboration and Trust in MANETs.
Mob. Networks Appl., 2012
Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012
2011
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
Proceedings of the MILCOM 2011, 2011
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011
Extracting Information about Security Vulnerabilities from Web Text.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011
2010
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
2009
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
Proceedings of the MDM 2009, 2009
Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008
2007
A Ubiquitous Context-Aware Environment for Surgical Training.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007