Nafei Zhu
Orcid: 0000-0003-4036-0724
According to our database1,
Nafei Zhu
authored at least 58 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Privacy information propagation in online social networks - a case study based on Weibo data.
Int. J. Inf. Sec., February, 2025
Future Gener. Comput. Syst., 2025
2024
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach.
J. Supercomput., December, 2024
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain.
Clust. Comput., September, 2024
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications.
Clust. Comput., August, 2024
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks.
IEEE Trans. Comput. Soc. Syst., June, 2024
Trans. Emerg. Telecommun. Technol., June, 2024
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning.
Trans. Emerg. Telecommun. Technol., April, 2024
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024
Trans. Emerg. Telecommun. Technol., January, 2024
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning.
Comput. Commun., January, 2024
An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach.
Ad Hoc Networks, January, 2024
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT.
J. King Saud Univ. Comput. Inf. Sci., 2024
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024
Comput. Commun., 2024
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks.
Future Internet, March, 2023
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023
J. Comput. Sci., 2023
An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs.
J. Intell. Fuzzy Syst., 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
2022
Microprocess. Microsystems, September, 2022
Trans. Data Priv., 2022
Secur. Priv., 2022
Inf. Syst. Frontiers, 2022
Int. J. Inf. Secur. Priv., 2022
Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022
2021
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls.
J. Intell. Fuzzy Syst., 2021
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection.
Inf. Process. Manag., 2021
Int. J. Secur. Networks, 2021
Trans. Emerg. Telecommun. Technol., 2021
IEEE Access, 2021
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks.
IEEE Access, 2021
2020
J. Web Eng., 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks.
Int. J. Netw. Secur., 2019
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs.
Future Internet, 2019
Clust. Comput., 2019
Proceedings of the NLPIR 2019: The 3rd International Conference on Natural Language Processing and Information Retrieval, Tokushima, Japan, June 28, 2019
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019
2018
Wirel. Pers. Commun., 2018
Future Internet, 2018
Future Internet, 2018
EURASIP J. Wirel. Commun. Netw., 2018
Digit. Investig., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017
2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
2013
J. Netw. Syst. Manag., 2013
2012
J. Networks, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012