An enhanced two-factor user authentication scheme in wireless sensor networks. D He, Y Gao, S Chan, C Chen, J Bu Ad Hoc Sens. Wirel. Networks 10 (4), 361-371, 2010 | 334 | 2010 |
A strong user authentication scheme with smart cards for wireless communications D He, M Ma, Y Zhang, C Chen, J Bu Computer Communications 34 (3), 367-374, 2011 | 257 | 2011 |
Secure and efficient handover authentication based on bilinear pairing functions D He, C Chen, S Chan, J Bu IEEE Transactions on Wireless Communications 11 (1), 48-53, 2011 | 252 | 2011 |
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE transactions on information technology in biomedicine 16 (4), 623-632, 2012 | 240 | 2012 |
Communication security of unmanned aerial vehicles D He, S Chan, M Guizani IEEE Wireless Communications 24 (4), 134-139, 2016 | 227 | 2016 |
Drone-assisted public safety networks: The security aspect D He, S Chan, M Guizani IEEE Communications Magazine 55 (8), 218-223, 2017 | 219 | 2017 |
Privacy in the internet of things for smart healthcare D He, R Ye, S Chan, M Guizani, Y Xu IEEE Communications Magazine 56 (4), 38-44, 2018 | 161 | 2018 |
Lightweight and provably secure user authentication with anonymity for the global mobility network C Chen, D He, S Chan, J Bu, Y Gao, R Fan International Journal of Communication Systems 24 (3), 347-362, 2011 | 145 | 2011 |
Privacy-preserving universal authentication protocol for wireless communications D He, J Bu, S Chan, C Chen, M Yin IEEE transactions on wireless communications 10 (2), 431-436, 2010 | 144 | 2010 |
User privacy and data trustworthiness in mobile crowd sensing D He, S Chan, M Guizani IEEE wireless communications 22 (1), 28-34, 2015 | 136 | 2015 |
Mobile application security: malware threats and defenses D He, S Chan, M Guizani IEEE Wireless Communications 22 (1), 138-144, 2015 | 131 | 2015 |
Offloading time optimization via Markov decision process in mobile-edge computing G Yang, L Hou, X He, D He, S Chan, M Guizani IEEE internet of things journal 8 (4), 2483-2493, 2020 | 116 | 2020 |
Intrusion detection methods based on integrated deep learning model Z Wang, Y Liu, D He, S Chan computers & security 103, 102177, 2021 | 115 | 2021 |
Smart contract vulnerability analysis and security audit D He, Z Deng, Y Zhang, S Chan, Y Cheng, N Guizani IEEE Network 34 (5), 276-282, 2020 | 115 | 2020 |
Distributed access control with privacy support in wireless sensor networks D He, J Bu, S Zhu, S Chan, C Chen IEEE Transactions on wireless communications 10 (10), 3472-3481, 2011 | 115 | 2011 |
A distributed trust evaluation model and its application scenarios for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE Transactions on Information Technology in Biomedicine 16 (6), 1164-1175, 2012 | 109 | 2012 |
A novel and lightweight system to secure wireless medical sensor networks D He, S Chan, S Tang IEEE journal of biomedical and health informatics 18 (1), 316-326, 2013 | 101 | 2013 |
Secure service provision in smart grid communications D He, C Chen, J Bu, S Chan, Y Zhang, M Guizani IEEE Communications Magazine 50 (8), 53-61, 2012 | 99 | 2012 |
Security in the Internet of Things supported by mobile edge computing D He, S Chan, M Guizani IEEE Communications Magazine 56 (8), 56-61, 2018 | 94 | 2018 |
Flight security and safety of drones in airborne fog computing systems D He, Y Qiao, S Chan, N Guizani IEEE Communications Magazine 56 (5), 66-71, 2018 | 94 | 2018 |