Shen He

According to our database1, Shen He authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EG-Net: Appearance-based eye gaze estimation using an efficient gaze network with attention mechanism.
Expert Syst. Appl., March, 2024

2023
A Hierarchical Authentication System for Access Equipment in Internet of Things.
Int. J. Intell. Syst., 2023

Using simulation to design an MPC policy for field navigation using GPS sensing.
CoRR, 2023

A Secure Two-Party Euclidean Distance Computation Scheme Through a Covert Adversarial Model Based on Paillier Encryption.
IEEE Access, 2023

A Rankable Boolean Searchable Encryption Scheme Supporting Dynamic Updates in a Cloud Environment.
IEEE Access, 2023

Requirements and Potential Key Technologies of Security for 6G Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2023

Learning-Based Congestion Control Assisted by Recurrent Neural Networks for Real-Time Communication.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

OSMO: Enhanced Offloading for Data Stream Perception with Smoothness and Orderliness.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

MCoT: Multi-Modal Vehicle-to-Vehicle Cooperative Perception with Transformers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

EMAR: Edge-Assisted Multi-User Mobile Augmented Reality.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Multi-Modal Deep Reinforcement Learning for Edge-Assisted Video Analytics.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A remote attestation mechanism using group signature for the perception layer in centralized networking.
EURASIP J. Wirel. Commun. Netw., 2022

A Highly Scalable Blockchain-Enabled DNS Architecture.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
A data corruption detection scheme based on ciphertexts in cloud environment.
KSII Trans. Internet Inf. Syst., 2021

An Effective Cost-Sensitive XGBoost Method for Malicious URLs Detection in Imbalanced Dataset.
IEEE Access, 2021

Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Dual Blockchain Framework to Enhance Data Trustworthiness in Digital Twin Network.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021

2020
Build with intrinsic security: Trusted autonomy security system.
Int. J. Distributed Sens. Networks, 2020

Blockchain based PKI and Certificates Management in Mobile Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

BloTISRT: Blockchain-based Threat Intelligence Sharing and Rating Technology.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2018
New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications.
Proceedings of the Science of Cyber Security - First International Conference, 2018


  Loading...