D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 4,090 112 World Ranking 9391 National Ranking 945

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Artificial intelligence

His primary areas of investigation include Computer network, Computer security, Wireless sensor network, Authentication and Wireless. His Computer network research includes themes of Network Access Control and Cryptography. In the field of Computer security, his study on Information privacy and Security service overlaps with subjects such as Service provider and Grid computing.

His Wireless sensor network research is multidisciplinary, incorporating elements of Wireless ad hoc network and Global Positioning System. Cryptographic protocol is closely connected to Wireless network in his research, which is encompassed under the umbrella topic of Authentication. His Wireless study integrates concerns from other disciplines, such as Trust management, Network performance and Base station.

His most cited work include:

  • An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks (190 citations)
  • A strong user authentication scheme with smart cards for wireless communications (169 citations)
  • ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks (163 citations)

What are the main themes of his work throughout his whole career to date?

Daojing He mostly deals with Computer security, Computer network, Wireless sensor network, Authentication and Wireless. His study explores the link between Computer security and topics such as Internet privacy that cross with problems in App store. He has researched Computer network in several fields, including Network Access Control, Wireless network and Cryptography.

His Wireless sensor network study incorporates themes from Key distribution in wireless sensor networks, Node, Protocol, Base station and Dissemination. In general Authentication study, his work on Authentication protocol often relates to the realm of Process, thereby connecting several areas of interest. His Wireless research incorporates themes from Trust management, Network performance and Distributed computing.

He most often published in these fields:

  • Computer security (45.54%)
  • Computer network (36.61%)
  • Wireless sensor network (24.11%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (45.54%)
  • Password (9.82%)
  • Intrusion detection system (7.14%)

In recent papers he was focusing on the following fields of study:

Daojing He mainly investigates Computer security, Password, Intrusion detection system, Artificial intelligence and Electronic systems. Borrowing concepts from Vulnerability assessment, Daojing He weaves in ideas under Computer security. His study in the fields of Password strength under the domain of Password overlaps with other disciplines such as Firmware.

His Intrusion detection system research is multidisciplinary, incorporating perspectives in Real-time computing and Network security. His biological study spans a wide range of topics, including Machine learning and App store. Daojing He has included themes like Interconnection, Security compliance and Digital signature in his Authentication study.

Between 2019 and 2021, his most popular works were:

  • Dynamic Control of Fraud Information Spreading in Mobile Social Networks (10 citations)
  • Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing (5 citations)
  • Security Analysis of Cryptocurrency Wallets in Android-Based Applications (4 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Artificial intelligence

His primary areas of study are Computer security, Password strength, Authentication, Password and Security analysis. His research on Computer security often connects related topics like Crowdsourcing. His research integrates issues of Artificial neural network, Web service and Pattern matching in his study of Password strength.

His work carried out in the field of Authentication brings together such families of science as Semantics and The Internet. His Security analysis research is multidisciplinary, incorporating elements of Cryptocurrency, Attack surface and Threat model.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks

Daojing He;Yi Gao;Sammy Chan;Chun Chen.
Ad Hoc & Sensor Wireless Networks (2010)

292 Citations

A strong user authentication scheme with smart cards for wireless communications

Daojing He;Maode Ma;Yan Zhang;Chun Chen.
Computer Communications (2011)

255 Citations

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

Daojing He;Chun Chen;Sammy Chan;Jiajun Bu.
IEEE Transactions on Wireless Communications (2012)

219 Citations

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He;Chun Chen;S. Chan;Jiajun Bu.
international conference of the ieee engineering in medicine and biology society (2012)

216 Citations

Lightweight and provably secure user authentication with anonymity for the global mobility network

Chun Chen;Daojing He;Sammy Chan;Jiajun Bu.
International Journal of Communication Systems (2011)

144 Citations

Privacy-Preserving Universal Authentication Protocol for Wireless Communications

Daojing He;Jiajun Bu;Sammy Chan;Chun Chen.
IEEE Transactions on Wireless Communications (2011)

136 Citations

Communication Security of Unmanned Aerial Vehicles

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2017)

127 Citations

User privacy and data trustworthiness in mobile crowd sensing

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2015)

122 Citations

Drone-Assisted Public Safety Networks: The Security Aspect

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Communications Magazine (2017)

118 Citations

Mobile application security: malware threats and defenses

Daojing He;Sammy Chan;Mohsen Guizani.
IEEE Wireless Communications (2015)

103 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Daojing He

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 38

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 34

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 23

Laurence T. Yang

Laurence T. Yang

St. Francis Xavier University

Publications: 22

Mohsen Guizani

Mohsen Guizani

Mohamed bin Zayed University of Artificial Intelligence

Publications: 20

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 19

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 18

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 18

Debiao He

Debiao He

Wuhan University

Publications: 16

Zheng Yan

Zheng Yan

Xidian University

Publications: 14

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 14

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 12

Fadi Al-Turjman

Fadi Al-Turjman

Near East University

Publications: 9

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 9

Yixian Yang

Yixian Yang

Beijing University of Posts and Telecommunications

Publications: 9

Yan Zhang

Yan Zhang

Chinese Academy of Sciences

Publications: 8

Trending Scientists

Ioannis Vlahavas

Ioannis Vlahavas

Aristotle University of Thessaloniki

Fang Chen

Fang Chen

University of Technology Sydney

Joe McGeehan

Joe McGeehan

University of Bristol

Elizabeth A. Croft

Elizabeth A. Croft

Monash University

Nigel P. Brandon

Nigel P. Brandon

Imperial College London

Shujun Zhang

Shujun Zhang

University of Wollongong

Rosaria Scozzari

Rosaria Scozzari

Sapienza University of Rome

Kimitsuna Watanabe

Kimitsuna Watanabe

National Institute of Advanced Industrial Science and Technology

Michal Hájek

Michal Hájek

Masaryk University

Isla H. Myers-Smith

Isla H. Myers-Smith

University of Edinburgh

Benoit Durand

Benoit Durand

French Agency for Food, Environmental and Occupational Health & Safety

James W. McClelland

James W. McClelland

The University of Texas at Austin

Shuiyuan Cheng

Shuiyuan Cheng

Beijing University of Technology

Fabio Pilato

Fabio Pilato

Università Campus Bio-Medico

Beth C. Bock

Beth C. Bock

Brown University

Diane C. Gooding

Diane C. Gooding

University of Wisconsin–Madison

Something went wrong. Please try again later.