Xiaojiang Du spends much of his time researching Computer network, Wireless sensor network, Distributed computing, Computer security and Key distribution in wireless sensor networks. Xiaojiang Du interconnects Wireless ad hoc network, Cloud computing and Wireless network in the investigation of issues within Computer network. His study in Wireless sensor network is interdisciplinary in nature, drawing from both Distributed algorithm, Real-time computing and Mobile wireless sensor network.
His research integrates issues of Signature, Identification, Quality of service, Denial-of-service attack and Key in his study of Distributed computing. The study incorporates disciplines such as Wireless, Scheme and Mobile Web in addition to Computer security. His work carried out in the field of Key distribution in wireless sensor networks brings together such families of science as Key management and Relay.
His primary scientific interests are in Computer network, Computer security, Cloud computing, Distributed computing and Scheme. In his study, which falls under the umbrella issue of Computer network, Communication channel is strongly linked to Wireless. Authentication, Access control, Blockchain, Security analysis and Cryptography are among the areas of Computer security where Xiaojiang Du concentrates his study.
Xiaojiang Du works mostly in the field of Cloud computing, limiting it down to concerns involving Encryption and, occasionally, Information sensitivity. His Scheme study frequently draws connections to other fields, such as The Internet. His biological study spans a wide range of topics, including Key distribution in wireless sensor networks, Mobile wireless sensor network, Real-time computing and Base station.
His scientific interests lie mostly in Computer security, Computer network, Cloud computing, Artificial intelligence and The Internet. His research is interdisciplinary, bridging the disciplines of Scheme and Computer security. In his work, Resource allocation is strongly intertwined with Reinforcement learning, which is a subfield of Computer network.
His Cloud computing research incorporates elements of Distributed computing, Server and Encryption. His research in Encryption tackles topics such as Access control which are related to areas like Protocol. As a part of the same scientific family, Xiaojiang Du mostly works in the field of Artificial intelligence, focusing on Machine learning and, on occasion, Smart city.
The scientist’s investigation covers issues in Computer security, Computer network, Blockchain, Artificial intelligence and The Internet. His study in Scheme extends to Computer security with its themes. His studies in Computer network integrate themes in fields like Relay, Cloud computing and Reinforcement learning.
His studies examine the connections between Relay and genetics, as well as such issues in Node, with regards to Wireless sensor network. His studies deal with areas such as Hash function and Big data as well as Blockchain. Xiaojiang Du studied The Internet and Wireless that intersect with Cellular network, Wearable technology, Software and Anomaly detection.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain
Qi Xia;Emmanuel Boateng Sifah;Kwame Omono Asamoah;Jianbin Gao.
IEEE Access (2017)
A survey of key management schemes in wireless sensor networks
Yang Xiao;Venkata Krishna Rayi;Bo Sun;Xiaojiang Du.
Computer Communications (2007)
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du;Yang Xiao;Mohsen Guizani;Hsiao-Hwa Chen.
ad hoc networks (2007)
Security in wireless sensor networks
Xiaojiang Du;Hsiao-Hwa Chen.
IEEE Wireless Communications (2008)
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet
Yang Xiao;Xiaojiang Du;Jingyuan Zhang;Fei Hu.
IEEE Communications Magazine (2007)
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Mohammed Ali Al-Garadi;Amr Mohamed;Abdulla Khalid Al-Ali;Xiaojiang Du.
IEEE Communications Surveys and Tutorials (2020)
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
Xiaojiang Du;M. Guizani;Yang Xiao;Hsiao-Hwa Chen.
IEEE Transactions on Wireless Communications (2009)
Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities
Zhitao Guan;Guanlin Si;Xiaosong Zhang;Longfei Wu.
IEEE Communications Magazine (2018)
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities
Meng Shen;Xiangyun Tang;Liehuang Zhu;Xiaojiang Du.
IEEE Internet of Things Journal (2019)
Timing Channel in IaaS: How to Identify and Investigate
Xiao Fu;Rui Yang;Xiaojiang Du;Bin Luo.
IEEE Access (2019)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Mohamed bin Zayed University of Artificial Intelligence
Beijing Institute of Technology
University of Alabama
National Cheng Kung University
Temple University
Beijing Jiaotong University
University of Electronic Science and Technology of China
Peking University
University of Victoria
City University of Hong Kong
Tsinghua University
Kharazmi University
Lawrence Berkeley National Laboratory
University of Sydney
Teagasc - The Irish Agriculture and Food Development Authority
Juntendo University
University of Exeter
Karolinska Institute
University of Nottingham
Western Michigan University
Trent University
Universidade de São Paulo
University of California, Davis
Harvard University
Nationwide Children's Hospital
Michigan State University