Xiaojiang Du

Orcid: 0000-0003-4235-9671

According to our database1, Xiaojiang Du authored at least 673 papers between 2001 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2020, "for contributions to wireless security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-Tallying Voting with Blockchain in Wireless Network Environment.
IEEE Wirel. Commun., October, 2024

An AI-Enhanced Multipath TCP Scheduler for Open Radio Access Networks.
IEEE Trans. Green Commun. Netw., September, 2024

GainNet: Coordinates the Odd Couple of Generative AI and 6G Networks.
IEEE Netw., September, 2024

Sparsity-Aware Intelligent Massive Random Access Control for Massive MIMO Networks: A Reinforcement Learning Based Approach.
IEEE Trans. Wirel. Commun., August, 2024

Integrated Sensing, Communication, and Computing for Cost-effective Multimodal Federated Perception.
ACM Trans. Multim. Comput. Commun. Appl., August, 2024

A Four-Dimensional Space-Based Data Multi-Embedding Mechanism for Network Services.
IEEE Trans. Netw. Serv. Manag., June, 2024

RPMDA: Robust and Privacy-Enhanced Multidimensional Data Aggregation Scheme for Fog-Assisted Smart Grids.
IEEE Internet Things J., May, 2024

BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024

SecureSL: A Privacy-Preserving Vertical Cooperative Learning Scheme for Web 3.0.
IEEE Trans. Netw. Sci. Eng., 2024

Automated and Controlled Patch Generation for Enhanced Fixing of Communication Software Vulnerabilities.
Intell. Converged Networks, 2024

A prototype-assisted clustered federated learning for big data security and privacy preservation.
Future Gener. Comput. Syst., 2024

A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles.
Digit. Commun. Networks, 2024

Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications.
Digit. Commun. Networks, 2024

Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks.
Digit. Commun. Networks, 2024

Identify As A Human Does: A Pathfinder of Next-Generation Anti-Cheat Framework for First-Person Shooter Games.
CoRR, 2024

Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain.
Proceedings of the IEEE International Conference on Communications, 2024

TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2024

NetReach: Guaranteed Network Availability and Reachability to enable Resilient Networks for Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Companion Apps or Backdoors? On the Security of Automotive Companion Apps.
Proceedings of the Computer Security - ESORICS 2024, 2024

Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Visible Light Integrated Positioning and Communication: A Multi-Task Federated Learning Framework.
IEEE Trans. Mob. Comput., December, 2023

A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system.
Neural Comput. Appl., November, 2023

Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023

Toward Optimal Deployment of UAV Relays in UAV-Assisted Internet of Vehicles.
IEEE Trans. Veh. Technol., October, 2023

Construction of node- and link-fault-tolerant virtual backbones in wireless networks.
J. Supercomput., August, 2023

Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes.
IEEE Trans. Netw. Serv. Manag., June, 2023

Green Heterogeneous Computing Powers Allocation Using Reinforcement Learning in SDN-IoV.
IEEE Trans. Green Commun. Netw., June, 2023

Black-box attacks on image classification model with advantage actor-critic algorithm in latent space.
Inf. Sci., May, 2023

User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks.
Future Gener. Comput. Syst., April, 2023

Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023

Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023

Integrated Sensing, Communication, and Computing for Cost-effective Multimodal Federated Perception.
CoRR, 2023

Sparsity-Aware Intelligent Massive Random Access Control in Open RAN: A Reinforcement Learning Based Approach.
CoRR, 2023

Android malware detection based on sensitive features combination.
Concurr. Comput. Pract. Exp., 2023

Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Proceedings of the 32nd USENIX Security Symposium, 2023

MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

A High-Throughput Scheduler based on Multipath-State Machine in Wireless Networks.
Proceedings of the IEEE International Conference on Communications, 2023

An Efficient Post-Quantum Multi-Signature Scheme for the Internet of Vehicles.
Proceedings of the IEEE International Conference on Communications, 2023

GBMIA: Gradient-based Membership Inference Attack in Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Convolutional Neural Network Based Classification of WeChat Mini-Apps.
Proceedings of the IEEE International Conference on Communications, 2023

Enhancing Edge Multipath Data Security Offloading Efficiency via Sequential Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2023

A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering.
Proceedings of the IEEE Global Communications Conference, 2023

5G-IoT-IDS: Intrusion Detection System for CIoT as Network Function in 5G Core Network.
Proceedings of the IEEE Global Communications Conference, 2023

Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments.
Proceedings of the IEEE Global Communications Conference, 2023

A Fine-Grained Cross-Chain Spectrum Sharing Mechanism Based on Oracle.
Proceedings of the IEEE Global Communications Conference, 2023

VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Virtual-Device-Based Policy Enforcement in Multi-Admin Smart Environments.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

An Internet of Things Testbed for Education and Community Research.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems.
Int. J. Intell. Syst., December, 2022

A Practical Cross-Device Federated Learning Framework over 5G Networks.
IEEE Wirel. Commun., 2022

Improve the reliability of 6G vehicular communication through skip network coding.
Veh. Commun., 2022

Distributed and Secure Uplink Power Control in Dynamic Spectrum Access.
IEEE Trans. Wirel. Commun., 2022

Auction-Promoted Trading for Multiple Federated Learning Services in UAV-Aided Networks.
IEEE Trans. Veh. Technol., 2022

Few-Shot Scale-Insensitive Object Detection for Edge Computing Platform.
IEEE Trans. Sustain. Comput., 2022

TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET.
IEEE Trans. Serv. Comput., 2022

Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security.
ACM Trans. Internet Techn., 2022

DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022

Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022

IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
Softw. Pract. Exp., 2022

STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022

Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis.
IEEE Netw., 2022

Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.
IEEE Netw., 2022

QoS provision for vehicle big data by parallel transmission based on heterogeneous network characteristics prediction.
J. Parallel Distributed Comput., 2022

Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things.
IEEE Internet Things J., 2022

Learning-Based Efficient Sparse Sensing and Recovery for Privacy-Aware IoMT.
IEEE Internet Things J., 2022

Resource Management for Edge Intelligence (EI)-Assisted IoV Using Quantum-Inspired Reinforcement Learning.
IEEE Internet Things J., 2022

Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

CAMA: Class activation mapping disruptive attack for deep neural networks.
Neurocomputing, 2022

TamForen: A tamper-proof cloud forensic framework.
Trans. Emerg. Telecommun. Technol., 2022

Hybrid Architectures for Distributed Machine Learning in Heterogeneous Wireless Networks.
CoRR, 2022

Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
CoRR, 2022

Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks.
Comput. Commun., 2022

An Intelligent Government Complaint Prediction Approach.
Big Data Res., 2022

Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

WGAN-GP and LSTM based Prediction Model for Aircraft 4- D Traj ectory.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

ADSA: A Multi-path Transmission Scheduling Algorithm based on Deep Reinforcement Learning in Vehicle Networks.
Proceedings of the IEEE International Conference on Communications, 2022

DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users.
Proceedings of the IEEE Global Communications Conference, 2022

Fine-Tuned Access Control for Internet of Things.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks.
IEEE Wirel. Commun., 2021

Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network.
IEEE Trans. Netw. Serv. Manag., 2021

A Blockchain-Based Storage System With Financial Incentives for Load-balancing.
IEEE Trans. Netw. Sci. Eng., 2021

Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021

An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV With Fog Computing Architecture.
IEEE Trans. Intell. Transp. Syst., 2021

LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV.
IEEE Trans. Intell. Transp. Syst., 2021

Compiler-Based Efficient CNN Model Construction for 5G Edge Devices.
IEEE Trans. Intell. Transp. Syst., 2021

Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach.
IEEE Trans. Intell. Transp. Syst., 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021

Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021

Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021

An Energy-Efficient In-Network Computing Paradigm for 6G.
IEEE Trans. Green Commun. Netw., 2021

Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021

Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC.
Phys. Commun., 2021

STAC: a spatio-temporal approximate method in data collection applications.
Pervasive Mob. Comput., 2021

Special Issue on Edge Intelligence for Immersive Communications.
IEEE Open J. Commun. Soc., 2021

The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021

Toward Decentralized Fair Data Trading Based on Blockchain.
IEEE Netw., 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum.
IEEE Netw., 2021

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices.
IEEE J. Sel. Areas Commun., 2021

Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS.
J. Parallel Distributed Comput., 2021

Scalable and redactable blockchain with update and anonymity.
Inf. Sci., 2021

IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021

Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios.
IEEE Internet Things J., 2021

Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities.
IEEE Internet Things J., 2021

Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems.
IEEE Internet Things J., 2021

PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services.
IEEE Internet Things J., 2021

Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach.
IEEE Internet Things J., 2021

A Two-Tier Collection and Processing Scheme for Fog-Based Mobile Crowdsensing in the Internet of Vehicles.
IEEE Internet Things J., 2021

Optimal Cooperative Relaying and Power Control for IoUT Networks With Reinforcement Learning.
IEEE Internet Things J., 2021

Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021

Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021

ECBCM: A prestige-based edge computing blockchain security consensus model.
Trans. Emerg. Telecommun. Technol., 2021

Blockchain-based privacy-preserving valet parking for self-driving vehicles.
Trans. Emerg. Telecommun. Technol., 2021

SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study.
ACM Comput. Surv., 2021

A method of chained recommendation for charging piles in internet of vehicles.
Computing, 2021

A sentence-level text adversarial attack algorithm against IIoT based smart grid.
Comput. Networks, 2021

RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything.
IEEE Consumer Electron. Mag., 2021

Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation.
Appl. Soft Comput., 2021

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021

HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes.
Proceedings of the 30th USENIX Security Symposium, 2021

SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Decision-Tree Based Root Cause Localization for Anomalies in Smart IoT Systems.
Proceedings of the ICC 2021, 2021

A Bottleneck-Aware Multipath Scheduling Mechanism for Social Networks.
Proceedings of the ICC 2021, 2021

BMDS: A Blockchain-based Medical Data Sharing Scheme with Attribute-Based Searchable Encryption.
Proceedings of the ICC 2021, 2021

Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain.
Proceedings of the ICC 2021, 2021

A Non-Intrusive Method for Smart Speaker Forensics.
Proceedings of the ICC 2021, 2021

False Data Injection Attack Detection Based on Wavelet Packet Decomposition and Random Forest in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks.
Proceedings of the IEEE Global Communications Conference, 2021

BPFL: A Blockchain Based Privacy-Preserving Federated Learning Scheme.
Proceedings of the IEEE Global Communications Conference, 2021

Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
Proceedings of the IEEE Global Communications Conference, 2021

Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2021

Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020

Advances of Security and Privacy Techniques in Emerging Wireless Networks.
IEEE Wirel. Commun., 2020

Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020

Accountable credential management system for vehicular communication.
Veh. Commun., 2020

FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2020

Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network.
IEEE Trans. Veh. Technol., 2020

An Adaptive Computation Offloading Mechanism for Mobile Health Applications.
IEEE Trans. Veh. Technol., 2020

A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2020

Hierarchical and Hybrid: Mobility-Compatible Database-Assisted Framework for Dynamic Spectrum Access.
IEEE Trans. Netw. Sci. Eng., 2020

Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2020

Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020

A Distributed Deep Learning System for Web Attack Detection on Edge Devices.
IEEE Trans. Ind. Informatics, 2020

Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020

Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City.
IEEE Trans. Comput. Soc. Syst., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G.
IEEE Trans. Cogn. Commun. Netw., 2020

Market-Based Model in CR-IoT: A Q-Probabilistic Multi-Agent Reinforcement Learning Approach.
IEEE Trans. Cogn. Commun. Netw., 2020

A Graph Convolutional Network-Based Deep Reinforcement Learning Approach for Resource Allocation in a Cognitive Radio Network.
Sensors, 2020

An Adaptive Network Coding Scheme for Multipath Transmission in Cellular-Based Vehicular Networks.
Sensors, 2020

A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs.
Sensors, 2020

An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks.
Sensors, 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning.
Peer-to-Peer Netw. Appl., 2020

A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data.
Pervasive Mob. Comput., 2020

ABQ: Active Buffer Queueing in Datacenters.
IEEE Netw., 2020

Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020

Green Communications for Future Vehicular Networks: Data Compression Approaches, Opportunities, and Challenges.
IEEE Netw., 2020

Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020

Intelligence-Sharing Vehicular Networks with Mobile Edge Computing and Spatiotemporal Knowledge Transfer.
IEEE Netw., 2020

Recent Advances in Security and Privacy for Future Intelligent Networks.
IEEE Netw., 2020

Structured Bayesian Compression for Deep Models in Mobile-Enabled Devices for Connected Healthcare.
IEEE Netw., 2020

Multi-layer security scheme for implantable medical devices.
Neural Comput. Appl., 2020

Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020

IntegrityChain: Provable Data Possession for Decentralized Storage.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020

Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation.
IEEE Internet Things J., 2020

Dynamic Measurement and Data Calibration for Aerial Mobile IoT.
IEEE Internet Things J., 2020

A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks.
IEEE Internet Things J., 2020

Zero-Chain: A Blockchain-Based Identity for Digital City Operating System.
IEEE Internet Things J., 2020

T-CAM: Time-based content access control mechanism for ICN subscription systems.
Future Gener. Comput. Syst., 2020

Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN.
Future Gener. Comput. Syst., 2020

Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020

Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach.
Future Gener. Comput. Syst., 2020

Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking.
Future Gener. Comput. Syst., 2020

CompRess: Composing overlay service resources for end-to-end network slices using semantic user intents.
Trans. Emerg. Telecommun. Technol., 2020

Space-Ground Integrated Information Network Enabled Internet of Vehicles: Architecture and Key Mechanisms.
IEEE Commun. Stand. Mag., 2020

Robust Attacks on Deep Learning Face Recognition in the Physical World.
CoRR, 2020

Privacy-Preserving Machine Learning Training in Aggregation Scenarios.
CoRR, 2020

SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security.
IEEE Commun. Surv. Tutorials, 2020

IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020

A differentially private greedy decision forest classification algorithm with high utility.
Comput. Secur., 2020

An adaptive cache management approach in ICN with pre-filter queues.
Comput. Commun., 2020

The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry.
Comput. Commun., 2020

Joint user association and resource allocation in HetNets based on user mobility prediction.
Comput. Networks, 2020

Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020

Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020

PPLS: a privacy-preserving location-sharing scheme in mobile online social networks.
Sci. China Inf. Sci., 2020

An incentive mechanism for data sharing based on blockchain with smart contracts.
Comput. Electr. Eng., 2020

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection.
IEEE Access, 2020

BEMPAS: A Decentralized Employee Performance Assessment System Based on Blockchain for Smart City Governance.
IEEE Access, 2020

Adversarial Attacks for Image Segmentation on Multiple Lightweight Models.
IEEE Access, 2020

A Differentially Private Classification Algorithm With High Utility for Wireless Body Area Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

An IoT data sharing privacy preserving scheme.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Malware Detection Method for Health Sensor Data Based on Machine Learning.
Proceedings of the IEEE International Conference on Informatics, 2020

Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Coexistence of Cellular V2X and Wi-Fi over Unlicensed Spectrum with Reinforcement Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Blockchain-based Conditional Privacy-Preserving Traffic Data Sharing in Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Physical Layer Security Scheme with Compressed Sensing in OFDM-based IoT Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

CEPS: A Cross-Blockchain based Electronic Health Records Privacy-Preserving Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Sensitive Labels Matching Privacy Protection in Multi-Social Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2020

An Efficient Network Coding Scheme for Heterogeneous Wireless Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Forensic Model for DDoS Attack.
Proceedings of the IEEE Global Communications Conference, 2020

A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain.
Proceedings of the IEEE Global Communications Conference, 2020

Secure Fog-assisted Sharing for Multimedia Health Records in the Cloud.
Proceedings of the IEEE Global Communications Conference, 2020

Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network.
Proceedings of the IEEE Global Communications Conference, 2020

An Electric Vehicle Charging Reservation Approach Based on Blockchain.
Proceedings of the IEEE Global Communications Conference, 2020

Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Attacking Graph-Based Classification without Changing Existing Connections.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis.
IEEE Wirel. Commun., 2019

Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks.
IEEE Wirel. Commun., 2019

Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019

Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks.
IEEE Wirel. Commun., 2019

A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture.
IEEE Wirel. Commun., 2019

An Optimal Channel Occupation Time Adjustment Method for LBE in Unlicensed Spectrum.
IEEE Trans. Veh. Technol., 2019

Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019

V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model.
IEEE Trans. Veh. Technol., 2019

A Novel DCT-Based Compression Scheme for 5G Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

Multi-Modal Data Semantic Localization With Relationship Dependencies for Efficient Signal Processing in EH CRNs.
IEEE Trans. Cogn. Commun. Netw., 2019

Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks.
IEEE Syst. J., 2019

A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing.
Sensors, 2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems.
Sensors, 2019

A Self-Selective Correlation Ship Tracking Method for Smart Ocean Systems.
Sensors, 2019

An Anti-Interference Scheme for UAV Data Links in Air-Ground Integrated Vehicular Networks.
Sensors, 2019

A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices.
Sensors, 2019

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
Sensors, 2019

Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective.
Secur. Commun. Networks, 2019

Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Netw., 2019

Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies.
IEEE Netw., 2019

Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things.
J. Parallel Distributed Comput., 2019

Security and privacy preservation in fog-based crowd sensing on the internet of vehicles.
J. Netw. Comput. Appl., 2019

Scalable explicit path control in software-defined networks.
J. Netw. Comput. Appl., 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet Things J., 2019

Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks.
IEEE Internet Things J., 2019

Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments.
IEEE Internet Things J., 2019

LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT.
IEEE Internet Things J., 2019

Optimal Energy Trading for Plug-In Hybrid Electric Vehicles Based on Fog Computing.
IEEE Internet Things J., 2019

Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design.
IEEE Internet Things J., 2019

Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019

A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.
IEEE Internet Things J., 2019

VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT.
Future Gener. Comput. Syst., 2019

A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019

Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks.
Future Gener. Comput. Syst., 2019

Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet.
Future Gener. Comput. Syst., 2019

Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications.
Future Gener. Comput. Syst., 2019

Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach.
Future Gener. Comput. Syst., 2019

Biometric-based authentication scheme for Implantable Medical Devices during emergency situations.
Future Gener. Comput. Syst., 2019

Caching mechanism for mobile edge computing in V2I networks.
Trans. Emerg. Telecommun. Technol., 2019

Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access.
CoRR, 2019

PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019

Self-Selective Correlation Ship Tracking Method for Smart Ocean System.
CoRR, 2019

Market-Based Model in CR-WSN: A Q-Probabilistic Multi-agent Learning Approach.
CoRR, 2019

When Energy Trading meets Blockchain in Electrical Power System: The State of the Art.
CoRR, 2019

Heterogeneous Coexistence of Cognitive Radio Networks in TV White Space.
CoRR, 2019

SDN Controllers: Benchmarking & Performance Evaluation.
CoRR, 2019

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems.
CoRR, 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019

A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing.
CoRR, 2019

Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach.
Concurr. Comput. Pract. Exp., 2019

Adversarial attacks against profile HMM website fingerprinting detection model.
Cogn. Syst. Res., 2019

Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid.
IEEE Commun. Mag., 2019

Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment.
Comput. Electr. Eng., 2019

Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks.
IEEE Access, 2019

Multi-User MAC Protocol for WLANs in MmWave Massive MIMO Systems With Mobile Edge Computing.
IEEE Access, 2019

Dual-Polarized Spatial-Temporal Propagation Measurement and Modeling in UMa O2I Scenario at 3.5 GHz.
IEEE Access, 2019

Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks.
IEEE Access, 2019

BNNC: Improving Performance of Multipath Transmission in Heterogeneous Vehicular Networks.
IEEE Access, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
IEEE Access, 2019

Resource Allocation in Information-Centric Wireless Networking With D2D-Enabled MEC: A Deep Reinforcement Learning Approach.
IEEE Access, 2019

Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers.
IEEE Access, 2019

Location Privacy Preservation for Mobile Users in Location-Based Services.
IEEE Access, 2019

Online Parallelized Service Function Chain Orchestration in Data Center Networks.
IEEE Access, 2019

A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants.
IEEE Access, 2019

Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems.
IEEE Access, 2019

An Optimizing and Differentially Private Clustering Algorithm for Mixed Data in SDN-Based Smart Grid.
IEEE Access, 2019

Interest-Related Item Similarity Model Based on Multimodal Data for Top-N Recommendation.
IEEE Access, 2019

Blockchain-Based Distributed Energy Trading in Energy Internet: An SDN Approach.
IEEE Access, 2019

Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV.
IEEE Access, 2019

Lightweight and Privacy-Preserving Medical Services Access for Healthcare Cloud.
IEEE Access, 2019

Super-Resolution of Brain MRI Images Using Overcomplete Dictionaries and Nonlocal Similarity.
IEEE Access, 2019

A Course-Aware Opportunistic Routing Protocol for FANETs.
IEEE Access, 2019

Cooperative Content Caching for Mobile Edge Computing With Network Coding.
IEEE Access, 2019

A Prediction Method for Destination Based on the Semantic Transfer Model.
IEEE Access, 2019

Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things.
IEEE Access, 2019

Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019

Infrared Small Target Detection Through Multiple Feature Analysis Based on Visual Saliency.
IEEE Access, 2019

POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019

Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019

Verification Code Recognition Based on Active and Deep Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Novel Secure Authentication Scheme for Heterogeneous Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Light-Weight Authentication Scheme for Air Force Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Effective UAV and Ground Sensor Authentication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Efficient and Privacy-Preserving Energy Trading Scheme Based on Blockchain.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Secure and Efficient Medical Data Sharing Protocol for Cloud-Assisted WBAN.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Novel Chaos-Based Physical Layer Security Transmission Scheme for Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cloud Database Encryption Technology Based on Combinatorial Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wirel. Commun., 2018

Security in Mobile Edge Caching with Reinforcement Learning.
IEEE Wirel. Commun., 2018

Security and Privacy in Wireless IoT.
IEEE Wirel. Commun., 2018

Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2018

Chain-based big data access control infrastructure.
J. Supercomput., 2018

Vehicle Tracking Using Surveillance With Multimodal Data Fusion.
IEEE Trans. Intell. Transp. Syst., 2018

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018

Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud.
IEEE Trans. Cloud Comput., 2018

Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018

AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions.
Sensors, 2018

TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

Vehicle-Type Detection Based on Compressed Sensing and Deep Learning in Vehicular Networks.
Sensors, 2018

SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail.
IEEE Netw., 2018

Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems.
J. Sens. Actuator Networks, 2018

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018

Random Access Preamble Design and Detection for Mobile Satellite Communication Systems.
IEEE J. Sel. Areas Commun., 2018

PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles.
IEEE Internet Things J., 2018

A 3-D Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks.
IEEE Internet Things J., 2018

Attention-mechanism-based tracking method for intelligent Internet of vehicles.
Int. J. Distributed Sens. Networks, 2018

An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Commun. Syst., 2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018

Reinforcement learning-based QoS/QoE-aware service function chaining in software-driven 5G slices.
Trans. Emerg. Telecommun. Technol., 2018

Radio resource coordination and scheduling scheme in ultra-dense cloud-based small cell networks.
EURASIP J. Wirel. Commun. Netw., 2018

Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding.
CoRR, 2018

When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018

Protecting User Privacy Based on Secret Sharing with Error Tolerance for Big Data in Smart Grid.
CoRR, 2018

Social Vehicle Swarms: A Novel Perspective on Social-aware Vehicular Communication Architecture.
CoRR, 2018

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
CoRR, 2018

Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security.
CoRR, 2018

A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services.
CoRR, 2018

PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social Networks.
CoRR, 2018

FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval.
CoRR, 2018

Spatio-temporal Trajectory Dataset Privacy Based on Network Traffic Control.
CoRR, 2018

Preserving Location Privacy in Mobile Edge Computing.
CoRR, 2018

Timing Channel in IaaS: How to Identify and Investigate.
CoRR, 2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices.
CoRR, 2018

An Accountable Anonymous Data Aggregation Scheme for Internet of Things.
CoRR, 2018

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices.
CoRR, 2018

Energy-Efficient Beamforming for 3.5 GHz 5G Cellular Networks based on 3D Spatial Channel Characteristics.
Comput. Commun., 2018

Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies.
Comput. Commun., 2018

Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks.
Comput. Networks, 2018

FPAN: Fine-grained and progressive attention localization network for data retrieval.
Comput. Networks, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Commun. Mag., 2018

From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies.
IEEE Commun. Mag., 2018

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Commun. Mag., 2018

Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV.
IEEE Commun. Mag., 2018

Discovering communities of malapps on Android-based mobile cyber-physical systems.
Ad Hoc Networks, 2018

Location-Aware Influence Blocking Maximization in Social Networks.
IEEE Access, 2018

Hermes: A Privacy-Preserving Approximate Search Framework for Big Data.
IEEE Access, 2018

Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach.
IEEE Access, 2018

Deciding Your Own Anonymity: User-Oriented Node Selection in I2P.
IEEE Access, 2018

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing.
IEEE Access, 2018

Congestion Game With Link Failures for Network Selection in High-Speed Vehicular Networks.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

Massive Fishing Website URL Parallel Filtering Method.
IEEE Access, 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

LTE-U and Wi-Fi Coexistence Algorithm Based on Q-Learning in Multi-Channel.
IEEE Access, 2018

Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment.
IEEE Access, 2018

Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information.
IEEE Access, 2018

Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings.
IEEE Access, 2018

MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles.
IEEE Access, 2018

PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing.
IEEE Access, 2018

Lclean: A Plausible Approach to Individual Trajectory Data Sanitization.
IEEE Access, 2018

Consortium Blockchain-Based Malware Detection in Mobile Devices.
IEEE Access, 2018

An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid.
Proceedings of the 2018 IEEE SmartWorld, 2018

Voiceprint-Based Access Control for Wireless Insulin Pump Systems.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

DTW based Authentication for Wireless Medical Device Security.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

V-Chain: A Blockchain-Based Car Lease Platform.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Online Deadline-Aware Bulk Transfer Over Inter-Datacenter WANs.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

The Identification of Secular Variation in IoT Based on Transfer Learning.
Proceedings of the 2018 International Conference on Computing, 2018

Secure Payment Routing Protocol for Economic Systems Based on Blockchain.
Proceedings of the 2018 International Conference on Computing, 2018

An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology.
Proceedings of the 2018 International Conference on Computing, 2018

PWiG: A Phase-based Wireless Gesture Recognition System.
Proceedings of the 2018 International Conference on Computing, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems.
Proceedings of the 2018 International Conference on Computing, 2018

A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Efficient Anonymous Authentication Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Enabling Fair Spectrum Sharing between Wi-Fi and LTE-Unlicensed.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Classification of Small UAVs Based on Auxiliary Classifier Wasserstein GANs.
Proceedings of the IEEE Global Communications Conference, 2018

Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor.
Proceedings of the IEEE Global Communications Conference, 2018

A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.
Proceedings of the IEEE Global Communications Conference, 2018

vFAC: Fine-Grained Access Control with Versatility for Cloud Storage.
Proceedings of the IEEE Global Communications Conference, 2018

BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records.
Proceedings of the IEEE Global Communications Conference, 2018

A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs.
Proceedings of the IEEE Global Communications Conference, 2018

Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack.
Proceedings of the IEEE Global Communications Conference, 2018

Envisioning an Information Assurance and Performance Infrastructure for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

2017
Secure Machine-Type Communications toward LTE Heterogeneous Networks.
IEEE Wirel. Commun., 2017

FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Veh. Technol., 2017

Cloud-Based Malware Detection Game for Mobile Devices with Offloading.
IEEE Trans. Mob. Comput., 2017

Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017

Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters.
Secur. Commun. Networks, 2017

P2P-based resource allocation with coalitional game for D2D networks.
Pervasive Mob. Comput., 2017

Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Netw., 2017

Intermittent Fault Diagnosability of Interconnection Networks.
J. Comput. Sci. Technol., 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Access Control Schemes for Implantable Medical Devices: A Survey.
IEEE Internet Things J., 2017

Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid.
IEEE Internet Things J., 2017

Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach.
IEICE Trans. Inf. Syst., 2017

A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks.
Comput. Networks, 2017

Resource management for future mobile networks: Architecture and technologies.
Comput. Networks, 2017

Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid.
IEEE Access, 2017

MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.
IEEE Access, 2017

Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper).
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

A Wideband Spectrum Data Segment Compression Algorithm in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Low-Latency Secure Data Outsourcing Scheme for Cloud-WSN.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance guarantee aware orchestration for service function chains with elastic demands.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A review of security challenges, attacks and resolutions for wireless medical devices.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Provably efficient algorithms for joint placement and allocation of virtual network functions.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

A calculation method for social network user credibility.
Proceedings of the IEEE International Conference on Communications, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

Detection of LSSUAV using hash fingerprint based SVDD.
Proceedings of the IEEE International Conference on Communications, 2017

VDAS: Verifiable data aggregation scheme for Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017

An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

An effective DDoS defense scheme for SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017

Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Performance Analysis Model for TCP over Multiple Heterogeneous Paths in 5G Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

DLRT: Deep Learning Approach for Reliable Diabetic Treatment.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Wii: Device-Free Passive Identity Identification via WiFi Signals.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An Unbalanced Data Hybrid-Sampling Algorithm Based on Multi-Information Fusion.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Control.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Predicting Vulnerable Software Components Using Software Network Graph.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Cuckoo: flexible compute-intensive task offloading in mobile cloud computing.
Wirel. Commun. Mob. Comput., 2016

CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing.
Wirel. Commun. Mob. Comput., 2016

A multi-channel cooperative clustering-based MAC protocol for V2V communications.
Wirel. Commun. Mob. Comput., 2016

Efficient device-to-device discovery and access procedure for 5G cellular network.
Wirel. Commun. Mob. Comput., 2016

Theoretical analysis on caching effects in urban vehicular ad hoc networks.
Wirel. Commun. Mob. Comput., 2016

Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture.
IEEE Wirel. Commun., 2016

Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms.
IEEE Trans. Veh. Technol., 2016

Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic.
IEEE Trans. Veh. Technol., 2016

Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks.
IEEE Trans. Veh. Technol., 2016

Significance Evaluation of Video Data Over Media Cloud Based on Compressed Sensing.
IEEE Trans. Multim., 2016

Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning.
Sensors, 2016

Publishing histograms with outliers under data differential privacy.
Secur. Commun. Networks, 2016

Sink Location Protection Protocols Based on Packet Sending Rate Adjustment.
Int. J. Distributed Sens. Networks, 2016

Sounding reference signal based timing advance adjustment for LTE-satellite mobile communication systems.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Analysis of discovery and access procedure for D2D communication in 5G cellular network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Secure data access for wireless body sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Quantifying caching effects in urban VANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Energy-efficient cluster management in heterogeneous vehicular networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Network security analyzing and modeling based on Petri net and Attack tree for SDN.
Proceedings of the 2016 International Conference on Computing, 2016

Public scene recognition using mobile phone sensors.
Proceedings of the 2016 International Conference on Computing, 2016

Protecting sink location against global traffic monitoring attacker.
Proceedings of the 2016 International Conference on Computing, 2016

LPPS: Location privacy protection for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Power Optimization for Secure Communications in Full-Duplex System under Residual Self-Interference.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Robust WLAN-Based Indoor Fine-Grained Intrusion Detection.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Analysis of clickjacking attacks and an effective defense scheme for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Interference management for heterogeneous networks with spectral efficiency improvement.
IEEE Wirel. Commun., 2015

Toward Vehicle-Assisted Cloud Computing for Smartphones.
IEEE Trans. Veh. Technol., 2015

Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic.
IEEE Trans. Veh. Technol., 2015

Multichannel Broadcast Via Channel Hopping in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System.
IEEE Trans. Parallel Distributed Syst., 2015

Achieving data privacy on hybrid cloud.
Secur. Commun. Networks, 2015

Data correlation-based analysis methods for automatic memory forensic.
Secur. Commun. Networks, 2015

Virtual machine placement in cloud systems through migration process.
Int. J. Parallel Emergent Distributed Syst., 2015

Processing geo-dispersed big data in an advanced mapreduce framework.
IEEE Netw., 2015

Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial].
IEEE Netw., 2015

Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Improving QoS on high-speed vehicle by multipath transmission based on practical experiment.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation Framework.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Application of text mining for customer evaluations in commercial banking.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

An effective access control scheme for preventing permission leak in Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A practical approach to the attestation of computational integrity in hybrid cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

CLPP: Context-aware location privacy protection for location-based social network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Effective task scheduling in proximate mobile device based communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A novel stochastic-encryption-based P2P Digital Rights Management scheme.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Face Recognition with Environment Tolerance on a Mobile Device.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic Perspective.
IEEE Trans. Veh. Technol., 2014

Verifying cloud service-level agreement by a third-party auditor.
Secur. Commun. Networks, 2014

Group-based key array authentication protocol in radio frequency identification systems.
IET Inf. Secur., 2014

Aligning Guard Zones of Massive MIMO in Cognitive Femtocell Networks.
IEEE Commun. Lett., 2014

Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Commun. Mag., 2014

Poster: near field communication based access control for wireless medical devices.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

A lightweight access control mechanism for mobile cloud computing.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Achieving big data privacy via hybrid cloud.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A light-weight certificate-less public key cryptography scheme based on ECC.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

MobiFish: A lightweight anti-phishing scheme for mobile phones.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

An effective online scheme for detecting Android malware.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Permission-combination-based scheme for Android mobile malware detection.
Proceedings of the IEEE International Conference on Communications, 2014

Auditing cloud service level agreement on VM CPU speed.
Proceedings of the IEEE International Conference on Communications, 2014

Contention-based adaptive position update for intermittently connected VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

Modeling Leechers attack in BitTorrent.
Proceedings of the IEEE Global Communications Conference, 2014

Analyzing mobile phone vulnerabilities caused by camera.
Proceedings of the IEEE Global Communications Conference, 2014

A lightweight dynamic multicast authentication scheme.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
Security for Wireless Implantable Medical Devices.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7153-0, 2013

Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage.
IEEE Wirel. Commun., 2013

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention.
IEEE Netw., 2013

Preventing Piracy Content Propagation in Peer-to-Peer Networks.
IEEE J. Sel. Areas Commun., 2013

A Measurement Study on the Topologies of BitTorrent Networks.
IEEE J. Sel. Areas Commun., 2013

Distributed precoder design for inter-cell interference suppressing in multi-cell MU-MIMO systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Stable multiuser channel allocations in opportunistic spectrum access.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Auditing CPU Performance in Public Cloud.
Proceedings of the IEEE Ninth World Congress on Services, 2013

A Task Scheduling Algorithm for Multi-core Processors.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Prometheus: Privacy-aware data retrieval on hybrid cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

PPBD: A piracy preventing system for BT DHT networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A performance prediction scheme for computation-intensive applications on cloud.
Proceedings of IEEE International Conference on Communications, 2013

Efficiently secure data privacy on hybrid cloud.
Proceedings of IEEE International Conference on Communications, 2013

Two vulnerabilities in Android OS kernel.
Proceedings of IEEE International Conference on Communications, 2013

Dynamic cache cleaning on Android.
Proceedings of IEEE International Conference on Communications, 2013

Practical and privacy-assured data indexes for outsourced cloud data.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Protecting private cloud located within public cloud.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Performance bound of ad hoc Device-to-Device communications using cognitive radio.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
An efficient anonymous communication protocol for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

Self-protecting networking using dynamic <i>p</i>-cycle construction within link capacity constraint.
Secur. Commun. Networks, 2012

Channel switching control policy for wireless mesh networks.
J. Parallel Distributed Comput., 2012

DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense.
Proceedings of IEEE International Conference on Communications, 2012

A distributed login framework for semi-structured Peer-to-Peer networks.
Proceedings of IEEE International Conference on Communications, 2012

Two matrices for Blakley's secret sharing scheme.
Proceedings of IEEE International Conference on Communications, 2012

Base station location protection in wireless sensor networks: Attacks and defense.
Proceedings of IEEE International Conference on Communications, 2012

Verifying cloud Service Level Agreement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Understanding the topologies of BitTorrent networks: A measurement view.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Efficient communications in Mobile Hybrid Wireless Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An effective auditing scheme for cloud computing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Efficient resource allocation in Hybrid Wireless Networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Biometric-based two-level secure access control for Implantable Medical Devices during emergencies.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Secure Key Management Scheme in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

Lightweight Source Anonymity in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Weaving a proper net to catch large objects in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2010

On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2010

Securing multi-tiered web applications.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Near-Minimum-Energy Routing in Heterogeneous Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Defending Resource Depletion Attacks on Implantable Medical Devices.
Proceedings of the Global Communications Conference, 2010

Defending Malicious Collision Attacks in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks.
IEEE Trans. Wirel. Commun., 2009

Stream-based cipher feedback mode in wireless error channel.
IEEE Trans. Wirel. Commun., 2009

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks.
IEEE Trans. Wirel. Commun., 2009

Efficient rekeying algorithms for WiMAX networks.
Secur. Commun. Networks, 2009

Ad hoc systems backboned by fibres: limitation and solutions.
Int. J. Sens. Networks, 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Comput. Networks, 2009

Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint.
Proceedings of IEEE International Conference on Communications, 2009

An Optimal Sensor Network for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2009

Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Load balance and energy efficient data gathering in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2008

Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks.
Wirel. Commun. Mob. Comput., 2008

Security in wireless sensor networks.
IEEE Wirel. Commun., 2008

Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks.
IEEE Trans. Veh. Technol., 2008

Designing fault tolerant networks to prevent poison message failure.
Secur. Commun. Networks, 2008

A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Weaving a Proper Net to Catch Large Objects.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Security in wireless mobile ad hoc and sensor networks [Guest Editorial].
IEEE Wirel. Commun., 2007

Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.
IEEE Trans. Wirel. Commun., 2007

Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems.
IEEE Trans. Veh. Technol., 2007

Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks.
Mob. Networks Appl., 2007

Self-healing sensor networks with distributed decision making.
Int. J. Sens. Networks, 2007

A survey of key management schemes in wireless sensor networks.
Comput. Commun., 2007

On efficient deployment of sensors on planar grid.
Comput. Commun., 2007

Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet.
IEEE Commun. Mag., 2007

An effective key management scheme for heterogeneous sensor networks.
Ad Hoc Networks, 2007

Simulating MPEG-4 over the IEEE 802.11 WLANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Paging Schemes Performance for Wireless Systems.
Proceedings of the Global Communications Conference, 2007

A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme.
Proceedings of the Global Communications Conference, 2007

2006
Secure cell relay routing protocol for sensor networks.
Wirel. Commun. Mob. Comput., 2006

Multiclass routing and medium access control for heterogeneous mobile ad hoc networks.
IEEE Trans. Veh. Technol., 2006

Adaptive cell relay routing protocol for mobile ad hoc networks.
IEEE Trans. Veh. Technol., 2006

Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method.
J. Netw. Syst. Manag., 2006

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs.
Int. J. Wirel. Mob. Comput., 2006

Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks.
Int. J. Wirel. Mob. Comput., 2006

Distributed Decision Making Algorithm for Self-Healing Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Challenges and Futuristic Perspective of CDMA Technologies: OCC-CDMA/OS for 4G Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2006

Channel Allocation Algorithms for Three-tier Wireless Local Loops.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Efficient Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Secure Routing Protocol for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Architecture, mobility management, and quality of service for integrated 3G and WLAN networks.
Wirel. Commun. Mob. Comput., 2005

Maintaining Differentiated Coverage in Heterogeneous Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2005

Secure cell relay routing protocol for sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Improving sensor network performance by deploying mobile sensors.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Designing efficient routing protocol for heterogeneous sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Efficient energy management protocol for target tracking sensor networks.
Proceedings of the Integrated Network Management, 2005

Efficient multi-class routing protocol for heterogeneous mobile ad hoc networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
QoS routing based on multi-class nodes for mobile ad hoc networks.
Ad Hoc Networks, 2004

Toward efficient distributed network monitoring.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Using k-nearest neighbor method to identify poison message failure.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004

2003
Using Neural Networks to Identify Control and Management Plane Poison Messages.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2001
Implementation and Performance Analysis of SNMP on a TLS/TCP Base.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001


  Loading...