Nafei Zhu

Orcid: 0000-0003-4036-0724

According to our database1, Nafei Zhu authored at least 47 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning.
Trans. Emerg. Telecommun. Technol., April, 2024

Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

A privacy-sensitive data identification model in online social networks.
Trans. Emerg. Telecommun. Technol., January, 2024

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning.
Comput. Commun., January, 2024

An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach.
Ad Hoc Networks, January, 2024

An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024

2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks.
Future Internet, March, 2023

A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Comput. Commun., February, 2023

Bitcoin transaction pattern recognition based on semi-supervised learning.
J. Comput. Sci., 2023

An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023

SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs.
J. Intell. Fuzzy Syst., 2023

Differentially Private Denoise Diffusion Probability Models.
IEEE Access, 2023

Priv-S: Privacy-Sensitive Data Identification in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

2022
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs.
Microprocess. Microsystems, September, 2022

Improving Data Utilization of K-anonymity through Clustering Optimization.
Trans. Data Priv., 2022

Social influence-based privacy inference attacks in online social networks.
Secur. Priv., 2022

Ontology-Based Approach for the Measurement of Privacy Disclosure.
Inf. Syst. Frontiers, 2022

Privacy Disclosure in the Real World: An Experimental Study.
Int. J. Inf. Secur. Priv., 2022

Toward pragmatic modeling of privacy information propagation in online social networks.
Comput. Networks, 2022

2021
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls.
J. Intell. Fuzzy Syst., 2021

Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection.
Inf. Process. Manag., 2021

An authorisation certificate-based access control model.
Int. J. Secur. Networks, 2021

A Multi-Model Approach for User Portrait.
Future Internet, 2021

Security enhancement technologies for smart contracts in the blockchain: A survey.
Trans. Emerg. Telecommun. Technol., 2021

A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks.
IEEE Access, 2021

ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks.
IEEE Access, 2021

2020
An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress".
J. Web Eng., 2020

A Semantic Inference Based Method for Privacy Measurement.
IEEE Access, 2020

Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks.
Int. J. Netw. Secur., 2019

A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs.
Future Internet, 2019

Management of access privileges for dynamic access control.
Clust. Comput., 2019

Survey of access control models and technologies for cloud computing.
Clust. Comput., 2019

Text Classification of Network Pyramid Scheme based on Topic Model.
Proceedings of the NLPIR 2019: The 3rd International Conference on Natural Language Processing and Information Retrieval, Tokushima, Japan, June 28, 2019

Pyramid Text Recognition Based on A New Text Representation Model.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

2018
On the Suitability of Applying WordNet to Privacy Measurement.
Wirel. Pers. Commun., 2018

An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs.
Future Internet, 2018

MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers.
Future Internet, 2018

Mobile beacon-based adaptive time synchronization for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2018

Identification of the source camera of images based on convolutional neural network.
Digit. Investig., 2018

A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
How Well Can WordNet Measure Privacy: A Comparative Study?
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

2015
Access Control for Privacy Protection for Dynamic and Correlated Databases.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

2013
On the Accuracy of Packet Delay Estimation in Distributed Service Networks.
J. Netw. Syst. Manag., 2013

2012
Experimental Study of the Similarity of Network Nodes based on RTT.
J. Networks, 2012

Overview of Monitor Selection in Computer Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012


  Loading...