default search action
Dongfeng Fang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Hui Zeng, Zhou Su, Qichao Xu, Dongfeng Fang:
USV Fleet-Assisted Collaborative Data Backup in Marine Internet of Things. IEEE Internet Things J. 11(22): 36308-36321 (2024) - [j20]Qichao Xu, Zhou Su, Dongfeng Fang, Yuan Wu:
BASIC: Distributed Task Assignment With Auction Incentive in UAV-Enabled Crowdsensing System. IEEE Trans. Veh. Technol. 73(2): 2416-2430 (2024) - [c21]Mengzhen Cheng, Zhou Su, Yuan Wu, Qichao Xu, Minghui Dai, Dongfeng Fang:
MEC-Enabled Cooperative Rendering in Metaverse: A Coalition Formation Game Approach. ICC 2024: 4548-4553 - [c20]Mingyang Zhang, Zhou Su, Qichao Xu, Yihao Qi, Dongfeng Fang:
Energy-Efficient Task Offloading in UAV-RIS-Assisted Mobile Edge Computing with NOMA. INFOCOM (Workshops) 2024: 1-6 - 2023
- [j19]Qichao Xu, Lifeng Zhao, Zhou Su, Dongfeng Fang, Ruidong Li:
Secure Federated Learning in Quantum Autonomous Vehicular Networks. IEEE Netw. 37(6): 240-247 (2023) - [j18]Meira Levy, Irit Hadar, Jennifer Horkoff, Jane Huffman Hayes, Barbara Paech, Alex Dekhtyar, Gunter Mussbacher, Elda Paja, Tong Li, Seok-Won Lee, Dongfeng Fang:
Philanthropic conference-based requirements engineering in time of pandemic and beyond. Requir. Eng. 28(2): 213-227 (2023) - [j17]Qichao Xu, Zhou Su, Dongfeng Fang, Yuan Wu:
Hierarchical Bandwidth Allocation for Social Community-Oriented Multicast in Space-Air-Ground Integrated Networks. IEEE Trans. Wirel. Commun. 22(3): 1915-1930 (2023) - [c19]Lei Xiong, Qichao Xu, Dongfeng Fang, Hui Zeng:
Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System. DASC/PiCom/CBDCom/CyberSciTech 2023: 143-148 - [c18]Qichao Xu, Yulin Lan, Zhou Su, Dongfeng Fang, Hongbing Zhang:
Verifiable and Privacy-Preserving Cooperative Federated Learning in UAV-Assisted Vehicular Networks. ICC 2023: 2288-2293 - [c17]Sanhuan Yang, Zhou Su, Qichao Xu, Rui Xing, Dongfeng Fang:
Task Allocation Optimization Strategy in UAV-enabled Mobile Edge Computing System. MetaCom 2023: 338-344 - [c16]Yihao Qi, Zhou Su, Qichao Xu, Dongfeng Fang:
Joint Beamforming and Trajectory Optimization for UAV-Assisted Double IRS Secure Transmission System: A Deep Reinforcement Learning Approach. MetaCom 2023: 504-509 - 2021
- [j16]Yuntao Wang, Zhou Su, Ning Zhang, Dongfeng Fang:
Disaster Relief Wireless Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(5): 148-155 (2021) - [c15]Yuntao Wang, Zhou Su, Qichao Xu, Dongfeng Fang:
Trusted and Collaborative Data Sharing with Quality Awareness in Autonomous Driving. ICC 2021: 1-6 - [c14]Isabel Jellen, Joseph Callenes-Sloan, Dongfeng Fang:
Heterogeneous System Model for Security in E-Health Applications. ICC Workshops 2021: 1-6 - [c13]Qichao Xu, Zhou Su, Ruidong Li, Koichi Asatani, Dongfeng Fang:
Game Theoretical Secure Bandwidth Allocation in UAV-assisted Heterogeneous Networks. ICC 2021: 1-5 - 2020
- [j15]Tianxin Lin, Zhou Su, Qichao Xu, Rui Xing, Dongfeng Fang:
Deep Q-Network Based Energy Scheduling in Retail Energy Market. IEEE Access 8: 69284-69295 (2020) - [j14]Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications. IEEE Internet Things J. 7(4): 3474-3484 (2020) - [j13]Minghui Dai, Zhou Su, Ruidong Li, Yuntao Wang, Jianbing Ni, Dongfeng Fang:
An Edge-Driven Security Framework for Intelligent Internet of Things. IEEE Netw. 34(5): 39-45 (2020) - [j12]Weiwei Li, Zhou Su, Kuan Zhang, Abderrahim Benslimane, Dongfeng Fang:
Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach. IEEE Trans. Netw. Sci. Eng. 7(4): 2642-2655 (2020) - [j11]Dongfeng Fang, Yi Qian:
5G Wireless Security and Privacy: Architecture and Flexible Mechanisms. IEEE Veh. Technol. Mag. 15(2): 58-64 (2020) - [c12]Jane Huffman Hayes, Jared Payne, Emily Essex, Kelsey Cole, Joseph Alverson, Alex Dekhtyar, Dongfeng Fang, Grant Bernosky:
Towards Improved Network Security Requirements and Policy: Domain-Specific Completeness Analysis via Topic Modeling. AIRE@RE 2020: 83-86
2010 – 2019
- 2019
- [j10]Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Security analysis for interference management in heterogeneous networks. Ad Hoc Networks 84: 1-8 (2019) - [j9]Huwei Chen, Zhou Su, Yilong Hui, Hui Hui, Dongfeng Fang:
Contract-based approach to provide electric vehicles with charging service in heterogeneous networks. Neurocomputing 344: 61-72 (2019) - [c11]Dongfeng Fang, Shengjie Xu, Hamid Sharif:
Security Analysis of Wireless Train Control Systems. GLOBECOM Workshops 2019: 1-6 - [c10]Shengjie Xu, Dongfeng Fang, Hamid Sharif:
Efficient Network Anomaly Detection for Edge Gateway Defense in 5G. GLOBECOM Workshops 2019: 1-5 - 2018
- [j8]Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Security for 5G Mobile Wireless Networks. IEEE Access 6: 4850-4874 (2018) - [j7]Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Security Requirements and Standards for 4G and 5G Wireless Systems. GetMobile Mob. Comput. Commun. 22(1): 15-20 (2018) - [c9]Dongfeng Fang, Feng Ye:
Identity Management Framework for E-Health Systems over 5G Networks. ICC 2018: 1-6 - [c8]Dongfeng Fang, Feng Ye, Yi Qian, Hamid Sharif:
Small Base Station Management - Improving Energy Efficiency in Heterogeneous Networks. IWCMC 2018: 1191-1196 - [c7]Jiaqi Huang, Dongfeng Fang, Feng Ye, Rose Qingyang Hu, Yi Qian:
A Relay Selection Scheme to Prolong Connection Time for Public Safety Communications. VTC Spring 2018: 1-5 - 2017
- [j6]Dongfeng Fang, Feng Ye, Yi Qian, Hamid Sharif:
A Cloud-Based Incentive Mechanism for Sensing in Mobile Sensor Networks. IJHCR 8(3): 1-14 (2017) - [j5]Huwei Chen, Hui Hui, Zhou Su, Dongfeng Fang, Yilong Hui:
Real-Time Pricing Strategy Based on the Stability of Smart Grid for Green Internet of Things. Mob. Inf. Syst. 2017: 5039702:1-5039702:11 (2017) - [j4]Zejun Xu, Zhou Su, Qichao Xu, Qifan Qi, Tingting Yang, Jintian Li, Dongfeng Fang, Bo Han:
Delivering mobile social content with selective agent and relay nodes in content centric networks. Peer-to-Peer Netw. Appl. 10(2): 296-304 (2017) - [j3]Qichao Xu, Zhou Su, Zejun Xu, Dongfeng Fang, Bo Han:
Analysis to reveal evolution and topological features of a real mobile social network. Peer-to-Peer Netw. Appl. 10(6): 1344-1353 (2017) - [c6]Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Interference Management for Physical Layer Security in Heterogeneous Networks. DASC/PiCom/DataCom/CyberSciTech 2017: 133-138 - [c5]Dongfeng Fang, Feng Ye, Yi Qian, Hamid Sharif:
An efficient incentive mechanism for cloud-based mobile sensor network. EIT 2017: 229-234 - [c4]Huwei Chen, Zhou Su, Yilong Hui, Hui Hui, Dongfeng Fang:
A Contract Based Approach for Electric Vehicles Charging in Heterogeneous Networks. LSMS/ICSEE (3) 2017: 319-328 - 2016
- [j2]Dongfeng Fang, Zhou Su, Qichao Xu, Zejun Xu:
Multi-characteristics based data scheduling over the smart grid. Int. J. Autom. Comput. 13(2): 151-158 (2016) - [j1]Qichao Xu, Zhou Su, Bo Han, Dongfeng Fang, Zejun Xu, Xiaoying Gan:
Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. 9(4): 712-720 (2016) - 2015
- [c3]Huwei Chen, Zhou Su, Dongfeng Fang, Hui Hui:
Real-time pricing strategy with multi-retailers based on network stability. SmartGridComm 2015: 804-808 - [c2]Qifan Qi, Zhou Su, Qichao Xu, Jintian Li, Dongfeng Fang, Bo Han:
Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks. WASA 2015: 437-445 - 2014
- [c1]Qichao Xu, Zhou Su, Dongfeng Fang, Bo Han:
Analysis on Evolution and Topological Features of a Real Mobile Social Network. MSN 2014: 251-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint