An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

Rong Fan , Dao-jing He , Xue-zeng Pan , Ling-di Ping
Journal of Zhejiang University Science C 12 ( 7) 550 -560

40
2011
Delay‐aware and cost‐efficient probabilistic transmission for opportunistic networks

Jun Li , Xing-Yu He , Dan Zhao , Gui-Song Yang
iet networks 9 ( 6) 372 -377

2020
GAIT RECOGNITION PROGRESS IN RECOGNIZING IMAGE CHARACTERISTICS

ASADULLAH KHAN , Farooq Ahmad , YASER DAANIAL KHAN , DAOJING HE
VAWKUM Transactions on Computer Sciences 9 ( 1) 1 -10

2016
Intrusion detection methods based on integrated deep learning model

Zhendong Wang , Yaodi Liu , Daojing He , Sammy Chan
Computers & Security 103 102177

31
2021
A Survey of Side Channel Attacks on MPKCs potential for RFID.

Daojing He , Weijian Li , Shaohua Tang
RFIDSec Asia 123 -131

2013
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks

Sammy Chan , Daojing He , Jiajun Bu , Yi Gao
Ad Hoc & Sensor Wireless Networks 10 361 -371

307
2010
Computation offloading time optimisation via Q‐learning in opportunistic edge computing

Sammy Chan , Daojing He , Xingyu He , Hao Cheng
Iet Communications 14 ( 21) 3898 -3906

2020
Fraudulent News Headline Detection with Attention Mechanism.

Sammy Chan , Daojing He , Hankun Liu
Computational Intelligence and Neuroscience 2021 6679661 -6679661

4
2021
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering

Xiejun Ni , Daojing He , Sammy Chan , Farooq Ahmad
applied cryptography and network security 212 -227

8
2016
A strong user authentication scheme with smart cards for wireless communications

Daojing He , Maode Ma , Yan Zhang , Chun Chen
Computer Communications 34 ( 3) 367 -374

169
2011
An adaptive MAC protocol for real-time and reliable communications in medical cyber-physical systems

Feng Xia , Linqiang Wang , Daqiang Zhang , Daojing He
Telecommunication Systems 58 ( 2) 125 -138

17
2015
Analyses of several recently proposed group key management schemes

Niu Liu , Shaohua Tang , Lingling Xu , Daojing He
Security and Communication Networks 8 ( 2) 136 -148

1
2015
Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation

Daojing He , Sammy Chan , Xiejun Ni , Mohsen Guizani
IEEE Internet of Things Journal 4 ( 6) 1890 -1898

60
2017
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He , Chun Chen , Sammy Chan , Jiajun Bu
international conference of the ieee engineering in medicine and biology society 16 ( 4) 623 -632

226
2012
Distributed Access Control with Privacy Support in Wireless Sensor Networks

Daojing He , Jiajun Bu , Sencun Zhu , Sammy Chan
IEEE Transactions on Wireless Communications 10 ( 10) 3472 -3481

74
2011
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks

Daojing He , Chun Chen , Sammy Chan , Jiajun Bu
IEEE Transactions on Wireless Communications 11 ( 5) 1946 -1956

34
2012
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks

Daojing He , Sammy Chan , Shaohua Tang , Mohsen Guizani
IEEE Transactions on Wireless Communications 12 ( 9) 4638 -4646

33
2013
Privacy-friendly and efficient secure communication framework for V2G networks

Daojing He , Sammy Chan , Mohsen Guizani
IET Communications 12 ( 3) 304 -309

8
2018
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems

Xiaoxia Liu , Daojing He , Yun Gao , Sencun Zhu
symposium on reliable distributed systems 205 -214

2020
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets

Hao Chen , Daojing He , Sencun Zhu , Jingshun Yang
computer and communications security 58 -70

36
2017