A data authentication scheme for UAV ad hoc network communication

J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da… - The Journal of …, 2020 - Springer
In this paper, we propose an efficient and energy-saving distributed network architecture
based on clustering stratification to solve the information security problem of unmanned aerial …

A new digital watermarking method for data integrity protection in the perception layer of IoT

…, L Kou, L Zhang, C Liu, Q Da… - Security and …, 2017 - Wiley Online Library
Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments
and research institutions around the world, and remarkable achievements have been …

Project gradient descent adversarial attack against multisource remote sensing image scene classification

Y Jiang, G Yin, Y Yuan, Q Da - Security and Communication …, 2021 - Wiley Online Library
Deep learning technology (a deeper and optimized network structure) and remote sensing
imaging (ie, the more multisource and the more multicategory remote sensing data) have …

[HTML][HTML] Scheduling optimization for UAV communication coverage using virtual force-based PSO model

J Sun, W Wang, S Li, Q Da, L Chen - Digital Communications and Networks, 2024 - Elsevier
When the ground communication base stations in the target area are severely destroyed, the
deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with …

A novel hybrid information security scheme for 2D vector map

Q Da, J Sun, L Zhang, L Kou, W Wang, Q Han… - Mobile Networks and …, 2018 - Springer
Abstract Information hiding is an essential research topic in the theory of hybrid information
security. 2D vector map contains a wealth of hybrid information, which requires verification of …

Multiple Unmanned Aerial Vehicle Autonomous Path Planning Algorithm Based on Whale-Inspired Deep Q-Network

W Wang, G Zhang, Q Da, D Lu, Y Zhao, S Li, D Lang - Drones, 2023 - mdpi.com
In emergency rescue missions, rescue teams can use UAVs and efficient path planning
strategies to provide flexible rescue services for trapped people, which can improve rescue …

An intrusion detection based on Bayesian game theory for UAV network

J Sun, W Wang, Q Da, L Kou, G Zhao, L Zhang… - 11th EAI International …, 2018 - eudl.eu
Unmanned aerial vehicles (UAVs) have enormous potential in public, civil and military fields,
so the security of UAV networks is attracting increasing people’s attention. The existing …

Adversarial transformation network with adaptive perturbations for generating adversarial examples

G Zhang, Q Da, S Li, J Sun, W Wang… - … Journal of Bio …, 2022 - inderscienceonline.com
Deep neural networks are susceptible to adversarial examples which can mislead or even
manipulate the predictive behaviour of deep neural networks. This raises concerns about the …

A multi-focus image fusion algorithm in 5G communications

…, K Zhang, L Zhang, Y Lin, Q Han, Q Da… - Multimedia Tools and …, 2019 - Springer
In this paper, we first build a mobile cloud platform that users can upload multi-focus images
or download full-focus images through the 5G network. Then we design a method named …

A lightweight multi-factor mobile user authentication scheme

…, Q Zhong, L Kou, W Wang, Q Da… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
This paper presents a lightweight multi-factor mobile user authentication scheme. It combines
the biometrics of users and information of smart phones to realize mutual authentication …