Trust Prediction and Trust-based Source Routing in Mobile Ad Hoc Networks H Xia, Z Jia, X Li, L Ju, E Sha Ad Hoc Networks 11 (7), 2096-2114, 2013 | 286 | 2013 |
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao J. Netw. Comput. Appl. 82, 56-64, 2017 | 127 | 2017 |
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks H Xia*, S Zhang, Y Li, Z Pan, X Peng, X Cheng IEEE Transactions on Vehicular Technology 68 (7), 7108-7120, 2019 | 95 | 2019 |
A Subjective Trust Management Model with Multiple Decision Factors for MANET based on AHP and Fuzzy Logic Rules H Xia, Z Jia, L Ju, X Li, Y Zhu IEEE/ACM GreenCom2011, 124-130, 2011 | 87 | 2011 |
Energy-efficient Routing Algorithm based on Unequal Clustering and Connected Graph in Wireless Sensor Networks H Xia*, R Zhang, J Yu, Z Pan International Journal of Wireless Information Networks 23 (2), 141-150, 2016 | 83 | 2016 |
Trust Management Model for Mobile Ad Hoc Network based on Analytic Hierarchy Process and Fuzzy Theory H Xia*, Z Jia, L Ju, Y Zhu IET Wireless Sensor Systems 1 (4), 248-266, 2011 | 83 | 2011 |
Trustworthiness Inference Framework in the Social Internet of Things: A Context-aware Approach H Xia*, F Xiao, S Zhang, C Hu, X Cheng IEEE International Conference on Computer Communications (INFOCOM2019), 838-846, 2019 | 70 | 2019 |
Impact of Trust Model on On-demand Multi-path Routing in Mobile Ad Hoc Networks H Xia, Z Jia, L Ju, X Li, E Sha Computer Communications 36 (9), 1078-1093, 2013 | 62 | 2013 |
An Efficient Social-like Semantic-aware Service Discovery Mechanism for Large-scale Internet of Things H Xia*, C Hu, F Xiao, X Cheng, Z Pan Computer Networks 152, 210-220, 2019 | 58 | 2019 |
Modeling and analysis botnet propagation in social Internet of Things H Xia*, L Li, X Cheng, X Cheng, T Qiu IEEE Internet of Things Journal 7 (8), 7470-7481, 2020 | 49 | 2020 |
A Novel Light-weight Subjective Trust Inference Framework in MANETs H Xia*, Z Li, Y Zheng, A Liu, Y Choi, S H. IEEE Transactions on Sustainable Computing 5 (2), 236-248, 2020 | 46 | 2020 |
Light-weight Trust-enhanced On-demand Multi-path Routing in Mobile Ad Hoc Networks H Xia*, J Yu, C Tian, Z Pan, E Sha Journal of Network and Computer Applications 62, 112-127, 2016 | 45 | 2016 |
Research of Trust Model based on Fuzzy Theory in Mobile Ad Hoc Networks H Xia*, Z Jia, E Sha IET Information Security 8 (2), 88-103, 2014 | 41 | 2014 |
Applying Link Stability Estimation Mechanism to Multicast Routing in MANETs H Xia*, S Xia, J Yu, Z Jia, E Sha Journal of Systems Architecture 60 (5), 467-480, 2014 | 41 | 2014 |
Towards a novel trust-based multicast routing for VANETs H Xia*, S Zhang, B Li, L Li, C X. Security and Communication Networks 7608198, 1-12, 2018 | 37 | 2018 |
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems H Xia*, F Xiao, S Zhang, X Cheng, Z Pan IEEE Transactions on Network Science and Engineering 7 (2), 792-804, 2020 | 32 | 2020 |
FedME2: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN H Xia, S Xu, J Pei, R Zhang, Z Yu, W Zou, L Wang, C Liu IEEE Journal on Selected Areas in Communications 41 (11), 3573-3588, 2023 | 31 | 2023 |
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction J Yu, R Hao, H Xia, H Zhang, X Cheng, F Kong Inf. Sci. 443, 158-172, 2018 | 30 | 2018 |
Optimization scheme for intrusion detection scheme GBDT in edge computing center J Cui, H Xia*, R Zhang, B Hu, X Cheng Computer Communications 168, 136-145, 2021 | 29 | 2021 |
SPDTS: a differential privacy-based blockchain scheme for secure power data trading Z Liu, C Hu, H Xia*, T Xiang, B Wang, J Chen IEEE Transactions on Network and Service Management 19 (4), 5196-5207, 2022 | 28 | 2022 |