Xiaofan He
Title
Cited by
Cited by
Year
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
W Shen, P Ning, X He, H Dai
2013 IEEE Symposium on Security and Privacy, 174-188, 2013
772013
A Byzantine attack defender in cognitive radio networks: The conditional frequency check
X He, H Dai, P Ning
IEEE Transactions on Wireless Communications 12 (5), 2512-2523, 2013
662013
HMM-based malicious user detection for robust collaborative spectrum sensing
X He, H Dai, P Ning
IEEE Journal on Selected Areas in Communications 31 (11), 2196-2208, 2013
572013
Is link signature dependable for wireless security?
X He, H Dai, W Shen, P Ning
2013 Proceedings IEEE INFOCOM, 200-204, 2013
572013
Privacy-aware offloading in mobile-edge computing
X He, J Liu, R Jin, H Dai
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
522017
Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT
X He, R Jin, H Dai
IEEE Internet of Things Journal 6 (3), 4547-4555, 2018
362018
Faster learning and adaptation in security games by exploiting information asymmetry
X He, H Dai, P Ning
IEEE Transactions on Signal Processing 64 (13), 3429-3443, 2016
312016
Toward proper guard zones for link signature
X He, H Dai, W Shen, P Ning, R Dutta
IEEE Transactions on Wireless Communications 15 (3), 2104-2117, 2015
292015
Dynamic adaptive anti-jamming via controlled mobility
X He, H Dai, P Ning
IEEE transactions on wireless communications 13 (8), 4374-4388, 2014
272014
MCR decoding: A MIMO approach for defending against wireless jamming attacks
W Shen, P Ning, X He, H Dai, Y Liu
2014 IEEE Conference on Communications and Network Security, 133-138, 2014
262014
Dynamic mobility-aware interference avoidance for aerial base stations in cognitive radio networks
A Rahmati, X He, I Guvenc, H Dai
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 595-603, 2019
252019
Leveraging spatial diversity for privacy-aware location-based services in mobile networks
X He, R Jin, H Dai
IEEE Transactions on Information Forensics and Security 13 (6), 1524-1534, 2018
252018
Improving learning and adaptation in security games by exploiting information asymmetry
X He, H Dai, P Ning
2015 IEEE Conference on Computer Communications (INFOCOM), 1787-1795, 2015
212015
The security of link signature: A view from channel models
X He, H Dai, Y Huang, D Wang, W Shen, P Ning
2014 IEEE Conference on Communications and Network Security, 103-108, 2014
212014
Zero-determinant strategies for multi-player multi-action iterated games
X He, H Dai, P Ning, R Dutta
IEEE Signal Processing Letters 23 (3), 311-315, 2016
182016
On the tradeoff between privacy and utility in collaborative intrusion detection systems-a game theoretical approach
R Jin, X He, H Dai
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
172017
Dynamic IDS configuration in the presence of intruder type uncertainty
X He, H Dai, P Ning, R Dutta
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
172015
A spline filter for multidimensional nonlinear state estimation
X He, R Sithiravel, R Tharmarasa, B Balaji, T Kirubarajan
Signal Processing 102, 282-295, 2014
172014
A track quality based metric for evaluating performance of multitarget filters
X He, R Tharmarasa, T Kirubarajan, T Thayaparan
IEEE Transactions on Aerospace and Electronic Systems 49 (1), 610-616, 2013
172013
Peace: Privacy-preserving and cost-efficient task offloading for mobile-edge computing
X He, R Jin, H Dai
IEEE Transactions on Wireless Communications 19 (3), 1814-1824, 2019
162019
The system can't perform the operation now. Try again later.
Articles 1–20