Letian Sha

According to our database1, Letian Sha authored at least 9 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
READ: Resource efficient authentication scheme for digital twin edge networks.
Future Gener. Comput. Syst., 2025

2023
AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT.
IEEE Syst. J., September, 2023

2022
Cross-scene passive human activity recognition using commodity WiFi.
Frontiers Comput. Sci., 2022

2020
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things.
IEEE Trans. Emerg. Top. Comput., 2020

Deep Spatial-Temporal Model Based Cross-Scene Action Recognition Using Commodity WiFi.
IEEE Internet Things J., 2020

A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT.
IEEE Internet Things J., 2020

2019
Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embed. Comput. Syst., 2019

2018
IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT.
World Wide Web, 2018

2016
SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network.
Secur. Commun. Networks, 2016


  Loading...