Year |
Citation |
Score |
2021 |
Huang K, Zhang X, Mu Y, Rezaeibagha F, Du X. Scalable and redactable blockchain with update and anonymity Information Sciences. 546: 25-41. DOI: 10.1016/J.Ins.2020.07.016 |
0.442 |
|
2020 |
Wei X, Guo H, Wang X, Wang X, Wang C, Guizani M, Du X. A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs. Sensors (Basel, Switzerland). 20. PMID 33171680 DOI: 10.3390/s20216370 |
0.339 |
|
2020 |
Wang Q, Fang J, Gong B, Du X, Guizani M. An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks. Sensors (Basel, Switzerland). 20. PMID 33158266 DOI: 10.3390/s20216287 |
0.3 |
|
2020 |
Yin C, Dong P, Du X, Zheng T, Zhang H, Guizani M. An Adaptive Network Coding Scheme for Multipath Transmission in Cellular-Based Vehicular Networks. Sensors (Basel, Switzerland). 20. PMID 33086691 DOI: 10.3390/s20205902 |
0.305 |
|
2020 |
Zhao D, Qin H, Song B, Han B, Du X, Guizani M. A Graph Convolutional Network-Based Deep Reinforcement Learning Approach for Resource Allocation in a Cognitive Radio Network. Sensors (Basel, Switzerland). 20. PMID 32933114 DOI: 10.3390/S20185216 |
0.42 |
|
2020 |
Gu Z, Cao Z, Tian Z, Wang Y, Du X, Mohsen G. A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks. Sensors (Basel, Switzerland). 20. PMID 31991639 DOI: 10.3390/S20030657 |
0.401 |
|
2020 |
Ren Y, Gu Z, Wang Z, Tian Z, Liu C, Lu H, Du X, Guizani M. System Log Detection Model Based on Conformal Prediction Electronics. 9: 232. DOI: 10.3390/Electronics9020232 |
0.325 |
|
2020 |
Zhang Y, Shao S, Ji M, Qiu J, Tian Z, Du X, Guizani M. An Automated Refactoring Approach to Improve IoT Software Quality Applied Sciences. 10: 413. DOI: 10.3390/App10010413 |
0.322 |
|
2020 |
Song X, Jiang W, Liu X, Lu H, Tian Z, Du X. A Survey of Game Theory as Applied to Social Networks Tsinghua Science & Technology. 25: 734-742. DOI: 10.26599/Tst.2020.9010005 |
0.337 |
|
2020 |
Huang K, Zhang X, Wang X, Mu Y, Rezaeibagha F, Xu G, Wang H, Zheng X, Yang G, Xia Q, Du X. HUCDO: A Hybrid User-Centric Data Outsourcing scheme Acm Transactions On Cyber-Physical Systems. 4: 35. DOI: 10.1145/3379464 |
0.443 |
|
2020 |
Li B, Guo X, Zhang R, Du X, Guizani M. Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network Ieee Transactions On Vehicular Technology. 69: 8925-8937. DOI: 10.1109/Tvt.2020.2997782 |
0.406 |
|
2020 |
Song L, Sun G, Yu H, Du X, Guizani M. FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles Ieee Transactions On Vehicular Technology. 69: 5403-5415. DOI: 10.1109/Tvt.2020.2977829 |
0.43 |
|
2020 |
Dai S, Wang ML, Gao Z, Huang L, Du X, Guizani M. An Adaptive Computation Offloading Mechanism for Mobile Health Applications Ieee Transactions On Vehicular Technology. 69: 998-1007. DOI: 10.1109/Tvt.2019.2954887 |
0.398 |
|
2020 |
Zhang C, Zhu L, Xu C, Sharif K, Ding K, Liu X, Du X, Guizani M. TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2961992 |
0.394 |
|
2020 |
Dai Y, Wu J, Du X. Hierarchical and Hybrid: Mobility-Compatible Database-Assisted Framework for Dynamic Spectrum Access Ieee Transactions On Network Science and Engineering. 7: 216-226. DOI: 10.1109/Tnse.2018.2832021 |
0.409 |
|
2020 |
Wang Y, Tian Z, Sun Y, Du X, Guizani N. LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV Ieee Transactions On Intelligent Transportation Systems. 1-10. DOI: 10.1109/Tits.2020.2970610 |
0.356 |
|
2020 |
Sun G, Zhang Y, Yu H, Du X, Guizani M. Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks Ieee Transactions On Intelligent Transportation Systems. 21: 2409-2426. DOI: 10.1109/Tits.2019.2918255 |
0.384 |
|
2020 |
Yu Y, Zhao Y, Li Y, Du X, Wang L, Guizani M. Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications Ieee Transactions On Industrial Informatics. 16: 3290-3300. DOI: 10.1109/Tii.2019.2944678 |
0.379 |
|
2020 |
Tian Z, Luo C, Qiu J, Du X, Guizani M. A Distributed Deep Learning System for Web Attack Detection on Edge Devices Ieee Transactions On Industrial Informatics. 16: 1963-1971. DOI: 10.1109/Tii.2019.2938778 |
0.42 |
|
2020 |
Zhao D, Qin H, Song B, Zhang Y, Du X, Guizani M. A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G Ieee Transactions On Cognitive Communications and Networking. 6: 452-463. DOI: 10.1109/Tccn.2020.2983170 |
0.406 |
|
2020 |
Wang D, Zhang W, Song B, Du X, Guizani M. Market-Based Model in CR-IoT: A Q-Probabilistic Multi-Agent Reinforcement Learning Approach Ieee Transactions On Cognitive Communications and Networking. 6: 179-188. DOI: 10.1109/Tccn.2019.2950242 |
0.326 |
|
2020 |
Lin X, Guizani M, Du X, Chu C, Yu Y. Advances of Security and Privacy Techniques in Emerging Wireless Networks Ieee Wireless Communications. 27: 8-9. DOI: 10.1109/Mwc.2020.9116080 |
0.4 |
|
2020 |
Zhai Y, Bao T, Zhu L, Shen M, Du X, Guizani M. Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling Ieee Wireless Communications. 27: 84-91. DOI: 10.1109/Mwc.001.1900298 |
0.422 |
|
2020 |
Qiu J, Du L, Chen Y, Tian Z, Du X, Guizani M. Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task Ieee Vehicular Technology Magazine. 15: 95-100. DOI: 10.1109/Mvt.2020.3002487 |
0.368 |
|
2020 |
Du X, Shen M, Chang Z, Cao Z. Recent Advances in Security and Privacy for Future Intelligent Networks Ieee Network. 34: 4-5. DOI: 10.1109/Mnet.2020.9055729 |
0.409 |
|
2020 |
Shen M, Liu Y, Zhu L, Xu K, Du X, Guizani N. Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach Ieee Network. 34: 20-27. DOI: 10.1109/Mnet.011.1900366 |
0.363 |
|
2020 |
Wang Y, Tian Z, Sun Y, Du X, Guizani N. Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation Ieee Network. 34: 284-290. DOI: 10.1109/Mnet.001.1900534 |
0.38 |
|
2020 |
Guo J, Luo W, Song B, Yu FR, Du X. Intelligence-Sharing Vehicular Networks with Mobile Edge Computing and Spatiotemporal Knowledge Transfer Ieee Network. 34: 256-262. DOI: 10.1109/Mnet.001.1900512 |
0.379 |
|
2020 |
Xu L, Xu K, Li T, Zheng K, Shen M, Du X, Du X. ABQ: Active Buffer Queueing in Datacenters Ieee Network. 34: 232-237. DOI: 10.1109/Mnet.001.1900266 |
0.353 |
|
2020 |
Chen S, Song B, Du X, Guizani N. Structured Bayesian Compression for Deep Models in Mobile-Enabled Devices for Connected Healthcare Ieee Network. 34: 142-149. DOI: 10.1109/Mnet.001.1900204 |
0.391 |
|
2020 |
Lu D, Han R, Shen Y, Dong X, Ma J, Du X, Guizani M. xTSeH : A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices Ieee Journal On Selected Areas in Communications. 1-1. DOI: 10.1109/Jsac.2020.3020658 |
0.338 |
|
2020 |
Li Y, Yu Y, Chen R, Du X, Guizani M. IntegrityChain: Provable Data Possession for Decentralized Storage Ieee Journal On Selected Areas in Communications. 38: 1205-1217. DOI: 10.1109/Jsac.2020.2986664 |
0.428 |
|
2020 |
Yu Y, Shi J, Li H, Li Y, Du X, Guizani M. Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments Ieee Journal On Selected Areas in Communications. 38: 1242-1251. DOI: 10.1109/Jsac.2020.2986620 |
0.45 |
|
2020 |
Shen M, Duan J, Zhu L, Zhang J, Du X, Guizani M. Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds Ieee Journal On Selected Areas in Communications. 38: 1229-1241. DOI: 10.1109/Jsac.2020.2986619 |
0.389 |
|
2020 |
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT Ieee Journal On Selected Areas in Communications. 38: 942-954. DOI: 10.1109/Jsac.2020.2980916 |
0.359 |
|
2020 |
Sun G, Song L, Yu H, Du X, Guizani M. A Two-tier Collection and Processing Scheme for Fog-based Mobile Crowd Sensing in the Internet of Vehicles Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3015967 |
0.391 |
|
2020 |
Su Y, LiWang M, Gao Z, Huang L, Du X, Guizani M. Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3008178 |
0.31 |
|
2020 |
Shafiq M, Tian Z, Bashir AK, Du X, Guizani M. CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3002255 |
0.331 |
|
2020 |
Shen M, Xu K, Du X, Reed MJ, Bhuiyan ZA, Zhang L, Mijumbi R. Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities Ieee Internet of Things Journal. 7: 3897-3900. DOI: 10.1109/Jiot.2020.2982522 |
0.367 |
|
2020 |
Gu J, Liu C, Zhuang Y, Du X, Zhuang F, Ying H, Zhao Y, Guizani M. Dynamic Measurement and Data Calibration for Aerial Mobile IoT Ieee Internet of Things Journal. 7: 5210-5219. DOI: 10.1109/Jiot.2020.2977910 |
0.331 |
|
2020 |
Gao J, Agyekum KOO, Sifah EB, Acheampong KN, Xia Q, Du X, Guizani M, Xia H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks Ieee Internet of Things Journal. 7: 4278-4291. DOI: 10.1109/Jiot.2019.2956241 |
0.433 |
|
2020 |
Guo J, Song B, Chen S, Yu FR, Du X, Guizani M. Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation Ieee Internet of Things Journal. 7: 5783-5791. DOI: 10.1109/Jiot.2019.2949633 |
0.402 |
|
2020 |
Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Ieee Communications Surveys and Tutorials. 22: 1646-1685. DOI: 10.1109/Comst.2020.2988293 |
0.393 |
|
2020 |
Xuan S, Tang D, Chung I, Cho Y, Du X, Yang W. Network Traffic Sampling System Based on Storage Compression for Application Classification Detection Ieee Access. 8: 63106-63120. DOI: 10.1109/Access.2020.2984258 |
0.391 |
|
2020 |
Biswas R, Wu J, Du X, Yang Y. Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks Cyber-Physical Systems. 1-20. DOI: 10.1080/23335777.2020.1811387 |
0.344 |
|
2020 |
Khan S, Zhu L, Yu X, Zhang Z, Rahim MA, Khan M, Du X, Guizani M. Accountable credential management system for vehicular communication Vehicular Communications. 25: 100279. DOI: 10.1016/J.Vehcom.2020.100279 |
0.416 |
|
2020 |
Smahi A, Xia Q, Xia H, Sulemana N, Fateh AA, Gao J, Du X, Guizani M. A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data Pervasive and Mobile Computing. 66: 101195. DOI: 10.1016/J.Pmcj.2020.101195 |
0.442 |
|
2020 |
Niu W, Zhang X, Du X, Zhao L, Cao R, Guizani M. A deep learning based static taint analysis approach for IoT software vulnerability location Measurement. 152: 107139. DOI: 10.1016/J.Measurement.2019.107139 |
0.335 |
|
2020 |
Chi K, Du X, Yin G, Wu J, Guizani M, Han Q, Yang Y. Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking Future Generation Computer Systems. 112: 297-306. DOI: 10.1016/J.Future.2020.05.026 |
0.386 |
|
2020 |
Xu C, Zhang L, Zhu L, Zhang C, Du X, Guizani M, Sharif K. Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN Future Generation Computer Systems. 111: 107-116. DOI: 10.1016/J.Future.2020.04.021 |
0.462 |
|
2020 |
Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city Future Generation Computer Systems. 107: 433-442. DOI: 10.1016/J.Future.2020.02.017 |
0.34 |
|
2020 |
Zhu L, Lwamo NMR, Sharif K, Xu C, Du X, Guizani M, Li F. T-CAM: Time-based content access control mechanism for ICN subscription systems Future Generation Computer Systems. 106: 607-621. DOI: 10.1016/J.Future.2020.01.039 |
0.466 |
|
2020 |
Guan Z, Lu X, Wang N, Wu J, Du X, Guizani M. Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach Future Generation Computer Systems. 110: 686-695. DOI: 10.1016/J.Future.2019.09.027 |
0.349 |
|
2020 |
Guan Z, Sun X, Shi L, Wu L, Du X. A differentially private greedy decision forest classification algorithm with high utility Computers & Security. 96: 101930. DOI: 10.1016/J.Cose.2020.101930 |
0.307 |
|
2020 |
Shafiq M, Tian Z, Bashir AK, Du X, Guizani M. IoT malicious traffic identification using wrapper-based feature selection mechanisms Computers & Security. 94: 101863. DOI: 10.1016/J.Cose.2020.101863 |
0.343 |
|
2020 |
Xuan S, Zheng L, Chung I, Wang W, Man D, Du X, Yang W, Guizani M. An incentive mechanism for data sharing based on blockchain with smart contracts Computers & Electrical Engineering. 83: 106587. DOI: 10.1016/J.Compeleceng.2020.106587 |
0.371 |
|
2020 |
Chen Y, Qiu J, Du X, Yin L, Tian Z. Security of Mobile Multimedia Data:The Adversarial Examples for Spatio-temporal Data Computer Networks. 181: 107432. DOI: 10.1016/J.Comnet.2020.107432 |
0.399 |
|
2020 |
Cheng Z, Chen N, Liu B, Gao Z, Huang L, Du X, Guizani M. Joint user association and resource allocation in HetNets based on user mobility prediction Computer Networks. 177: 107312. DOI: 10.1016/J.Comnet.2020.107312 |
0.381 |
|
2020 |
Man D, Lu Q, Wang Y, Wu Y, Du X, Guizani M. An adaptive cache management approach in ICN with pre-filter queues Computer Communications. 153: 250-263. DOI: 10.1016/J.Comcom.2020.01.062 |
0.389 |
|
2020 |
Chen Y, Song B, Du X, Guizani N. The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry Computer Communications. 152: 200-205. DOI: 10.1016/J.Comcom.2020.01.040 |
0.35 |
|
2020 |
Zheng B, Zhu L, Shen M, Du X, Guizani M. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering Science in China Series F: Information Sciences. 63: 132101. DOI: 10.1007/S11432-019-9900-9 |
0.399 |
|
2020 |
Xu C, Xie X, Zhu L, Sharif K, Zhang C, Du X, Guizani M. PPLS: a privacy-preserving location-sharing scheme in mobile online social networks Science China Information Sciences. 63. DOI: 10.1007/S11432-019-1508-6 |
0.43 |
|
2020 |
Rathore H, Fu C, Mohamed A, Al-Ali AK, Du X, Guizani M, Yu Z. Multi-layer security scheme for implantable medical devices Neural Computing and Applications. 32: 4347-4360. DOI: 10.1007/S00521-018-3819-0 |
0.41 |
|
2019 |
He Y, Zhai D, Zhang R, Du X, Guizani M. An Anti-Interference Scheme for UAV Data Links in Air-Ground Integrated Vehicular Networks. Sensors (Basel, Switzerland). 19. PMID 31683703 DOI: 10.3390/S19214742 |
0.436 |
|
2019 |
Zhang C, Zhu L, Xu C, Du X, Guizani M. A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing. Sensors (Basel, Switzerland). 19. PMID 30871229 DOI: 10.3390/S19061274 |
0.364 |
|
2019 |
Obour Agyekum KO, Xia Q, Sifah EB, Gao J, Xia H, Du X, Guizani M. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors (Basel, Switzerland). 19. PMID 30862110 DOI: 10.3390/S19051235 |
0.451 |
|
2019 |
Gu J, Huang R, Jiang L, Qiao G, Du X, Guizani M. A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices. Sensors (Basel, Switzerland). 19. PMID 30857140 DOI: 10.3390/S19051184 |
0.427 |
|
2019 |
Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M. Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors (Basel, Switzerland). 19. PMID 30823597 DOI: 10.3390/S19040974 |
0.332 |
|
2019 |
Kang X, Song B, Guo J, Du X, Guizani M. A Self-Selective Correlation Ship Tracking Method for Smart Ocean Systems. Sensors (Basel, Switzerland). 19. PMID 30781563 DOI: 10.3390/S19040821 |
0.313 |
|
2019 |
Gu J, Dong Z, Zhang C, Du X, Guizani M. Dynamic Stress Measurement with Sensor Data Compensation Electronics. 8: 859. DOI: 10.3390/Electronics8080859 |
0.379 |
|
2019 |
Sun J, Huang G, Sangaiah AK, Zhu G, Du X. Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective Security and Communication Networks. 2019: 1-15. DOI: 10.1155/2019/4074272 |
0.429 |
|
2019 |
Wang Q, Du X, Gao Z, Guizani M. An Optimal Channel Occupation Time Adjustment Method for LBE in Unlicensed Spectrum Ieee Transactions On Vehicular Technology. 68: 10943-10955. DOI: 10.1109/Tvt.2019.2940123 |
0.396 |
|
2019 |
Su Y, Lu X, Huang L, Du X, Guizani M. A Novel DCT-Based Compression Scheme for 5G Vehicular Networks Ieee Transactions On Vehicular Technology. 68: 10872-10881. DOI: 10.1109/Tvt.2019.2939619 |
0.457 |
|
2019 |
Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M. Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory Ieee Transactions On Vehicular Technology. 68: 5971-5980. DOI: 10.1109/Tvt.2019.2910217 |
0.361 |
|
2019 |
Niu W, Zhuo Z, Zhang X, Du X, Yang G, Guizani M. A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification Ieee Transactions On Vehicular Technology. 68: 3843-3853. DOI: 10.1109/Tvt.2019.2894290 |
0.407 |
|
2019 |
Sun G, Song L, Yu H, Chang V, Du X, Guizani M. V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model Ieee Transactions On Vehicular Technology. 68: 908-922. DOI: 10.1109/Tvt.2018.2884525 |
0.367 |
|
2019 |
Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Sun Y, Guizani N. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment Ieee Transactions On Industrial Informatics. 15: 4285-4294. DOI: 10.1109/Tii.2019.2907754 |
0.439 |
|
2019 |
Zeng Q, Luo L, Qian Z, Du X, Li Z, Huang C, Farkas C. Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957787 |
0.316 |
|
2019 |
Chen S, Song B, Fan L, Du X, Guizani M. Multi-Modal Data Semantic Localization With Relationship Dependencies for Efficient Signal Processing in EH CRNs Ieee Transactions On Cognitive Communications and Networking. 5: 347-357. DOI: 10.1109/Tccn.2019.2893360 |
0.356 |
|
2019 |
Niu W, Zhang X, Du X, Hu T, Xie X, Guizani N. Detecting Malware on X86-Based IoT Devices in Autonomous Driving Ieee Wireless Communications. 26: 80-87. DOI: 10.1109/Mwc.2019.1800505 |
0.331 |
|
2019 |
LiWang M, Dai S, Gao Z, Du X, Guizani M, Dai H. A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture Ieee Wireless Communications. 26: 124-132. DOI: 10.1109/Mwc.2019.1800364 |
0.418 |
|
2019 |
Wang D, Song B, Chen D, Du X. Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks Ieee Wireless Communications. 26: 54-61. DOI: 10.1109/Mwc.2019.1800353 |
0.399 |
|
2019 |
Lin Z, Du X, Chen H, Ai B, Chen Z, Wu D. Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks Ieee Wireless Communications. 26: 72-77. DOI: 10.1109/Mwc.2019.1800035 |
0.355 |
|
2019 |
Zhu L, Zhang C, Xu C, Du X, Guizani N, Sharif K. Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis Ieee Wireless Communications. 26: 18-23. DOI: 10.1109/Mwc.001.1900123 |
0.396 |
|
2019 |
Yu Y, Li H, Chen R, Zhao Y, Yang H, Du X. Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning Ieee Network. 33: 82-87. DOI: 10.1109/Mnet.2019.1800362 |
0.471 |
|
2019 |
Li Y, Susilo W, Yang G, Yu Y, Du X, Liu D, Guizani N. Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies Ieee Network. 33: 111-117. DOI: 10.1109/Mnet.2019.1800271 |
0.366 |
|
2019 |
Zhu L, Li M, Zhang Z, Xu C, Zhang R, Du X, Guizani N. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid Ieee Communications Magazine. 57: 80-85. DOI: 10.1109/Mcom.2019.1700859 |
0.448 |
|
2019 |
Sun G, Zhu G, Liao D, Yu H, Du X, Guizani M. Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks Ieee Systems Journal. 13: 3877-3888. DOI: 10.1109/Jsyst.2018.2879883 |
0.409 |
|
2019 |
Su Y, Lu X, Zhao Y, Huang L, Du X. Cooperative Communications With Relay Selection Based on Deep Reinforcement Learning in Wireless Sensor Networks Ieee Sensors Journal. 19: 9561-9569. DOI: 10.1109/Jsen.2019.2925719 |
0.431 |
|
2019 |
Xia Q, Sifah EB, Agyekum KOO, Xia H, Acheampong KN, Smahi A, Gao J, Du X, Guizani M. Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments Ieee Internet of Things Journal. 6: 10749-10762. DOI: 10.1109/Jiot.2019.2941638 |
0.427 |
|
2019 |
Yao X, Liao W, Du X, Cheng X, Guizani M. Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks Ieee Internet of Things Journal. 6: 10396-10407. DOI: 10.1109/Jiot.2019.2939144 |
0.434 |
|
2019 |
Sun G, Zhang F, Liao D, Yu H, Du X, Guizani M. Optimal Energy Trading for Plug-In Hybrid Electric Vehicles Based on Fog Computing Ieee Internet of Things Journal. 6: 2309-2324. DOI: 10.1109/Jiot.2019.2906186 |
0.334 |
|
2019 |
Shen M, Tang X, Zhu L, Du X, Guizani M. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities Ieee Internet of Things Journal. 6: 7702-7712. DOI: 10.1109/Jiot.2019.2901840 |
0.41 |
|
2019 |
Sun G, Wang K, Yu H, Du X, Guizani M. Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design Ieee Internet of Things Journal. 6: 5363-5375. DOI: 10.1109/Jiot.2019.2900661 |
0.413 |
|
2019 |
Wang F, Xu Y, Zhu L, Du X, Guizani M. LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT Ieee Internet of Things Journal. 6: 4462-4471. DOI: 10.1109/Jiot.2018.2888636 |
0.408 |
|
2019 |
Yu Y, Ding Y, Zhao Y, Li Y, Zhao Y, Du X, Guizani M. LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT Ieee Internet of Things Journal. 6: 4702-4710. DOI: 10.1109/Jiot.2018.2878406 |
0.389 |
|
2019 |
Shen M, Ma B, Zhu L, Du X, Xu K. Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Ieee Internet of Things Journal. 6: 1998-2008. DOI: 10.1109/Jiot.2018.2871607 |
0.44 |
|
2019 |
Liu J, Cao H, Li Q, Cai F, Du X, Guizani M. A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing Ieee Internet of Things Journal. 6: 1321-1330. DOI: 10.1109/Jiot.2018.2828463 |
0.448 |
|
2019 |
Zhao Y, Xu X, Su Y, Huang L, Du X, Guizani N. Multi-User MAC Protocol for WLANs in MmWave Massive MIMO Systems With Mobile Edge Computing Ieee Access. 7: 181242-181256. DOI: 10.1109/Access.2019.2952174 |
0.361 |
|
2019 |
Zhang Y, Dong P, Du X, Luo H, Zheng T, Guizani M. BNNC: Improving Performance of Multipath Transmission in Heterogeneous Vehicular Networks Ieee Access. 7: 158113-158125. DOI: 10.1109/Access.2019.2948954 |
0.422 |
|
2019 |
He Y, Tang X, Zhang R, Du X, Zhou D, Guizani M. A Course-Aware Opportunistic Routing Protocol for FANETs Ieee Access. 7: 144303-144312. DOI: 10.1109/Access.2019.2944867 |
0.42 |
|
2019 |
Ping Y, Hao B, Hei X, Tu Y, Du X, Wu J. Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems Ieee Access. 7: 121286-121302. DOI: 10.1109/Access.2019.2937805 |
0.383 |
|
2019 |
Wang D, Qin H, Song B, Du X, Guizani M. Resource Allocation in Information-Centric Wireless Networking With D2D-Enabled MEC: A Deep Reinforcement Learning Approach Ieee Access. 7: 114935-114944. DOI: 10.1109/Access.2019.2935545 |
0.369 |
|
2019 |
Sun G, Chen Z, Yu H, Du X, Guizani M. Online Parallelized Service Function Chain Orchestration in Data Center Networks Ieee Access. 7: 100147-100161. DOI: 10.1109/Access.2019.2930295 |
0.408 |
|
2019 |
Sun G, Cai S, Yu H, Maharjan S, Chang V, Du X, Guizani M. Location Privacy Preservation for Mobile Users in Location-Based Services Ieee Access. 7: 87425-87438. DOI: 10.1109/Access.2019.2925571 |
0.422 |
|
2019 |
Zhang R, Guo Q, Zhai D, Zhou D, Du X, Guizani M. Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks Ieee Access. 7: 80870-80883. DOI: 10.1109/Access.2019.2923538 |
0.4 |
|
2019 |
Sun G, Xu Z, Yu H, Chang VI, Du X, Guizani M. Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers Ieee Access. 7: 80219-80232. DOI: 10.1109/Access.2019.2923096 |
0.334 |
|
2019 |
Han Q, Lu D, Zhang K, Du X, Guizani M. A Prediction Method for Destination Based on the Semantic Transfer Model Ieee Access. 7: 73756-73763. DOI: 10.1109/Access.2019.2918594 |
0.318 |
|
2019 |
He W, Su Y, Xu X, Luo Z, Huang L, Du X. Cooperative Content Caching for Mobile Edge Computing With Network Coding Ieee Access. 7: 67695-67707. DOI: 10.1109/Access.2019.2917977 |
0.356 |
|
2019 |
Zhu W, Yang W, Xuan S, Man D, Wang W, Du X, Guizani M. Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks Ieee Access. 7: 27272-27287. DOI: 10.1109/Access.2019.2900708 |
0.348 |
|
2019 |
Liwang M, Wang J, Gao Z, Du X, Guizani M. Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV Ieee Access. 7: 32551-32561. DOI: 10.1109/Access.2019.2897617 |
0.363 |
|
2019 |
Lv J, Song B, Guo J, Du X, Guizani M. Interest-Related Item Similarity Model Based on Multimodal Data for Top-N Recommendation Ieee Access. 7: 12809-12821. DOI: 10.1109/Access.2019.2893355 |
0.349 |
|
2019 |
Guan Z, Liu X, Diao H, Du X, Zhang Z, Su L. Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things Ieee Access. 7: 5784-5794. DOI: 10.1109/Access.2018.2889642 |
0.403 |
|
2019 |
Zhao Y, Liu Y, Tian A, Yu Y, Du X. Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things Journal of Parallel and Distributed Computing. 132: 141-149. DOI: 10.1016/J.Jpdc.2019.06.001 |
0.442 |
|
2019 |
Luo L, Yu H, Luo S, Ye Z, Du X, Guizani M. Scalable explicit path control in software-defined networks Journal of Network and Computer Applications. 141: 86-103. DOI: 10.1016/J.Jnca.2019.05.014 |
0.36 |
|
2019 |
Sun G, Sun S, Sun J, Yu H, Du X, Guizani M. Security and privacy preservation in fog-based crowd sensing on the internet of vehicles Journal of Network and Computer Applications. 134: 89-99. DOI: 10.1016/J.Jnca.2019.02.018 |
0.455 |
|
2019 |
Zhao Y, Yu Y, Li Y, Han G, Du X. Machine learning based privacy-preserving fair data trading in big data market Information Sciences. 478: 449-460. DOI: 10.1016/J.Ins.2018.11.028 |
0.385 |
|
2019 |
Xue L, Yu Y, Li Y, Au MH, Du X, Yang B. Efficient attribute-based encryption with attribute revocation for assured data deletion Information Sciences. 479: 640-650. DOI: 10.1016/J.Ins.2018.02.015 |
0.42 |
|
2019 |
Belkhouja T, Du X, Mohamed A, Al-Ali AK, Guizani M. Biometric-based authentication scheme for Implantable Medical Devices during emergency situations Future Generation Computer Systems. 98: 109-119. DOI: 10.1016/J.Future.2019.02.002 |
0.367 |
|
2019 |
Guan Z, Lv Z, Du X, Wu L, Guizani M. Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach Future Generation Computer Systems. 98: 60-68. DOI: 10.1016/J.Future.2019.01.058 |
0.329 |
|
2019 |
Guo J, Song B, Chi Y, Jayasinghe L, Yuen C, Guan YL, Du X, Guizani M. Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications Future Generation Computer Systems. 95: 629-638. DOI: 10.1016/J.Future.2019.01.041 |
0.4 |
|
2019 |
Tian Z, Su S, Shi W, Du X, Guizani M, Yu X. A data-driven method for future Internet route decision modeling Future Generation Computer Systems. 95: 212-220. DOI: 10.1016/J.Future.2018.12.054 |
0.363 |
|
2019 |
Su Y, Lu X, Huang L, Du X, Guizani M. Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet Future Generation Computer Systems. 97: 41-49. DOI: 10.1016/J.Future.2018.11.009 |
0.437 |
|
2019 |
Sun G, Li Y, Yu H, Vasilakos AV, Du X, Guizani M. Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks Future Generation Computer Systems. 91: 347-360. DOI: 10.1016/J.Future.2018.09.037 |
0.384 |
|
2019 |
Zhang C, Zhu L, Xu C, Sharif K, Du X, Guizani M. LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT Future Generation Computer Systems. 90: 175-184. DOI: 10.1016/J.Future.2018.07.064 |
0.434 |
|
2019 |
Liu X, Zhuo Z, Du X, Zhang X, Zhu Q, Guizani M. Adversarial attacks against profile HMM website fingerprinting detection model Cognitive Systems Research. 54: 83-89. DOI: 10.1016/J.Cogsys.2018.12.005 |
0.401 |
|
2019 |
Sun R, Zheng H, Liu J, Du X, Guizani M. Placement delivery array design for the coded caching scheme in medical data sharing Neural Computing and Applications. 32: 867-878. DOI: 10.1007/S00521-019-04042-X |
0.402 |
|
2018 |
Li Y, Song B, Kang X, Du X, Guizani M. Vehicle-Type Detection Based on Compressed Sensing and Deep Learning in Vehicular Networks. Sensors (Basel, Switzerland). 18. PMID 30572635 DOI: 10.3390/S18124500 |
0.367 |
|
2018 |
Zhang R, Liu J, Du X, Li B, Guizani M. AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions. Sensors (Basel, Switzerland). 18. PMID 30126251 DOI: 10.3390/S18082727 |
0.354 |
|
2018 |
Liu X, Zhang X, Guizani N, Lu J, Zhu Q, Du X. TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems. Sensors (Basel, Switzerland). 18. PMID 30103460 DOI: 10.3390/S18082630 |
0.342 |
|
2018 |
Song J, Dong P, Zhou H, Zheng T, Du X, Guizani M. A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services Sustainability. 10: 1337. DOI: 10.3390/Su10051337 |
0.387 |
|
2018 |
Belkhouja T, Du X, Mohamed A, Al-Ali AK, Guizani M. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems Journal of Sensor and Actuator Networks. 7: 21. DOI: 10.3390/Jsan7020021 |
0.389 |
|
2018 |
Chen Z, Zou S, Tang Y, Du X, Guizani M. Radio resource coordination and scheduling scheme in ultra-dense cloud-based small cell networks Eurasip Journal On Wireless Communications and Networking. 2018: 137. DOI: 10.1186/S13638-018-1150-1 |
0.465 |
|
2018 |
Sun G, Zhang Y, Liao D, Yu H, Du X, Guizani M. Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks Ieee Transactions On Vehicular Technology. 67: 7550-7563. DOI: 10.1109/Tvt.2018.2828651 |
0.403 |
|
2018 |
Zhang Y, Song B, Du X, Guizani M. Vehicle Tracking Using Surveillance With Multimodal Data Fusion Ieee Transactions On Intelligent Transportation Systems. 19: 2353-2361. DOI: 10.1109/Tits.2017.2787101 |
0.318 |
|
2018 |
Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B. Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications Ieee Transactions On Industrial Informatics. 14: 4538-4547. DOI: 10.1109/Tii.2018.2841047 |
0.428 |
|
2018 |
Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M. File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things Ieee Transactions On Industrial Informatics. 14: 3648-3658. DOI: 10.1109/Tii.2018.2794442 |
0.447 |
|
2018 |
Shen M, Ma B, Zhu L, Mijumbi R, Du X, Hu J. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection Ieee Transactions On Information Forensics and Security. 13: 940-953. DOI: 10.1109/Tifs.2017.2774451 |
0.337 |
|
2018 |
Zhang H, Zhou Z, Ye L, Du X. Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud Ieee Transactions On Cloud Computing. 6: 316-329. DOI: 10.1109/Tcc.2015.2430316 |
0.381 |
|
2018 |
Du X, Chen H, Zhu L, Li J, Chang Z. Security and Privacy in Wireless IoT Ieee Wireless Communications. 25: 10-11. DOI: 10.1109/Mwc.2018.8600750 |
0.436 |
|
2018 |
Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M. Security in Mobile Edge Caching with Reinforcement Learning Ieee Wireless Communications. 25: 116-122. DOI: 10.1109/Mwc.2018.1700291 |
0.432 |
|
2018 |
Zhu L, Li M, Zhang Z, Du X, Guizani M. Big Data Mining of Users’ Energy Consumption Patterns in the Wireless Smart Grid Ieee Wireless Communications. 25: 84-89. DOI: 10.1109/Mwc.2018.1700157 |
0.442 |
|
2018 |
Dong P, Zheng T, Du X, Zhang H, Guizani M. SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail Ieee Network. 32: 64-71. DOI: 10.1109/Mnet.2018.1700330 |
0.388 |
|
2018 |
Wang D, Chen D, Song B, Guizani N, Yu X, Du X. From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies Ieee Communications Magazine. 56: 114-120. DOI: 10.1109/Mcom.2018.1701310 |
0.372 |
|
2018 |
Yu Y, Li Y, Du X, Chen R, Yang B. Content Protection in Named Data Networking: Challenges and Potential Solutions Ieee Communications Magazine. 56: 82-87. DOI: 10.1109/Mcom.2018.1701086 |
0.458 |
|
2018 |
Gu J, Su T, Wang Q, Du X, Guizani M. Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV Ieee Communications Magazine. 56: 82-89. DOI: 10.1109/Mcom.2018.1700422 |
0.438 |
|
2018 |
Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities Ieee Communications Magazine. 56: 82-88. DOI: 10.1109/Mcom.2018.1700401 |
0.432 |
|
2018 |
Zhu L, Tang X, Shen M, Du X, Guizani M. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks Ieee Journal On Selected Areas in Communications. 36: 628-643. DOI: 10.1109/Jsac.2018.2815442 |
0.42 |
|
2018 |
Zhen L, Qin H, Song B, Ding R, Du X, Guizani M. Random Access Preamble Design and Detection for Mobile Satellite Communication Systems Ieee Journal On Selected Areas in Communications. 36: 280-291. DOI: 10.1109/Jsac.2018.2804138 |
0.369 |
|
2018 |
Zhu L, Zhang C, Xu C, Du X, Xu R, Sharif K, Guizani M. PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles Ieee Internet of Things Journal. 5: 2457-2466. DOI: 10.1109/Jiot.2018.2846653 |
0.418 |
|
2018 |
Wang J, Zhang R, Yuan J, Du X. A 3-Dimensional Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2018.2803111 |
0.354 |
|
2018 |
Yan X, Dong P, Du X, Zheng T, Zhang H, Guizani M. Congestion Game With Link Failures for Network Selection in High-Speed Vehicular Networks Ieee Access. 6: 76165-76175. DOI: 10.1109/Access.2018.2884766 |
0.394 |
|
2018 |
Ye L, Yu X, Zhao J, Zhan D, Du X, Guizani M. Deciding Your Own Anonymity: User-Oriented Node Selection in I2P Ieee Access. 6: 71350-71359. DOI: 10.1109/Access.2018.2881719 |
0.372 |
|
2018 |
Li M, Zhu L, Zhang Z, Du X, Guizani M. PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing Ieee Access. 6: 66188-66197. DOI: 10.1109/Access.2018.2878792 |
0.441 |
|
2018 |
Zhu W, Yang W, Xuan S, Man D, Wang W, Du X. Location-Aware Influence Blocking Maximization in Social Networks Ieee Access. 6: 61462-61477. DOI: 10.1109/Access.2018.2876141 |
0.337 |
|
2018 |
Xu R, Zhu L, Wang A, Du X, Choo KR, Zhang G, Gai K. Side-Channel Attack on a Protected RFID Card Ieee Access. 6: 58395-58404. DOI: 10.1109/Access.2018.2870663 |
0.343 |
|
2018 |
Liu J, Li Q, Cao H, Sun R, Du X, Guizani M. MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles Ieee Access. 6: 50974-50983. DOI: 10.1109/Access.2018.2869543 |
0.466 |
|
2018 |
Zhang Y, Song B, Gao S, Du X, Guizani M. Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach Ieee Access. 6: 49721-49731. DOI: 10.1109/Access.2018.2868476 |
0.371 |
|
2018 |
Ye L, Yu X, Yu L, Guo B, Zhan D, Du X, Guizani M. Checking Function-Level Kernel Control Flow Integrity for Cloud Computing Ieee Access. 6: 41856-41865. DOI: 10.1109/Access.2018.2859767 |
0.362 |
|
2018 |
Rathore H, Wenzel L, Al-Ali AK, Mohamed A, Du X, Guizani M. Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment Ieee Access. 6: 44718-44730. DOI: 10.1109/Access.2018.2854822 |
0.385 |
|
2018 |
Sun S, Fu X, Ruan H, Du X, Luo B, Guizani M. Real-Time Behavior Analysis and Identification for Android Application Ieee Access. 6: 38041-38051. DOI: 10.1109/Access.2018.2853121 |
0.333 |
|
2018 |
Han Q, Lu D, Zhang K, Du X, Guizani M. Lclean: A Plausible Approach to Individual Trajectory Data Sanitization Ieee Access. 6: 30110-30116. DOI: 10.1109/Access.2018.2833163 |
0.344 |
|
2018 |
Gu J, Sun B, Du X, Wang J, Zhuang Y, Wang Z. Consortium Blockchain-Based Malware Detection in Mobile Devices Ieee Access. 6: 12118-12128. DOI: 10.1109/Access.2018.2805783 |
0.34 |
|
2018 |
Su Y, Du X, Huang L, Gao Z, Guizani M. LTE-U and Wi-Fi Coexistence Algorithm Based on Q-Learning in Multi-Channel Ieee Access. 6: 13644-13652. DOI: 10.1109/Access.2018.2803258 |
0.345 |
|
2018 |
Liu J, Zhang L, Sun R, Du X, Guizani M. Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings Ieee Access. 6: 7854-7863. DOI: 10.1109/Access.2018.2797102 |
0.44 |
|
2018 |
Zhou Z, Zhang H, Li S, Du X. Hermes: A Privacy-Preserving Approximate Search Framework for Big Data Ieee Access. 6: 20009-20020. DOI: 10.1109/Access.2017.2788013 |
0.394 |
|
2018 |
Lv J, Man D, Yang W, Du X, Yu M. Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information Ieee Access. 6: 30117-30127. DOI: 10.1109/Access.2017.2785444 |
0.347 |
|
2018 |
Zhan D, Ye L, Zhang H, Fang B, Li H, Liu Y, Du X, Guizani M. A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT Future Generation Computer Systems. 88: 209-219. DOI: 10.1016/J.Future.2018.05.055 |
0.351 |
|
2018 |
Yan X, Dong P, Du X, Zheng T, Sun J, Guizani M. Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks Computer Networks. 145: 165-174. DOI: 10.1016/J.Comnet.2018.08.019 |
0.408 |
|
2018 |
Chen S, Song B, Guo J, Zhang Y, Du X, Guizani M. FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval Computer Networks. 143: 98-111. DOI: 10.1016/J.Comnet.2018.07.011 |
0.336 |
|
2018 |
Li Y, Gao Z, Huang L, Du X, Guizani M. Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies Computer Communications. 127: 30-35. DOI: 10.1016/J.Comcom.2018.05.012 |
0.422 |
|
2018 |
Zhang R, Wang J, Zhong Z, Li C, Du X, Guizani M. Energy-Efficient Beamforming for 3.5 GHz 5G Cellular Networks based on 3D Spatial Channel Characteristics Computer Communications. 121: 59-70. DOI: 10.1016/J.Comcom.2018.02.019 |
0.332 |
|
2018 |
Sifah EB, Xia Q, Agyekum KOO, Amofa S, Gao J, Chen R, Xia H, Gee JC, Du X, Guizani M. Chain-based big data access control infrastructure The Journal of Supercomputing. 74: 4945-4964. DOI: 10.1007/S11227-018-2308-7 |
0.46 |
|
2018 |
Su M, Zhang H, Bhuiyan ZA, Du X, Zhang P. An effective copyright‐protected content delivery scheme for P2P file sharing networks International Journal of Communication Systems. 31. DOI: 10.1002/Dac.3476 |
0.398 |
|
2017 |
Luo Z, LiWang M, Lin Z, Huang L, Du X, Guizani M. Energy-Efficient Caching for Mobile Edge Computing in 5G Networks Applied Sciences. 7: 557. DOI: 10.3390/App7060557 |
0.425 |
|
2017 |
Man D, Yang W, Xuan S, Du X. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters Security and Communication Networks. 2017: 1-9. DOI: 10.1155/2017/5350201 |
0.357 |
|
2017 |
Zhu X, Hao R, Chi H, Du X. FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins Ieee Transactions On Vehicular Technology. 66: 10461-10469. DOI: 10.1109/Tvt.2017.2764999 |
0.393 |
|
2017 |
Xiao L, Li Y, Huang X, Du X. Cloud-Based Malware Detection Game for Mobile Devices with Offloading Ieee Transactions On Mobile Computing. 16: 2742-2750. DOI: 10.1109/Tmc.2017.2687918 |
0.416 |
|
2017 |
Guan Z, Li J, Zhu L, Zhang Z, Du X, Guizani M. Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources Ieee Transactions On Industrial Informatics. 13: 3216-3225. DOI: 10.1109/Tii.2017.2706760 |
0.43 |
|
2017 |
Zhao C, Huang L, Zhao Y, Du X. Secure Machine-Type Communications toward LTE Heterogeneous Networks Ieee Wireless Communications. 24: 82-87. DOI: 10.1109/Mwc.2017.1600141Wc |
0.438 |
|
2017 |
Fu X, Gao Y, Luo B, Du X, Guizani M. Security Threats to Hadoop: Data Leakage Attacks and Investigation Ieee Network. 31: 67-71. DOI: 10.1109/Mnet.2017.1500095Nm |
0.373 |
|
2017 |
Wu L, Du X, Guizani M, Mohamed A. Access Control Schemes for Implantable Medical Devices: A Survey Ieee Internet of Things Journal. 4: 1272-1283. DOI: 10.1109/Jiot.2017.2708042 |
0.393 |
|
2017 |
Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid Ieee Internet of Things Journal. 4: 1934-1944. DOI: 10.1109/Jiot.2017.2690522 |
0.439 |
|
2017 |
Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain Ieee Access. 5: 14757-14767. DOI: 10.1109/Access.2017.2730843 |
0.34 |
|
2017 |
Xu R, Wang R, Guan Z, Wu L, Wu J, Du X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid Ieee Access. 5: 13787-13798. DOI: 10.1109/Access.2017.2728681 |
0.385 |
|
2017 |
Lin Z, Huang L, Zhao Y, Du X, Guizani M. P2P-based resource allocation with coalitional game for D2D networks Pervasive and Mobile Computing. 42: 487-497. DOI: 10.1016/J.Pmcj.2017.06.001 |
0.424 |
|
2017 |
Cheng Y, Fu X, Du X, Luo B, Guizani M. A lightweight live memory forensic approach based on hardware virtualization Information Sciences. 379: 23-41. DOI: 10.1016/J.Ins.2016.07.019 |
0.314 |
|
2017 |
Zhao C, Huang M, Huang L, Du X, Guizani M. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks Computer Networks. 128: 164-171. DOI: 10.1016/J.Comnet.2017.05.028 |
0.483 |
|
2017 |
Li Y, Gao Z, Huang L, Du X, Guizani M. Resource management for future mobile networks Computer Networks. 129: 392-398. DOI: 10.1016/J.Comnet.2017.04.007 |
0.436 |
|
2016 |
Zhang Y, Song B, Zhang Y, Du X, Guizani M. Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning. Sensors (Basel, Switzerland). 16. PMID 27916841 DOI: 10.3390/S16122021 |
0.38 |
|
2016 |
Chen J, Lin Z, Liu Y, Hu Y, Du X. Sink Location Protection Protocols Based on Packet Sending Rate Adjustment International Journal of Distributed Sensor Networks. 12: 6354514. DOI: 10.1155/2016/6354514 |
0.401 |
|
2016 |
Dong P, Song B, Zhang H, Du X. Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks Ieee Transactions On Vehicular Technology. 65: 9493-9507. DOI: 10.1109/Tvt.2016.2581020 |
0.46 |
|
2016 |
Wu L, Du X, Wu J. Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms Ieee Transactions On Vehicular Technology. 65: 6678-6691. DOI: 10.1109/Tvt.2015.2472993 |
0.427 |
|
2016 |
Wang K, Li X, Ji H, Du X. Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic Ieee Transactions On Vehicular Technology. 65: 5595-5610. DOI: 10.1109/Tvt.2014.2328232 |
0.345 |
|
2016 |
Guo J, Song B, Du X. Significance Evaluation of Video Data Over Media Cloud Based on Compressed Sensing Ieee Transactions On Multimedia. 18: 1297-1304. DOI: 10.1109/Tmm.2016.2564100 |
0.352 |
|
2016 |
Zhang Y, Tian F, Song B, Du X. Social vehicle swarms: A novel perspective on socially aware vehicular communication architecture Ieee Wireless Communications. 23: 82-89. DOI: 10.1109/Mwc.2016.7553030 |
0.344 |
|
2016 |
Zhang H, Xu Z, Du X, Zhou Z, Shi J. CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing Wireless Communications and Mobile Computing. 16: 2179-2193. DOI: 10.1002/Wcm.2675 |
0.403 |
|
2016 |
Han Q, Shao B, Li L, Ma Z, Zhang H, Du X. Publishing histograms with outliers under data differential privacy Security and Communication Networks. DOI: 10.1002/Sec.1493 |
0.346 |
|
2015 |
Guan Z, Yang T, Du X. Achieving secure and efficient data access control for cloud-integrated body sensor networks International Journal of Distributed Sensor Networks. 2015: 142. DOI: 10.1155/2015/101287 |
0.452 |
|
2015 |
Zhang H, Zhang Q, Du X. Toward Vehicle-Assisted Cloud Computing for Smartphones Ieee Transactions On Vehicular Technology. 64: 5610-5618. DOI: 10.1109/Tvt.2015.2480004 |
0.369 |
|
2015 |
Wang K, Li X, Ji H, Du X. Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic Ieee Transactions On Vehicular Technology. 64: 5904-5918. DOI: 10.1109/Tvt.2014.2386352 |
0.332 |
|
2015 |
Chen L, Bian K, Du X, Li X. Multichannel Broadcast Via Channel Hopping in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 64: 3004-3017. DOI: 10.1109/Tvt.2014.2349996 |
0.38 |
|
2015 |
Hei X, Du X, Lin S, Lee I, Sokolsky O. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System Ieee Transactions On Parallel and Distributed Systems. 26: 3108-3121. DOI: 10.1109/Tpds.2014.2370045 |
0.347 |
|
2015 |
Zhang H, Chen S, Li X, Ji H, Du X. Interference management for heterogeneous networks with spectral efficiency improvement Ieee Wireless Communications. 22: 101-107. DOI: 10.1109/Mwc.2015.7096292 |
0.407 |
|
2015 |
Zhang H, Zhang Q, Zhou Z, Du X, Yu W, Guizani M. Processing geo-dispersed big data in an advanced mapreduce framework Ieee Network. 29: 24-30. DOI: 10.1109/Mnet.2015.7293301 |
0.401 |
|
2015 |
Wang X, Han G, Du X, Rodrigues JJPC. Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial] Ieee Network. 29: 4-5. DOI: 10.1109/Mnet.2015.7064896 |
0.415 |
|
2015 |
Li K, Zheng H, Wu J, Du X. Virtual machine placement in cloud systems through migration process International Journal of Parallel, Emergent and Distributed Systems. 30: 393-410. DOI: 10.1080/17445760.2014.931957 |
0.339 |
|
2015 |
Fu X, Du X, Luo B. Data correlation-based analysis methods for automatic memory forensic Security and Communication Networks. 8: 4213-4226. DOI: 10.1002/Sec.1337 |
0.313 |
|
2015 |
Huang X, Du X. Achieving data privacy on hybrid cloud Security and Communication Networks. 8: 3771-3781. DOI: 10.1002/Sec.1298 |
0.389 |
|
2014 |
Xu Q, Li X, Ji H, Du X. Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic Perspective Ieee Transactions On Vehicular Technology. 63: 2071-2082. DOI: 10.1109/Tvt.2014.2312288 |
0.361 |
|
2014 |
Wu L, Du X, Fu X. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones Ieee Communications Magazine. 52: 80-87. DOI: 10.1109/Mcom.2014.6766089 |
0.419 |
|
2014 |
Jiang Y, Du X, Cheng W. Group-based key array authentication protocol in radio frequency identification systems Iet Information Security. 8: 290-296. DOI: 10.1049/Iet-Ifs.2012.0241 |
0.4 |
|
2014 |
Zhang H, Ye L, Shi J, Du X, Guizani M. Verifying cloud service-level agreement by a third-party auditor Security and Communication Networks. 7: 492-502. DOI: 10.1002/Sec.740 |
0.375 |
|
2013 |
Huang L, Zhu G, Du X. Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage Ieee Wireless Communications. 20: 44-51. DOI: 10.1109/Mwc.2013.6507393 |
0.422 |
|
2013 |
Bian K, Park J, Du X, Li X. Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention Ieee Network. 27: 16-21. DOI: 10.1109/Mnet.2013.6523803 |
0.372 |
|
2013 |
Yao X, Han X, Du X, Zhou X. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications Ieee Sensors Journal. 13: 3693-3701. DOI: 10.1109/Jsen.2013.2266116 |
0.371 |
|
2013 |
Su M, Zhang H, Du X, Fang B, Guizani M. A Measurement Study on the Topologies of BitTorrent Networks Ieee Journal On Selected Areas in Communications. 31: 338-347. DOI: 10.1109/Jsac.2013.Sup.0513030 |
0.353 |
|
2013 |
Zhang H, Ye L, Shi J, Du X, Chen H. Preventing Piracy Content Propagation in Peer-to-Peer Networks Ieee Journal On Selected Areas in Communications. 31: 105-114. DOI: 10.1109/Jsac.2013.Sup.0513010 |
0.408 |
|
2012 |
Li X, Wu J, Lin S, Du X. Channel switching control policy for wireless mesh networks Journal of Parallel and Distributed Computing. 72: 1295-1305. DOI: 10.1016/J.Jpdc.2012.06.008 |
0.301 |
|
2012 |
Zhang W, Kandah F, Du X, Wang C. Self-protecting networking using dynamic p -cycle construction within link capacity constraint Security and Communication Networks. 5: 689-708. DOI: 10.1002/Sec.364 |
0.327 |
|
2010 |
Lin Y, Wu Q, Cai X, Du X, Kwon K. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks International Journal of Distributed Sensor Networks. 6: 563156. DOI: 10.1155/2010/563156 |
0.436 |
|
2010 |
Olteanu A, Xiao Y, Wu K, Du X. Weaving a proper net to catch large objects in wireless sensor networks Ieee Transactions On Wireless Communications. 9: 1360-1369. DOI: 10.1109/Twc.2010.04.081098 |
0.329 |
|
2009 |
Xiao Y, Chen H, Du X, Zhang Y, Chen H, Guizani M. On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks Ieee Transactions On Wireless Communications. 8: 4406-4410. DOI: 10.1109/Twc.2009.080717 |
0.394 |
|
2009 |
Xiao Y, Chen H, Du X, Guizani M. Stream-based cipher feedback mode in wireless error channel Ieee Transactions On Wireless Communications. 8: 622-626. DOI: 10.1109/Twc.2009.071278 |
0.305 |
|
2009 |
Du X, Guizani M, Xiao Y, Chen H. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks Ieee Transactions On Wireless Communications. 8: 1223-1229. DOI: 10.1109/Twc.2009.060598 |
0.407 |
|
2009 |
Xiao Y, Zhang Y, Peng M, Chen H, Du X, Sun B, Wu K. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Computer Networks. 53: 2458-2475. DOI: 10.1016/J.Comnet.2009.05.002 |
0.311 |
|
2009 |
Brown J, Du X, Guizani M. Efficient rekeying algorithms for WiMAX networks Security and Communication Networks. 2: 392-400. DOI: 10.1002/Sec.124 |
0.455 |
|
2008 |
Du X, Guizani M, Xiao Y, Chen H. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks Ieee Transactions On Vehicular Technology. 57: 2387-2394. DOI: 10.1109/Tvt.2007.912327 |
0.405 |
|
2008 |
Du X, Chen H. Security in wireless sensor networks Ieee Wireless Communications. 15: 60-66. DOI: 10.1109/Mwc.2008.4599222 |
0.383 |
|
2008 |
Du X, Xiao Y, Dai F. Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks Wireless Communications and Mobile Computing. 8: 125-136. DOI: 10.1002/Wcm.452 |
0.361 |
|
2008 |
Du X, Shayman MA, Skoog RA. Designing fault tolerant networks to prevent poison message failure Security and Communication Networks. 1: 161-177. DOI: 10.1002/Sec.9 |
0.343 |
|
2007 |
Du X, Guizani M, Xiao Y, Chen H. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks Ieee Transactions On Wireless Communications. 6: 3395-3401. DOI: 10.1109/Twc.2007.06095 |
0.394 |
|
2007 |
Xiao Y, Chen H, Du X, Guizani M. Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems Ieee Transactions On Vehicular Technology. 56: 2745-2755. DOI: 10.1109/Tvt.2007.898380 |
0.422 |
|
2007 |
Guizani M, Du X, Chen H, Mueller P. Security in wireless mobile ad hoc and sensor networks [Guest Editorial] Ieee Wireless Communications. 14: 6-7. DOI: 10.1109/Mwc.2007.4396937 |
0.415 |
|
2007 |
Wu Q, Rao NSV, Du X, Iyengar SS, Vaishnavi VK. On efficient deployment of sensors on planar grid Computer Communications. 30: 2721-2734. DOI: 10.1016/J.Comcom.2007.05.012 |
0.312 |
|
2007 |
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M. A survey of key management schemes in wireless sensor networks Computer Communications. 30: 2314-2341. DOI: 10.1016/J.Comcom.2007.04.009 |
0.417 |
|
2007 |
Du X, Wu D. Joint design of routing and medium access control for hybrid mobile ad hoc networks Mobile Networks and Applications. 12: 57-68. DOI: 10.1007/S11036-006-0006-9 |
0.397 |
|
2006 |
Du X, Xiao Y. Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks International Journal of Wireless and Mobile Computing. 1: 121-130. DOI: 10.1504/Ijwmc.2006.012471 |
0.366 |
|
2006 |
Du X, Wu D. Adaptive cell relay routing protocol for mobile ad hoc networks Ieee Transactions On Vehicular Technology. 55: 278-285. DOI: 10.1109/Tvt.2005.861196 |
0.401 |
|
2006 |
Du X, Wu D, Liu W, Fang Y. Multiclass routing and medium access control for heterogeneous mobile ad hoc networks Ieee Transactions On Vehicular Technology. 55: 270-277. DOI: 10.1109/Tvt.2005.861183 |
0.409 |
|
2006 |
Du X. Identifying control and management plane poison message failure by K-nearest neighbor method Journal of Network and Systems Management. 14: 243-259. DOI: 10.1007/S10922-006-9027-8 |
0.324 |
|
2006 |
Du X, Xiao Y, Chen H, Wu Q. Secure cell relay routing protocol for sensor networks Wireless Communications and Mobile Computing. 6: 375-391. DOI: 10.1002/Wcm.402 |
0.438 |
|
2005 |
Du X, Lin F. Maintaining differentiated coverage in heterogeneous sensor networks Eurasip Journal On Wireless Communications and Networking. 2005: 565-572. DOI: 10.1155/Wcn.2005.565 |
0.352 |
|
2005 |
Xiao Y, Leung KK, Pan Y, Du X. Architecture, mobility management, and quality of service for integrated 3G and WLAN networks Wireless Communications and Mobile Computing. 5: 805-823. DOI: 10.1002/Wcm.344 |
0.37 |
|
Show low-probability matches. |