Dajiang Chen

Orcid: 0000-0003-0745-5836

According to our database1, Dajiang Chen authored at least 60 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LsiA3CS: Deep-Reinforcement-Learning-Based Cloud-Edge Collaborative Task Scheduling in Large-Scale IIoT.
IEEE Internet Things J., July, 2024

Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices.
IEEE Internet Things J., May, 2024

Flexible and Fine-Grained Access Control for EHR in Blockchain-Assisted E-Healthcare Systems.
IEEE Internet Things J., March, 2024

Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading.
IEEE Trans. Dependable Secur. Comput., 2024

UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing.
Comput. Commun., 2024

2023
Integration of blockchain and edge computing in internet of things: A survey.
Future Gener. Comput. Syst., July, 2023

FastNet: A Lightweight Convolutional Neural Network for Tumors Fast Identification in Mobile-Computer-Assisted Devices.
IEEE Internet Things J., June, 2023

Reservoir Inflow Forecasting in Hydropower Industry: A Generative Flow-Based Approach.
IEEE Trans. Ind. Informatics, 2023

RLSegNet: An Medical Image Segmentation Network Based on Reinforcement Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

A survey of identity recognition via data fusion and feature learning.
Inf. Fusion, 2023

2022
Adversarial Sample Attack and Defense Method for Encrypted Traffic Data.
IEEE Trans. Intell. Transp. Syst., 2022

ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform.
IEEE Trans. Ind. Informatics, 2022

MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment.
IEEE Trans. Ind. Informatics, 2022

On Message Authentication Channel Capacity Over a Wiretap Channel.
IEEE Trans. Inf. Forensics Secur., 2022

Machine-learning-based cache partition method in cloud environment.
Peer-to-Peer Netw. Appl., 2022

Audio-Based Security Techniques for Secure Device-to-Device Communications.
IEEE Netw., 2022

MallesNet: A multi-object assistance based network for brachial plexus segmentation in ultrasound images.
Medical Image Anal., 2022

Learning-Based Health Prediction Method for Airborne DME Receiver with Signal Processing Techniques in 6G Networks.
J. Circuits Syst. Comput., 2022

Differential Game Approach for Attack-Defense Strategy Analysis in Internet of Things Networks.
IEEE Internet Things J., 2022

Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach.
IEEE Internet Things J., 2022

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022

A practical underwater information sensing system based on intermittent chaos under the background of Lévy noise.
EURASIP J. Wirel. Commun. Netw., 2022

Multi-Dimensional Self Attention based Approach for Remaining Useful Life Estimation.
CoRR, 2022

2021
A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication.
Wirel. Commun. Mob. Comput., 2021

Variational Graph Neural Networks for Road Traffic Prediction in Intelligent Transportation Systems.
IEEE Trans. Ind. Informatics, 2021

A location privacy protection scheme for convoy driving in autonomous driving era.
Peer-to-Peer Netw. Appl., 2021

A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT.
IEEE Internet Things J., 2021

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things.
IEEE Internet Things J., 2021

ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation.
Neurocomputing, 2021

Underwater Information Sensing Method Based on Improved Dual-Coupled Duffing Oscillator Under Lévy Noise Description.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Physical Layer based Message Authentication with Secure Channel Codes.
IEEE Trans. Dependable Secur. Comput., 2020

ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks.
CCF Trans. Netw., 2020

2019
Physical Layer Security for Internet of Things.
Wirel. Commun. Mob. Comput., 2019

RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network.
IEEE Internet Things J., 2019

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach.
IEEE Access, 2019

Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors.
IEEE Access, 2019

Lightweight Deep Learning Model For Facial Expression Recognition.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Emerging Technologies for Vehicular Communication Networks.
Wirel. Commun. Mob. Comput., 2018

Synergy of Big Data and 5G Wireless Networks: Opportunities, Approaches, and Challenges.
IEEE Wirel. Commun., 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018

2017
On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation.
IEEE Trans. Wirel. Commun., 2017

Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions.
IEEE Netw., 2017

Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things.
Mob. Inf. Syst., 2017

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol.
IEEE Internet Things J., 2017

Multi-message Authentication over Noisy Channel with Secure Channel Codes.
CoRR, 2017

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context.
IEEE Access, 2017

PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing.
IEEE Access, 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Physical layer security: A WFRFT-basec cooperation approach.
Proceedings of the IEEE International Conference on Communications, 2017

MESA: An Efficient Matching Scheme in Content-Based Publish/Subscribe System with Simplified Bayesian Approach.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
DCIL: Devices Collaboration Indoor Localization with Soft AP.
Ad Hoc Sens. Wirel. Networks, 2016

2015
Message Authentication Code over a wiretap channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Wireless Device Authentication Using Acoustic Hardware Fingerprints.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
GRIB: Gesture Recognition Interaction with Mobile Devices for Blind People.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference.
IEEE Trans. Inf. Forensics Secur., 2013

Rate Efficient Authentication over a Wiretap Channel.
CoRR, 2013

SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013


  Loading...