Citation Impact

Citing Papers

Deep-Learning-Empowered Breast Cancer Auxiliary Diagnosis for 5GB Remote E-Health
2021 Standout
Toward Digitalization of Maritime Transport?
2019 Standout
Secure Data Management in Cloudlet Assisted IoT Enabled e-Health Framework in Smart City
2020
Fast Splitting-Based Tag Identification Algorithm For Anti-Collision in UHF RFID System
2018
SCoP: Smartphone energy saving by merging push services in Fog computing
2017
A Tucker Deep Computation Model for Mobile Multimedia Feature Learning
2017 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
A Review on the Use of Blockchain for the Internet of Things
2018 Standout
Applications of Deep Reinforcement Learning in Communications and Networking: A Survey
2019 Standout
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT
2018
Sampling Bloom Filter-Based Detection of Unknown RFID Tags
2015
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
2016
Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways
2017 Standout
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
2018 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
An Improved Ant Colony Optimization Algorithm Based on Hybrid Strategies for Scheduling Problem
2019 Standout
Significant Permission Identification for Machine-Learning-Based Android Malware Detection
2018

Works of Kai Bu being referenced

A locality-based range-free localization algorithm for anisotropic wireless sensor networks
2015
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
2012
ENDA
2013
Robust localization against outliers in wireless sensor networks
2013
Efficient distributed query processing in large RFID-enabled supply chains
2014
Flexible and Time-Efficient Tag Scanning with Handheld Readers
2015
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
2015
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
2013
Complete and fast unknown tag identification in large RFID systems
2012
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
2015
Rankless by CCL
2026