Daojing He
Orcid: 0000-0002-3820-8128
According to our database1,
Daojing He
authored at least 156 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Medical Syst., December, 2024
IEEE Commun. Mag., November, 2024
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems.
Clust. Comput., November, 2024
Peer Peer Netw. Appl., September, 2024
UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks.
IEEE Internet Things J., September, 2024
GSASG: Global Sparsification With Adaptive Aggregated Stochastic Gradients for Communication-Efficient Federated Learning.
IEEE Internet Things J., September, 2024
Improving byzantine fault tolerance based on stake evaluation and consistent hashing.
Peer Peer Netw. Appl., July, 2024
IEEE Netw., July, 2024
IEEE Internet Things J., June, 2024
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024
IEEE Internet Things J., February, 2024
IEEE Internet Things J., January, 2024
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization.
Ad Hoc Networks, January, 2024
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A comprehensive survey of smart contract security: State of the art and research directions.
J. Netw. Comput. Appl., 2024
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024
IEEE Internet Things J., 2024
Optimal Offering Strategies for Renewable Energy Producers: A Coalitional Game Approach.
Proceedings of the IEEE International Conference on Communications, 2024
Enhancing Flow Embedding Through Trace: A Novel Self-supervised Approach for Encrypted Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2024
RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Expert Syst. Appl., December, 2023
IEEE Trans. Wirel. Commun., November, 2023
IEEE Netw., November, 2023
IEEE Internet Things J., July, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
IEEE Internet Comput., 2023
Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection.
Int. J. Intell. Syst., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Netw., 2022
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Comput., 2022
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning.
Expert Syst. Appl., 2022
CoRR, 2022
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
IEEE Netw., 2021
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021
A mixed data clustering algorithm with noise-filtered distribution centroid and iterative weight adjustment strategy.
Inf. Sci., 2021
IEEE Internet Things J., 2021
Feature selection-based android malware adversarial sample generation and detection method.
IET Inf. Secur., 2021
Comput. Secur., 2021
Comput. Intell. Neurosci., 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Traitement du Signal, 2020
Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020
IEEE Netw., 2020
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020
IEEE Netw., 2020
IEEE Internet Things J., 2020
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks.
IET Networks, 2020
Computation offloading time optimisation via Q-learning in opportunistic edge computing.
IET Commun., 2020
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking.
Sci. China Inf. Sci., 2020
Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory.
IEEE Access, 2020
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
IEEE Wirel. Commun., 2019
IEEE Netw., 2019
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Netw., 2019
Multim. Tools Appl., 2019
Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019
IEEE Access, 2019
2018
IET Commun., 2018
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
2017
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks.
Wirel. Pers. Commun., 2017
Wirel. Networks, 2017
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
IEEE Wirel. Commun., 2017
IEEE Internet Things J., 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks.
IEEE Trans. Veh. Technol., 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IEEE Wirel. Commun., 2015
IEEE Trans. Wirel. Commun., 2015
IEEE Trans. Parallel Distributed Syst., 2015
An adaptive MAC protocol for real-time and reliable communications in medical cyber-physical systems.
Telecommun. Syst., 2015
Secur. Commun. Networks, 2015
IEEE Netw., 2015
IEEE Commun. Mag., 2015
IEEE Commun. Mag., 2015
IEEE Commun. Mag., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
IEEE Wirel. Commun., 2014
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014
IEEE J. Biomed. Health Informatics, 2014
An enhanced public key infrastructure to secure smart grid wireless communication networks.
IEEE Netw., 2014
IEEE Intell. Syst., 2014
2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013
IEEE Trans. Parallel Distributed Syst., 2013
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks.
IEEE J. Biomed. Health Informatics, 2013
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2013
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks.
IEEE Trans. Computers, 2013
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013
Int. J. Commun. Syst., 2013
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects.
IEEE Commun. Mag., 2013
Proceedings of the Radio Frequency Identification System Security, 2013
2012
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Wirel. Commun., 2012
A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012
IEEE Trans. Ind. Electron., 2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks.
IEEE Commun. Lett., 2012
2011
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks.
Wirel. Pers. Commun., 2011
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2011
IEEE Trans. Wirel. Commun., 2011
IEEE Trans. Wirel. Commun., 2011
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks.
J. Zhejiang Univ. Sci. C, 2011
SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks.
Int. J. Distributed Sens. Networks, 2011
Lightweight and provably secure user authentication with anonymity for the global mobility network.
Int. J. Commun. Syst., 2011
Comput. Commun., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Ad Hoc Sens. Wirel. Networks, 2010
A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2009
Wirel. Pers. Commun., 2009
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009