Daojing He

About Daojing He

Daojing He, With an exceptional h-index of 41 and a recent h-index of 31 (since 2020), a distinguished researcher at South China University of Technology, specializes in the field of Network and Information security.

His recent articles reflect a diverse array of research interests and contributions to the field:

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization

A comprehensive survey of smart contract security: State of the art and research directions

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

Double-layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning

Special Characters Usage and Its Effect On Password Security

Multi-Round Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems

Towards Secure and Verifiable Hybrid Federated Learning

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection

Daojing He Information

University

Position

School of Computer Science and Engineering

Citations(all)

5376

Citations(since 2020)

2916

Cited By

3608

hIndex(all)

41

hIndex(since 2020)

31

i10Index(all)

77

i10Index(since 2020)

67

Email

University Profile Page

Google Scholar

Daojing He Skills & Research Interests

Network and Information security

Top articles of Daojing He

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization

Ad Hoc Networks

2024/1/1

A comprehensive survey of smart contract security: State of the art and research directions

2024/4/26

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

Peer-to-Peer Networking and Applications

2024/4/11

Double-layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning

IEEE Transactions on Information Forensics and Security

2024/3/4

Special Characters Usage and Its Effect On Password Security

IEEE Internet of Things Journal

2024/2/19

Multi-Round Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems

IEEE Internet of Things Journal

2024/1/29

Towards Secure and Verifiable Hybrid Federated Learning

IEEE Transactions on Information Forensics and Security

2024/1/22

Daojing He
Daojing He

H-Index: 32

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection

International Journal of Intelligent Systems

2023/11/16

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems

Cluster Computing

2022/10

Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services

IEEE Internet of Things Journal

2023/10/20

A quasi-oppositional learning of updating quantum state and Q-learning based on the dung beetle algorithm for global optimization

Alexandria Engineering Journal

2023/10/15

FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows

IEEE Network

2023/10/13

A comprehensive detection method for the lateral movement stage of apt attacks

IEEE Internet of Things Journal

2023/10/6

Unknown Threats Detection Methods of Smart Contracts

IEEE Internet of Things Journal

2023/7/28

A method for detecting phishing websites based on tiny-bert stacking

IEEE Internet of Things Journal

2023/7/4

Residual Vector Product Quantization for approximate nearest neighbor search

2023/6/16

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly

IEEE Internet of Things Journal

2023/6/8

You can glimpse but you cannot identify: Protect IoT devices from being fingerprinted

IEEE Transactions on Dependable and Secure Computing

2023/5/12

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems

Journal of Systems Architecture

2023/5/1

A lightweight and secure communication protocol for the IoT environment

IEEE Transactions on Dependable and Secure Computing

2023/4/17

See List of Professors in Daojing He University(South China University of Technology)