Letian Sha

Orcid: 0009-0007-5547-3728

According to our database1, Letian Sha authored at least 14 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Boreas: Semantic-Aware Framework for Buffer Overflow Detection to Reduce Carbon Footprint in IoT Devices.
IEEE Internet Things J., September, 2025

RSAKA-VDT: Designing Reliable and Provably Secure Authenticated Key Agreement Scheme for Vehicular Digital Twin Networks.
IEEE Trans. Veh. Technol., August, 2025

AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery.
J. Comput. Sci. Technol., May, 2025

VRVul-Discovery: BiLSTM-based Vulnerability Discovery for Virtual Reality Devices in Metaverse.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025

SFO-CID: Structural Feature Optimization Based Command Injection Vulnerability Discovery for Internet of Things.
IEEE Trans. Ind. Informatics, February, 2025

READ: Resource efficient authentication scheme for digital twin edge networks.
Future Gener. Comput. Syst., 2025

2023
AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT.
IEEE Syst. J., September, 2023

2022
Cross-scene passive human activity recognition using commodity WiFi.
Frontiers Comput. Sci., 2022

2020
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things.
IEEE Trans. Emerg. Top. Comput., 2020

Deep Spatial-Temporal Model Based Cross-Scene Action Recognition Using Commodity WiFi.
IEEE Internet Things J., 2020

A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT.
IEEE Internet Things J., 2020

2019
Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embed. Comput. Syst., 2019

2018
IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT.
World Wide Web, 2018

2016
SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network.
Secur. Commun. Networks, 2016


  Loading...