Xiaojiang Du
Xiaojiang Du
Verified email at temple.edu - Homepage
TitleCited byYear
A survey of key management schemes in wireless sensor networks
Y Xiao, VK Rayi, B Sun, X Du, F Hu, M Galloway
Computer communications 30 (11-12), 2314-2341, 2007
5962007
An effective key management scheme for heterogeneous sensor networks
X Du, Y Xiao, M Guizani, HH Chen
Ad Hoc Networks 5 (1), 24-34, 2007
4632007
Internet protocol television (IPTV): the killer application for the next-generation internet
Y Xiao, X Du, J Zhang, F Hu, S Guizani
IEEE Communications Magazine 45 (11), 126-134, 2007
3722007
Security in wireless sensor networks
X Du, HH Chen
IEEE Wireless Communications 15 (4), 60-66, 2008
3702008
Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
X Du, M Guizani, Y Xiao, HH Chen
IEEE Transactions on Wireless Communications 8 (3), 1223-1229, 2009
3152009
MeDShare: Trust-less medical data sharing among cloud service providers via blockchain
QI Xia, EB Sifah, KO Asamoah, J Gao, X Du, M Guizani
IEEE Access 5, 14757-14767, 2017
1982017
Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage
L Huang, G Zhu, X Du
IEEE wireless communications 20 (2), 44-51, 2013
1582013
Maintaining differentiated coverage in heterogeneous sensor networks
X Du, F Lin
EURASIP Journal on Wireless Communications and Networking 2005 (4), 565-572, 2005
1472005
Two tier secure routing protocol for heterogeneous sensor networks
X Du, M Guizani, Y Xiao, HH Chen
IEEE transactions on Wireless Communications 6 (9), 3395-3401, 2007
1162007
Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid
Z Guan, J Li, L Wu, Y Zhang, J Wu, X Du
IEEE Internet of Things Journal 4 (6), 1934-1944, 2017
1072017
On efficient deployment of sensors on planar grid
Q Wu, NSV Rao, X Du, SS Iyengar, VK Vaishnavi
Computer Communications 30 (14-15), 2721-2734, 2007
992007
A lightweight multicast authentication mechanism for small scale IoT applications
X Yao, X Han, X Du, X Zhou
IEEE Sensors Journal 13 (10), 3693-3701, 2013
982013
Permission-combination-based scheme for android mobile malware detection
S Liang, X Du
2014 IEEE international conference on communications (ICC), 2301-2306, 2014
972014
Improving routing in sensor networks with heterogeneous sensor nodes
X Du, F Lin
2005 IEEE 61st Vehicular Technology Conference 4, 2528-2532, 2005
962005
Toward vehicle-assisted cloud computing for smartphones
H Zhang, Q Zhang, X Du
IEEE Transactions on Vehicular Technology 64 (12), 5610-5618, 2015
942015
Secure and efficient time synchronization in heterogeneous sensor networks
X Du, M Guizani, Y Xiao, HH Chen
IEEE transactions on vehicular technology 57 (4), 2387-2394, 2008
852008
Biometric-based two-level secure access control for implantable medical devices during emergencies
X Hei, X Du
2011 Proceedings IEEE INFOCOM, 346-350, 2011
842011
Effective defense schemes for phishing attacks on mobile computing platforms
L Wu, X Du, J Wu
IEEE Transactions on Vehicular Technology 65 (8), 6678-6691, 2015
822015
Defending resource depletion attacks on implantable medical devices
X Hei, X Du, J Wu, F Hu
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
812010
A lightweight live memory forensic approach based on hardware virtualization
Y Cheng, X Fu, X Du, B Luo, M Guizani
Information Sciences 379, 23-41, 2017
742017
The system can't perform the operation now. Try again later.
Articles 1–20