Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Feiyang Zhao
Bill Marczak
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
edythe d london
Chen Ma
Home
/
Author
/
DAOJING HE
Author Info
Open Visualization
Name
Affiliation
Papers
DAOJING HE
Zhejiang Univ, Natl Engn Res Ctr Intelligent Train, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
97
Collaborators
Citations
PageRank
181
1013
58.40
Referers
Referees
References
2179
1765
876
Search Limit
100
1000
Publications (97 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Adversarial Attacks for Intrusion Detection Based on Bus Traffic
0
0.34
2022
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware
0
0.34
2021
Group-based Password Characteristics Analysis
0
0.34
2021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks
2
0.37
2021
Fraudulent News Headline Detection With Attention Mechanism
0
0.34
2021
How Does Social Behavior Affect Your Password?
0
0.34
2021
Intrusion Detection Methods Based On Integrated Deep Learning Model
0
0.34
2021
Review of Firmware Homology Detection: a System Aspect
0
0.34
2021
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing
5
0.41
2021
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems
0
0.34
2021
An Effective Countermeasure Against UAV Swarm Attack
2
0.37
2021
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning
0
0.34
2021
Fake Review Detection based on PU Learning and Behavior Density
0
0.34
2020
Delay-Aware And Cost-Efficient Probabilistic Transmission For Opportunistic Networks
0
0.34
2020
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems
1
0.41
2020
Password Enhancement Based on Semantic Transformation
0
0.34
2020
Deterministic Algorithms For Solving Boolean Polynomial Equations Based On Channel Coding Theory
0
0.34
2020
Android-based Cryptocurrency Wallets: Attacks and Countermeasures
0
0.34
2020
Group Password Strength Meter Based on Attention Mechanism
0
0.34
2020
Smart Contract Vulnerability Analysis and Security Audit
1
0.36
2020
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking
2
0.37
2020
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems
1
0.38
2020
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems
1
0.38
2020
Simulation Design for Security Testing of Integrated Electronic Systems
0
0.34
2020
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing
1
0.35
2020
Computation Offloading Time Optimisation Via Q-Learning In Opportunistic Edge Computing
0
0.34
2020
Wireless Sensor Network Deployment Optimization Based On Two Flower Pollination Algorithms
0
0.34
2019
metrics and methods of video quality assessment: a brief review
0
0.34
2019
Secure Multi-UAV Collaborative Task Allocation.
1
0.34
2019
Pollution Source Localization Based on Multi-UAV Cooperative Communication.
0
0.34
2019
How to Govern the Non-cooperative Amateur Drones?
0
0.34
2019
Detecting Promotion Attacks in the App Market Using Neural Networks
0
0.34
2019
Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems
3
0.38
2019
Privacy-friendly and efficient secure communication framework for V2G networks.
0
0.34
2018
Imminent Communication Security for Smart Communities.
0
0.34
2018
Security Analysis of a Space-Based Wireless Network.
2
0.37
2018
Security in the Internet of Things Supported by Mobile Edge Computing.
6
0.42
2018
Privacy in the Internet of Things for Smart Healthcare.
7
0.44
2018
Flight Security and Safety of Drones in Airborne Fog Computing Systems.
10
0.47
2018
Communication Security of Unmanned Aerial Vehicles.
23
1.08
2017
Online/offline signature based on UOV in wireless sensor networks.
2
0.37
2017
Win-Win Security Approaches for Smart Grid Communications Networks.
0
0.34
2017
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.
9
0.45
2017
An FPGA-Based Real-Time Moving Object Tracking Approach.
0
0.34
2017
Drone-Assisted Public Safety Networks: The Security Aspect.
14
0.65
2017
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks.
0
0.34
2017
Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation.
3
0.39
2017
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
7
0.47
2017
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
2
0.38
2016
Securing software defined wireless networks.
6
0.44
2016
1
2
50 / page