default search action
Nafei Zhu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j49]Jiajia Hu, Jingsha He, Nafei Zhu, Lu Qu:
Trajectory privacy preservation model based on LSTM-DCGAN. Future Gener. Comput. Syst. 163: 107496 (2025) - [j48]Yehong Luo, Nafei Zhu, Ziwen Wang, Lei Sun, Jingsha He, Anca Delia Jurcut, Yuzi Yi, Xiangjun Ma:
Privacy information propagation in online social networks - a case study based on Weibo data. Int. J. Inf. Sec. 24(1): 32 (2025) - 2024
- [j47]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal:
An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach. Ad Hoc Networks 152: 103331 (2024) - [j46]Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He:
A scalable blockchain storage scheme for VANET. Clust. Comput. 27(4): 3957-3981 (2024) - [j45]Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He:
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications. Clust. Comput. 27(5): 5677-5698 (2024) - [j44]Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6): 8367-8392 (2024) - [j43]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo:
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning. Comput. Commun. 213: 236-245 (2024) - [j42]Xiangjun Ma, Jingsha He, Tiejun Wu, Nafei Zhu, Yakang Hua:
Interaction behavior enhanced community detection in online social networks. Comput. Commun. 219: 92-103 (2024) - [j41]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j40]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Mutiq Almutiq, Fayaz Ali Dharejo, Deepak Kumar Jain, Saqib Hussain, Zulfiqar Ali Zardari:
An intelligent Hybrid-Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j39]Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He:
Modeling the dissemination of privacy information in online social networks. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - [j38]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Faheem Ullah, Sirajuddin Qureshi, Musa Osman:
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intell. Decis. Technol. 18(1): 33-55 (2024) - [j37]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Faheem Ullah, Sirajuddin Qureshi, Xiangjun Ma, Muhammad Salman Pathan:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - [j36]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Ahsan Nazir, Ahsan Wajahat, Faheem Ullah, Abdul Wadud:
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102164 (2024) - [j35]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks. IEEE Trans. Comput. Soc. Syst. 11(3): 4367-4384 (2024) - [j34]Musa Osman, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal, Asaad Ahmed:
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach. J. Supercomput. 80(18): 26333-26362 (2024) - [c9]Ahsan Nazir, Jingsha He, Nafei Zhu, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Ahsan Wajahat:
Ensemble Learning Techniques for the Detection of IoT Botnets. CSAIDE 2024: 80-85 - 2023
- [j33]Zhiguang Chu, Jingsha He, Dongdong Peng, Xing Zhang, Nafei Zhu:
Differentially Private Denoise Diffusion Probability Models. IEEE Access 11: 108033-108040 (2023) - [j32]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Comput. Commun. 200: 149-160 (2023) - [j31]Jingsha He, Yue Li, Nafei Zhu:
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks. Future Internet 15(3): 92 (2023) - [j30]Saima Siraj Qureshi, Jingsha He, Sirajuddin Qureshi, Nafei Zhu, Zulfiqar Ali Zardari, Tariq Mahmood, Ahsan Wajahat:
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs. J. Intell. Fuzzy Syst. 44(6): 10675-10687 (2023) - [j29]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j28]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101820 (2023) - [j27]Ruixin Xue, Nafei Zhu, Jingsha He, Lin He:
Bitcoin transaction pattern recognition based on semi-supervised learning. J. Comput. Sci. 71: 102055 (2023) - [c8]Yuzi Yi, Nafei Zhu, Jingsha He, Xiangjun Ma, Yehong Luo:
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks. WISE 2023: 220-234 - 2022
- [j26]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j25]Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. Int. J. Inf. Secur. Priv. 16(1): 1-22 (2022) - [j24]Nafei Zhu, Baocun Chen, Siyu Wang, Da Teng, Jingsha He:
Ontology-Based Approach for the Measurement of Privacy Disclosure. Inf. Syst. Frontiers 24(5): 1689-1707 (2022) - [j23]Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Ghulam Ali Mallah, Ziyue Qiao, Amir Haider, Saqib Hussain, Muhammad Iftikhar Hussain, Zulfiqar Ali Zardari:
A new Asymmetric Link Quality Routing protocol (ALQR) for heterogeneous WSNs. Microprocess. Microsystems 93: 104617 (2022) - [j22]Yuzi Yi, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. Secur. Priv. 5(2) (2022) - [j21]Hewen Wang, Jingsha He, Nafei Zhu:
Improving Data Utilization of K-anonymity through Clustering Optimization. Trans. Data Priv. 15(3): 177-192 (2022) - 2021
- [j20]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, Ahsan Wajahat:
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks. IEEE Access 9: 73938-73947 (2021) - [j19]Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, Nafei Zhu, Sirajuddin Qureshi:
ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access 9: 83654-83665 (2021) - [j18]Yajing Wang, Jingsha He, Nafei Zhu, Yuzi Yi, Qingqing Zhang, Hongyu Song, Ruixin Xue:
Security enhancement technologies for smart contracts in the blockchain: A survey. Trans. Emerg. Telecommun. Technol. 32(12) (2021) - [j17]Yanbo Chen, Jingsha He, Wei Wei, Nafei Zhu, Cong Yu:
A Multi-Model Approach for User Portrait. Future Internet 13(6): 147 (2021) - [j16]Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng:
An authorisation certificate-based access control model. Int. J. Secur. Networks 16(4): 258-266 (2021) - [j15]Hongyu Song, Nafei Zhu, Ruixin Xue, Jingsha He, Kun Zhang, Jianyu Wang:
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection. Inf. Process. Manag. 58(3): 102507 (2021) - [j14]Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, Muhammad Salman Pathan:
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. J. Intell. Fuzzy Syst. 41(1): 125-136 (2021) - 2020
- [j13]Baocun Chen, Nafei Zhu, Jingsha He, Peng He, Shuting Jin, Shijia Pan:
A Semantic Inference Based Method for Privacy Measurement. IEEE Access 8: 200112-200128 (2020) - [j12]Peng Zhai, Jingsha He, Nafei Zhu, Peng He, Yao Liang:
An Efficient Authentication Protocol for Wireless Mesh Networks "In Prepress". J. Web Eng. 19(7-8): 230-243 (2020) - [c7]Xiang Li, Jingsha He, Nafei Zhu, Ziqiang Hou:
Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion. COMPSAC 2020: 255-261
2010 – 2019
- 2019
- [j11]Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu:
Survey of access control models and technologies for cloud computing. Clust. Comput. 22(Supplement): 6111-6122 (2019) - [j10]Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, Zhao Li:
Management of access privileges for dynamic access control. Clust. Comput. 22(Supplement): 8899-8917 (2019) - [j9]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon:
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs. Future Internet 11(3): 61 (2019) - [j8]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. Int. J. Netw. Secur. 21(6): 1021-1030 (2019) - [c6]Shaoxun Su, Nafei Zhu, Jingsha He:
Pyramid Text Recognition Based on A New Text Representation Model. ICNSC 2019: 195-199 - [c5]Pengyu Mu, Jingsha He, Nafei Zhu:
Text Classification of Network Pyramid Scheme based on Topic Model. NLPIR 2019: 15-19 - 2018
- [j7]Na Huang, Jingsha He, Nafei Zhu, Xinggang Xuan, Gongzheng Liu, Chengyue Chang:
Identification of the source camera of images based on convolutional neural network. Digit. Investig. 26: 72-80 (2018) - [j6]Jingsha He, Xinggang Xuan, Nafei Zhu, Na Huang, Peng He:
Mobile beacon-based adaptive time synchronization for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 220 (2018) - [j5]Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, Muhammad Iftikhar Hussain:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. Future Internet 10(2): 16 (2018) - [j4]Jingsha He, Jianan Wu, Nafei Zhu, Muhammad Salman Pathan:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. Future Internet 10(5): 38 (2018) - [j3]Nafei Zhu, Siyu Wang, Jingsha He, Da Teng, Peng He, Yuqiang Zhang:
On the Suitability of Applying WordNet to Privacy Measurement. Wirel. Pers. Commun. 103(1): 359-378 (2018) - [c4]Na Huang, Jingsha He, Nafei Zhu:
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network. TrustCom/BigDataSE 2018: 1702-1705 - 2017
- [c3]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - 2015
- [c2]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - 2013
- [j2]Nafei Zhu, Jingsha He, Yue Zhou, Wei Wang:
On the Accuracy of Packet Delay Estimation in Distributed Service Networks. J. Netw. Syst. Manag. 21(4): 623-649 (2013) - 2012
- [j1]Nafei Zhu, Jingsha He:
Experimental Study of the Similarity of Network Nodes based on RTT. J. Networks 7(9): 1423-1430 (2012) - [c1]Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang:
Overview of Monitor Selection in Computer Networks. ISCTCS 2012: 52-59
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint