Daojing He

Orcid: 0000-0002-3820-8128

According to our database1, Daojing He authored at least 156 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Electronic Health Records Sharing Based on Consortium Blockchain.
J. Medical Syst., December, 2024

An Empirical Study of Function-Irrelevant Patches Based on Internet Software.
IEEE Commun. Mag., November, 2024

Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems.
Clust. Comput., November, 2024

A hierarchical hybrid intrusion detection model for industrial internet of things.
Peer Peer Netw. Appl., September, 2024

UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks.
IEEE Internet Things J., September, 2024

GSASG: Global Sparsification With Adaptive Aggregated Stochastic Gradients for Communication-Efficient Federated Learning.
IEEE Internet Things J., September, 2024

Improving byzantine fault tolerance based on stake evaluation and consistent hashing.
Peer Peer Netw. Appl., July, 2024

FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows.
IEEE Netw., July, 2024

Special Characters Usage and Its Effect on Password Security.
IEEE Internet Things J., June, 2024

VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024

Multiround Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems.
IEEE Internet Things J., May, 2024

Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024

Unknown Threats Detection Methods of Smart Contracts.
IEEE Internet Things J., February, 2024

A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking.
IEEE Internet Things J., January, 2024

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization.
Ad Hoc Networks, January, 2024

Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Secure and Verifiable Hybrid Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted.
IEEE Trans. Dependable Secur. Comput., 2024

A Lightweight and Secure Communication Protocol for the IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2024

A comprehensive survey of smart contract security: State of the art and research directions.
J. Netw. Comput. Appl., 2024

IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024

A Comprehensive Detection Method for the Lateral Movement Stage of APT Attacks.
IEEE Internet Things J., 2024

Parameter Competition Balancing for Model Merging.
CoRR, 2024

FOBNN: Fast Oblivious Binarized Neural Network Inference.
CoRR, 2024

Optimal Offering Strategies for Renewable Energy Producers: A Coalitional Game Approach.
Proceedings of the IEEE International Conference on Communications, 2024

Enhancing Flow Embedding Through Trace: A Novel Self-supervised Approach for Encrypted Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2024

RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Residual Vector Product Quantization for approximate nearest neighbor search.
Expert Syst. Appl., December, 2023

A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT.
IEEE Trans. Wirel. Commun., November, 2023

A Malicious Domains Detection Method Based on File Sandbox Traffic.
IEEE Netw., November, 2023

Detection of Vulnerabilities of Blockchain Smart Contracts.
IEEE Internet Things J., July, 2023

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly.
IEEE Internet Things J., 2023

A Novel Authentication Protocol for IoT-Enabled Devices.
IEEE Internet Things J., 2023

Fuzzy Hashing on Firmwares Images: A Comparative Analysis.
IEEE Internet Comput., 2023

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection.
Int. J. Intell. Syst., 2023

Detecting Union Type Confusion in Component Object Model.
Proceedings of the 32nd USENIX Security Symposium, 2023

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location.
IEEE Trans. Intell. Transp. Syst., 2022

An Effective Double-Layer Detection System Against Social Engineering Attacks.
IEEE Netw., 2022

Adversarial Attacks for Intrusion Detection Based on Bus Traffic.
IEEE Netw., 2022

Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices.
IEEE Internet Things J., 2022

Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme.
IEEE Internet Things J., 2022

Secure Logistic Regression for Vertical Federated Learning.
IEEE Internet Comput., 2022

A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning.
Expert Syst. Appl., 2022

An Empirical Study on the Efficacy of Deep Active Learning for Image Classification.
CoRR, 2022

Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Deep logarithmic neural network for Internet intrusion detection.
Soft Comput., 2021

Group-based Password Characteristics Analysis.
IEEE Netw., 2021

How Does Social Behavior Affect Your Password?
IEEE Netw., 2021

An Effective Countermeasure Against UAV Swarm Attack.
IEEE Netw., 2021

Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware.
IEEE Netw., 2021

Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021

A mixed data clustering algorithm with noise-filtered distribution centroid and iterative weight adjustment strategy.
Inf. Sci., 2021

Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing.
IEEE Internet Things J., 2021

Feature selection-based android malware adversarial sample generation and detection method.
IET Inf. Secur., 2021

Intrusion detection methods based on integrated deep learning model.
Comput. Secur., 2021

Fraudulent News Headline Detection with Attention Mechanism.
Comput. Intell. Neurosci., 2021

Local Model Privacy-Preserving Study for Federated Learning.
Proceedings of the Security and Privacy in Communication Networks, 2021

A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Review of Firmware Homology Detection: a System Aspect.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
A Malicious Webpage Detection Algorithm Based on Image Semantics.
Traitement du Signal, 2020

Group Password Strength Meter Based on Attention Mechanism.
IEEE Netw., 2020

Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020

Password Enhancement Based on Semantic Transformation.
IEEE Netw., 2020

Simulation Design for Security Testing of Integrated Electronic Systems.
IEEE Netw., 2020

Fake Review Detection Based on PU Learning and Behavior Density.
IEEE Netw., 2020

A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020

Security Analysis of Cryptocurrency Wallets in Android-Based Applications.
IEEE Netw., 2020

Smart Contract Vulnerability Analysis and Security Audit.
IEEE Netw., 2020

Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing.
IEEE Internet Things J., 2020

Delay-aware and cost-efficient probabilistic transmission for opportunistic networks.
IET Networks, 2020

Computation offloading time optimisation via Q-learning in opportunistic edge computing.
IET Commun., 2020

Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking.
Sci. China Inf. Sci., 2020

Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory.
IEEE Access, 2020

TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Detecting Promotion Attacks in the App Market Using Neural Networks.
IEEE Wirel. Commun., 2019

Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems.
IEEE Netw., 2019

A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Netw., 2019

How to Govern the Non-Cooperative Amateur Drones?
IEEE Netw., 2019

metrics and methods of video quality assessment: a brief review.
Multim. Tools Appl., 2019

Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019

Secure Multi-UAV Collaborative Task Allocation.
IEEE Access, 2019

Pollution Source Localization Based on Multi-UAV Cooperative Communication.
IEEE Access, 2019

2018
Security Analysis of a Space-Based Wireless Network.
IEEE Netw., 2018

Privacy-friendly and efficient secure communication framework for V2G networks.
IET Commun., 2018

Privacy in the Internet of Things for Smart Healthcare.
IEEE Commun. Mag., 2018

Flight Security and Safety of Drones in Airborne Fog Computing Systems.
IEEE Commun. Mag., 2018

Imminent Communication Security for Smart Communities.
IEEE Commun. Mag., 2018

Security in the Internet of Things Supported by Mobile Edge Computing.
IEEE Commun. Mag., 2018

2017
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks.
Wirel. Pers. Commun., 2017

Online/offline signature based on UOV in wireless sensor networks.
Wirel. Networks, 2017

Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
IEEE Wirel. Commun., 2017

Communication Security of Unmanned Aerial Vehicles.
IEEE Wirel. Commun., 2017

Win-Win Security Approaches for Smart Grid Communications Networks.
IEEE Netw., 2017

Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation.
IEEE Internet Things J., 2017

Drone-Assisted Public Safety Networks: The Security Aspect.
IEEE Commun. Mag., 2017

An FPGA-Based Real-Time Moving Object Tracking Approach.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks.
IEEE Trans. Veh. Technol., 2016

Securing software defined wireless networks.
IEEE Commun. Mag., 2016

FPGA-Based Parallel Implementation of SURF Algorithm.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Mobile application security: malware threats and defenses.
IEEE Wirel. Commun., 2015

User privacy and data trustworthiness in mobile crowd sensing.
IEEE Wirel. Commun., 2015

Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2015

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

An adaptive MAC protocol for real-time and reliable communications in medical cyber-physical systems.
Telecommun. Syst., 2015

Analyses of several recently proposed group key management schemes.
Secur. Commun. Networks, 2015

Handover authentication for mobile networks: security and efficiency aspects.
IEEE Netw., 2015

Privacy and incentive mechanisms in people-centric sensing networks.
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part II [Guest Editorial].
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part 1 [Guest Editorial].
IEEE Commun. Mag., 2015

Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Small data dissemination for wireless sensor networks: The security aspect.
IEEE Wirel. Commun., 2014

Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks.
IEEE J. Biomed. Health Informatics, 2014

An enhanced public key infrastructure to secure smart grid wireless communication networks.
IEEE Netw., 2014

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
IEEE Intell. Syst., 2014

2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2013

Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks.
IEEE J. Biomed. Health Informatics, 2013

Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2013

Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks.
IEEE Trans. Computers, 2013

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013

Strong roaming authentication technique for wireless and mobile networks.
Int. J. Commun. Syst., 2013

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects.
IEEE Commun. Mag., 2013

A Survey of Side Channel Attacks on MPKCs potential for RFID.
Proceedings of the Radio Frequency Identification System Security, 2013

2012
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2012

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions.
IEEE Trans. Wirel. Commun., 2012

A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2012

Cryptanalysis of some conference schemes for mobile communications.
Secur. Commun. Networks, 2012

Secure and efficient dynamic program update in wireless sensor networks.
Secur. Commun. Networks, 2012

Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks.
IEEE Commun. Lett., 2012

Secure service provision in smart grid communications.
IEEE Commun. Mag., 2012

2011
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks.
Wirel. Pers. Commun., 2011

Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2011

Distributed Access Control with Privacy Support in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

Privacy-Preserving Universal Authentication Protocol for Wireless Communications.
IEEE Trans. Wirel. Commun., 2011

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks.
J. Zhejiang Univ. Sci. C, 2011

SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Lightweight and provably secure user authentication with anonymity for the global mobility network.
Int. J. Commun. Syst., 2011

A strong user authentication scheme with smart cards for wireless communications.
Comput. Commun., 2011

ICAD: Indirect correlation based anomaly detection in dynamic WSNs.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2009
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks.
Wirel. Pers. Commun., 2009

Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009


  Loading...