A survey on access control in the age of internet of things J Qiu, Z Tian, C Du, Q Zuo, S Su, B Fang IEEE Internet of Things Journal 7 (6), 4682-4696, 2020 | 378 | 2020 |
Block-DEF: A secure digital evidence framework using blockchain Z Tian, M Li, M Qiu, Y Sun, S Su Information Sciences 491, 151-165, 2019 | 331 | 2019 |
Real-time lateral movement detection based on evidence reasoning network for edge computing environment Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019 | 202 | 2019 |
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory Z Tian, X Gao, S Su, J Qiu, X Du, M Guizani IEEE Transactions on Vehicular Technology 68 (6), 5971-5980, 2019 | 188 | 2019 |
Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city J Qiu, L Du, D Zhang, S Su, Z Tian IEEE Transactions on Industrial Informatics 16 (4), 2659-2666, 2019 | 170 | 2019 |
A data-driven method for future Internet route decision modeling Z Tian, S Su, W Shi, X Du, M Guizani, X Yu Future Generation Computer Systems 95, 212-220, 2019 | 142 | 2019 |
Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles Z Tian, X Gao, S Su, J Qiu IEEE Internet of Things Journal 7 (5), 3901-3909, 2019 | 138 | 2019 |
A real-time correlation of host-level events in cyber range service for smart campus Z Tian, Y Cui, L An, S Su, X Yin, L Yin, X Cui IEEE Access 6, 35355-35364, 2018 | 107 | 2018 |
IRBA: An identity-based cross-domain authentication scheme for the internet of things X Jia, N Hu, S Su, S Yin, Y Zhao, X Cheng, C Zhang Electronics 9 (4), 634, 2020 | 65 | 2020 |
A reputation management scheme for efficient malicious vehicle identification over 5G networks S Su, Z Tian, S Liang, S Li, S Du, N Guizani IEEE Wireless Communications 27 (3), 46-52, 2020 | 64 | 2020 |
Automatically traceback RDP‐based targeted ransomware attacks ZH Wang, CG Liu, J Qiu, ZH Tian, X Cui, S Su Wireless Communications and Mobile Computing 2018 (1), 7943586, 2018 | 57 | 2018 |
Honeypot identification in softwarized industrial cyber–physical systems Y Sun, Z Tian, M Li, S Su, X Du, M Guizani IEEE Transactions on Industrial Informatics 17 (8), 5542-5551, 2020 | 54 | 2020 |
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement Y Zhang, R Oliveira, Y Wang, S Su, B Zhang, J Bi, H Zhang, L Zhang IEEE Journal on Selected Areas in Communications 29 (9), 1822-1836, 2011 | 52 | 2011 |
A correlation-change based feature selection method for IoT equipment anomaly detection S Su, Y Sun, X Gao, J Qiu, Z Tian Applied sciences 9 (3), 437, 2019 | 51 | 2019 |
A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding J Chen, BX Fang, LH Yin, S Su Jisuanji Xuebao(Chinese Journal of Computers) 33 (9), 1736-1747, 2010 | 49 | 2010 |
A privacy preserving scheme for nearest neighbor query Y Wang, Z Tian, H Zhang, S Su, W Shi Sensors 18 (8), 2440, 2018 | 37 | 2018 |
User and entity behavior analysis under urban big data Z Tian, C Luo, H Lu, S Su, Y Sun, M Zhang ACM Transactions on Data Science 1 (3), 1-19, 2020 | 31 | 2020 |
Preserving location privacy in mobile edge computing Y Wang, Z Tian, S Su, Y Sun, C Zhu ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 29 | 2019 |
Automated attack and defense framework for 5G security on physical and logical layers Z Tian, Y Sun, S Su, M Li, X Du, M Guizani arXiv preprint arXiv:1902.04009, 2019 | 24 | 2019 |
Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding C Yi, F Jiang, MZA Bhuiyan, C Yang, X Gao, H Guo, J Ma, S Su Future Generation Computer Systems 114, 96-105, 2021 | 20 | 2021 |