Daojing He
South China University of Technology
H-index: 41
Asia-China
Top articles of Daojing He
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization
Ad Hoc Networks
2024/1/1
Zhendong Wang
H-Index: 4
Lili Huang
H-Index: 8
Xiao Luo
H-Index: 7
Daojing He
H-Index: 32
Sammy Chan
H-Index: 33
A comprehensive survey of smart contract security: State of the art and research directions
2024/4/26
Guangfu Wu
H-Index: 12
Xin Lai
H-Index: 6
Mengmeng Wang
H-Index: 6
Daojing He
H-Index: 32
Sammy Chan
H-Index: 33
Improving byzantine fault tolerance based on stake evaluation and consistent hashing
Peer-to-Peer Networking and Applications
2024/4/11
Double-layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning
IEEE Transactions on Information Forensics and Security
2024/3/4
Special Characters Usage and Its Effect On Password Security
IEEE Internet of Things Journal
2024/2/19
Multi-Round Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems
IEEE Internet of Things Journal
2024/1/29
Towards Secure and Verifiable Hybrid Federated Learning
IEEE Transactions on Information Forensics and Security
2024/1/22
Daojing He
H-Index: 32
Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection
International Journal of Intelligent Systems
2023/11/16
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems
Cluster Computing
2022/10
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services
IEEE Internet of Things Journal
2023/10/20
A quasi-oppositional learning of updating quantum state and Q-learning based on the dung beetle algorithm for global optimization
Alexandria Engineering Journal
2023/10/15
Zhendong Wang
H-Index: 4
Lili Huang
H-Index: 8
Dahai Li
H-Index: 7
Daojing He
H-Index: 32
Sammy Chan
H-Index: 33
FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows
IEEE Network
2023/10/13
A comprehensive detection method for the lateral movement stage of apt attacks
IEEE Internet of Things Journal
2023/10/6
Unknown Threats Detection Methods of Smart Contracts
IEEE Internet of Things Journal
2023/7/28
A method for detecting phishing websites based on tiny-bert stacking
IEEE Internet of Things Journal
2023/7/4
Residual Vector Product Quantization for approximate nearest neighbor search
2023/6/16
Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly
IEEE Internet of Things Journal
2023/6/8
You can glimpse but you cannot identify: Protect IoT devices from being fingerprinted
IEEE Transactions on Dependable and Secure Computing
2023/5/12
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems
Journal of Systems Architecture
2023/5/1
A lightweight and secure communication protocol for the IoT environment
IEEE Transactions on Dependable and Secure Computing
2023/4/17