Jingsha He

Orcid: 0000-0002-8122-8052

According to our database1, Jingsha He authored at least 145 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning.
Trans. Emerg. Telecommun. Technol., April, 2024

Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

A privacy-sensitive data identification model in online social networks.
Trans. Emerg. Telecommun. Technol., January, 2024

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning.
Comput. Commun., January, 2024

An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach.
Ad Hoc Networks, January, 2024

An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024

2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks.
Future Internet, March, 2023

A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023

Bitcoin transaction pattern recognition based on semi-supervised learning.
J. Comput. Sci., 2023

An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023

SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs.
J. Intell. Fuzzy Syst., 2023

Differentially Private Denoise Diffusion Probability Models.
IEEE Access, 2023

Priv-S: Privacy-Sensitive Data Identification in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

2022
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs.
Microprocess. Microsystems, September, 2022

Improving Data Utilization of K-anonymity through Clustering Optimization.
Trans. Data Priv., 2022

Social influence-based privacy inference attacks in online social networks.
Secur. Priv., 2022

Ontology-Based Approach for the Measurement of Privacy Disclosure.
Inf. Syst. Frontiers, 2022

Privacy Disclosure in the Real World: An Experimental Study.
Int. J. Inf. Secur. Priv., 2022

Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022

2021
A cost-effective adaptive random testing algorithm for object-oriented software testing.
J. Intell. Fuzzy Syst., 2021

An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls.
J. Intell. Fuzzy Syst., 2021

Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection.
Inf. Process. Manag., 2021

An authorisation certificate-based access control model.
Int. J. Secur. Networks, 2021

A Multi-Model Approach for User Portrait.
Future Internet, 2021

Security enhancement technologies for smart contracts in the blockchain: A survey.
Trans. Emerg. Telecommun. Technol., 2021

A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.
Complex., 2021

A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks.
IEEE Access, 2021

ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks.
IEEE Access, 2021

2020
Using metadata for recommending business process.
J. Supercomput., 2020

An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress".
J. Web Eng., 2020

Distributed management of permission for access control model.
J. Intell. Fuzzy Syst., 2020

A novel approach to secret data concealment with high cover text capacity and security.
Int. J. Electron. Secur. Digit. Forensics, 2020

Special issue on the application of artificial intelligence in advanced manufacturing.
Int. J. Comput. Integr. Manuf., 2020

A Semantic Inference Based Method for Privacy Measurement.
IEEE Access, 2020

Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.
IEEE Internet Things J., 2019

A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks.
Int. J. Netw. Secur., 2019

A cryptographic data hiding algorithm with high cover text capacity.
Int. J. Electron. Secur. Digit. Forensics, 2019

A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs.
Future Internet, 2019

Management of access privileges for dynamic access control.
Clust. Comput., 2019

Survey of access control models and technologies for cloud computing.
Clust. Comput., 2019

Applying Ordered Technique Set for Fault Localization.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Text Classification of Network Pyramid Scheme based on Topic Model.
Proceedings of the NLPIR 2019: The 3rd International Conference on Natural Language Processing and Information Retrieval, Tokushima, Japan, June 28, 2019

Pyramid Text Recognition Based on A New Text Representation Model.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

2018
On the Suitability of Applying WordNet to Privacy Measurement.
Wirel. Pers. Commun., 2018

Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting.
Sensors, 2018

Recovering multiple versions of YAFFS2 files based on Hash and timestamps.
Int. J. Embed. Syst., 2018

An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs.
Future Internet, 2018

MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers.
Future Internet, 2018

Mobile beacon-based adaptive time synchronization for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2018

Identification of the source camera of images based on convolutional neural network.
Digit. Investig., 2018

On the security verification of a short message service protocol.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MFI-5 Based Similarity Measurement of Business Process Models.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
LA-Based Approach for IoT Security.
J. Robotics Netw. Artif. Life, 2017

Multi-objective Optimization for Computer Security and Privacy.
Int. J. Netw. Secur., 2017

An Evolutionary Multi-objective Approach for Modelling Network Security.
Int. J. Netw. Secur., 2017

An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning.
Future Internet, 2017

How Well Can WordNet Measure Privacy: A Comparative Study?
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

2016
Application of game theory for dynamic access control in security systems.
Int. J. High Perform. Comput. Netw., 2016

A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Method for Trust Quantification in Cloud Computing Environments.
Int. J. Distributed Sens. Networks, 2016

Dynamic trust evaluation in open networks.
Intell. Autom. Soft Comput., 2016

Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning.
Future Internet, 2016

On the Recoverability of Data in Android YAFFS2.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Novel Storage and Search Scheme in Cloud Computing.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications.
Proceedings of the Communications and Networking, 2016

2015
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices.
Int. J. Digit. Crime Forensics, 2015

Towards more pro-active access control in computer systems and networks.
Comput. Secur., 2015

Access Control for Privacy Protection for Dynamic and Correlated Databases.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

An evolutionary approach for security metric.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Modelling the relationship between trust and privacy in network environments.
Int. J. Comput. Sci. Eng., 2014

An access authentication protocol for trusted handoff in wireless mesh networks.
Comput. Stand. Interfaces, 2014

2013
Enabling end-to-end secure communication between wireless sensor networks and the Internet.
World Wide Web, 2013

On the Accuracy of Packet Delay Estimation in Distributed Service Networks.
J. Netw. Syst. Manag., 2013

A new trusted roaming protocol in wireless mesh networks.
Int. J. Sens. Networks, 2013

On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things.
Int. J. Distributed Sens. Networks, 2013

Mobile Cloud Computing Research - Issues, Challenges and Needs.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

On the application of digital forensics in different scenarios.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

2012
Experimental Study of the Similarity of Network Nodes based on RTT.
J. Networks, 2012

A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks.
J. Networks, 2012

An Access Control Model based on Multi-factors Trust.
J. Networks, 2012

Trust Based Privacy Protection Method in Pervasive Computing.
J. Networks, 2012

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN.
J. Commun., 2012

Secure Localization in Wireless Sensor Networks with Mobile Beacons.
Int. J. Distributed Sens. Networks, 2012

A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario.
Int. J. Distributed Sens. Networks, 2012

Secure Sensor Localization in Wireless Sensor Networks based on Neural Network.
Int. J. Comput. Intell. Syst., 2012

An Access Control Method based on Scenario Trust.
Int. J. Comput. Intell. Syst., 2012

EMAP: An efficient mutual authentication protocol for passive RFID tags.
Int. J. Autom. Comput., 2012

2011
Secure and Energy-Efficient Routing for Wireless Sensor Networks.
J. Networks, 2011

Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks.
J. Networks, 2011

Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification.
Int. J. Comput. Intell. Syst., 2011

EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Trust Based Secure Localization in Wireless Sensor Networks.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
Access Control Mechanism Based on Trust Quantification.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A collaborative approach for identifying privacy disclosure in Web-based services.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

A trust quantification method based on grey fuzzy theory.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

User-Centric Privacy Preservation in Data-Sharing Applications.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

An approach for tracking privacy disclosure.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Efficient Group Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

A Quantifying Metric for Privacy Protection Based on Information Theory.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Behavioral model for secure group communication in wireless mesh networks.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Towards critical region reliability support for Grid workflows.
J. Parallel Distributed Comput., 2009

A distributed decision-making mechanism for wireless P2P networks.
J. Commun. Networks, 2009

An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor Networks.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A directed signature scheme and its application to group key initial distribution.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Power Peer-Based Reputation Scheme for Mobile P2P Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

A Group-Based Reputation Mechanism for Mobile P2P Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Active Media Technology, 5th International Conference, 2009

A Method for Privacy Protection in Location Based Services.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Group-based intrusion detection system in wireless sensor networks.
Comput. Commun., 2008

An Enhanced Trust Model Based on Reputation for P2P Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

Reputation-based Trust Update in Network Environment.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A New Decision-Making Approach for C2C Electronic Trade.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A Distributed Intrusion Detection Scheme for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Mutual Authentication in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2008

Improving the Efficiency of Network Topology Discovery.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Secure Multiple Deployment in Wireless Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Key Management in Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Key Predistribution in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Composite Key Management Scheme for Mobile Ad Hoc Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Hexagon-Based Key Predistribution Scheme in Sensor Networks.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

A Systematic Regression Testing Method and Tool For Software Components.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Testing Coverage Analysis for Software Component Validation.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Towards a Formal Framework for Distributed Identity Management.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
On Available Bandwidth Measurement Implementation and Experiment.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Available bandwidth measurement, implementation and evaluation.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Active misconfiguration detection in Ethernet networks based on analysis of end-to-end anomalies.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2001
An Algorithm for Available Bandwidth Measurement.
Proceedings of the Networking, 2001

2000
An Architecture for Wide Area Network Load Balancing.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1992
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
Proceedings of the Computer Security, 1992

1990
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990


  Loading...