Citation Impact
Citing Papers
A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks
2023 Standout
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
2010
Security and privacy in 6G networks: New areas and new challenges
2020
Modeling and analyses of IP spoofing attack in 6LoWPAN network
2017
A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications
2015 Standout
Exploiting encrypted and tunneled multimedia calls in high-speed big data environment
2017
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
2018 Standout
Wireless sensor networks: a survey on recent developments and potential synergies
2013 Standout
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
2015
Virtual reality in the context of Internet of Things
2019 Standout
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
2015
Literature review of Industry 4.0 and related technologies
2018 Standout
Depth and Rate of Fading on Fixed Wireless Channels Between 200 MHz and 2 GHz in Suburban Macrocell Environments
2010
Characterising the Digital Twin: A systematic literature review
2020 Standout
Unobtrusive Activity Recognition of Elderly People Living Alone Using Anonymous Binary Sensors and DCNN
2018
Securing vehicle-to-grid communications in the smart grid
2013
A Survey of 5G Network: Architecture and Emerging Technologies
2015 Standout
An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm
2022
6G Internet of Things: A Comprehensive Survey
2021 Standout
Opportunities and Challenges of Vehicle-to-Home, Vehicle-to-Vehicle, and Vehicle-to-Grid Technologies
2013
Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid
2012
A systematic literature review of blockchain-based applications: Current status, classification and open issues
2018 Standout
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
2020 Standout
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
2014
On the condition number distribution of complex wishart matrices
2010
A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS
2022 Standout
Privacy preserving smartcard-based authentication system with provable security
2015
Recent Advances in Underlay Heterogeneous Networks: Interference Control, Resource Allocation, and Self-Organization
2015
An Overview of Massive MIMO: Benefits and Challenges
2014 Standout
M2M Security: Challenges and Solutions
2016
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid
2014
Authentication Protocols for Internet of Things: A Comprehensive Survey
2017
Space-Air-Ground Integrated Network: A Survey
2018 Standout
A novel ant colony optimization based on game for traveling salesman problem
2020
Toward Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions
2019
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
2019 Standout
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET
2022
Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network
2019 Standout
Cyber-physical systems and their security issues
2018 Standout
Potential Applications of Computer Vision in Quality Inspection of Rice: A Review
2015
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
2017
A Survey of the Functional Splits Proposed for 5G Mobile Crosshaul Networks
2018 Standout
A systematic literature review on machine learning applications for sustainable agriculture supply chain performance
2020 Standout
Exploiting hash functions to intensify the remote user authentication scheme
2012
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks
2021
Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
2017 Standout
Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks
2016
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
2022 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Underwater Optical Wireless Communication
2016 Standout
Opportunities and Challenges of Software-Defined Mobile Networks in Network Security
2016
An Edge Traffic Flow Detection Scheme Based on Deep Learning in an Intelligent Transportation System
2020 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks
2019
Industrial IoT in 5G environment towards smart manufacturing
2018
An Improved Hybrid Secure Multipath Routing Protocol for MANET
2021 Standout
LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem
2018
Dual iterative adaptive dynamic programming for a class of discrete-time nonlinear systems with time-delays
2012
Particle Swarm Optimization: A Comprehensive Survey
2022 Standout
Electric vehicles and smart grid interaction: A review on vehicle to grid and renewable energy sources integration
2014 Standout
Satellite Communications in the New Space Era: A Survey and Future Challenges
2020 Standout
Challenges Toward Wireless Communications for High-Speed Railway
2014 Standout
Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks
2022 Standout
A survey of network anomaly detection techniques
2015 Standout
Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics Be the Game Changers?
2019
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
2015
Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol
2014
Differentially Private Asynchronous Federated Learning for Mobile Edge Computing in Urban Informatics
2019
Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities
2021
Survival Study on Blockchain Based 6G-Enabled Mobile Edge Computation for IoT Automation
2020
Sustainable supply chain management with pricing, greening and governmental tariffs determining strategies: A game-theoretic approach
2017
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
Secure Wireless Communication via Intelligent Reflecting Surface
2019 Standout
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
2011
Privacy‐friendly and efficient secure communication framework for V2G networks
2017
Secure localization and location verification in wireless sensor networks: a survey
2010
5G roadmap: 10 key enabling technologies
2016
Digital Twins: A Survey on Enabling Technologies, Challenges, Trends and Future Prospects
2022 Standout
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
Accessibility Analysis and Modeling for IoV in an Urban Scene
2020
Multi-factor user authentication scheme for IoT-based healthcare services
2018
An Industrial Perspective on Wireless Sensor Networks — A Survey of Requirements, Protocols, and Challenges
2014
Intelligent rate control for supporting real-time traffic in WLAN mesh networks
2010
Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections
2016
Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid
2013
5G Internet of Things: A survey
2018 Standout
Data-Driven Zero-Sum Neuro-Optimal Control for a Class of Continuous-Time Unknown Nonlinear Systems With Disturbance Using ADP
2015 Standout
Novel Anonymous Authentication Scheme Using Smart Cards
2012
Parameter adaptation-based ant colony optimization with dynamic hybrid mechanism
2022 Standout
Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review
2020 Standout
Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research
2018
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
2014 Standout
The Impact of Artificial Intelligence and Blockchain on the Accounting Profession
2020 Standout
Task Allocation for Wireless Sensor Network Using Modified Binary Particle Swarm Optimization
2013
FogHA: An efficient handover authentication for mobile devices in fog computing
2021
Sparse Channel Estimation and Equalization for OFDM-Based Underwater Cooperative Systems With Amplify-and-Forward Relaying
2015
Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network
2017
The Role of AI, Machine Learning, and Big Data in Digital Twinning: A Systematic Literature Review, Challenges, and Opportunities
2021 Standout
Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective
2019
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
2015
A review on the state-of-the-art technologies of electric vehicle, its impacts and prospects
2015 Standout
Research on the Natural Language Recognition Method Based on Cluster Analysis Using Neural Network
2021 Standout
A Survey on Mobile Edge Computing: The Communication Perspective
2017 Standout
Deep Reinforcement Learning Assisted Federated Learning Algorithm for Data Management of IIoT
2021 Standout
Combination of wearable sensors and internet of things and its application in sports rehabilitation
2019 Standout
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare
2021 Standout
ECC-based untraceable authentication for large-scale active-tag RFID systems
2014
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
2020
Works of Maode Ma being referenced
Wireless broadband access: WiMAX and beyond
2007
Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks
2008
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network
2018
A strong user authentication scheme with smart cards for wireless communications
2010
Delay guaranteed MDP scheduling scheme for HCCA based on802.11p protocol inV2R environments
2017
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks
2008
A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks
2011
Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks
2019
A Link Adaptation Algorithm in MIMO-based WiMAX Systems
2007
Cognitive-inspired Computing: Advances and Novel Applications
2020
A Survey on Security Aspects for 3GPP 5G Networks
2019
CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets
2019
Green Communications and Networks
2012
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications
2011
IPACT With Grant Estimation (IPACT-GE) Scheme for Ethernet Passive Optical Networks
2008
A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
2016
A Server Independent Authentication Scheme for RFID Systems
2012
Smart healthcare in smart cities: wireless patient monitoring system using IoT
2021
Intelligent MAC model for traffic scheduling in IEEE 802.11e wireless LANs
2008
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks
2017
An novel three-party authenticated key exchange protocol using one-time key
2012
A Survey on Security Aspects for LTE and LTE-A Networks
2013
Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data
2018
A group-based authentication and key agreement for MTC in LTE networks
2012
A simple and robust handover authentication between HeNB and eNB in LTE networks
2012
Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination
2018
A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis
2010
Multi-Population Ant Colony Algorithm for Virtual Machine Deployment
2017
Network lifetime optimization in wireless sensor networks
2010
Information Computing and Applications
2013
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks
2012
A unified grid-based wandering pattern detection algorithm
2016
A proxy signature-based handover authentication scheme for LTE wireless networks
2017
A Novel Mechanism for Fast Detection of Transformed Data Leakage
2018
A Survey on MAC Protocols for Underwater Wireless Sensor Networks
2014
A survey and projection on medium access control protocols for wireless sensor networks
2012
An Anonymous Handover Authentication Scheme Based on LTE‐A for Vehicular Networks
2018
Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics
2019
Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks
2019
DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET
2019