Æȷοì
Daojing He
Daojing He
School of Computer Science and Engineering, South China University of Technology
scut.edu.cnÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
An enhanced two-factor user authentication scheme in wireless sensor networks.
D He, Y Gao, S Chan, C Chen, J Bu
Ad Hoc Sens. Wirel. Networks 10 (4), 361-371, 2010
3342010
A strong user authentication scheme with smart cards for wireless communications
D He, M Ma, Y Zhang, C Chen, J Bu
Computer Communications 34 (3), 367-374, 2011
2572011
Secure and efficient handover authentication based on bilinear pairing functions
D He, C Chen, S Chan, J Bu
IEEE Transactions on Wireless Communications 11 (1), 48-53, 2011
2522011
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
D He, C Chen, S Chan, J Bu, AV Vasilakos
IEEE transactions on information technology in biomedicine 16 (4), 623-632, 2012
2392012
Communication security of unmanned aerial vehicles
D He, S Chan, M Guizani
IEEE Wireless Communications 24 (4), 134-139, 2016
2262016
Drone-assisted public safety networks: The security aspect
D He, S Chan, M Guizani
IEEE Communications Magazine 55 (8), 218-223, 2017
2192017
Privacy in the internet of things for smart healthcare
D He, R Ye, S Chan, M Guizani, Y Xu
IEEE Communications Magazine 56 (4), 38-44, 2018
1612018
Lightweight and provably secure user authentication with anonymity for the global mobility network
C Chen, D He, S Chan, J Bu, Y Gao, R Fan
International Journal of Communication Systems 24 (3), 347-362, 2011
1452011
Privacy-preserving universal authentication protocol for wireless communications
D He, J Bu, S Chan, C Chen, M Yin
IEEE transactions on wireless communications 10 (2), 431-436, 2010
1442010
User privacy and data trustworthiness in mobile crowd sensing
D He, S Chan, M Guizani
IEEE wireless communications 22 (1), 28-34, 2015
1362015
Mobile application security: malware threats and defenses
D He, S Chan, M Guizani
IEEE Wireless Communications 22 (1), 138-144, 2015
1312015
Intrusion detection methods based on integrated deep learning model
Z Wang, Y Liu, D He, S Chan
computers & security 103, 102177, 2021
1162021
Offloading time optimization via Markov decision process in mobile-edge computing
G Yang, L Hou, X He, D He, S Chan, M Guizani
IEEE internet of things journal 8 (4), 2483-2493, 2020
1162020
Smart contract vulnerability analysis and security audit
D He, Z Deng, Y Zhang, S Chan, Y Cheng, N Guizani
IEEE Network 34 (5), 276-282, 2020
1152020
Distributed access control with privacy support in wireless sensor networks
D He, J Bu, S Zhu, S Chan, C Chen
IEEE Transactions on wireless communications 10 (10), 3472-3481, 2011
1152011
A distributed trust evaluation model and its application scenarios for medical sensor networks
D He, C Chen, S Chan, J Bu, AV Vasilakos
IEEE Transactions on Information Technology in Biomedicine 16 (6), 1164-1175, 2012
1082012
A novel and lightweight system to secure wireless medical sensor networks
D He, S Chan, S Tang
IEEE journal of biomedical and health informatics 18 (1), 316-326, 2013
1012013
Secure service provision in smart grid communications
D He, C Chen, J Bu, S Chan, Y Zhang, M Guizani
IEEE Communications Magazine 50 (8), 53-61, 2012
992012
Security in the Internet of Things supported by mobile edge computing
D He, S Chan, M Guizani
IEEE Communications Magazine 56 (8), 56-61, 2018
942018
Flight security and safety of drones in airborne fog computing systems
D He, Y Qiao, S Chan, N Guizani
IEEE Communications Magazine 56 (5), 66-71, 2018
942018
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20