Works (37)

2020 journal article

Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.

By: X. He, R. Jin & H. Dai

Source: Web Of Science
Added: April 14, 2020

2020 journal article

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.

By: X. He, R. Jin & H. Dai

Source: Web Of Science
Added: July 13, 2020

2019 journal article

Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks

IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.

By: X. He, R. Jin & H. Dai

Source: Web Of Science
Added: March 11, 2019

2019 journal article

Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.

By: X. He, R. Jin & H. Dai

Source: Web Of Science
Added: July 15, 2019

2019 journal article

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.

By: R. Jin, X. He & H. Dai

Source: Web Of Science
Added: September 16, 2019

2018 chapter

Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 73–74).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Adversary Detection For Cognitive Radio Networks Introduction

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 1–6).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Adversary Detection For Cognitive Radio Networks Preface

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (p. VII-).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Adversary Detection For Cognitive Radio Networks Preface

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (p. VII-).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 19, 2018

2018 chapter

Case Study I: Link Signature Assisted PUE Attack Detection

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 45–50).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Case Study II: HMM-Based Byzantine Attack Detection

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 51–62).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Case Study III: CFC-Based Byzantine Attack Detection

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 63–72).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 journal article

Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.

By: R. Jin, X. He & H. Dai

Source: NC State University Libraries
Added: January 14, 2019

2018 chapter

Dynamic Games for Network Security Conclusion and Future Work

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 73–74).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Dynamic Games for Network Security Preface

In DYNAMIC GAMES FOR NETWORK SECURITY (p. VII-).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Dynamic Security Games with Deception

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 61–71).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Dynamic Security Games with Extra Information

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 25–42).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Dynamic Security Games with Incomplete Information

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 43–60).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Overview of Adversary Detection in CR Networks

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 19–44).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Overview of Dynamic Network Security Games

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 17–23).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Preliminaries

In DYNAMIC GAMES FOR NETWORK SECURITY (pp. 1–16).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2018 chapter

Preliminaries of Analytical Tools

In ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS (pp. 7–17).

By: X. He & H. Dai

Source: NC State University Libraries
Added: October 16, 2018

2017 journal article

A leader-follower controlled Markov stopping game for delay tolerant and opportunistic resource sharing networks

IEEE Journal on Selected Areas in Communications, 35(3), 615–627.

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Collaborative IDS configuration: A two-layer game-theoretical approach

2016 ieee global communications conference (globecom).

By: R. Jin, X. He & H. Dai

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Faster learning and adaptation in security games by exploiting information asymmetry

IEEE Transactions on Signal Processing, 64(13), 3429–3443.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Toward proper guard zones for link signature

IEEE Transactions on Wireless Communications, 15(3), 2104–2117.

By: X. He, H. Dai, W. Shen, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A stochastic multi-channel spectrum access game with incomplete information

2015 ieee international conference on communications (icc), 4799–4804.

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Dynamic IDS configuration in the presence of intruder type uncertainty

2015 IEEE Global Communications Conference (GLOBECOM).

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen, Y. Liu, X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Dynamic adaptive anti-jamming via controlled mobility

IEEE Transactions on Wireless Communications, 13(8), 4374–4388.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

A Byzantine attack defender in cognitive radio networks: The conditional frequency check

IEEE Transactions on Wireless Communications, 12(5), 2512–2523.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time

2013 ieee symposium on security and privacy (sp), 174–188.

By: W. Shen, P. Ning, X. He & H. Dai

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Is link signature dependable for wireless security?

2013 proceedings ieee infocom, 200–204.

By: X. He, H. Dai, W. Shen & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018