Xiaojiang Du, Ph.D. - Publications

Affiliations: 
2003 University of Maryland, College Park, College Park, MD 

244 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Huang K, Zhang X, Mu Y, Rezaeibagha F, Du X. Scalable and redactable blockchain with update and anonymity Information Sciences. 546: 25-41. DOI: 10.1016/J.Ins.2020.07.016  0.442
2020 Wei X, Guo H, Wang X, Wang X, Wang C, Guizani M, Du X. A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs. Sensors (Basel, Switzerland). 20. PMID 33171680 DOI: 10.3390/s20216370  0.339
2020 Wang Q, Fang J, Gong B, Du X, Guizani M. An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks. Sensors (Basel, Switzerland). 20. PMID 33158266 DOI: 10.3390/s20216287  0.3
2020 Yin C, Dong P, Du X, Zheng T, Zhang H, Guizani M. An Adaptive Network Coding Scheme for Multipath Transmission in Cellular-Based Vehicular Networks. Sensors (Basel, Switzerland). 20. PMID 33086691 DOI: 10.3390/s20205902  0.305
2020 Zhao D, Qin H, Song B, Han B, Du X, Guizani M. A Graph Convolutional Network-Based Deep Reinforcement Learning Approach for Resource Allocation in a Cognitive Radio Network. Sensors (Basel, Switzerland). 20. PMID 32933114 DOI: 10.3390/S20185216  0.42
2020 Gu Z, Cao Z, Tian Z, Wang Y, Du X, Mohsen G. A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks. Sensors (Basel, Switzerland). 20. PMID 31991639 DOI: 10.3390/S20030657  0.401
2020 Ren Y, Gu Z, Wang Z, Tian Z, Liu C, Lu H, Du X, Guizani M. System Log Detection Model Based on Conformal Prediction Electronics. 9: 232. DOI: 10.3390/Electronics9020232  0.325
2020 Zhang Y, Shao S, Ji M, Qiu J, Tian Z, Du X, Guizani M. An Automated Refactoring Approach to Improve IoT Software Quality Applied Sciences. 10: 413. DOI: 10.3390/App10010413  0.322
2020 Song X, Jiang W, Liu X, Lu H, Tian Z, Du X. A Survey of Game Theory as Applied to Social Networks Tsinghua Science & Technology. 25: 734-742. DOI: 10.26599/Tst.2020.9010005  0.337
2020 Huang K, Zhang X, Wang X, Mu Y, Rezaeibagha F, Xu G, Wang H, Zheng X, Yang G, Xia Q, Du X. HUCDO: A Hybrid User-Centric Data Outsourcing scheme Acm Transactions On Cyber-Physical Systems. 4: 35. DOI: 10.1145/3379464  0.443
2020 Li B, Guo X, Zhang R, Du X, Guizani M. Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network Ieee Transactions On Vehicular Technology. 69: 8925-8937. DOI: 10.1109/Tvt.2020.2997782  0.406
2020 Song L, Sun G, Yu H, Du X, Guizani M. FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles Ieee Transactions On Vehicular Technology. 69: 5403-5415. DOI: 10.1109/Tvt.2020.2977829  0.43
2020 Dai S, Wang ML, Gao Z, Huang L, Du X, Guizani M. An Adaptive Computation Offloading Mechanism for Mobile Health Applications Ieee Transactions On Vehicular Technology. 69: 998-1007. DOI: 10.1109/Tvt.2019.2954887  0.398
2020 Zhang C, Zhu L, Xu C, Sharif K, Ding K, Liu X, Du X, Guizani M. TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2961992  0.394
2020 Dai Y, Wu J, Du X. Hierarchical and Hybrid: Mobility-Compatible Database-Assisted Framework for Dynamic Spectrum Access Ieee Transactions On Network Science and Engineering. 7: 216-226. DOI: 10.1109/Tnse.2018.2832021  0.409
2020 Wang Y, Tian Z, Sun Y, Du X, Guizani N. LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV Ieee Transactions On Intelligent Transportation Systems. 1-10. DOI: 10.1109/Tits.2020.2970610  0.356
2020 Sun G, Zhang Y, Yu H, Du X, Guizani M. Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks Ieee Transactions On Intelligent Transportation Systems. 21: 2409-2426. DOI: 10.1109/Tits.2019.2918255  0.384
2020 Yu Y, Zhao Y, Li Y, Du X, Wang L, Guizani M. Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications Ieee Transactions On Industrial Informatics. 16: 3290-3300. DOI: 10.1109/Tii.2019.2944678  0.379
2020 Tian Z, Luo C, Qiu J, Du X, Guizani M. A Distributed Deep Learning System for Web Attack Detection on Edge Devices Ieee Transactions On Industrial Informatics. 16: 1963-1971. DOI: 10.1109/Tii.2019.2938778  0.42
2020 Zhao D, Qin H, Song B, Zhang Y, Du X, Guizani M. A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G Ieee Transactions On Cognitive Communications and Networking. 6: 452-463. DOI: 10.1109/Tccn.2020.2983170  0.406
2020 Wang D, Zhang W, Song B, Du X, Guizani M. Market-Based Model in CR-IoT: A Q-Probabilistic Multi-Agent Reinforcement Learning Approach Ieee Transactions On Cognitive Communications and Networking. 6: 179-188. DOI: 10.1109/Tccn.2019.2950242  0.326
2020 Lin X, Guizani M, Du X, Chu C, Yu Y. Advances of Security and Privacy Techniques in Emerging Wireless Networks Ieee Wireless Communications. 27: 8-9. DOI: 10.1109/Mwc.2020.9116080  0.4
2020 Zhai Y, Bao T, Zhu L, Shen M, Du X, Guizani M. Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling Ieee Wireless Communications. 27: 84-91. DOI: 10.1109/Mwc.001.1900298  0.422
2020 Qiu J, Du L, Chen Y, Tian Z, Du X, Guizani M. Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task Ieee Vehicular Technology Magazine. 15: 95-100. DOI: 10.1109/Mvt.2020.3002487  0.368
2020 Du X, Shen M, Chang Z, Cao Z. Recent Advances in Security and Privacy for Future Intelligent Networks Ieee Network. 34: 4-5. DOI: 10.1109/Mnet.2020.9055729  0.409
2020 Shen M, Liu Y, Zhu L, Xu K, Du X, Guizani N. Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach Ieee Network. 34: 20-27. DOI: 10.1109/Mnet.011.1900366  0.363
2020 Wang Y, Tian Z, Sun Y, Du X, Guizani N. Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation Ieee Network. 34: 284-290. DOI: 10.1109/Mnet.001.1900534  0.38
2020 Guo J, Luo W, Song B, Yu FR, Du X. Intelligence-Sharing Vehicular Networks with Mobile Edge Computing and Spatiotemporal Knowledge Transfer Ieee Network. 34: 256-262. DOI: 10.1109/Mnet.001.1900512  0.379
2020 Xu L, Xu K, Li T, Zheng K, Shen M, Du X, Du X. ABQ: Active Buffer Queueing in Datacenters Ieee Network. 34: 232-237. DOI: 10.1109/Mnet.001.1900266  0.353
2020 Chen S, Song B, Du X, Guizani N. Structured Bayesian Compression for Deep Models in Mobile-Enabled Devices for Connected Healthcare Ieee Network. 34: 142-149. DOI: 10.1109/Mnet.001.1900204  0.391
2020 Lu D, Han R, Shen Y, Dong X, Ma J, Du X, Guizani M. xTSeH : A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices Ieee Journal On Selected Areas in Communications. 1-1. DOI: 10.1109/Jsac.2020.3020658  0.338
2020 Li Y, Yu Y, Chen R, Du X, Guizani M. IntegrityChain: Provable Data Possession for Decentralized Storage Ieee Journal On Selected Areas in Communications. 38: 1205-1217. DOI: 10.1109/Jsac.2020.2986664  0.428
2020 Yu Y, Shi J, Li H, Li Y, Du X, Guizani M. Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments Ieee Journal On Selected Areas in Communications. 38: 1242-1251. DOI: 10.1109/Jsac.2020.2986620  0.45
2020 Shen M, Duan J, Zhu L, Zhang J, Du X, Guizani M. Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds Ieee Journal On Selected Areas in Communications. 38: 1229-1241. DOI: 10.1109/Jsac.2020.2986619  0.389
2020 Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT Ieee Journal On Selected Areas in Communications. 38: 942-954. DOI: 10.1109/Jsac.2020.2980916  0.359
2020 Sun G, Song L, Yu H, Du X, Guizani M. A Two-tier Collection and Processing Scheme for Fog-based Mobile Crowd Sensing in the Internet of Vehicles Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3015967  0.391
2020 Su Y, LiWang M, Gao Z, Huang L, Du X, Guizani M. Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3008178  0.31
2020 Shafiq M, Tian Z, Bashir AK, Du X, Guizani M. CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3002255  0.331
2020 Shen M, Xu K, Du X, Reed MJ, Bhuiyan ZA, Zhang L, Mijumbi R. Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities Ieee Internet of Things Journal. 7: 3897-3900. DOI: 10.1109/Jiot.2020.2982522  0.367
2020 Gu J, Liu C, Zhuang Y, Du X, Zhuang F, Ying H, Zhao Y, Guizani M. Dynamic Measurement and Data Calibration for Aerial Mobile IoT Ieee Internet of Things Journal. 7: 5210-5219. DOI: 10.1109/Jiot.2020.2977910  0.331
2020 Gao J, Agyekum KOO, Sifah EB, Acheampong KN, Xia Q, Du X, Guizani M, Xia H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks Ieee Internet of Things Journal. 7: 4278-4291. DOI: 10.1109/Jiot.2019.2956241  0.433
2020 Guo J, Song B, Chen S, Yu FR, Du X, Guizani M. Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation Ieee Internet of Things Journal. 7: 5783-5791. DOI: 10.1109/Jiot.2019.2949633  0.402
2020 Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Ieee Communications Surveys and Tutorials. 22: 1646-1685. DOI: 10.1109/Comst.2020.2988293  0.393
2020 Xuan S, Tang D, Chung I, Cho Y, Du X, Yang W. Network Traffic Sampling System Based on Storage Compression for Application Classification Detection Ieee Access. 8: 63106-63120. DOI: 10.1109/Access.2020.2984258  0.391
2020 Biswas R, Wu J, Du X, Yang Y. Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks Cyber-Physical Systems. 1-20. DOI: 10.1080/23335777.2020.1811387  0.344
2020 Khan S, Zhu L, Yu X, Zhang Z, Rahim MA, Khan M, Du X, Guizani M. Accountable credential management system for vehicular communication Vehicular Communications. 25: 100279. DOI: 10.1016/J.Vehcom.2020.100279  0.416
2020 Smahi A, Xia Q, Xia H, Sulemana N, Fateh AA, Gao J, Du X, Guizani M. A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data Pervasive and Mobile Computing. 66: 101195. DOI: 10.1016/J.Pmcj.2020.101195  0.442
2020 Niu W, Zhang X, Du X, Zhao L, Cao R, Guizani M. A deep learning based static taint analysis approach for IoT software vulnerability location Measurement. 152: 107139. DOI: 10.1016/J.Measurement.2019.107139  0.335
2020 Chi K, Du X, Yin G, Wu J, Guizani M, Han Q, Yang Y. Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking Future Generation Computer Systems. 112: 297-306. DOI: 10.1016/J.Future.2020.05.026  0.386
2020 Xu C, Zhang L, Zhu L, Zhang C, Du X, Guizani M, Sharif K. Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN Future Generation Computer Systems. 111: 107-116. DOI: 10.1016/J.Future.2020.04.021  0.462
2020 Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city Future Generation Computer Systems. 107: 433-442. DOI: 10.1016/J.Future.2020.02.017  0.34
2020 Zhu L, Lwamo NMR, Sharif K, Xu C, Du X, Guizani M, Li F. T-CAM: Time-based content access control mechanism for ICN subscription systems Future Generation Computer Systems. 106: 607-621. DOI: 10.1016/J.Future.2020.01.039  0.466
2020 Guan Z, Lu X, Wang N, Wu J, Du X, Guizani M. Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach Future Generation Computer Systems. 110: 686-695. DOI: 10.1016/J.Future.2019.09.027  0.349
2020 Guan Z, Sun X, Shi L, Wu L, Du X. A differentially private greedy decision forest classification algorithm with high utility Computers & Security. 96: 101930. DOI: 10.1016/J.Cose.2020.101930  0.307
2020 Shafiq M, Tian Z, Bashir AK, Du X, Guizani M. IoT malicious traffic identification using wrapper-based feature selection mechanisms Computers & Security. 94: 101863. DOI: 10.1016/J.Cose.2020.101863  0.343
2020 Xuan S, Zheng L, Chung I, Wang W, Man D, Du X, Yang W, Guizani M. An incentive mechanism for data sharing based on blockchain with smart contracts Computers & Electrical Engineering. 83: 106587. DOI: 10.1016/J.Compeleceng.2020.106587  0.371
2020 Chen Y, Qiu J, Du X, Yin L, Tian Z. Security of Mobile Multimedia Data:The Adversarial Examples for Spatio-temporal Data Computer Networks. 181: 107432. DOI: 10.1016/J.Comnet.2020.107432  0.399
2020 Cheng Z, Chen N, Liu B, Gao Z, Huang L, Du X, Guizani M. Joint user association and resource allocation in HetNets based on user mobility prediction Computer Networks. 177: 107312. DOI: 10.1016/J.Comnet.2020.107312  0.381
2020 Man D, Lu Q, Wang Y, Wu Y, Du X, Guizani M. An adaptive cache management approach in ICN with pre-filter queues Computer Communications. 153: 250-263. DOI: 10.1016/J.Comcom.2020.01.062  0.389
2020 Chen Y, Song B, Du X, Guizani N. The enhancement of catenary image with low visibility based on multi-feature fusion network in railway industry Computer Communications. 152: 200-205. DOI: 10.1016/J.Comcom.2020.01.040  0.35
2020 Zheng B, Zhu L, Shen M, Du X, Guizani M. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering Science in China Series F: Information Sciences. 63: 132101. DOI: 10.1007/S11432-019-9900-9  0.399
2020 Xu C, Xie X, Zhu L, Sharif K, Zhang C, Du X, Guizani M. PPLS: a privacy-preserving location-sharing scheme in mobile online social networks Science China Information Sciences. 63. DOI: 10.1007/S11432-019-1508-6  0.43
2020 Rathore H, Fu C, Mohamed A, Al-Ali AK, Du X, Guizani M, Yu Z. Multi-layer security scheme for implantable medical devices Neural Computing and Applications. 32: 4347-4360. DOI: 10.1007/S00521-018-3819-0  0.41
2019 He Y, Zhai D, Zhang R, Du X, Guizani M. An Anti-Interference Scheme for UAV Data Links in Air-Ground Integrated Vehicular Networks. Sensors (Basel, Switzerland). 19. PMID 31683703 DOI: 10.3390/S19214742  0.436
2019 Zhang C, Zhu L, Xu C, Du X, Guizani M. A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing. Sensors (Basel, Switzerland). 19. PMID 30871229 DOI: 10.3390/S19061274  0.364
2019 Obour Agyekum KO, Xia Q, Sifah EB, Gao J, Xia H, Du X, Guizani M. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors (Basel, Switzerland). 19. PMID 30862110 DOI: 10.3390/S19051235  0.451
2019 Gu J, Huang R, Jiang L, Qiao G, Du X, Guizani M. A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices. Sensors (Basel, Switzerland). 19. PMID 30857140 DOI: 10.3390/S19051184  0.427
2019 Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M. Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors (Basel, Switzerland). 19. PMID 30823597 DOI: 10.3390/S19040974  0.332
2019 Kang X, Song B, Guo J, Du X, Guizani M. A Self-Selective Correlation Ship Tracking Method for Smart Ocean Systems. Sensors (Basel, Switzerland). 19. PMID 30781563 DOI: 10.3390/S19040821  0.313
2019 Gu J, Dong Z, Zhang C, Du X, Guizani M. Dynamic Stress Measurement with Sensor Data Compensation Electronics. 8: 859. DOI: 10.3390/Electronics8080859  0.379
2019 Sun J, Huang G, Sangaiah AK, Zhu G, Du X. Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective Security and Communication Networks. 2019: 1-15. DOI: 10.1155/2019/4074272  0.429
2019 Wang Q, Du X, Gao Z, Guizani M. An Optimal Channel Occupation Time Adjustment Method for LBE in Unlicensed Spectrum Ieee Transactions On Vehicular Technology. 68: 10943-10955. DOI: 10.1109/Tvt.2019.2940123  0.396
2019 Su Y, Lu X, Huang L, Du X, Guizani M. A Novel DCT-Based Compression Scheme for 5G Vehicular Networks Ieee Transactions On Vehicular Technology. 68: 10872-10881. DOI: 10.1109/Tvt.2019.2939619  0.457
2019 Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M. Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory Ieee Transactions On Vehicular Technology. 68: 5971-5980. DOI: 10.1109/Tvt.2019.2910217  0.361
2019 Niu W, Zhuo Z, Zhang X, Du X, Yang G, Guizani M. A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification Ieee Transactions On Vehicular Technology. 68: 3843-3853. DOI: 10.1109/Tvt.2019.2894290  0.407
2019 Sun G, Song L, Yu H, Chang V, Du X, Guizani M. V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model Ieee Transactions On Vehicular Technology. 68: 908-922. DOI: 10.1109/Tvt.2018.2884525  0.367
2019 Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Sun Y, Guizani N. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment Ieee Transactions On Industrial Informatics. 15: 4285-4294. DOI: 10.1109/Tii.2019.2907754  0.439
2019 Zeng Q, Luo L, Qian Z, Du X, Li Z, Huang C, Farkas C. Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957787  0.316
2019 Chen S, Song B, Fan L, Du X, Guizani M. Multi-Modal Data Semantic Localization With Relationship Dependencies for Efficient Signal Processing in EH CRNs Ieee Transactions On Cognitive Communications and Networking. 5: 347-357. DOI: 10.1109/Tccn.2019.2893360  0.356
2019 Niu W, Zhang X, Du X, Hu T, Xie X, Guizani N. Detecting Malware on X86-Based IoT Devices in Autonomous Driving Ieee Wireless Communications. 26: 80-87. DOI: 10.1109/Mwc.2019.1800505  0.331
2019 LiWang M, Dai S, Gao Z, Du X, Guizani M, Dai H. A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture Ieee Wireless Communications. 26: 124-132. DOI: 10.1109/Mwc.2019.1800364  0.418
2019 Wang D, Song B, Chen D, Du X. Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks Ieee Wireless Communications. 26: 54-61. DOI: 10.1109/Mwc.2019.1800353  0.399
2019 Lin Z, Du X, Chen H, Ai B, Chen Z, Wu D. Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks Ieee Wireless Communications. 26: 72-77. DOI: 10.1109/Mwc.2019.1800035  0.355
2019 Zhu L, Zhang C, Xu C, Du X, Guizani N, Sharif K. Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis Ieee Wireless Communications. 26: 18-23. DOI: 10.1109/Mwc.001.1900123  0.396
2019 Yu Y, Li H, Chen R, Zhao Y, Yang H, Du X. Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning Ieee Network. 33: 82-87. DOI: 10.1109/Mnet.2019.1800362  0.471
2019 Li Y, Susilo W, Yang G, Yu Y, Du X, Liu D, Guizani N. Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies Ieee Network. 33: 111-117. DOI: 10.1109/Mnet.2019.1800271  0.366
2019 Zhu L, Li M, Zhang Z, Xu C, Zhang R, Du X, Guizani N. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid Ieee Communications Magazine. 57: 80-85. DOI: 10.1109/Mcom.2019.1700859  0.448
2019 Sun G, Zhu G, Liao D, Yu H, Du X, Guizani M. Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks Ieee Systems Journal. 13: 3877-3888. DOI: 10.1109/Jsyst.2018.2879883  0.409
2019 Su Y, Lu X, Zhao Y, Huang L, Du X. Cooperative Communications With Relay Selection Based on Deep Reinforcement Learning in Wireless Sensor Networks Ieee Sensors Journal. 19: 9561-9569. DOI: 10.1109/Jsen.2019.2925719  0.431
2019 Xia Q, Sifah EB, Agyekum KOO, Xia H, Acheampong KN, Smahi A, Gao J, Du X, Guizani M. Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments Ieee Internet of Things Journal. 6: 10749-10762. DOI: 10.1109/Jiot.2019.2941638  0.427
2019 Yao X, Liao W, Du X, Cheng X, Guizani M. Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks Ieee Internet of Things Journal. 6: 10396-10407. DOI: 10.1109/Jiot.2019.2939144  0.434
2019 Sun G, Zhang F, Liao D, Yu H, Du X, Guizani M. Optimal Energy Trading for Plug-In Hybrid Electric Vehicles Based on Fog Computing Ieee Internet of Things Journal. 6: 2309-2324. DOI: 10.1109/Jiot.2019.2906186  0.334
2019 Shen M, Tang X, Zhu L, Du X, Guizani M. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities Ieee Internet of Things Journal. 6: 7702-7712. DOI: 10.1109/Jiot.2019.2901840  0.41
2019 Sun G, Wang K, Yu H, Du X, Guizani M. Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design Ieee Internet of Things Journal. 6: 5363-5375. DOI: 10.1109/Jiot.2019.2900661  0.413
2019 Wang F, Xu Y, Zhu L, Du X, Guizani M. LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT Ieee Internet of Things Journal. 6: 4462-4471. DOI: 10.1109/Jiot.2018.2888636  0.408
2019 Yu Y, Ding Y, Zhao Y, Li Y, Zhao Y, Du X, Guizani M. LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT Ieee Internet of Things Journal. 6: 4702-4710. DOI: 10.1109/Jiot.2018.2878406  0.389
2019 Shen M, Ma B, Zhu L, Du X, Xu K. Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Ieee Internet of Things Journal. 6: 1998-2008. DOI: 10.1109/Jiot.2018.2871607  0.44
2019 Liu J, Cao H, Li Q, Cai F, Du X, Guizani M. A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing Ieee Internet of Things Journal. 6: 1321-1330. DOI: 10.1109/Jiot.2018.2828463  0.448
2019 Zhao Y, Xu X, Su Y, Huang L, Du X, Guizani N. Multi-User MAC Protocol for WLANs in MmWave Massive MIMO Systems With Mobile Edge Computing Ieee Access. 7: 181242-181256. DOI: 10.1109/Access.2019.2952174  0.361
2019 Zhang Y, Dong P, Du X, Luo H, Zheng T, Guizani M. BNNC: Improving Performance of Multipath Transmission in Heterogeneous Vehicular Networks Ieee Access. 7: 158113-158125. DOI: 10.1109/Access.2019.2948954  0.422
2019 He Y, Tang X, Zhang R, Du X, Zhou D, Guizani M. A Course-Aware Opportunistic Routing Protocol for FANETs Ieee Access. 7: 144303-144312. DOI: 10.1109/Access.2019.2944867  0.42
2019 Ping Y, Hao B, Hei X, Tu Y, Du X, Wu J. Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems Ieee Access. 7: 121286-121302. DOI: 10.1109/Access.2019.2937805  0.383
2019 Wang D, Qin H, Song B, Du X, Guizani M. Resource Allocation in Information-Centric Wireless Networking With D2D-Enabled MEC: A Deep Reinforcement Learning Approach Ieee Access. 7: 114935-114944. DOI: 10.1109/Access.2019.2935545  0.369
2019 Sun G, Chen Z, Yu H, Du X, Guizani M. Online Parallelized Service Function Chain Orchestration in Data Center Networks Ieee Access. 7: 100147-100161. DOI: 10.1109/Access.2019.2930295  0.408
2019 Sun G, Cai S, Yu H, Maharjan S, Chang V, Du X, Guizani M. Location Privacy Preservation for Mobile Users in Location-Based Services Ieee Access. 7: 87425-87438. DOI: 10.1109/Access.2019.2925571  0.422
2019 Zhang R, Guo Q, Zhai D, Zhou D, Du X, Guizani M. Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks Ieee Access. 7: 80870-80883. DOI: 10.1109/Access.2019.2923538  0.4
2019 Sun G, Xu Z, Yu H, Chang VI, Du X, Guizani M. Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers Ieee Access. 7: 80219-80232. DOI: 10.1109/Access.2019.2923096  0.334
2019 Han Q, Lu D, Zhang K, Du X, Guizani M. A Prediction Method for Destination Based on the Semantic Transfer Model Ieee Access. 7: 73756-73763. DOI: 10.1109/Access.2019.2918594  0.318
2019 He W, Su Y, Xu X, Luo Z, Huang L, Du X. Cooperative Content Caching for Mobile Edge Computing With Network Coding Ieee Access. 7: 67695-67707. DOI: 10.1109/Access.2019.2917977  0.356
2019 Zhu W, Yang W, Xuan S, Man D, Wang W, Du X, Guizani M. Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks Ieee Access. 7: 27272-27287. DOI: 10.1109/Access.2019.2900708  0.348
2019 Liwang M, Wang J, Gao Z, Du X, Guizani M. Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV Ieee Access. 7: 32551-32561. DOI: 10.1109/Access.2019.2897617  0.363
2019 Lv J, Song B, Guo J, Du X, Guizani M. Interest-Related Item Similarity Model Based on Multimodal Data for Top-N Recommendation Ieee Access. 7: 12809-12821. DOI: 10.1109/Access.2019.2893355  0.349
2019 Guan Z, Liu X, Diao H, Du X, Zhang Z, Su L. Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things Ieee Access. 7: 5784-5794. DOI: 10.1109/Access.2018.2889642  0.403
2019 Zhao Y, Liu Y, Tian A, Yu Y, Du X. Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things Journal of Parallel and Distributed Computing. 132: 141-149. DOI: 10.1016/J.Jpdc.2019.06.001  0.442
2019 Luo L, Yu H, Luo S, Ye Z, Du X, Guizani M. Scalable explicit path control in software-defined networks Journal of Network and Computer Applications. 141: 86-103. DOI: 10.1016/J.Jnca.2019.05.014  0.36
2019 Sun G, Sun S, Sun J, Yu H, Du X, Guizani M. Security and privacy preservation in fog-based crowd sensing on the internet of vehicles Journal of Network and Computer Applications. 134: 89-99. DOI: 10.1016/J.Jnca.2019.02.018  0.455
2019 Zhao Y, Yu Y, Li Y, Han G, Du X. Machine learning based privacy-preserving fair data trading in big data market Information Sciences. 478: 449-460. DOI: 10.1016/J.Ins.2018.11.028  0.385
2019 Xue L, Yu Y, Li Y, Au MH, Du X, Yang B. Efficient attribute-based encryption with attribute revocation for assured data deletion Information Sciences. 479: 640-650. DOI: 10.1016/J.Ins.2018.02.015  0.42
2019 Belkhouja T, Du X, Mohamed A, Al-Ali AK, Guizani M. Biometric-based authentication scheme for Implantable Medical Devices during emergency situations Future Generation Computer Systems. 98: 109-119. DOI: 10.1016/J.Future.2019.02.002  0.367
2019 Guan Z, Lv Z, Du X, Wu L, Guizani M. Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach Future Generation Computer Systems. 98: 60-68. DOI: 10.1016/J.Future.2019.01.058  0.329
2019 Guo J, Song B, Chi Y, Jayasinghe L, Yuen C, Guan YL, Du X, Guizani M. Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications Future Generation Computer Systems. 95: 629-638. DOI: 10.1016/J.Future.2019.01.041  0.4
2019 Tian Z, Su S, Shi W, Du X, Guizani M, Yu X. A data-driven method for future Internet route decision modeling Future Generation Computer Systems. 95: 212-220. DOI: 10.1016/J.Future.2018.12.054  0.363
2019 Su Y, Lu X, Huang L, Du X, Guizani M. Tac-U: A traffic balancing scheme over licensed and unlicensed bands for Tactile Internet Future Generation Computer Systems. 97: 41-49. DOI: 10.1016/J.Future.2018.11.009  0.437
2019 Sun G, Li Y, Yu H, Vasilakos AV, Du X, Guizani M. Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks Future Generation Computer Systems. 91: 347-360. DOI: 10.1016/J.Future.2018.09.037  0.384
2019 Zhang C, Zhu L, Xu C, Sharif K, Du X, Guizani M. LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT Future Generation Computer Systems. 90: 175-184. DOI: 10.1016/J.Future.2018.07.064  0.434
2019 Liu X, Zhuo Z, Du X, Zhang X, Zhu Q, Guizani M. Adversarial attacks against profile HMM website fingerprinting detection model Cognitive Systems Research. 54: 83-89. DOI: 10.1016/J.Cogsys.2018.12.005  0.401
2019 Sun R, Zheng H, Liu J, Du X, Guizani M. Placement delivery array design for the coded caching scheme in medical data sharing Neural Computing and Applications. 32: 867-878. DOI: 10.1007/S00521-019-04042-X  0.402
2018 Li Y, Song B, Kang X, Du X, Guizani M. Vehicle-Type Detection Based on Compressed Sensing and Deep Learning in Vehicular Networks. Sensors (Basel, Switzerland). 18. PMID 30572635 DOI: 10.3390/S18124500  0.367
2018 Zhang R, Liu J, Du X, Li B, Guizani M. AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions. Sensors (Basel, Switzerland). 18. PMID 30126251 DOI: 10.3390/S18082727  0.354
2018 Liu X, Zhang X, Guizani N, Lu J, Zhu Q, Du X. TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems. Sensors (Basel, Switzerland). 18. PMID 30103460 DOI: 10.3390/S18082630  0.342
2018 Song J, Dong P, Zhou H, Zheng T, Du X, Guizani M. A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services Sustainability. 10: 1337. DOI: 10.3390/Su10051337  0.387
2018 Belkhouja T, Du X, Mohamed A, Al-Ali AK, Guizani M. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems Journal of Sensor and Actuator Networks. 7: 21. DOI: 10.3390/Jsan7020021  0.389
2018 Chen Z, Zou S, Tang Y, Du X, Guizani M. Radio resource coordination and scheduling scheme in ultra-dense cloud-based small cell networks Eurasip Journal On Wireless Communications and Networking. 2018: 137. DOI: 10.1186/S13638-018-1150-1  0.465
2018 Sun G, Zhang Y, Liao D, Yu H, Du X, Guizani M. Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks Ieee Transactions On Vehicular Technology. 67: 7550-7563. DOI: 10.1109/Tvt.2018.2828651  0.403
2018 Zhang Y, Song B, Du X, Guizani M. Vehicle Tracking Using Surveillance With Multimodal Data Fusion Ieee Transactions On Intelligent Transportation Systems. 19: 2353-2361. DOI: 10.1109/Tits.2017.2787101  0.318
2018 Yu Y, Xue L, Li Y, Du X, Guizani M, Yang B. Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications Ieee Transactions On Industrial Informatics. 14: 4538-4547. DOI: 10.1109/Tii.2018.2841047  0.428
2018 Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M. File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things Ieee Transactions On Industrial Informatics. 14: 3648-3658. DOI: 10.1109/Tii.2018.2794442  0.447
2018 Shen M, Ma B, Zhu L, Mijumbi R, Du X, Hu J. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection Ieee Transactions On Information Forensics and Security. 13: 940-953. DOI: 10.1109/Tifs.2017.2774451  0.337
2018 Zhang H, Zhou Z, Ye L, Du X. Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud Ieee Transactions On Cloud Computing. 6: 316-329. DOI: 10.1109/Tcc.2015.2430316  0.381
2018 Du X, Chen H, Zhu L, Li J, Chang Z. Security and Privacy in Wireless IoT Ieee Wireless Communications. 25: 10-11. DOI: 10.1109/Mwc.2018.8600750  0.436
2018 Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M. Security in Mobile Edge Caching with Reinforcement Learning Ieee Wireless Communications. 25: 116-122. DOI: 10.1109/Mwc.2018.1700291  0.432
2018 Zhu L, Li M, Zhang Z, Du X, Guizani M. Big Data Mining of Users’ Energy Consumption Patterns in the Wireless Smart Grid Ieee Wireless Communications. 25: 84-89. DOI: 10.1109/Mwc.2018.1700157  0.442
2018 Dong P, Zheng T, Du X, Zhang H, Guizani M. SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail Ieee Network. 32: 64-71. DOI: 10.1109/Mnet.2018.1700330  0.388
2018 Wang D, Chen D, Song B, Guizani N, Yu X, Du X. From IoT to 5G I-IoT: The Next Generation IoT-Based Intelligent Algorithms and 5G Technologies Ieee Communications Magazine. 56: 114-120. DOI: 10.1109/Mcom.2018.1701310  0.372
2018 Yu Y, Li Y, Du X, Chen R, Yang B. Content Protection in Named Data Networking: Challenges and Potential Solutions Ieee Communications Magazine. 56: 82-87. DOI: 10.1109/Mcom.2018.1701086  0.458
2018 Gu J, Su T, Wang Q, Du X, Guizani M. Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV Ieee Communications Magazine. 56: 82-89. DOI: 10.1109/Mcom.2018.1700422  0.438
2018 Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities Ieee Communications Magazine. 56: 82-88. DOI: 10.1109/Mcom.2018.1700401  0.432
2018 Zhu L, Tang X, Shen M, Du X, Guizani M. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks Ieee Journal On Selected Areas in Communications. 36: 628-643. DOI: 10.1109/Jsac.2018.2815442  0.42
2018 Zhen L, Qin H, Song B, Ding R, Du X, Guizani M. Random Access Preamble Design and Detection for Mobile Satellite Communication Systems Ieee Journal On Selected Areas in Communications. 36: 280-291. DOI: 10.1109/Jsac.2018.2804138  0.369
2018 Zhu L, Zhang C, Xu C, Du X, Xu R, Sharif K, Guizani M. PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles Ieee Internet of Things Journal. 5: 2457-2466. DOI: 10.1109/Jiot.2018.2846653  0.418
2018 Wang J, Zhang R, Yuan J, Du X. A 3-Dimensional Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2018.2803111  0.354
2018 Yan X, Dong P, Du X, Zheng T, Zhang H, Guizani M. Congestion Game With Link Failures for Network Selection in High-Speed Vehicular Networks Ieee Access. 6: 76165-76175. DOI: 10.1109/Access.2018.2884766  0.394
2018 Ye L, Yu X, Zhao J, Zhan D, Du X, Guizani M. Deciding Your Own Anonymity: User-Oriented Node Selection in I2P Ieee Access. 6: 71350-71359. DOI: 10.1109/Access.2018.2881719  0.372
2018 Li M, Zhu L, Zhang Z, Du X, Guizani M. PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing Ieee Access. 6: 66188-66197. DOI: 10.1109/Access.2018.2878792  0.441
2018 Zhu W, Yang W, Xuan S, Man D, Wang W, Du X. Location-Aware Influence Blocking Maximization in Social Networks Ieee Access. 6: 61462-61477. DOI: 10.1109/Access.2018.2876141  0.337
2018 Xu R, Zhu L, Wang A, Du X, Choo KR, Zhang G, Gai K. Side-Channel Attack on a Protected RFID Card Ieee Access. 6: 58395-58404. DOI: 10.1109/Access.2018.2870663  0.343
2018 Liu J, Li Q, Cao H, Sun R, Du X, Guizani M. MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles Ieee Access. 6: 50974-50983. DOI: 10.1109/Access.2018.2869543  0.466
2018 Zhang Y, Song B, Gao S, Du X, Guizani M. Monopolistic Models for Resource Allocation: A Probabilistic Reinforcement Learning Approach Ieee Access. 6: 49721-49731. DOI: 10.1109/Access.2018.2868476  0.371
2018 Ye L, Yu X, Yu L, Guo B, Zhan D, Du X, Guizani M. Checking Function-Level Kernel Control Flow Integrity for Cloud Computing Ieee Access. 6: 41856-41865. DOI: 10.1109/Access.2018.2859767  0.362
2018 Rathore H, Wenzel L, Al-Ali AK, Mohamed A, Du X, Guizani M. Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment Ieee Access. 6: 44718-44730. DOI: 10.1109/Access.2018.2854822  0.385
2018 Sun S, Fu X, Ruan H, Du X, Luo B, Guizani M. Real-Time Behavior Analysis and Identification for Android Application Ieee Access. 6: 38041-38051. DOI: 10.1109/Access.2018.2853121  0.333
2018 Han Q, Lu D, Zhang K, Du X, Guizani M. Lclean: A Plausible Approach to Individual Trajectory Data Sanitization Ieee Access. 6: 30110-30116. DOI: 10.1109/Access.2018.2833163  0.344
2018 Gu J, Sun B, Du X, Wang J, Zhuang Y, Wang Z. Consortium Blockchain-Based Malware Detection in Mobile Devices Ieee Access. 6: 12118-12128. DOI: 10.1109/Access.2018.2805783  0.34
2018 Su Y, Du X, Huang L, Gao Z, Guizani M. LTE-U and Wi-Fi Coexistence Algorithm Based on Q-Learning in Multi-Channel Ieee Access. 6: 13644-13652. DOI: 10.1109/Access.2018.2803258  0.345
2018 Liu J, Zhang L, Sun R, Du X, Guizani M. Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings Ieee Access. 6: 7854-7863. DOI: 10.1109/Access.2018.2797102  0.44
2018 Zhou Z, Zhang H, Li S, Du X. Hermes: A Privacy-Preserving Approximate Search Framework for Big Data Ieee Access. 6: 20009-20020. DOI: 10.1109/Access.2017.2788013  0.394
2018 Lv J, Man D, Yang W, Du X, Yu M. Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information Ieee Access. 6: 30117-30127. DOI: 10.1109/Access.2017.2785444  0.347
2018 Zhan D, Ye L, Zhang H, Fang B, Li H, Liu Y, Du X, Guizani M. A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT Future Generation Computer Systems. 88: 209-219. DOI: 10.1016/J.Future.2018.05.055  0.351
2018 Yan X, Dong P, Du X, Zheng T, Sun J, Guizani M. Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks Computer Networks. 145: 165-174. DOI: 10.1016/J.Comnet.2018.08.019  0.408
2018 Chen S, Song B, Guo J, Zhang Y, Du X, Guizani M. FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval Computer Networks. 143: 98-111. DOI: 10.1016/J.Comnet.2018.07.011  0.336
2018 Li Y, Gao Z, Huang L, Du X, Guizani M. Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies Computer Communications. 127: 30-35. DOI: 10.1016/J.Comcom.2018.05.012  0.422
2018 Zhang R, Wang J, Zhong Z, Li C, Du X, Guizani M. Energy-Efficient Beamforming for 3.5 GHz 5G Cellular Networks based on 3D Spatial Channel Characteristics Computer Communications. 121: 59-70. DOI: 10.1016/J.Comcom.2018.02.019  0.332
2018 Sifah EB, Xia Q, Agyekum KOO, Amofa S, Gao J, Chen R, Xia H, Gee JC, Du X, Guizani M. Chain-based big data access control infrastructure The Journal of Supercomputing. 74: 4945-4964. DOI: 10.1007/S11227-018-2308-7  0.46
2018 Su M, Zhang H, Bhuiyan ZA, Du X, Zhang P. An effective copyright‐protected content delivery scheme for P2P file sharing networks International Journal of Communication Systems. 31. DOI: 10.1002/Dac.3476  0.398
2017 Luo Z, LiWang M, Lin Z, Huang L, Du X, Guizani M. Energy-Efficient Caching for Mobile Edge Computing in 5G Networks Applied Sciences. 7: 557. DOI: 10.3390/App7060557  0.425
2017 Man D, Yang W, Xuan S, Du X. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters Security and Communication Networks. 2017: 1-9. DOI: 10.1155/2017/5350201  0.357
2017 Zhu X, Hao R, Chi H, Du X. FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins Ieee Transactions On Vehicular Technology. 66: 10461-10469. DOI: 10.1109/Tvt.2017.2764999  0.393
2017 Xiao L, Li Y, Huang X, Du X. Cloud-Based Malware Detection Game for Mobile Devices with Offloading Ieee Transactions On Mobile Computing. 16: 2742-2750. DOI: 10.1109/Tmc.2017.2687918  0.416
2017 Guan Z, Li J, Zhu L, Zhang Z, Du X, Guizani M. Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources Ieee Transactions On Industrial Informatics. 13: 3216-3225. DOI: 10.1109/Tii.2017.2706760  0.43
2017 Zhao C, Huang L, Zhao Y, Du X. Secure Machine-Type Communications toward LTE Heterogeneous Networks Ieee Wireless Communications. 24: 82-87. DOI: 10.1109/Mwc.2017.1600141Wc  0.438
2017 Fu X, Gao Y, Luo B, Du X, Guizani M. Security Threats to Hadoop: Data Leakage Attacks and Investigation Ieee Network. 31: 67-71. DOI: 10.1109/Mnet.2017.1500095Nm  0.373
2017 Wu L, Du X, Guizani M, Mohamed A. Access Control Schemes for Implantable Medical Devices: A Survey Ieee Internet of Things Journal. 4: 1272-1283. DOI: 10.1109/Jiot.2017.2708042  0.393
2017 Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid Ieee Internet of Things Journal. 4: 1934-1944. DOI: 10.1109/Jiot.2017.2690522  0.439
2017 Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain Ieee Access. 5: 14757-14767. DOI: 10.1109/Access.2017.2730843  0.34
2017 Xu R, Wang R, Guan Z, Wu L, Wu J, Du X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid Ieee Access. 5: 13787-13798. DOI: 10.1109/Access.2017.2728681  0.385
2017 Lin Z, Huang L, Zhao Y, Du X, Guizani M. P2P-based resource allocation with coalitional game for D2D networks Pervasive and Mobile Computing. 42: 487-497. DOI: 10.1016/J.Pmcj.2017.06.001  0.424
2017 Cheng Y, Fu X, Du X, Luo B, Guizani M. A lightweight live memory forensic approach based on hardware virtualization Information Sciences. 379: 23-41. DOI: 10.1016/J.Ins.2016.07.019  0.314
2017 Zhao C, Huang M, Huang L, Du X, Guizani M. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks Computer Networks. 128: 164-171. DOI: 10.1016/J.Comnet.2017.05.028  0.483
2017 Li Y, Gao Z, Huang L, Du X, Guizani M. Resource management for future mobile networks Computer Networks. 129: 392-398. DOI: 10.1016/J.Comnet.2017.04.007  0.436
2016 Zhang Y, Song B, Zhang Y, Du X, Guizani M. Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning. Sensors (Basel, Switzerland). 16. PMID 27916841 DOI: 10.3390/S16122021  0.38
2016 Chen J, Lin Z, Liu Y, Hu Y, Du X. Sink Location Protection Protocols Based on Packet Sending Rate Adjustment International Journal of Distributed Sensor Networks. 12: 6354514. DOI: 10.1155/2016/6354514  0.401
2016 Dong P, Song B, Zhang H, Du X. Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks Ieee Transactions On Vehicular Technology. 65: 9493-9507. DOI: 10.1109/Tvt.2016.2581020  0.46
2016 Wu L, Du X, Wu J. Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms Ieee Transactions On Vehicular Technology. 65: 6678-6691. DOI: 10.1109/Tvt.2015.2472993  0.427
2016 Wang K, Li X, Ji H, Du X. Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic Ieee Transactions On Vehicular Technology. 65: 5595-5610. DOI: 10.1109/Tvt.2014.2328232  0.345
2016 Guo J, Song B, Du X. Significance Evaluation of Video Data Over Media Cloud Based on Compressed Sensing Ieee Transactions On Multimedia. 18: 1297-1304. DOI: 10.1109/Tmm.2016.2564100  0.352
2016 Zhang Y, Tian F, Song B, Du X. Social vehicle swarms: A novel perspective on socially aware vehicular communication architecture Ieee Wireless Communications. 23: 82-89. DOI: 10.1109/Mwc.2016.7553030  0.344
2016 Zhang H, Xu Z, Du X, Zhou Z, Shi J. CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing Wireless Communications and Mobile Computing. 16: 2179-2193. DOI: 10.1002/Wcm.2675  0.403
2016 Han Q, Shao B, Li L, Ma Z, Zhang H, Du X. Publishing histograms with outliers under data differential privacy Security and Communication Networks. DOI: 10.1002/Sec.1493  0.346
2015 Guan Z, Yang T, Du X. Achieving secure and efficient data access control for cloud-integrated body sensor networks International Journal of Distributed Sensor Networks. 2015: 142. DOI: 10.1155/2015/101287  0.452
2015 Zhang H, Zhang Q, Du X. Toward Vehicle-Assisted Cloud Computing for Smartphones Ieee Transactions On Vehicular Technology. 64: 5610-5618. DOI: 10.1109/Tvt.2015.2480004  0.369
2015 Wang K, Li X, Ji H, Du X. Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic Ieee Transactions On Vehicular Technology. 64: 5904-5918. DOI: 10.1109/Tvt.2014.2386352  0.332
2015 Chen L, Bian K, Du X, Li X. Multichannel Broadcast Via Channel Hopping in Cognitive Radio Networks Ieee Transactions On Vehicular Technology. 64: 3004-3017. DOI: 10.1109/Tvt.2014.2349996  0.38
2015 Hei X, Du X, Lin S, Lee I, Sokolsky O. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System Ieee Transactions On Parallel and Distributed Systems. 26: 3108-3121. DOI: 10.1109/Tpds.2014.2370045  0.347
2015 Zhang H, Chen S, Li X, Ji H, Du X. Interference management for heterogeneous networks with spectral efficiency improvement Ieee Wireless Communications. 22: 101-107. DOI: 10.1109/Mwc.2015.7096292  0.407
2015 Zhang H, Zhang Q, Zhou Z, Du X, Yu W, Guizani M. Processing geo-dispersed big data in an advanced mapreduce framework Ieee Network. 29: 24-30. DOI: 10.1109/Mnet.2015.7293301  0.401
2015 Wang X, Han G, Du X, Rodrigues JJPC. Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial] Ieee Network. 29: 4-5. DOI: 10.1109/Mnet.2015.7064896  0.415
2015 Li K, Zheng H, Wu J, Du X. Virtual machine placement in cloud systems through migration process International Journal of Parallel, Emergent and Distributed Systems. 30: 393-410. DOI: 10.1080/17445760.2014.931957  0.339
2015 Fu X, Du X, Luo B. Data correlation-based analysis methods for automatic memory forensic Security and Communication Networks. 8: 4213-4226. DOI: 10.1002/Sec.1337  0.313
2015 Huang X, Du X. Achieving data privacy on hybrid cloud Security and Communication Networks. 8: 3771-3781. DOI: 10.1002/Sec.1298  0.389
2014 Xu Q, Li X, Ji H, Du X. Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic Perspective Ieee Transactions On Vehicular Technology. 63: 2071-2082. DOI: 10.1109/Tvt.2014.2312288  0.361
2014 Wu L, Du X, Fu X. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones Ieee Communications Magazine. 52: 80-87. DOI: 10.1109/Mcom.2014.6766089  0.419
2014 Jiang Y, Du X, Cheng W. Group-based key array authentication protocol in radio frequency identification systems Iet Information Security. 8: 290-296. DOI: 10.1049/Iet-Ifs.2012.0241  0.4
2014 Zhang H, Ye L, Shi J, Du X, Guizani M. Verifying cloud service-level agreement by a third-party auditor Security and Communication Networks. 7: 492-502. DOI: 10.1002/Sec.740  0.375
2013 Huang L, Zhu G, Du X. Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage Ieee Wireless Communications. 20: 44-51. DOI: 10.1109/Mwc.2013.6507393  0.422
2013 Bian K, Park J, Du X, Li X. Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention Ieee Network. 27: 16-21. DOI: 10.1109/Mnet.2013.6523803  0.372
2013 Yao X, Han X, Du X, Zhou X. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications Ieee Sensors Journal. 13: 3693-3701. DOI: 10.1109/Jsen.2013.2266116  0.371
2013 Su M, Zhang H, Du X, Fang B, Guizani M. A Measurement Study on the Topologies of BitTorrent Networks Ieee Journal On Selected Areas in Communications. 31: 338-347. DOI: 10.1109/Jsac.2013.Sup.0513030  0.353
2013 Zhang H, Ye L, Shi J, Du X, Chen H. Preventing Piracy Content Propagation in Peer-to-Peer Networks Ieee Journal On Selected Areas in Communications. 31: 105-114. DOI: 10.1109/Jsac.2013.Sup.0513010  0.408
2012 Li X, Wu J, Lin S, Du X. Channel switching control policy for wireless mesh networks Journal of Parallel and Distributed Computing. 72: 1295-1305. DOI: 10.1016/J.Jpdc.2012.06.008  0.301
2012 Zhang W, Kandah F, Du X, Wang C. Self-protecting networking using dynamic p -cycle construction within link capacity constraint Security and Communication Networks. 5: 689-708. DOI: 10.1002/Sec.364  0.327
2010 Lin Y, Wu Q, Cai X, Du X, Kwon K. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks International Journal of Distributed Sensor Networks. 6: 563156. DOI: 10.1155/2010/563156  0.436
2010 Olteanu A, Xiao Y, Wu K, Du X. Weaving a proper net to catch large objects in wireless sensor networks Ieee Transactions On Wireless Communications. 9: 1360-1369. DOI: 10.1109/Twc.2010.04.081098  0.329
2009 Xiao Y, Chen H, Du X, Zhang Y, Chen H, Guizani M. On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks Ieee Transactions On Wireless Communications. 8: 4406-4410. DOI: 10.1109/Twc.2009.080717  0.394
2009 Xiao Y, Chen H, Du X, Guizani M. Stream-based cipher feedback mode in wireless error channel Ieee Transactions On Wireless Communications. 8: 622-626. DOI: 10.1109/Twc.2009.071278  0.305
2009 Du X, Guizani M, Xiao Y, Chen H. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks Ieee Transactions On Wireless Communications. 8: 1223-1229. DOI: 10.1109/Twc.2009.060598  0.407
2009 Xiao Y, Zhang Y, Peng M, Chen H, Du X, Sun B, Wu K. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks Computer Networks. 53: 2458-2475. DOI: 10.1016/J.Comnet.2009.05.002  0.311
2009 Brown J, Du X, Guizani M. Efficient rekeying algorithms for WiMAX networks Security and Communication Networks. 2: 392-400. DOI: 10.1002/Sec.124  0.455
2008 Du X, Guizani M, Xiao Y, Chen H. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks Ieee Transactions On Vehicular Technology. 57: 2387-2394. DOI: 10.1109/Tvt.2007.912327  0.405
2008 Du X, Chen H. Security in wireless sensor networks Ieee Wireless Communications. 15: 60-66. DOI: 10.1109/Mwc.2008.4599222  0.383
2008 Du X, Xiao Y, Dai F. Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks Wireless Communications and Mobile Computing. 8: 125-136. DOI: 10.1002/Wcm.452  0.361
2008 Du X, Shayman MA, Skoog RA. Designing fault tolerant networks to prevent poison message failure Security and Communication Networks. 1: 161-177. DOI: 10.1002/Sec.9  0.343
2007 Du X, Guizani M, Xiao Y, Chen H. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks Ieee Transactions On Wireless Communications. 6: 3395-3401. DOI: 10.1109/Twc.2007.06095  0.394
2007 Xiao Y, Chen H, Du X, Guizani M. Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems Ieee Transactions On Vehicular Technology. 56: 2745-2755. DOI: 10.1109/Tvt.2007.898380  0.422
2007 Guizani M, Du X, Chen H, Mueller P. Security in wireless mobile ad hoc and sensor networks [Guest Editorial] Ieee Wireless Communications. 14: 6-7. DOI: 10.1109/Mwc.2007.4396937  0.415
2007 Wu Q, Rao NSV, Du X, Iyengar SS, Vaishnavi VK. On efficient deployment of sensors on planar grid Computer Communications. 30: 2721-2734. DOI: 10.1016/J.Comcom.2007.05.012  0.312
2007 Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M. A survey of key management schemes in wireless sensor networks Computer Communications. 30: 2314-2341. DOI: 10.1016/J.Comcom.2007.04.009  0.417
2007 Du X, Wu D. Joint design of routing and medium access control for hybrid mobile ad hoc networks Mobile Networks and Applications. 12: 57-68. DOI: 10.1007/S11036-006-0006-9  0.397
2006 Du X, Xiao Y. Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks International Journal of Wireless and Mobile Computing. 1: 121-130. DOI: 10.1504/Ijwmc.2006.012471  0.366
2006 Du X, Wu D. Adaptive cell relay routing protocol for mobile ad hoc networks Ieee Transactions On Vehicular Technology. 55: 278-285. DOI: 10.1109/Tvt.2005.861196  0.401
2006 Du X, Wu D, Liu W, Fang Y. Multiclass routing and medium access control for heterogeneous mobile ad hoc networks Ieee Transactions On Vehicular Technology. 55: 270-277. DOI: 10.1109/Tvt.2005.861183  0.409
2006 Du X. Identifying control and management plane poison message failure by K-nearest neighbor method Journal of Network and Systems Management. 14: 243-259. DOI: 10.1007/S10922-006-9027-8  0.324
2006 Du X, Xiao Y, Chen H, Wu Q. Secure cell relay routing protocol for sensor networks Wireless Communications and Mobile Computing. 6: 375-391. DOI: 10.1002/Wcm.402  0.438
2005 Du X, Lin F. Maintaining differentiated coverage in heterogeneous sensor networks Eurasip Journal On Wireless Communications and Networking. 2005: 565-572. DOI: 10.1155/Wcn.2005.565  0.352
2005 Xiao Y, Leung KK, Pan Y, Du X. Architecture, mobility management, and quality of service for integrated 3G and WLAN networks Wireless Communications and Mobile Computing. 5: 805-823. DOI: 10.1002/Wcm.344  0.37
Show low-probability matches.