User profiles for Xiaojiang Du
Xiaojiang Du, Endowed-Chair Professor, IEEE Fellow, ACM Distinguished MemberStevens Institute of Technology Verified email at stevens.edu Cited by 36943 |
A survey of machine and deep learning methods for internet of things (IoT) security
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest developing fields in the …
one another with minimal human intervention. IoT is one of the fastest developing fields in the …
[HTML][HTML] When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
SDN controllers: A comprehensive analysis and performance evaluation study
Software-defined networks offer flexible and intelligent network operations by splitting a
traditional network into a centralized control plane and a programmable data plane. The …
traditional network into a centralized control plane and a programmable data plane. The …
An effective key management scheme for heterogeneous sensor networks
Security is critical for sensor networks used in military, homeland security and other hostile
environments. Previous research on sensor network security mainly considers homogeneous …
environments. Previous research on sensor network security mainly considers homogeneous …
Security in wireless sensor networks
Recent advances in electronics and wireless communication technologies have enabled the
development of large-scale wireless sensor networks that consist of many low-power, low-…
development of large-scale wireless sensor networks that consist of many low-power, low-…
MeDShare: Trust-less medical data sharing among cloud service providers via blockchain
The dissemination of patients' medical records results in diverse risks to patients' privacy as
malicious activities on these records cause severe damage to the reputation, finances, and …
malicious activities on these records cause severe damage to the reputation, finances, and …
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide
variety of areas. They are often deployed in potentially adverse or even hostile environment …
variety of areas. They are often deployed in potentially adverse or even hostile environment …
CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential
for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For …
for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For …
Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities
Machine learning (ML) techniques have been widely used in many smart city sectors, where
a huge amount of data is gathered from various (IoT) devices. As a typical ML model, …
a huge amount of data is gathered from various (IoT) devices. As a typical ML model, …
Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
Previous research on sensor network security mainly considers homogeneous sensor
networks, where all sensor nodes have the same capabilities. Research has shown that …
networks, where all sensor nodes have the same capabilities. Research has shown that …