Works (41)
2021 article
Dynamic Interference Management for UAV-Assisted Wireless Networks
Rahmati, A., Hosseinalipour, S., Yapici, Y., He, X., Guvenc, I., Dai, H., & Bhuyan, A. (2021, September 28). IEEE Transactions on Wireless Communications, Vol. 21, pp. 2637–2653.
2021 article
Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing
He, X., Jin, R., & Dai, H. (2021, November 22). IEEE Transactions on Communications.
2020 article
Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing
He, X., Jin, R., & Dai, H. (2020, December 1).
2020 article
Minimizing the Age of Information in the Presence of Location Privacy-aware Mobile Agents
Jin, R., He, X., & Dai, H. (2020, January 1). IEEE Transactions on Communications.
2020 article
Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing
He, X., Jin, R., & Dai, H. (2020, March 18). IEEE Transactions on Wireless Communications.
2019 article
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Jin, R., He, X., & Dai, H. (2019, May 4). IEEE Transactions on Information Forensics and Security.
2019 article
Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing
He, X., Jin, R., & Dai, H. (2019, December 13). IEEE Transactions on Wireless Communications.
2018 article
Advances in Mechanics of Microstructured Media and Structures
dell'Isola, F., Eremeyev, V. A., & Porubov, A. (2018, January 1). Advanced Structured Materials.
2018 book
Adversary Detection For Cognitive Radio Networks
In SpringerBriefs in Electrical and Computer Engineering.
2018 article
Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks
He, X., Jin, R., & Dai, H. (2018, June 12). IEEE Wireless Communications Letters.
2018 article
Case Study I: Link Signature Assisted PUE Attack Detection
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Case Study II: HMM-Based Byzantine Attack Detection
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Case Study III: CFC-Based Byzantine Attack Detection
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach
Jin, R., He, X., & Dai, H. (2018, July 13). IEEE Transactions on Cognitive Communications and Networking.
2018 article
Conclusion and Future Work
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Conclusion and Future Work
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT
He, X., Jin, R., & Dai, H. (2018, October 30). IEEE Internet of Things Journal.
2018 book
Dynamic Games for Network Security
In SpringerBriefs in Electrical and Computer Engineering.
2018 article
Dynamic Security Games with Deception
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Dynamic Security Games with Extra Information
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Dynamic Security Games with Incomplete Information
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Introduction
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Overview of Adversary Detection in CR Networks
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Overview of Dynamic Network Security Games
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Preliminaries
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2018 article
Preliminaries of Analytical Tools
He, X., & Dai, H. (2018, January 1). Springer Briefs in Electrical and Computer Engineering.
2017 article
A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks
He, X., Dai, H., Ning, P., & Dutta, R. (2017, January 26). IEEE Journal on Selected Areas in Communications, Vol. 35, pp. 615–627.
2016 article
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
He, X., Dai, H., Ning, P., & Dutta, R. (2016, April 1). IEEE INFOCOM 2016 - the 35th Annual IEEE International Conference on Computer Communications.
2016 article
Collaborative IDS Configuration: A Two-Layer Game-Theoretical Approach
Jin, R., He, X., & Dai, H. (2016, December 1).
2016 article
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry
He, X., Dai, H., & Ning, P. (2016, March 31). IEEE Transactions on Signal Processing.
2015 article
A stochastic multi-channel spectrum access game with incomplete information
He, X., Dai, H., Ning, P., & Dutta, R. (2015, June 1). 2015 Ieee International Conference on Communications (Icc), pp. 4799–4804.
2015 article
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
He, X., Dai, H., Ning, P., & Dutta, R. (2015, December 1). 2015 IEEE Global Communications Conference (GLOBECOM).
2015 article
Improving learning and adaptation in security games by exploiting information asymmetry
He, X., Dai, H., & Ning, P. (2015, April 1).
2015 article
No time to demodulate - fast physical layer verification of friendly jamming
Shen, W., Liu, Y., He, X., Dai, H., & Ning, P. (2015, October 1).
2015 article
Toward Proper Guard Zones for Link Signature
He, X., Dai, H., Shen, W., Ning, P., & Dutta, R. (2015, November 6). IEEE Transactions on Wireless Communications, Vol. 15, pp. 2104–2117.
2014 article
Dynamic Adaptive Anti-Jamming via Controlled Mobility
He, X., Dai, H., & Ning, P. (2014, April 29). IEEE Transactions on Wireless Communications.
2013 article
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
He, X., Dai, H., & Ning, P. (2013, March 22). IEEE Transactions on Wireless Communications.
2013 article
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
Shen, N. W., Ning, N. P., He, N. X., & Dai, N. H. (2013, May 1).
2013 article
Dynamic adaptive anti-jamming via controlled mobility
He, X., Dai, H., & Ning, P. (2013, October 1).
2013 article
Is link signature dependable for wireless security?
He, X., Dai, H., Shen, W., & Ning, P. (2013, April 1).
2012 article
A Byzantine attack defender: The Conditional Frequency Check
He, X., Dai, H., & Ning, P. (2012, July 1).