An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. D He, Y Gao, S Chan, C Chen, J Bu Ad Hoc & Sensor Wireless Networks 10 (4), 361-371, 2010 | 334 | 2010 |
Secure and efficient handover authentication based on bilinear pairing functions D He, C Chen, S Chan, J Bu IEEE Transactions on Wireless Communications 11 (1), 48-53, 2012 | 250 | 2012 |
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE Transactions on Information Technology in Biomedicine 16 (4), 623-632, 2012 | 239 | 2012 |
Communication Security of Unmanned Aerial Vehicles D He, S Chan, M Guizani IEEE Wireless Communications, 2016 | 222 | 2016 |
PD-RED: to improve the performance of RED J Sun, KT Ko, G Chen, S Chan, M Zukerman IEEE Communications letters 7 (8), 406-408, 2003 | 171 | 2003 |
Privacy in the internet of things for smart healthcare D He, R Ye, S Chan, M Guizani, Y Xu IEEE Communications Magazine 56 (4), 38-44, 2018 | 159 | 2018 |
Cascading failure spreading on weighted heterogeneous networks ZX Wu, G Peng, WX Wang, S Chan, EWM Wong Journal of Statistical Mechanics: Theory and Experiment 2008 (05), P05013, 2008 | 147 | 2008 |
Lightweight and provably secure user authentication with anonymity for the global mobility network C Chen, D He, S Chan, J Bu, Y Gao, R Fan International Journal of Communication Systems 24 (3), 347-362, 2011 | 145 | 2011 |
Privacy-preserving universal authentication protocol for wireless communications D He, J Bu, S Chan, C Chen, M Yin IEEE Transactions on Wireless Communications 10 (2), 431-436, 2011 | 144 | 2011 |
User privacy and data trustworthiness in mobile crowd sensing D He, S Chan, M Guizani IEEE Wireless Communications 22 (1), 28-34, 2015 | 136 | 2015 |
Mobile application security: malware threats and defenses D He, S Chan, M Guizani IEEE Wireless Communications 22 (1), 138-144, 2015 | 129 | 2015 |
HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint G Han, L Liu, S Chan, R Yu, Y Yang IEEE Communications Magazine 55 (3), 93-99, 2017 | 121 | 2017 |
PD-controller: a new active queue management scheme J Sun, G Chen, KT Ko, S Chan, M Zukerman Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE 6, 3103-3107, 2003 | 120 | 2003 |
Distributed access control with privacy support in wireless sensor networks D He, J Bu, S Zhu, S Chan, C Chen IEEE Transactions on Wireless Communications 10 (10), 3472-3481, 2011 | 115 | 2011 |
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things G Han, L Zhou, H Wang, W Zhang, S Chan Future Generation Computer Systems 82, 689-697, 2018 | 110 | 2018 |
Offloading Time Optimization via Markov Decision Process in Mobile Edge Computing G Yang, L Hou, X He, D He, S Chan, M Guizani IEEE Internet of Things Journal, 2020 | 109 | 2020 |
Smart Contract Vulnerability Analysis and Security Audit D He, Z Deng, Y Zhang, S Chan, Y Cheng, N Guizani IEEE Network 34 (5), 276-282, 2020 | 109 | 2020 |
A distributed trust evaluation model and its application scenarios for medical sensor networks D He, C Chen, S Chan, J Bu, AV Vasilakos IEEE Transactions on Information Technology in Biomedicine 16 (6), 1164-1175, 2012 | 108 | 2012 |
Intrusion detection methods based on integrated deep learning model Z Wang, Y Liu, D He, S Chan computers & security 103, 102177, 2021 | 105 | 2021 |
Iterative decoding of multi-dimensional concatenated single parity check codes L Ping, S Chan, KL Yeung Communications, 1998. ICC 98. Conference Record. 1998 IEEE International …, 1998 | 104 | 1998 |