A survey of key management schemes in wireless sensor networks Y Xiao, VK Rayi, B Sun, X Du, F Hu, M Galloway Computer communications 30 (11-12), 2314-2341, 2007 | 672 | 2007 |
An effective key management scheme for heterogeneous sensor networks X Du, Y Xiao, M Guizani, HH Chen Ad Hoc Networks 5 (1), 24-34, 2007 | 532 | 2007 |
MeDShare: Trust-less medical data sharing among cloud service providers via blockchain QI Xia, EB Sifah, KO Asamoah, J Gao, X Du, M Guizani IEEE Access 5, 14757-14767, 2017 | 461 | 2017 |
Security in wireless sensor networks X Du, HH Chen IEEE Wireless Communications 15 (4), 60-66, 2008 | 436 | 2008 |
Internet protocol television (IPTV): the killer application for the next-generation internet Y Xiao, X Du, J Zhang, F Hu, S Guizani IEEE Communications Magazine 45 (11), 126-134, 2007 | 431 | 2007 |
Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks X Du, M Guizani, Y Xiao, HH Chen IEEE Transactions on Wireless Communications 8 (3), 1223-1229, 2009 | 392 | 2009 |
Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage L Huang, G Zhu, X Du IEEE wireless communications 20 (2), 44-51, 2013 | 170 | 2013 |
Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities Z Guan, G Si, X Zhang, L Wu, N Guizani, X Du, Y Ma IEEE Communications Magazine 56 (7), 82-88, 2018 | 159 | 2018 |
Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid Z Guan, J Li, L Wu, Y Zhang, J Wu, X Du IEEE Internet of Things Journal 4 (6), 1934-1944, 2017 | 159 | 2017 |
Maintaining differentiated coverage in heterogeneous sensor networks X Du, F Lin EURASIP Journal on Wireless Communications and Networking 2005 (4), 1-8, 2005 | 155 | 2005 |
Two tier secure routing protocol for heterogeneous sensor networks X Du, M Guizani, Y Xiao, HH Chen IEEE transactions on Wireless Communications 6 (9), 3395-3401, 2007 | 127 | 2007 |
A survey of machine and deep learning methods for internet of things (IoT) security MA Al-Garadi, A Mohamed, AK Al-Ali, X Du, I Ali, M Guizani IEEE Communications Surveys & Tutorials 22 (3), 1646-1685, 2020 | 125 | 2020 |
Toward vehicle-assisted cloud computing for smartphones H Zhang, Q Zhang, X Du IEEE Transactions on Vehicular Technology 64 (12), 5610-5618, 2015 | 125 | 2015 |
Real-time lateral movement detection based on evidence reasoning network for edge computing environment Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019 | 120 | 2019 |
A lightweight multicast authentication mechanism for small scale IoT applications X Yao, X Han, X Du, X Zhou IEEE Sensors Journal 13 (10), 3693-3701, 2013 | 119 | 2013 |
Permission-combination-based scheme for android mobile malware detection S Liang, X Du 2014 IEEE international conference on communications (ICC), 2301-2306, 2014 | 111 | 2014 |
Defending resource depletion attacks on implantable medical devices X Hei, X Du, J Wu, F Hu 2010 IEEE global telecommunications conference GLOBECOM 2010, 1-5, 2010 | 108 | 2010 |
On efficient deployment of sensors on planar grid Q Wu, NSV Rao, X Du, SS Iyengar, VK Vaishnavi Computer Communications 30 (14-15), 2721-2734, 2007 | 108 | 2007 |
Cloud-based malware detection game for mobile devices with offloading L Xiao, Y Li, X Huang, XJ Du IEEE Transactions on Mobile Computing 16 (10), 2742-2750, 2017 | 107 | 2017 |
Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities M Shen, X Tang, L Zhu, X Du, M Guizani IEEE Internet of Things Journal 6 (5), 7702-7712, 2019 | 105 | 2019 |