Strategic honeypot game model for distributed denial of service attacks in the smart grid K Wang, M Du, S Maharjan, Y Sun IEEE Transactions on Smart Grid 8 (5), 2474-2482, 2017 | 230 | 2017 |
Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things M Du, K Wang, Y Chen, X Wang, Y Sun IEEE Communications Magazine 56 (8), 62-67, 2018 | 192 | 2018 |
Edge QoE: Computation offloading with deep reinforcement learning for Internet of Things H Lu, X He, M Du, X Ruan, Y Sun, K Wang IEEE Internet of Things Journal 7 (10), 9255-9265, 2020 | 164 | 2020 |
Game-theory-based active defense for intrusion detection in cyber-physical embedded systems K Wang, M Du, D Yang, C Zhu, J Shen, Y Zhang ACM Transactions on Embedded Computing Systems (TECS) 16 (1), 1-21, 2016 | 119 | 2016 |
An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things M Du, K Wang IEEE Transactions on Industrial Informatics 16 (1), 648-657, 2019 | 108 | 2019 |
Differential privacy preserving of training model in wireless big data with edge computing M Du, K Wang, Z Xia, Y Zhang IEEE transactions on big data 6 (2), 283-295, 2018 | 108 | 2018 |
QoE-based task offloading with deep reinforcement learning in edge-enabled Internet of Vehicles X He, H Lu, M Du, Y Mao, K Wang IEEE Transactions on Intelligent Transportation Systems 22 (4), 2252-2261, 2020 | 94 | 2020 |
Tornado: Enabling blockchain in heterogeneous Internet of Things through a space-structured approach Y Liu, K Wang, K Qian, M Du, S Guo IEEE Internet of Things Journal 7 (2), 1273-1286, 2019 | 84 | 2019 |
Attack detection and distributed forensics in machine-to-machine networks K Wang, M Du, Y Sun, A Vinel, Y Zhang IEEE Network 30 (6), 49-55, 2016 | 78 | 2016 |
A differential privacy-based query model for sustainable fog data centers M Du, K Wang, X Liu, S Guo, Y Zhang IEEE Transactions on Sustainable computing 4 (2), 145-155, 2017 | 72 | 2017 |
GAN-based data augmentation strategy for sensor anomaly detection in industrial robots H Lu, M Du, K Qian, X He, K Wang IEEE Sensors Journal 22 (18), 17464-17474, 2021 | 58 | 2021 |
Spacechain: A three-dimensional blockchain architecture for IoT security M Du, K Wang, Y Liu, K Qian, Y Sun, W Xu, S Guo IEEE Wireless Communications 27 (3), 38-45, 2020 | 48 | 2020 |
Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game W Tian, M Du, X Ji, G Liu, Y Dai, Z Han IEEE Internet of Things Journal 8 (24), 17372-17381, 2021 | 47 | 2021 |
HPCchain: A Consortium Blockchain System Based on CPU-FPGA Hybrid-PUF for Industrial Internet of Things K Qian, Y Liu, X He, M Du, S Zhang, K Wang IEEE Transactions on Industrial Informatics 19 (11), 11205-11215, 2023 | 13 | 2023 |
DMADRL: A distributed multi-agent deep reinforcement learning algorithm for cognitive offloading in dynamic MEC networks M Yi, P Yang, M Du, R Ma Neural Processing Letters 54 (5), 4341-4373, 2022 | 11 | 2022 |
Contract-based incentive mechanisms for honeypot defense in advanced metering infrastructure W Tian, M Du, X Ji, G Liu, Y Dai, Z Han IEEE Transactions on Smart Grid 12 (5), 4259-4268, 2021 | 11 | 2021 |
Bayesian game based pseudo honeypot model in social networks M Du, Y Li, Q Lu, K Wang Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 11 | 2017 |
An adaptive neural architecture search design for collaborative edge-cloud computing H Lu, M Du, X He, K Qian, J Chen, Y Sun, K Wang IEEE Network 35 (5), 83-89, 2021 | 10 | 2021 |
A new distributed intrusion detection method based on immune mobile agent Y Li, M Du, J Xu 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD …, 2018 | 10 | 2018 |
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things H Pei, P Yang, W Li, M Du, Z Hu Computer Networks 245, 110373, 2024 | 6 | 2024 |