关注
Jiadai Wang
Jiadai Wang
在 nwpu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Networking and communications in autonomous driving: A survey
J Wang, J Liu, N Kato
IEEE Communications Surveys & Tutorials 21 (2), 1243-1274, 2018
4752018
Smart resource allocation for mobile edge computing: A deep reinforcement learning approach
J Wang, L Zhao, J Liu, N Kato
IEEE Transactions on emerging topics in computing 9 (3), 1529-1541, 2019
4142019
When machine learning meets privacy in 6G: A survey
Y Sun, J Liu, J Wang, Y Cao, N Kato
IEEE Communications Surveys & Tutorials 22 (4), 2694-2724, 2020
1652020
Optimal edge resource allocation in IoT-based smart cities
L Zhao, J Wang, J Liu, N Kato
IEEE Network 33 (2), 30-35, 2019
1422019
Routing for crowd management in smart cities: A deep reinforcement learning perspective
L Zhao, J Wang, J Liu, N Kato
IEEE Communications Magazine 57 (4), 88-93, 2019
1222019
Attacker identification and intrusion detection for in-vehicle networks
J Ning, J Wang, J Liu, N Kato
IEEE communications letters 23 (11), 1927-1930, 2019
632019
Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles
Y Tan, J Wang, J Liu, N Kato
IEEE Internet of Things Journal 9 (18), 16928-16940, 2022
582022
Artificial intelligence-assisted network slicing: Network assurance and service provisioning in 6G
J Wang, J Liu, J Li, N Kato
IEEE Vehicular Technology Magazine 18 (1), 49-58, 2023
392023
Topology poisoning attack in SDN-enabled vehicular edge network
J Wang, Y Tan, J Liu, Y Zhang
IEEE Internet of Things Journal 7 (10), 9563-9574, 2020
372020
Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures
H Chen, J Liu, J Wang, Y Xun
Vehicular Communications 39, 100548, 2023
282023
Unmanned systems security: Models, challenges, and future directions
Y Tan, J Wang, J Liu, Y Zhang
IEEE Network 34 (4), 291-297, 2020
252020
Secure and reliable slicing in 5G and beyond vehicular networks
J Wang, J Liu
IEEE Wireless Communications 29 (1), 126-133, 2022
242022
Location hijacking attack in software-defined space–air–ground-integrated vehicular network
J Wang, J Liu
IEEE Internet of Things Journal 9 (8), 5971-5981, 2021
202021
Automatic content inspection and forensics for children android apps
Q Luo, J Liu, J Wang, Y Tan, Y Cao, N Kato
IEEE Internet of Things Journal 7 (8), 7123-7134, 2020
202020
Deep learning for securing software-defined industrial internet of things: attacks and countermeasures
J Wang, J Liu
IEEE Internet of Things Journal 9 (13), 11179-11189, 2021
162021
Deep reinforcement learning for securing software-defined industrial networks with distributed control plane
J Wang, J Liu, H Guo, B Mao
IEEE Transactions on Industrial Informatics 18 (6), 4275-4285, 2021
112021
Intelligent task offloading and resource allocation in digital twin based aerial computing networks
H Guo, X Zhou, J Wang, J Liu, A Benslimane
IEEE Journal on Selected Areas in Communications, 2023
102023
How to protect key drones in unmanned aerial vehicle networks? An SDN-based topology deception scheme
Y Tan, J Liu, J Wang
IEEE Transactions on Vehicular Technology 71 (12), 13320-13331, 2022
82022
Topology poisoning attacks and countermeasures in SDN-enabled vehicular networks
J Wang, Y Tan, J Liu
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
82020
Jamming-aided secure communication in ultra-dense LEO integrated satellite-terrestrial networks
Y Shi, J Liu, J Wang, Y Xun
China Communications 20 (7), 43-56, 2023
42023
系统目前无法执行此操作,请稍后再试。
文章 1–20