2009 |
26 | EE | Xu Wu,
Jingsha He,
Fei Xu:
A Group-Based Reputation Mechanism for Mobile P2P Networks.
GPC 2009: 410-421 |
2008 |
25 | EE | Yingfang Fu,
Jingsha He,
Liangyu Luan,
Rong Wang,
Guorui Li:
A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks.
COMPSAC 2008: 68-71 |
24 | EE | Yingfang Fu,
Jingsha He,
Rong Wang,
Guorui Li:
Mutual Authentication in Wireless Mesh Networks.
ICC 2008: 1690-1694 |
23 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks.
ICDCS Workshops 2008: 309-314 |
22 | EE | Xu Wu,
Jingsha He,
Fei Xu:
A New Decision-Making Approach for C2C Electronic Trade.
ICNSC 2008: 1222-1226 |
21 | EE | Shufen Peng,
Jingsha He,
Yao Meng:
Reputation-based Trust Update in Network Environment.
ISECS 2008: 118-123 |
20 | EE | Yingfang Fu,
Jingsha He,
Liangyu Luan,
Guorui Li,
Wang Rong:
A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
KES-AMSTA 2008: 584-593 |
19 | EE | Xu Wu,
Jingsha He,
Fei Xu:
An Enhanced Trust Model Based on Reputation for P2P Networks.
SUTC 2008: 67-73 |
18 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
Group-based intrusion detection system in wireless sensor networks.
Computer Communications 31(18): 4324-4332 (2008) |
2007 |
17 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks.
AINA Workshops (2) 2007: 127-132 |
16 | EE | Yingfang Fu,
Jingsha He,
Guorui Li:
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks.
COMPSAC (2) 2007: 75-80 |
15 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks.
International Conference on Computational Science (4) 2007: 409-416 |
14 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
Secure Multiple Deployment in Wireless Sensor Networks.
MobiQuitous 2007: 1-4 |
13 | EE | Wei Zhang,
Jingsha He:
Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks.
SNPD (3) 2007: 968-973 |
2006 |
12 | EE | Jerry Gao,
Deepa Gopinathan,
Quan Mai,
Jingsha He:
A Systematic Regression Testing Method and Tool For Software Components.
COMPSAC (1) 2006: 455-466 |
11 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
A Hexagon-Based Key Predistribution Scheme in Sensor Networks.
ICPP Workshops 2006: 175-180 |
10 | EE | Yingfang Fu,
Jingsha He,
Guorui Li:
A Composite Key Management Scheme for Mobile Ad Hoc Networks.
OTM Workshops (1) 2006: 575-584 |
9 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
Key Predistribution in Sensor Networks.
UIC 2006: 845-853 |
8 | EE | Guorui Li,
Jingsha He,
Yingfang Fu:
Key Management in Sensor Networks.
WASA 2006: 457-466 |
2005 |
7 | EE | Jingsha He,
Ran Zhang:
Towards a Formal Framework for Distributed Identity Management.
APWeb 2005: 913-924 |
6 | EE | Jerry Gao,
Raquel Espinoza,
Jingsha He:
Testing Coverage Analysis for Software Component Validation.
COMPSAC (1) 2005: 463-470 |
2004 |
5 | EE | Jingsha He:
On Available Bandwidth Measurement Implementation and Experiment.
LCN 2004: 772-773 |
2001 |
4 | EE | Jingsha He,
C. Edward Chow,
Jihui Yang,
Takafumi Chujo:
An Algorithm for Available Bandwidth Measurement.
ICN (1) 2001: 753-761 |
2000 |
3 | | Jingsha He:
An Architecture for Wide Area Network Load Balancing.
ICC (2) 2000: 1169-1173 |
1992 |
2 | EE | Jingsha He,
Virgil D. Gligor:
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
ESORICS 1992: 57-76 |
1990 |
1 | | Jingsha He,
Virgil D. Gligor:
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
CSFW 1990: 139-149 |