H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 31 Citations 3,733 91 World Ranking 8103 National Ranking 768

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Artificial intelligence

His primary areas of investigation include Computer network, Computer security, Wireless sensor network, Authentication and Wireless. His Computer network research includes themes of Network Access Control and Cryptography. In the field of Computer security, his study on Information privacy and Security service overlaps with subjects such as Service provider and Grid computing.

His Wireless sensor network research is multidisciplinary, incorporating elements of Wireless ad hoc network and Global Positioning System. Cryptographic protocol is closely connected to Wireless network in his research, which is encompassed under the umbrella topic of Authentication. His Wireless study integrates concerns from other disciplines, such as Trust management, Network performance and Base station.

His most cited work include:

  • An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks (190 citations)
  • A strong user authentication scheme with smart cards for wireless communications (169 citations)
  • ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks (163 citations)

What are the main themes of his work throughout his whole career to date?

Daojing He mostly deals with Computer security, Computer network, Wireless sensor network, Authentication and Wireless. His study explores the link between Computer security and topics such as Internet privacy that cross with problems in App store. He has researched Computer network in several fields, including Network Access Control, Wireless network and Cryptography.

His Wireless sensor network study incorporates themes from Key distribution in wireless sensor networks, Node, Protocol, Base station and Dissemination. In general Authentication study, his work on Authentication protocol often relates to the realm of Process, thereby connecting several areas of interest. His Wireless research incorporates themes from Trust management, Network performance and Distributed computing.

He most often published in these fields:

  • Computer security (45.54%)
  • Computer network (36.61%)
  • Wireless sensor network (24.11%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (45.54%)
  • Password (9.82%)
  • Intrusion detection system (7.14%)

In recent papers he was focusing on the following fields of study:

Daojing He mainly investigates Computer security, Password, Intrusion detection system, Artificial intelligence and Electronic systems. Borrowing concepts from Vulnerability assessment, Daojing He weaves in ideas under Computer security. His study in the fields of Password strength under the domain of Password overlaps with other disciplines such as Firmware.

His Intrusion detection system research is multidisciplinary, incorporating perspectives in Real-time computing and Network security. His biological study spans a wide range of topics, including Machine learning and App store. Daojing He has included themes like Interconnection, Security compliance and Digital signature in his Authentication study.

Between 2019 and 2021, his most popular works were:

  • Dynamic Control of Fraud Information Spreading in Mobile Social Networks (10 citations)
  • Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing (5 citations)
  • Security Analysis of Cryptocurrency Wallets in Android-Based Applications (4 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Artificial intelligence

His primary areas of study are Computer security, Password strength, Authentication, Password and Security analysis. His research on Computer security often connects related topics like Crowdsourcing. His research integrates issues of Artificial neural network, Web service and Pattern matching in his study of Password strength.

His work carried out in the field of Authentication brings together such families of science as Semantics and The Internet. His Security analysis research is multidisciplinary, incorporating elements of Cryptocurrency, Attack surface and Threat model.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks

Daojing He;Yi Gao;Sammy Chan;Chun Chen.
Ad Hoc & Sensor Wireless Networks (2010)

283 Citations

A strong user authentication scheme with smart cards for wireless communications

Daojing He;Maode Ma;Yan Zhang;Chun Chen.
Computer Communications (2011)

244 Citations

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He;Chun Chen;S. Chan;Jiajun Bu.
international conference of the ieee engineering in medicine and biology society (2012)

203 Citations

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

Daojing He;Chun Chen;Sammy Chan;Jiajun Bu.
IEEE Transactions on Wireless Communications (2012)

199 Citations

Lightweight and provably secure user authentication with anonymity for the global mobility network

Chun Chen;Daojing He;Sammy Chan;Jiajun Bu.
International Journal of Communication Systems (2011)

134 Citations

Privacy-Preserving Universal Authentication Protocol for Wireless Communications

Daojing He;Jiajun Bu;Sammy Chan;Chun Chen.
IEEE Transactions on Wireless Communications (2011)

130 Citations

User privacy and data trustworthiness in mobile crowd sensing

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2015)

99 Citations

Distributed Access Control with Privacy Support in Wireless Sensor Networks

Daojing He;Jiajun Bu;Sencun Zhu;Sammy Chan.
IEEE Transactions on Wireless Communications (2011)

97 Citations

Communication Security of Unmanned Aerial Vehicles

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2017)

97 Citations

Mobile application security: malware threats and defenses

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2015)

94 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Daojing He

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 38

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 34

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 23

Laurence T. Yang

Laurence T. Yang

St. Francis Xavier University

Publications: 22

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 20

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 19

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 18

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 18

Debiao He

Debiao He

Wuhan University

Publications: 16

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 14

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 14

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 12

Yixian Yang

Yixian Yang

Beijing University of Posts and Telecommunications

Publications: 9

Fadi Al-Turjman

Fadi Al-Turjman

Near East University

Publications: 9

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 9

Something went wrong. Please try again later.