Enabling collaborative edge computing for software defined vehicular networks K Wang, H Yin, W Quan, G Min IEEE Network 32 (5), 112-117, 2018 | 228 | 2018 |
Hyperconnected network: A decentralized trusted computing and networking paradigm H Yin, D Guo, K Wang, Z Jiang, Y Lyu, J Xing IEEE Network 32 (1), 112-117, 2018 | 101 | 2018 |
Securing data with blockchain and AI K Wang, J Dong, Y Wang, H Yin Ieee Access 7, 77981-77989, 2019 | 77 | 2019 |
Graph structure and statistical properties of Ethereum transaction relationships D Guo, J Dong, K Wang Information Sciences 492, 58-71, 2019 | 75 | 2019 |
Decoupling malicious interests from pending interest table to mitigate interest flooding attacks K Wang, H Zhou, Y Qin, J Chen, H Zhang 2013 IEEE Globecom Workshops (GC Wkshps), 963-968, 2013 | 68 | 2013 |
Cooperative-filter: countering interest flooding attacks in named data networking K Wang, H Zhou, Y Qin, H Zhang soft computing 18 (9), 1803-1813, 2014 | 45 | 2014 |
Modeling denial‐of‐service against pending interest table in named data networking K Wang, J Chen, H Zhou, Y Qin, H Zhang International Journal of Communication Systems 27 (12), 4355-4368, 2014 | 36 | 2014 |
PA-cache: Evolving learning-based popularity-aware content caching in edge networks Q Fan, X Li, J Li, Q He, K Wang, J Wen IEEE Transactions on Network and Service Management 18 (2), 1746-1757, 2021 | 35 | 2021 |
Detecting and mitigating interest flooding attacks in content‐centric network K Wang, H Zhou, H Luo, J Guan, Y Qin, H Zhang Security and Communication Networks 7 (4), 685-699, 2014 | 31 | 2014 |
Joint cloud collaboration mechanism between vehicle clouds based on blockchain B Yin, L Mei, Z Jiang, K Wang 2019 IEEE international conference on service-oriented system engineering …, 2019 | 27 | 2019 |
Software‐Defined Collaborative Offloading for Heterogeneous Vehicular Networks W Quan, K Wang, Y Liu, N Cheng, H Zhang, X Shen Wireless Communications and Mobile Computing 2018 (1), 3810350, 2018 | 27 | 2018 |
Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network K Wang, A Zhang, H Sun, B Wang IEEE Transactions on Intelligent Transportation Systems 24 (2), 1843-1854, 2023 | 26 | 2023 |
InterestFence: Simple but efficient way to counter interest flooding attack J Dong, K Wang, W Quan, H Yin Computers & Security 88, 101628, 2020 | 22 | 2020 |
Accuracy or delay? A game in detecting interest flooding attacks G Liu, W Quan, N Cheng, K Wang, H Zhang Internet Technology Letters 1 (2), e31, 2018 | 18 | 2018 |
[Retracted] Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network C Wang, B Wang, Y Sun, Y Wei, K Wang, H Zhang, H Liu Security and Communication Networks 2021 (1), 4027900, 2021 | 14 | 2021 |
Research on cooperation mechanisms of smart network components S Gao, H Wang, K Wang, H Zhang Acta Electronica Sinica 41 (7), 1261-1267, 2013 | 14 | 2013 |
Content-centric networking: Effect of content caching on mitigating DoS attack K Wang, J Chen, H Zhou, Y Qin International Journal of Computer Science Issues (IJCSI) 9 (6), 43, 2012 | 14 | 2012 |
MDSDV: a modified DSDV routing mechanism for wireless mesh networks W Kai, Y GAO, J GUAN, Y QIN The Journal of China Universities of Posts and Telecommunications 18, 34-39, 2011 | 11 | 2011 |
Global-local integration for GNN-based anomalous device state detection in industrial control systems L Shuaiyi, K Wang, L Zhang, B Wang Expert Systems with Applications 209, 118345, 2022 | 9 | 2022 |
Betweenness centrality based software defined routing: Observation from practical Internet datasets K Wang, W Quan, N Cheng, M Liu, Y Liu, HA Chan ACM Transactions on Internet Technology (TOIT) 19 (4), 1-19, 2019 | 9 | 2019 |