


Остановите войну!
for scientists:


default search action
Jingsha He
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j74]Yuzi Yi, Nafei Zhu, Jingsha He
, Anca Delia Jurcut
, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Comput. Commun. 200: 149-160 (2023) - [j73]Jingsha He
, Yue Li, Nafei Zhu:
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks. Future Internet 15(3): 92 (2023) - [j72]Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, Nafei Zhu, Zulfiqar Ali Zardari, Tariq Mahmood, Ahsan Wajahat:
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs. J. Intell. Fuzzy Syst. 44(6): 10675-10687 (2023) - [j71]Ahsan Wajahat
, Jingsha He
, Nafei Zhu
, Tariq Mahmood
, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j70]Ruixin Xue, Nafei Zhu, Jingsha He
, Lin He:
Bitcoin transaction pattern recognition based on semi-supervised learning. J. Comput. Sci. 71: 102055 (2023) - 2022
- [j69]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut
, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j68]Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. Int. J. Inf. Secur. Priv. 16(1): 1-22 (2022) - [j67]Nafei Zhu, Baocun Chen, Siyu Wang, Da Teng, Jingsha He:
Ontology-Based Approach for the Measurement of Privacy Disclosure. Inf. Syst. Frontiers 24(5): 1689-1707 (2022) - [j66]Fahad Razaque Mughal
, Jingsha He, Nafei Zhu, Ghulam Ali Mallah, Ziyue Qiao, Amir Haider
, Saqib Hussain, Muhammad Iftikhar Hussain
, Zulfiqar Ali Zardari:
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs. Microprocess. Microsystems 93: 104617 (2022) - [j65]Yuzi Yi
, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. Secur. Priv. 5(2) (2022) - [j64]Hewen Wang, Jingsha He, Nafei Zhu:
Improving Data Utilization of K-anonymity through Clustering Optimization. Trans. Data Priv. 15(3): 177-192 (2022) - 2021
- [j63]Sirajuddin Qureshi
, Jingsha He
, Saima Tunio, Nafei Zhu
, Faheem Akhtar
, Faheem Ullah, Ahsan Nazir, Ahsan Wajahat:
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks. IEEE Access 9: 73938-73947 (2021) - [j62]Musa Osman
, Jingsha He
, Fawaz Mahiuob Mohammed Mokbal
, Nafei Zhu
, Sirajuddin Qureshi
:
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access 9: 83654-83665 (2021) - [j61]Gongzheng Liu
, Jingsha He
, Xinggang Xuan
:
A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics. Complex. 2021: 5536326:1-5536326:12 (2021) - [j60]Yajing Wang
, Jingsha He, Nafei Zhu, Yuzi Yi, Qingqing Zhang, Hongyu Song, Ruixin Xue:
Security enhancement technologies for smart contracts in the blockchain: A survey. Trans. Emerg. Telecommun. Technol. 32(12) (2021) - [j59]Yanbo Chen
, Jingsha He, Wei Wei, Nafei Zhu, Cong Yu:
A Multi-Model Approach for User Portrait. Future Internet 13(6): 147 (2021) - [j58]Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng:
An authorisation certificate-based access control model. Int. J. Secur. Networks 16(4): 258-266 (2021) - [j57]Hongyu Song, Nafei Zhu, Ruixin Xue, Jingsha He, Kun Zhang, Jianyu Wang:
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection. Inf. Process. Manag. 58(3): 102507 (2021) - [j56]Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque
, Saqib Hussain, Muhammad Salman Pathan
:
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. J. Intell. Fuzzy Syst. 41(1): 125-136 (2021) - [j55]Yue Zhou, Xiujun Wang, Shu Guo, Yi Wen, Jingsha He:
A cost-effective adaptive random testing algorithm for object-oriented software testing. J. Intell. Fuzzy Syst. 41(3): 4415-4423 (2021) - 2020
- [j54]Baocun Chen
, Nafei Zhu
, Jingsha He
, Peng He
, Shuting Jin, Shijia Pan:
A Semantic Inference Based Method for Privacy Measurement. IEEE Access 8: 200112-200128 (2020) - [j53]Jingsha He, Prasad K. D. V. Yarlagadda
, Shengzong Zhou:
Special issue on the application of artificial intelligence in advanced manufacturing. Int. J. Comput. Integr. Manuf. 33(10-11): 947-948 (2020) - [j52]Muhammad Azeem, Jingsha He, Allah Ditta, Faheem Akhtar
, Sher Muhammad Daudpota
:
A novel approach to secret data concealment with high cover text capacity and security. Int. J. Electron. Secur. Digit. Forensics 12(1): 77-98 (2020) - [j51]Fangbo Cai, Jingsha He, Zulfiqar Ali Zardari, Song Han:
Distributed management of permission for access control model. J. Intell. Fuzzy Syst. 38(2): 1539-1548 (2020) - [j50]Peng Zhai, Jingsha He, Nafei Zhu, Peng He, Yao Liang:
An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress". J. Web Eng. 19(7-8): 230-243 (2020) - [j49]Zhao Li, Jun Wu, Xiaofeng Zhang, Jingsha He, Peng Chen, Keqing He:
Using metadata for recommending business process. J. Supercomput. 76(5): 3729-3748 (2020) - [c62]Xiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou:
Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion. COMPSAC 2020: 255-261
2010 – 2019
- 2019
- [j48]Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu:
Survey of access control models and technologies for cloud computing. Clust. Comput. 22(Supplement): 6111-6122 (2019) - [j47]Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, Zhao Li:
Management of access privileges for dynamic access control. Clust. Comput. 22(Supplement): 8899-8917 (2019) - [j46]Zulfiqar Ali Zardari
, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani
, Muhammad Salman Pathan
, Muhammad Iftikhar Hussain
, Muhammad Qasim Memon
:
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs. Future Internet 11(3): 61 (2019) - [j45]Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar Rajpoot
:
A cryptographic data hiding algorithm with high cover text capacity. Int. J. Electron. Secur. Digit. Forensics 11(2): 225-244 (2019) - [j44]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. Int. J. Netw. Secur. 21(6): 1021-1030 (2019) - [j43]Guorui Li
, Jingsha He, Sancheng Peng
, Weijia Jia
, Cong Wang
, Jianwei Niu
, Shui Yu
:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - [c61]Shaoxun Su, Nafei Zhu, Jingsha He:
Pyramid Text Recognition Based on A New Text Representation Model. ICNSC 2019: 195-199 - [c60]Pengyu Mu, Jingsha He, Nafei Zhu:
Text Classification of Network Pyramid Scheme based on Topic Model. NLPIR 2019: 15-19 - [c59]Zhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He:
Applying Ordered Technique Set for Fault Localization. QRS Companion 2019: 516-517 - 2018
- [j42]Na Huang, Jingsha He, Nafei Zhu, Xinggang Xuan, Gongzheng Liu, Chengyue Chang:
Identification of the source camera of images based on convolutional neural network. Digit. Investig. 26: 72-80 (2018) - [j41]Jingsha He, Xinggang Xuan
, Nafei Zhu, Na Huang, Peng He:
Mobile beacon-based adaptive time synchronization for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 220 (2018) - [j40]Muhammad Salman Pathan
, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon
, Muhammad Iftikhar Hussain:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. Future Internet 10(2): 16 (2018) - [j39]Jingsha He, Jianan Wu
, Nafei Zhu, Muhammad Salman Pathan
:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. Future Internet 10(5): 38 (2018) - [j38]Yameng Li, Jingsha He, Na Huang, Gongzheng Liu:
Recovering multiple versions of YAFFS2 files based on Hash and timestamps. Int. J. Embed. Syst. 10(4): 313-322 (2018) - [j37]Muhammad Qasim Memon
, Jingsha He, Mirza Ammar Yasir, Aasma Memon
:
Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting. Sensors 18(4): 1185 (2018) - [j36]Nafei Zhu, Siyu Wang, Jingsha He, Da Teng, Peng He, Yuqiang Zhang:
On the Suitability of Applying WordNet to Privacy Measurement. Wirel. Pers. Commun. 103(1): 359-378 (2018) - [c58]Zhao Li, Jun Wu, Shuangmei Peng, Peng Chen, Jingsha He, Yiwang Huang, Keqing He:
MFI-5 Based Similarity Measurement of Business Process Models. ICCCS (1) 2018: 648-661 - [c57]Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. TrustCom/BigDataSE 2018: 1702-1705 - [c56]Anca Delia Jurcut, Madhusanka Liyanage
, Jinyong Chen, Cornelia Györödi
, Jingsha He:
On the security verification of a short message service protocol. WCNC 2018: 1-6 - 2017
- [j35]Jingsha He, Qi Xiao
, Peng He, Muhammad Salman Pathan
:
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning. Future Internet 9(1): 7 (2017) - [j34]Seyed Mahmood Hashemi, Jingsha He, Alireza Ebrahimi Basabi:
Multi-objective Optimization for Computer Security and Privacy. Int. J. Netw. Secur. 19(3): 394-405 (2017) - [j33]Seyed Mahmood Hashemi, Jingsha He:
An Evolutionary Multi-objective Approach for Modelling Network Security. Int. J. Netw. Secur. 19(4): 528-536 (2017) - [j32]Seyed Mahmood Hashemi, Jingsha He:
LA-Based Approach for IoT Security. J. Robotics Netw. Artif. Life 3(4): 240-248 (2017) - [c55]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - 2016
- [j31]Jingsha He, Chengyue Chang
, Peng He, Muhammad Salman Pathan
:
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet 8(4): 54 (2016) - [j30]Bin Zhao, Jingsha He, Yixuan Zhang, Gongzheng Liu, Peng Zhai, Na Huang, Ruohong Liu:
Dynamic trust evaluation in open networks. Intell. Autom. Soft Comput. 22(4): 631-638 (2016) - [j29]Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang:
A Method for Trust Quantification in Cloud Computing Environments. Int. J. Distributed Sens. Networks 12(2): 5052614:1-5052614:7 (2016) - [j28]Jing Xu, Jingsha He, Yuqiang Zhang, Fei Xu, Fangbo Cai:
A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(4): 2080536:1-2080536:8 (2016) - [j27]Yixuan Zhang, Jingsha He, Bin Zhao, Ruohong Liu:
Application of game theory for dynamic access control in security systems. Int. J. High Perform. Comput. Netw. 9(5/6): 451-461 (2016) - [c54]Jingsha He, Qi Xiao, Muhammad Salman Pathan
:
A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications. ChinaCom (1) 2016: 200-207 - [c53]Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:
A Novel Storage and Search Scheme in Cloud Computing. CIS 2016: 304-308 - [c52]Yameng Li, Jingsha He, Na Huang, Chengyue Chang:
On the Recoverability of Data in Android YAFFS2. CIS 2016: 665-668 - 2015
- [j26]Yixuan Zhang, Jingsha He, Bin Zhao, Zhiqing Huang, Ruohong Liu:
Towards more pro-active access control in computer systems and networks. Comput. Secur. 49: 132-146 (2015) - [j25]Xuejiao Wan, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, Yonghao Mai:
Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices. Int. J. Digit. Crime Forensics 7(1): 1-25 (2015) - [j24]Guorui Li
, Jingsha He, Cong Wang:
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 856507:1-856507:12 (2015) - [c51]Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, Na Huang:
A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control. ICA3PP (1) 2015: 317-326 - [c50]Seyed Mahmood Hashemi, Jingsha He:
An evolutionary approach for security metric. ICTC 2015: 1205-1211 - [c49]Rui Liu, Xiaoyang Zhong, Yao Liang, Jingsha He:
Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor Networks. SmartCity 2015: 562-567 - [c48]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - 2014
- [j23]Peng Xiao, Jingsha He
, Yingfang Fu:
An access authentication protocol for trusted handoff in wireless mesh networks. Comput. Stand. Interfaces 36(3): 480-488 (2014) - [j22]Feng Gao, Jingsha He
, Shunan Ma:
Modelling the relationship between trust and privacy in network environments. Int. J. Comput. Sci. Eng. 9(4): 347-354 (2014) - 2013
- [j21]Hong Yu, Jingsha He
, Ruohong Liu, Dajie Ji:
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Peng Xiao, Jingsha He
, Yunli Chen, Yingfang Fu:
A new trusted roaming protocol in wireless mesh networks. Int. J. Sens. Networks 14(2): 109-119 (2013) - [j19]Nafei Zhu, Jingsha He
, Yue Zhou, Wei Wang:
On the Accuracy of Packet Delay Estimation in Distributed Service Networks. J. Netw. Syst. Manag. 21(4): 623-649 (2013) - [j18]Hong Yu, Jingsha He
, Ting Zhang, Peng Xiao, Yuqiang Zhang:
Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16(4): 515-540 (2013) - [c47]Jingsha He
, Xuejiao Wan, Gongzheng Liu, Na Huang, Bin Zhao:
On the application of digital forensics in different scenarios. SADFE 2013: 1-5 - [c46]Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He
, George Roussos, Wei-Tek Tsai:
Mobile Cloud Computing Research - Issues, Challenges and Needs. SOSE 2013: 442-453 - 2012
- [j17]Guorui Li, Ying Wang, Cuirong Wang, Jingsha He
:
EMAP: An efficient mutual authentication protocol for passive RFID tags. Int. J. Autom. Comput. 9(1): 108-112 (2012) - [j16]Ting Zhang, Jingsha He
, Yang Zhang:
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network. Int. J. Comput. Intell. Syst. 5(5): 914-923 (2012) - [j15]Shunan Ma, Jingsha He
, Xunbo Shuai:
An Access Control Method based on Scenario Trust. Int. J. Comput. Intell. Syst. 5(5): 942-952 (2012) - [j14]Hong Yu, Jingsha He
, Ting Zhang, Peng Xiao:
A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario. Int. J. Distributed Sens. Networks 8 (2012) - [j13]Ting Zhang, Jingsha He
, Hong Yu:
Secure Localization in Wireless Sensor Networks with Mobile Beacons. Int. J. Distributed Sens. Networks 8 (2012) - [j12]Hong Yu, Jingsha He
:
Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN. J. Commun. 7(8): 634-642 (2012) - [j11]Shunan Ma, Jingsha He
, Feng Gao:
An Access Control Model based on Multi-factors Trust. J. Networks 7(1): 173-178 (2012) - [j10]Peng Xiao, Jingsha He
, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. J. Networks 7(2): 267-274 (2012) - [j9]Feng Gao, Jingsha He
, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. J. Networks 7(2): 322-328 (2012) - [j8]Nafei Zhu, Jingsha He
:
Experimental Study of the Similarity of Network Nodes based on RTT. J. Networks 7(9): 1423-1430 (2012) - 2011
- [j7]Xing Zhang, Jingsha He
, Qian Wei:
EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j6]Shunan Ma, Jingsha He
, Xunbo Shuai:
Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification. Int. J. Comput. Intell. Syst. 4(5): 768-776 (2011) - [j5]Xing Zhang, Jingsha He
, Qian Wei:
Secure and Energy-Efficient Routing for Wireless Sensor Networks. J. Networks 6(9): 1288-1295 (2011) - [j4]Qian Wei, Jingsha He
, Xing Zhang:
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks. J. Networks 6(9): 1351-1358 (2011) - [c45]Ting Zhang, Jingsha He
, Yang Zhang:
Trust Based Secure Localization in Wireless Sensor Networks. IPTC 2011: 55-58 - 2010
- [c44]Qian Wei, Jingsha He
, Xing Zhang:
Behavioral model for secure group communication in wireless mesh networks. CSIIRW 2010: 81 - [c43]Feng Gao, Jingsha He
, Shufen Peng, Xu Wu:
A Quantifying Metric for Privacy Protection Based on Information Theory. IITSI 2010: 216-220 - [c42]Guorui Li, Ying Wang, Jingsha He
:
Efficient Group Key Management Scheme in Wireless Sensor Networks. IITSI 2010: 411-415 - [c41]Feng Gao, Jingsha He, Xu Wu:
An approach for tracking privacy disclosure. NCM 2010: 294-299 - [c40]Feng Gao, Jingsha He
, Shufen Peng:
User-Centric Privacy Preservation in Data-Sharing Applications. NPC 2010: 423-431 - [c39]Shunan Ma, Jingsha He
, Feng Gao, Yuqiang Zhang:
A trust quantification method based on grey fuzzy theory. SIN 2010: 27-31 - [c38]Feng Gao, Jingsha He
, Shunan Ma:
A collaborative approach for identifying privacy disclosure in Web-based services. SOCA 2010: 1-4 - [c37]Shunan Ma, Jingsha He
, Xunbo Shuai, Zhao Wang:
Access Control Mechanism Based on Trust Quantification. SocialCom/PASSAT 2010: 1032-1037
2000 – 2009
- 2009
- [j3]Xu Wu, Jingsha He, Fei Xu, Xi Zhang:
A distributed decision-making mechanism for wireless P2P networks. J. Commun. Networks 11(4): 359-367 (2009) - [j2]Guozhong Tian, Jiong Yu, Jingsha He
:
Towards critical region reliability support for Grid workflows. J. Parallel Distributed Comput. 69(12): 989-995 (2009) - [c36]Fei Xu, Jingsha He
, Xu Wu, Jing Xu:
A Method for Privacy Protection in Location Based Services. CIT (2) 2009: 351-355 - [c35]Xing Zhang, Jingsha He
, Qiang Wei:
Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks. AMT 2009: 522-528 - [c34]Xu Wu, Jingsha He
, Fei Xu:
A Group-Based Reputation Mechanism for Mobile P2P Networks. GPC 2009: 410-421 - [c33]Xu Wu, Jingsha He
, Chia-Hu Chang, Fei Xu:
A Power Peer-Based Reputation Scheme for Mobile P2P Systems. ICA3PP 2009: 615-625 - [c32]Fei Xu, Kam-Pui Chow, Jingsha He
, Xu Wu:
Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection. ICPADS 2009: 572-577 - [c31]Xu Wu, Jingsha He
, Xi Zhang, Fei Xu:
A Distributed Decision-Making Mechanism for Wireless P2P Networks. ICPP Workshops 2009: 350-355 - [c30]Qian Wei, Jingsha He
, Huiying Shao:
A directed signature scheme and its application to group key initial distribution. ICIS 2009: 265-269 - [c29]Xing Zhang, Jingsha He
, Qian Wei:
An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor Networks. ISPAN 2009: 238-242 - 2008
- [j1]Guorui Li, Jingsha He
, Yingfang Fu:
Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18): 4324-4332 (2008) - [c28]Yingfang Fu, Jingsha He
, Liangyu Luan, Rong Wang, Guorui Li:
A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. COMPSAC 2008: 68-71 - [c27]Bo Li, Jingsha He
, Henghua Shi:
Improving the Efficiency of Network Topology Discovery. GPC Workshops 2008: 189-194 - [c26]Guorui Li, Jingsha He
, Yingfang Fu:
A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks. GPC Workshops 2008: 286-291 - [c25]Yingfang Fu, Jingsha He
, Rong Wang, Guorui Li:
Mutual Authentication in Wireless Mesh Networks. ICC 2008: 1690-1694 - [c24]Guorui Li, Jingsha He
, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. ICDCS Workshops 2008: 309-314 - [c23]