A data authentication scheme for UAV ad hoc network communication
J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da… - The Journal of …, 2020 - Springer
In this paper, we propose an efficient and energy-saving distributed network architecture
based on clustering stratification to solve the information security problem of unmanned aerial …
based on clustering stratification to solve the information security problem of unmanned aerial …
A new digital watermarking method for data integrity protection in the perception layer of IoT
…, L Kou, L Zhang, C Liu, Q Da… - Security and …, 2017 - Wiley Online Library
Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from governments
and research institutions around the world, and remarkable achievements have been …
and research institutions around the world, and remarkable achievements have been …
Project gradient descent adversarial attack against multisource remote sensing image scene classification
Y Jiang, G Yin, Y Yuan, Q Da - Security and Communication …, 2021 - Wiley Online Library
Deep learning technology (a deeper and optimized network structure) and remote sensing
imaging (ie, the more multisource and the more multicategory remote sensing data) have …
imaging (ie, the more multisource and the more multicategory remote sensing data) have …
[HTML][HTML] Scheduling optimization for UAV communication coverage using virtual force-based PSO model
When the ground communication base stations in the target area are severely destroyed, the
deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with …
deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with …
A novel hybrid information security scheme for 2D vector map
Q Da, J Sun, L Zhang, L Kou, W Wang, Q Han… - Mobile Networks and …, 2018 - Springer
Abstract Information hiding is an essential research topic in the theory of hybrid information
security. 2D vector map contains a wealth of hybrid information, which requires verification of …
security. 2D vector map contains a wealth of hybrid information, which requires verification of …
Multiple Unmanned Aerial Vehicle Autonomous Path Planning Algorithm Based on Whale-Inspired Deep Q-Network
In emergency rescue missions, rescue teams can use UAVs and efficient path planning
strategies to provide flexible rescue services for trapped people, which can improve rescue …
strategies to provide flexible rescue services for trapped people, which can improve rescue …
An intrusion detection based on Bayesian game theory for UAV network
J Sun, W Wang, Q Da, L Kou, G Zhao, L Zhang… - 11th EAI International …, 2018 - eudl.eu
Unmanned aerial vehicles (UAVs) have enormous potential in public, civil and military fields,
so the security of UAV networks is attracting increasing people’s attention. The existing …
so the security of UAV networks is attracting increasing people’s attention. The existing …
Adversarial transformation network with adaptive perturbations for generating adversarial examples
G Zhang, Q Da, S Li, J Sun, W Wang… - … Journal of Bio …, 2022 - inderscienceonline.com
Deep neural networks are susceptible to adversarial examples which can mislead or even
manipulate the predictive behaviour of deep neural networks. This raises concerns about the …
manipulate the predictive behaviour of deep neural networks. This raises concerns about the …
A multi-focus image fusion algorithm in 5G communications
In this paper, we first build a mobile cloud platform that users can upload multi-focus images
or download full-focus images through the 5G network. Then we design a method named …
or download full-focus images through the 5G network. Then we design a method named …
A lightweight multi-factor mobile user authentication scheme
…, Q Zhong, L Kou, W Wang, Q Da… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
This paper presents a lightweight multi-factor mobile user authentication scheme. It combines
the biometrics of users and information of smart phones to realize mutual authentication …
the biometrics of users and information of smart phones to realize mutual authentication …