Works (41)

Updated: July 5th, 2023 15:44

2022 journal article

Dynamic Interference Management for UAV-Assisted Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(4), 2637–2653.

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Interference; Trajectory; Three-dimensional displays; Wireless communication; Jamming; Resource management; Unmanned aerial vehicles; Unmanned aerial vehicle (UAV); jammer; trajectory optimization; power allocation; interference management; smart interferer; spectral graph theory; Cheeger constant
Sources: Web Of Science, ORCID
Added: April 14, 2022

2022 journal article

Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing

IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344.

By: X. He*, R. Jin n & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Task analysis; Edge computing; Servers; Resource management; Unmanned aerial vehicles; Computational modeling; Wireless communication; Edge computing; UAV; resource allocation; deployment
Source: Web Of Science
Added: March 7, 2022

2021 journal article

Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents

IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067.

By: R. Jin n, X. He* & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Mobile agents; Privacy; Sensors; Task analysis; Differential privacy; Information age; Base stations; Age of information; mobile crowd sensing; location privacy; differential privacy
Source: Web Of Science
Added: March 29, 2021

2020 article

Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He*, R. Jin n & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
Source: Web Of Science
Added: October 26, 2021

2020 journal article

Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.

By: X. He*, R. Jin n & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Mobile-edge computing; privacy; task offloading; Lyapunov optimization
Source: Web Of Science
Added: April 14, 2020

2020 journal article

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.

By: X. He*, R. Jin n & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Servers; Jamming; Security; Mobile handsets; Wireless communication; Task analysis; Interference cancellation; Mobile-edge computing; secure offloading; physical-layer
Source: Web Of Science
Added: July 13, 2020

2019 journal article

Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks

IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.

By: X. He*, R. Jin n & H. Dai n

co-author countries: United States of America 🇺🇸
author keywords: Location privacy; cognitive radio; database-driven; mobile
Source: Web Of Science
Added: March 11, 2019

2019 journal article

Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.

By: X. He*, R. Jin n & H. Dai n

co-author countries: United States of America 🇺🇸
author keywords: Deep learning; Internet-of-Things (IoT); mobile-edge computing (MEC); post-decision state (PDS); privacy
Source: Web Of Science
Added: July 15, 2019

2019 journal article

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.

By: R. Jin n, X. He* & H. Dai n

co-author countries: China 🇨🇳 United States of America 🇺🇸
author keywords: Quantitative information flow; game theory; collaborative security; privacy
Source: Web Of Science
Added: September 16, 2019

2018 book

Advances in Mechanics of Microstructured Media and Structures

In ADVANCES IN MECHANICS OF MICROSTRUCTURED MEDIA AND STRUCTURES (Vol. 87, pp. 1–369).

Source: Web Of Science
Added: October 19, 2018

2018 book

Adversary Detection For Cognitive Radio Networks

In SpringerBriefs in Electrical and Computer Engineering.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 73–74.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Introduction

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 1–6.

By: X. He*, H. Dai*, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study I: Link Signature Assisted PUE Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 45–50.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study II: HMM-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 51–62.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study III: CFC-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 63–72.

By: X. He*, H. Dai*, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 journal article

Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.

By: R. Jin n, X. He* & H. Dai n

co-author countries: United States of America 🇺🇸
author keywords: Collaborative intrusion detection systems; game theory; Nash-Q learning
Source: Web Of Science
Added: January 14, 2019

2018 book

Dynamic Games for Network Security

In SpringerBriefs in Electrical and Computer Engineering (pp. 1–74).

By: X. He* & H. Dai n

co-author countries: United States of America 🇺🇸
Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Dynamic Games for Network Security Conclusion and Future Work

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 73–74.

By: X. He*, H. Dai*, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Deception

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 61–71.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Extra Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 25–42.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Incomplete Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 43–60.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Overview of Adversary Detection in CR Networks

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 19–44.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Overview of Dynamic Network Security Games

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 17–23.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 1–16.

By: X. He*, H. Dai*, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries of Analytical Tools

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 7–17.

By: X. He*, H. Dai n, X. He & H. Dai

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: October 16, 2018

2017 journal article

A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

co-author countries: United States of America 🇺🇸
author keywords: Resource sharing; delay tolerant; opportunistic resource; game theory; optimal stopping
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

co-author countries: United States of America 🇺🇸
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2016 conference paper

Collaborative IDS configuration: A two-layer game-theoretical approach

2016 ieee global communications conference (globecom).

By: R. Jin n, X. He n & H. Dai n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
author keywords: Cloud computing; cognitive radio; energy harvesting; jamming; reinforcement learning; security; stochastic game
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Toward Proper Guard Zones for Link Signature

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.

By: X. He n, H. Dai n, W. Shen n, P. Ning n & R. Dutta n

co-author countries: United States of America 🇺🇸
author keywords: Link signature; channel correlation model; guard zone; physical-layer security
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 conference paper

A A stochastic multi-channel spectrum access game with incomplete information

2015 ieee international conference on communications (icc), 4799–4804.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

co-author countries: United States of America 🇺🇸
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2015 article

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

co-author countries: United States of America 🇺🇸
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Dynamic Adaptive Anti-Jamming via Controlled Mobility

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
author keywords: Jamming/anti-jamming; mobility control; conductance; cognitive radio network; security
Source: Web Of Science
Added: August 6, 2018

2013 journal article

A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(5), 2512–2523.

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
author keywords: Cognitive radio network; collaborative spectrum sensing; malicious user detection; security
Source: Web Of Science
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen n, P. Ning n, X. He n & H. Dai n

co-author countries: United States of America 🇺🇸
author keywords: Wireless; friendly jamming; interference cancellation
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Is link signature dependable for wireless security?

2013 proceedings ieee infocom, 200–204.

By: X. He n, H. Dai n, W. Shen n & P. Ning n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He n, H. Dai n & P. Ning n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018