Jing (Selena) He
Jing (Selena) He
Associate Professor, Department of Computer Science, Kennesaw State University
Verified email at kennesaw.edu - Homepage
Title
Cited by
Cited by
Year
Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course
J He, DCT Lo, Y Xie, J Lartigue
2016 IEEE frontiers in education conference (FIE), 1-9, 2016
932016
Optimal distributed data collection for asynchronous cognitive radio networks
Z Cai, S Ji, J He, AG Bourgeois
2012 IEEE 32nd international conference on distributed computing systems …, 2012
722012
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
692014
Clinical efficacy of a specifically targeted antimicrobial peptide mouth rinse: targeted elimination of Streptococcus mutans and prevention of demineralization
R Sullivan, P Santarpia, S Lavender, E Gittins, Z Liu, MH Anderson, J He, ...
Caries research 45 (5), 415-428, 2011
692011
Constructing load-balanced data aggregation trees in probabilistic wireless sensor networks
J He, S Ji, Y Pan, Y Li
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1681-1690, 2013
612013
A novel blockchain-based education records verification solution
M Han, Z Li, J He, D Wu, Y Xie, A Baba
Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018
562018
Deep learning approach for cyberattack detection
Y Zhou, M Han, L Liu, JS He, Y Wang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018
542018
Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration
Z Cai, S Ji, J He, L Wei, AG Bourgeois
IEEE, 2012
532012
Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks
JS He, S Ji, Y Pan, Z Cai
Theoretical Computer Science 507, 2-16, 2013
512013
Constructing a load-balanced virtual backbone in wireless sensor networks
J He, S Ji, P Fan, Y Pan, Y Li
2012 International Conference on Computing, Networking and Communications …, 2012
382012
Security in fog computing through encryption
A Vishwanath, R Peruri, Jing (Selena) He
DigitalCommons@ Kennesaw State University, 2016
362016
Load–balanced CDS construction in wireless sensor networks via genetic algorithm
J He, S Ji, M Yan, Y Pan, Y Li
International Journal of Sensor Networks 11 (3), 166-178, 2012
342012
General graph data de-anonymization: From mobility traces to social networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-29, 2016
322016
Minimum-sized influential node set selection for social networks under the independent cascade model
J He, S Ji, R Beyah, Z Cai
Proceedings of the 15th ACM International Symposium on Mobile ad hoc …, 2014
322014
Effects of ginkgoneolic acid on the growth, acidogenicity, adherence, and biofilm of Streptococcus mutans in vitro
J He, S Wang, T Wu, Y Cao, X Xu, X Zhou
Folia microbiologica 58 (2), 147-153, 2013
322013
Reliable and energy efficient target coverage for wireless sensor networks
J He, S Ji, Y Pan, Y Li
Tsinghua science and technology 16 (5), 464-474, 2011
322011
A survey on decentralized flocking schemes for a set of autonomous mobile robots
N Xiong, J He, Y Yang, Y He, T Kim, C Lin
J. Commun. 5 (1), 31-38, 2010
322010
Nicotine enhances interspecies relationship between Streptococcus mutans and Candida albicans
S Liu, W Qiu, K Zhang, X Zhou, B Ren, J He, X Xu, L Cheng, M Li
BioMed Research International 2017, 2017
312017
A survey on fault-tolerance in distributed network systems
N Xiong, Y Yang, M Cao, J He, L Shu
2009 International Conference on Computational Science and Engineering 2 …, 2009
272009
Genetic-algorithm-based construction of load-balanced CDSs in wireless sensor networks
J He, S Ji, M Yan, Y Pan, Y Li
2011-MILCOM 2011 Military Communications Conference, 667-672, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20