Name
Affiliation
Papers
DAOJING HE
Zhejiang Univ, Natl Engn Res Ctr Intelligent Train, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
97
Collaborators
Citations 
PageRank 
181
1013
58.40
Referers 
Referees 
References 
2179
1765
876
Search Limit
1001000
Title
Citations
PageRank
Year
Adversarial Attacks for Intrusion Detection Based on Bus Traffic00.342022
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware00.342021
Group-based Password Characteristics Analysis00.342021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks20.372021
Fraudulent News Headline Detection With Attention Mechanism00.342021
How Does Social Behavior Affect Your Password?00.342021
Intrusion Detection Methods Based On Integrated Deep Learning Model00.342021
Review of Firmware Homology Detection: a System Aspect00.342021
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing50.412021
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems00.342021
An Effective Countermeasure Against UAV Swarm Attack20.372021
Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning00.342021
Fake Review Detection based on PU Learning and Behavior Density00.342020
Delay-Aware And Cost-Efficient Probabilistic Transmission For Opportunistic Networks00.342020
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems10.412020
Password Enhancement Based on Semantic Transformation00.342020
Deterministic Algorithms For Solving Boolean Polynomial Equations Based On Channel Coding Theory00.342020
Android-based Cryptocurrency Wallets: Attacks and Countermeasures00.342020
Group Password Strength Meter Based on Attention Mechanism00.342020
Smart Contract Vulnerability Analysis and Security Audit10.362020
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking20.372020
A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems10.382020
Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems10.382020
Simulation Design for Security Testing of Integrated Electronic Systems00.342020
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing10.352020
Computation Offloading Time Optimisation Via Q-Learning In Opportunistic Edge Computing00.342020
Wireless Sensor Network Deployment Optimization Based On Two Flower Pollination Algorithms00.342019
metrics and methods of video quality assessment: a brief review00.342019
Secure Multi-UAV Collaborative Task Allocation.10.342019
Pollution Source Localization Based on Multi-UAV Cooperative Communication.00.342019
How to Govern the Non-cooperative Amateur Drones?00.342019
Detecting Promotion Attacks in the App Market Using Neural Networks00.342019
Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems30.382019
Privacy-friendly and efficient secure communication framework for V2G networks.00.342018
Imminent Communication Security for Smart Communities.00.342018
Security Analysis of a Space-Based Wireless Network.20.372018
Security in the Internet of Things Supported by Mobile Edge Computing.60.422018
Privacy in the Internet of Things for Smart Healthcare.70.442018
Flight Security and Safety of Drones in Airborne Fog Computing Systems.100.472018
Communication Security of Unmanned Aerial Vehicles.231.082017
Online/offline signature based on UOV in wireless sensor networks.20.372017
Win-Win Security Approaches for Smart Grid Communications Networks.00.342017
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.90.452017
An FPGA-Based Real-Time Moving Object Tracking Approach.00.342017
Drone-Assisted Public Safety Networks: The Security Aspect.140.652017
RePC: A Localization Method Based on Regional Partition and Cooperation in Communication Networks.00.342017
Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation.30.392017
Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.70.472017
Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.20.382016
Securing software defined wireless networks.60.442016
  • 1
  • 2