@article{rahmati_hosseinalipour_yapici_he_guvenc_dai_bhuyan_2022, title={Dynamic Interference Management for UAV-Assisted Wireless Networks}, volume={21}, ISSN={["1558-2248"]}, url={https://doi.org/10.1109/TWC.2021.3114234}, DOI={10.1109/TWC.2021.3114234}, number={4}, journal={IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Rahmati, Ali and Hosseinalipour, Seyyedali and Yapici, Yavuz and He, Xiaofan and Guvenc, Ismail and Dai, Huaiyu and Bhuyan, Arupjyoti}, year={2022}, month={Apr}, pages={2637–2653} } @article{he_jin_dai_2022, title={Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing}, volume={70}, ISSN={["1558-0857"]}, DOI={10.1109/TCOMM.2021.3129902}, number={2}, journal={IEEE TRANSACTIONS ON COMMUNICATIONS}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2022}, month={Feb}, pages={1332–1344} } @article{jin_he_dai_2021, title={Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents}, volume={69}, ISBN={1558-0857}, DOI={10.1109/TCOMM.2020.3035394}, number={2}, journal={IEEE TRANSACTIONS ON COMMUNICATIONS}, author={Jin, Richeng and He, Xiaofan and Dai, Huaiyu}, year={2021}, month={Feb}, pages={1053–1067} } @article{he_jin_dai_2020, title={Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing}, ISSN={["2576-6813"]}, DOI={10.1109/GLOBECOM42002.2020.9348243}, journal={2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2020} } @article{he_jin_dai_2020, title={Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing}, volume={19}, ISBN={1558-2248}, DOI={10.1109/TWC.2019.2958091}, number={3}, journal={IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2020}, month={Mar}, pages={1814–1824} } @article{he_jin_dai_2020, title={Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing}, volume={19}, ISBN={1558-2248}, DOI={10.1109/TWC.2020.2979456}, number={6}, journal={IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2020}, month={Jun}, pages={4054–4066} } @article{he_jin_dai_2019, title={Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks}, volume={8}, ISBN={2162-2345}, DOI={10.1109/LWC.2018.2846621}, number={1}, journal={IEEE WIRELESS COMMUNICATIONS LETTERS}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2019}, month={Feb}, pages={21–24} } @article{he_jin_dai_2019, title={Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT}, volume={6}, ISBN={2327-4662}, DOI={10.1109/JIOT.2018.2878718}, number={3}, journal={IEEE INTERNET OF THINGS JOURNAL}, author={He, Xiaofan and Jin, Richeng and Dai, Huaiyu}, year={2019}, month={Jun}, pages={4547–4555} } @article{jin_he_dai_2019, title={On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective}, volume={14}, ISBN={1556-6021}, DOI={10.1109/TIFS.2019.2914358}, number={12}, journal={IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY}, author={Jin, Richeng and He, Xiaofan and Dai, Huaiyu}, year={2019}, month={Dec}, pages={3273–3286} } @book{he_dai_2018, title={Adversary Detection For Cognitive Radio Networks}, ISBN={9783319758671 9783319758688}, ISSN={2191-8112 2191-8120}, url={http://dx.doi.org/10.1007/978-3-319-75868-8}, DOI={10.1007/978-3-319-75868-8}, journal={SpringerBriefs in Electrical and Computer Engineering}, publisher={Springer International Publishing}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={VII-} } @inbook{he_dai_2018, title={Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_7}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={73–74} } @inbook{he_dai_2018, title={Adversary Detection For Cognitive Radio Networks Introduction}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_1}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={1–6} } @inbook{he_dai_2018, title={Adversary Detection For Cognitive Radio Networks Preface}, ISBN={0}, DOI={10.1007/978-3-319-73694-5}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={VII-} } @inbook{he_dai_2018, title={Case Study I: Link Signature Assisted PUE Attack Detection}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_4}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={45–50} } @inbook{he_dai_2018, title={Case Study II: HMM-Based Byzantine Attack Detection}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_5}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={51–62} } @inbook{he_dai_2018, title={Case Study III: CFC-Based Byzantine Attack Detection}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_6}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={63–72} } @article{jin_he_dai_2018, title={Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach}, volume={4}, DOI={10.1109/TCCN.2018.2856207}, number={4}, journal={IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING}, author={Jin, Richeng and He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={803–815} } @book{he_dai_2018, title={Dynamic Games for Network Security}, ISBN={9783319758701 9783319758718}, ISSN={2191-8112 2191-8120}, url={http://dx.doi.org/10.1007/978-3-319-75871-8}, DOI={10.1007/978-3-319-75871-8}, journal={SpringerBriefs in Electrical and Computer Engineering}, publisher={Springer International Publishing}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={VII-} } @inbook{he_dai_2018, title={Dynamic Games for Network Security Conclusion and Future Work}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_6}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={73–74} } @inbook{he_dai_2018, title={Dynamic Security Games with Deception}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_5}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={61–71} } @inbook{he_dai_2018, title={Dynamic Security Games with Extra Information}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_3}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={25–42} } @inbook{he_dai_2018, title={Dynamic Security Games with Incomplete Information}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_4}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={43–60} } @inbook{he_dai_2018, title={Overview of Adversary Detection in CR Networks}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_3}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={19–44} } @inbook{he_dai_2018, title={Overview of Dynamic Network Security Games}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_2}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={17–23} } @inbook{he_dai_2018, title={Preliminaries}, ISBN={0}, DOI={10.1007/978-3-319-75871-8_1}, booktitle={DYNAMIC GAMES FOR NETWORK SECURITY}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={1–16} } @inbook{he_dai_2018, title={Preliminaries of Analytical Tools}, ISBN={0}, DOI={10.1007/978-3-319-75868-8_2}, booktitle={ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS}, author={He, Xiaofan and Dai, Huaiyu}, year={2018}, pages={7–17} } @article{he_dai_ning_dutta_2017, title={A A leader-follower controlled Markov stopping game for delay tolerant and opportunistic resource sharing networks}, volume={35}, DOI={10.1109/jsac.2017.2659581}, number={3}, journal={IEEE Journal on Selected Areas in Communications}, author={He, X. F. and Dai, Huaiyu and Ning, P. and Dutta, Rudra}, year={2017}, pages={615–627} } @inproceedings{he_dai_ning_dutta_2016, title={A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks}, DOI={10.1109/infocom.2016.7524350}, booktitle={IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications}, author={He, X. F. and Dai, Huaiyu and Ning, P. and Dutta, Rudra}, year={2016} } @inproceedings{jin_he_dai_2016, title={Collaborative IDS configuration: A two-layer game-theoretical approach}, DOI={10.1109/glocom.2016.7841671}, booktitle={2016 ieee global communications conference (globecom)}, author={Jin, R. C. and He, X. F. and Dai, H. Y.}, year={2016} } @article{he_dai_ning_2016, title={Faster learning and adaptation in security games by exploiting information asymmetry}, volume={64}, DOI={10.1109/tsp.2016.2548987}, number={13}, journal={IEEE Transactions on Signal Processing}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2016}, pages={3429–3443} } @article{he_dai_shen_ning_dutta_2016, title={Toward proper guard zones for link signature}, volume={15}, DOI={10.1109/twc.2015.2498621}, number={3}, journal={IEEE Transactions on Wireless Communications}, author={He, X. F. and Dai, Huaiyu and Shen, W. B. and Ning, P. and Dutta, Rudra}, year={2016}, pages={2104–2117} } @inproceedings{he_dai_ning_dutta_2015, title={A A stochastic multi-channel spectrum access game with incomplete information}, DOI={10.1109/icc.2015.7249082}, booktitle={2015 ieee international conference on communications (icc)}, author={He, X. F. and Dai, Huaiyu and Ning, P. and Dutta, Rudra}, year={2015}, pages={4799–4804} } @inproceedings{he_dai_ning_dutta_2015, title={Dynamic IDS configuration in the presence of intruder type uncertainty}, DOI={10.1109/glocom.2015.7417158}, booktitle={2015 IEEE Global Communications Conference (GLOBECOM)}, author={He, X. F. and Dai, Huaiyu and Ning, P. and Dutta, Rudra}, year={2015} } @inproceedings{he_dai_ning_2015, title={Improving learning and adaptation in security games by exploiting information asymmetry}, DOI={10.1109/infocom.2015.7218560}, booktitle={2015 ieee conference on computer communications (infocom)}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2015} } @inproceedings{shen_liu_he_dai_ning_2015, title={No time to demodulate - fast physical layer verification of friendly jamming}, DOI={10.1109/milcom.2015.7357518}, booktitle={2015 ieee military communications conference (milcom 2015)}, author={Shen, W. B. and Liu, Y. and He, X. F. and Dai, H. Y. and Ning, P.}, year={2015}, pages={653–658} } @article{he_dai_ning_2014, title={Dynamic adaptive anti-jamming via controlled mobility}, volume={13}, DOI={10.1109/twc.2014.2320973}, number={8}, journal={IEEE Transactions on Wireless Communications}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2014}, pages={4374–4388} } @article{he_dai_ning_2013, title={A Byzantine attack defender in cognitive radio networks: The conditional frequency check}, volume={12}, DOI={10.1109/twc.2013.031313.121551}, number={5}, journal={IEEE Transactions on Wireless Communications}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2013}, pages={2512–2523} } @inproceedings{shen_ning_he_dai_2013, title={Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time}, DOI={10.1109/sp.2013.22}, booktitle={2013 ieee symposium on security and privacy (sp)}, author={Shen, W. B. and Ning, P. and He, X. F. and Dai, H. Y.}, year={2013}, pages={174–188} } @inproceedings{he_dai_ning_2013, title={Dynamic adaptive anti-jamming via controlled mobility}, DOI={10.1109/cns.2013.6682686}, booktitle={2013 IEEE Conference on Communications and Network Security (CNS)}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2013}, pages={1–9} } @inproceedings{he_dai_shen_ning_2013, title={Is link signature dependable for wireless security?}, DOI={10.1109/infcom.2013.6566763}, booktitle={2013 proceedings ieee infocom}, author={He, X. F. and Dai, H. Y. and Shen, W. B. and Ning, P.}, year={2013}, pages={200–204} } @inproceedings{he_dai_ning_2012, title={A Byzantine attack defender: The Conditional Frequency Check}, DOI={10.1109/isit.2012.6284709}, booktitle={2012 ieee international symposium on information theory proceedings (isit)}, author={He, X. F. and Dai, H. Y. and Ning, P.}, year={2012} }