Daojing He
Orcid: 0000-0002-3820-8128
According to our database1,
Daojing He
authored at least 135 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024
IEEE Internet Things J., February, 2024
IEEE Internet Things J., January, 2024
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization.
Ad Hoc Networks, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Internet Things J., 2024
RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation.
CoRR, 2024
2023
Expert Syst. Appl., December, 2023
IEEE Trans. Wirel. Commun., November, 2023
IEEE Netw., November, 2023
IEEE Internet Things J., July, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
IEEE Internet Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
Traffic Sign Recognition Based on Semantic Scene Understanding and Structural Traffic Sign Location.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Netw., 2022
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Comput., 2022
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning.
Expert Syst. Appl., 2022
CoRR, 2022
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
IEEE Netw., 2021
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021
A mixed data clustering algorithm with noise-filtered distribution centroid and iterative weight adjustment strategy.
Inf. Sci., 2021
IEEE Internet Things J., 2021
Feature selection-based android malware adversarial sample generation and detection method.
IET Inf. Secur., 2021
Comput. Secur., 2021
Comput. Intell. Neurosci., 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Traitement du Signal, 2020
Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020
IEEE Netw., 2020
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020
IEEE Netw., 2020
IEEE Internet Things J., 2020
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks.
IET Networks, 2020
Computation offloading time optimisation via Q-learning in opportunistic edge computing.
IET Commun., 2020
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking.
Sci. China Inf. Sci., 2020
Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory.
IEEE Access, 2020
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
IEEE Wirel. Commun., 2019
IEEE Netw., 2019
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles.
IEEE Netw., 2019
Multim. Tools Appl., 2019
Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019
IEEE Access, 2019
2018
IET Commun., 2018
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
2017
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks.
Wirel. Pers. Commun., 2017
Wirel. Networks, 2017
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
IEEE Wirel. Commun., 2017
IEEE Internet Things J., 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks.
IEEE Trans. Veh. Technol., 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IEEE Wirel. Commun., 2015
IEEE Trans. Wirel. Commun., 2015
IEEE Trans. Parallel Distributed Syst., 2015
An adaptive MAC protocol for real-time and reliable communications in medical cyber-physical systems.
Telecommun. Syst., 2015
Secur. Commun. Networks, 2015
IEEE Netw., 2015
IEEE Commun. Mag., 2015
IEEE Commun. Mag., 2015
IEEE Commun. Mag., 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
IEEE Wirel. Commun., 2014
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014
IEEE J. Biomed. Health Informatics, 2014
An enhanced public key infrastructure to secure smart grid wireless communication networks.
IEEE Netw., 2014
IEEE Intell. Syst., 2014
2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013
IEEE Trans. Parallel Distributed Syst., 2013
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks.
IEEE J. Biomed. Health Informatics, 2013
Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2013
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks.
IEEE Trans. Computers, 2013
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013
Int. J. Commun. Syst., 2013
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects.
IEEE Commun. Mag., 2013
Proceedings of the Radio Frequency Identification System Security, 2013
2012
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Wirel. Commun., 2012
A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012
IEEE Trans. Ind. Electron., 2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks.
IEEE Commun. Lett., 2012
2011
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks.
Wirel. Pers. Commun., 2011
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2011
IEEE Trans. Wirel. Commun., 2011
IEEE Trans. Wirel. Commun., 2011
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks.
J. Zhejiang Univ. Sci. C, 2011
SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks.
Int. J. Distributed Sens. Networks, 2011
Lightweight and provably secure user authentication with anonymity for the global mobility network.
Int. J. Commun. Syst., 2011
Comput. Commun., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Ad Hoc Sens. Wirel. Networks, 2010
A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2009
Wirel. Pers. Commun., 2009
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009