Xiaofan He Rahmati, A., Hosseinalipour, S., Yapici, Y., He, X., Guvenc, I., Dai, H., & Bhuyan, A. (2022). Dynamic Interference Management for UAV-Assisted Wireless Networks. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(4), 2637–2653. https://doi.org/10.1109/TWC.2021.3114234 He, X., Jin, R., & Dai, H. (2022). Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing. IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344. https://doi.org/10.1109/TCOMM.2021.3129902 Jin, R., He, X., & Dai, H. (2021). Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents. IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067. https://doi.org/10.1109/TCOMM.2020.3035394 He, X., Jin, R., & Dai, H. (2020). Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM42002.2020.9348243 He, X., Jin, R., & Dai, H. (2020). Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824. https://doi.org/10.1109/TWC.2019.2958091 He, X., Jin, R., & Dai, H. (2020). Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066. https://doi.org/10.1109/TWC.2020.2979456 He, X., Jin, R., & Dai, H. (2019). Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks. IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24. https://doi.org/10.1109/LWC.2018.2846621 He, X., Jin, R., & Dai, H. (2019). Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT. IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555. https://doi.org/10.1109/JIOT.2018.2878718 Jin, R., He, X., & Dai, H. (2019). On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286. https://doi.org/10.1109/TIFS.2019.2914358 Advances in Mechanics of Microstructured Media and Structures. (2018). In ADVANCES IN MECHANICS OF MICROSTRUCTURED MEDIA AND STRUCTURES (Vol. 87, pp. 1–369). https://doi.org/10.1007/978-3-319-73694-5 He, X., Dai, H., He, X., & Dai, H. (2018). Adversary Detection For Cognitive Radio Networks. In SpringerBriefs in Electrical and Computer Engineering. https://doi.org/10.1007/978-3-319-75868-8 He, X., Dai, H., He, X., & Dai, H. (2018). Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 73–74. https://doi.org/10.1007/978-3-319-75868-8_7 He, X., Dai, H., He, X., & Dai, H. (2018). Adversary Detection For Cognitive Radio Networks Introduction. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 1–6. https://doi.org/10.1007/978-3-319-75868-8_1 He, X., Dai, H., He, X., & Dai, H. (2018). Case Study I: Link Signature Assisted PUE Attack Detection. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 45–50. https://doi.org/10.1007/978-3-319-75868-8_4 He, X., Dai, H., He, X., & Dai, H. (2018). Case Study II: HMM-Based Byzantine Attack Detection. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 51–62. https://doi.org/10.1007/978-3-319-75868-8_5 He, X., Dai, H., He, X., & Dai, H. (2018). Case Study III: CFC-Based Byzantine Attack Detection. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 63–72. https://doi.org/10.1007/978-3-319-75868-8_6 Jin, R., He, X., & Dai, H. (2018). Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815. https://doi.org/10.1109/TCCN.2018.2856207 He, X., & Dai, H. (2018). Dynamic Games for Network Security. In SpringerBriefs in Electrical and Computer Engineering (pp. 1–74). https://doi.org/10.1007/978-3-319-75871-8 He, X., Dai, H., He, X., & Dai, H. (2018). Dynamic Games for Network Security Conclusion and Future Work. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 73–74. https://doi.org/10.1007/978-3-319-75871-8_6 He, X., Dai, H., He, X., & Dai, H. (2018). Dynamic Security Games with Deception. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 61–71. https://doi.org/10.1007/978-3-319-75871-8_5 He, X., Dai, H., He, X., & Dai, H. (2018). Dynamic Security Games with Extra Information. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 25–42. https://doi.org/10.1007/978-3-319-75871-8_3 He, X., Dai, H., He, X., & Dai, H. (2018). Dynamic Security Games with Incomplete Information. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 43–60. https://doi.org/10.1007/978-3-319-75871-8_4 He, X., Dai, H., He, X., & Dai, H. (2018). Overview of Adversary Detection in CR Networks. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 19–44. https://doi.org/10.1007/978-3-319-75868-8_3 He, X., Dai, H., He, X., & Dai, H. (2018). Overview of Dynamic Network Security Games. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 17–23. https://doi.org/10.1007/978-3-319-75871-8_2 He, X., Dai, H., He, X., & Dai, H. (2018). Preliminaries. DYNAMIC GAMES FOR NETWORK SECURITY, pp. 1–16. https://doi.org/10.1007/978-3-319-75871-8_1 He, X., Dai, H., He, X., & Dai, H. (2018). Preliminaries of Analytical Tools. ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 7–17. https://doi.org/10.1007/978-3-319-75868-8_2 He, X., Dai, H., Ning, P., & Dutta, R. (2017). A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627. https://doi.org/10.1109/jsac.2017.2659581 He, X. F., Dai, H., Ning, P., & Dutta, R. (2016). A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications. https://doi.org/10.1109/infocom.2016.7524350 Jin, R. C., He, X. F., & Dai, H. Y. (2016). Collaborative IDS configuration: A two-layer game-theoretical approach. 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7841671 He, X., Dai, H., & Ning, P. (2016). Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443. https://doi.org/10.1109/tsp.2016.2548987 He, X., Dai, H., Shen, W., Ning, P., & Dutta, R. (2016). Toward Proper Guard Zones for Link Signature. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117. https://doi.org/10.1109/twc.2015.2498621 He, X. F., Dai, H., Ning, P., & Dutta, R. (2015). A A stochastic multi-channel spectrum access game with incomplete information. 2015 ieee international conference on communications (icc), 4799–4804. https://doi.org/10.1109/icc.2015.7249082 He, X., Dai, H., Ning, P., & Dutta, R. (2015). Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/glocom.2015.7417158 He, X. F., Dai, H. Y., & Ning, P. (2015). Improving learning and adaptation in security games by exploiting information asymmetry. 2015 ieee conference on computer communications (infocom). https://doi.org/10.1109/infocom.2015.7218560 Shen, W. B., Liu, Y., He, X. F., Dai, H. Y., & Ning, P. (2015). No time to demodulate - fast physical layer verification of friendly jamming. 2015 ieee military communications conference (milcom 2015), 653–658. https://doi.org/10.1109/milcom.2015.7357518 He, X., Dai, H., & Ning, P. (2014). Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388. https://doi.org/10.1109/twc.2014.2320973 He, X., Dai, H., & Ning, P. (2013). A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(5), 2512–2523. https://doi.org/10.1109/twc.2013.031313.121551 Shen, W., Ning, P., He, X., & Dai, H. (2013). Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188. https://doi.org/10.1109/sp.2013.22 He, X. F., Dai, H. Y., & Ning, P. (2013). Dynamic adaptive anti-jamming via controlled mobility. 2013 IEEE Conference on Communications and Network Security (CNS), 1–9. https://doi.org/10.1109/cns.2013.6682686 He, X. F., Dai, H. Y., Shen, W. B., & Ning, P. (2013). Is link signature dependable for wireless security? 2013 proceedings ieee infocom, 200–204. https://doi.org/10.1109/infcom.2013.6566763 He, X. F., Dai, H. Y., & Ning, P. (2012). A Byzantine attack defender: The Conditional Frequency Check. 2012 ieee international symposium on information theory proceedings (isit). https://doi.org/10.1109/isit.2012.6284709