Jingsha He
Orcid: 0000-0002-8122-8052
According to our database1,
Jingsha He
authored at least 156 papers
between 1990 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Privacy information propagation in online social networks - a case study based on Weibo data.
Int. J. Inf. Sec., February, 2025
Future Gener. Comput. Syst., 2025
2024
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach.
J. Supercomput., December, 2024
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain.
Clust. Comput., September, 2024
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications.
Clust. Comput., August, 2024
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks.
IEEE Trans. Comput. Soc. Syst., June, 2024
Trans. Emerg. Telecommun. Technol., June, 2024
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning.
Trans. Emerg. Telecommun. Technol., April, 2024
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024
Trans. Emerg. Telecommun. Technol., January, 2024
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning.
Comput. Commun., January, 2024
An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach.
Ad Hoc Networks, January, 2024
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT.
J. King Saud Univ. Comput. Inf. Sci., 2024
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024
Comput. Commun., 2024
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks.
Future Internet, March, 2023
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023
J. Comput. Sci., 2023
An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs.
J. Intell. Fuzzy Syst., 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023
2022
Microprocess. Microsystems, September, 2022
Trans. Data Priv., 2022
Secur. Priv., 2022
Inf. Syst. Frontiers, 2022
Int. J. Inf. Secur. Priv., 2022
Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022
2021
A cost-effective adaptive random testing algorithm for object-oriented software testing.
J. Intell. Fuzzy Syst., 2021
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls.
J. Intell. Fuzzy Syst., 2021
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection.
Inf. Process. Manag., 2021
Int. J. Secur. Networks, 2021
Trans. Emerg. Telecommun. Technol., 2021
A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.
Complex., 2021
IEEE Access, 2021
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks.
IEEE Access, 2021
2020
J. Web Eng., 2020
J. Intell. Fuzzy Syst., 2020
A novel approach to secret data concealment with high cover text capacity and security.
Int. J. Electron. Secur. Digit. Forensics, 2020
Special issue on the application of artificial intelligence in advanced manufacturing.
Int. J. Comput. Integr. Manuf., 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.
IEEE Internet Things J., 2019
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks.
Int. J. Netw. Secur., 2019
Int. J. Electron. Secur. Digit. Forensics, 2019
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs.
Future Internet, 2019
Clust. Comput., 2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Proceedings of the NLPIR 2019: The 3rd International Conference on Natural Language Processing and Information Retrieval, Tokushima, Japan, June 28, 2019
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019
2018
Wirel. Pers. Commun., 2018
Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting.
Sensors, 2018
Int. J. Embed. Syst., 2018
Future Internet, 2018
Future Internet, 2018
EURASIP J. Wirel. Commun. Netw., 2018
Digit. Investig., 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning.
Future Internet, 2017
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017
2016
Int. J. High Perform. Comput. Netw., 2016
A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016
Int. J. Distributed Sens. Networks, 2016
Future Internet, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications.
Proceedings of the Communications and Networking, 2016
2015
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices.
Int. J. Digit. Crime Forensics, 2015
Comput. Secur., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Int. J. Comput. Sci. Eng., 2014
Comput. Stand. Interfaces, 2014
2013
Enabling end-to-end secure communication between wireless sensor networks and the Internet.
World Wide Web, 2013
J. Netw. Syst. Manag., 2013
Int. J. Sens. Networks, 2013
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
2012
J. Networks, 2012
J. Networks, 2012
Int. J. Distributed Sens. Networks, 2012
A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario.
Int. J. Distributed Sens. Networks, 2012
Int. J. Comput. Intell. Syst., 2012
Int. J. Comput. Intell. Syst., 2012
Int. J. Autom. Comput., 2012
2011
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks.
J. Networks, 2011
Int. J. Comput. Intell. Syst., 2011
EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
J. Parallel Distributed Comput., 2009
J. Commun. Networks, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009
Proceedings of the Active Media Technology, 5th International Conference, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Comput. Commun., 2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2001
Proceedings of the Networking, 2001
2000
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000
1992
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
Proceedings of the Computer Security, 1992
1990
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990