Остановите войну!
for scientists:
default search action
Ke Xiao
Publications
- 2023
- [j67]Xue Chen, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain. Comput. Networks 224: 109595 (2023) - [j66]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE Internet Things J. 10(14): 12126-12139 (2023) - [j65]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j61]Chao Wang, Shuo Wang, Xiaoman Cheng, Yunhua He, Ke Xiao, Shujia Fan:
A Privacy and Efficiency-Oriented Data Sharing Mechanism for IoTs. IEEE Trans. Big Data 9(1): 174-185 (2023) - [j60]Yunhua He, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. IEEE/ACM Trans. Netw. 31(2): 485-496 (2023) - [c35]Shiyuan Xu, Xue Chen, Weimin Kong, Yibo Cao, Yunhua He, Ke Xiao:
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET. VTC2023-Spring 2023: 1-6 - 2022
- [j58]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE Internet Things J. 9(11): 7989-8000 (2022) - [j56]Guangcan Yang, Yunhua He, Ke Xiao, Qifeng Tang, Yang Xin, Hongliang Zhu:
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. Secur. Commun. Networks 2022: 9360899:1-9360899:16 (2022) - [c34]Ke Xiao, Yueyao Zhang, Yunhua He, Gang Xu, Chao Wang:
Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM. CWSN 2022: 212-224 - [c31]Yuyang Cheng, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios. WASA (2) 2022: 356-364 - 2021
- [j53]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A survey: applications of blockchain in the Internet of Vehicles. EURASIP J. Wirel. Commun. Netw. 2021(1): 77 (2021) - [j52]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Yutong Tian:
A blockchain-based privacy-preserving 5G network slicing service level agreement audit scheme. EURASIP J. Wirel. Commun. Netw. 2021(1): 165 (2021) - [c30]Ziye Geng, Yunhua He, Chao Wang, Gang Xu, Ke Xiao, Shui Yu:
A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service. ICC 2021: 1-6 - [c28]Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He, Ke Xiao, Yibo Cao:
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. WASA (2) 2021: 70-83 - 2020
- [j48]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Haoyu Zhang:
Destination Prediction-Based Scheduling Algorithms for Message Delivery in IoVs. IEEE Access 8: 14965-14976 (2020) - [j47]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Chunqiang Hu:
Segmented Trajectory Clustering-Based Destination Prediction in IoVs. IEEE Access 8: 98999-99009 (2020) - [c27]Yunhua He, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020: 1-6 - [c25]Chao Wang, Jitong Li, Xiaoman Cheng, Yunhua He, Limin Sun, Ke Xiao:
LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs. VTC Fall 2020: 1-5 - [c24]Chao Wang, Xiaoman Cheng, Jitong Li, Yunhua He, Ke Xiao:
A Survey: Applications of Blockchains in the Internet of Vehicles. WASA (1) 2020: 457-468 - [c23]Ke Xiao, Ziye Geng, Yunhua He, Gang Xu, Chao Wang, Wei Cheng:
A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. WASA (1) 2020: 542-554 - 2019
- [j38]Ke Xiao, Jianyu Zhao, Yunhua He, Chaofei Li, Wei Cheng:
Abnormal Behavior Detection Scheme of UAV Using Recurrent Neural Networks. IEEE Access 7: 110293-110305 (2019) - [c22]Ke Xiao, Jianyu Zhao, Yunhua He, Shui Yu:
Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks. ICC 2019: 1-6 - [c19]Ke Xiao, Chaofei Li, Yunhua He, Chao Wang, Wei Cheng:
A Location Predictive Model Based on 2D Angle Data for HAPS Using LSTM. WASA 2019: 370-381 - 2018
- [j29]Jingzhong Wang, Mengru Li, Yunhua He, Hong Li, Ke Xiao, Chao Wang:
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications. IEEE Access 6: 17545-17556 (2018) - [j16]Ke Xiao, Shaowei Zhang, Yunhua He:
On the Secrecy Capacity of 5G New Radio Networks. Wirel. Commun. Mob. Comput. 2018: 4359261:1-4359261:11 (2018)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-30 00:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint