Follow
Shen Su
Shen Su
Guangzhou University
Verified email at gzhu.edu.cn
Title
Cited by
Cited by
Year
Block-DEF: A secure digital evidence framework using blockchain
Z Tian, M Li, M Qiu, Y Sun, S Su
Information Sciences 491, 151-165, 2019
1952019
A survey on access control in the age of internet of things
J Qiu, Z Tian, C Du, Q Zuo, S Su, B Fang
IEEE Internet of Things Journal 7 (6), 4682-4696, 2020
1622020
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
1602019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
1272019
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory
Z Tian, X Gao, S Su, J Qiu, X Du, M Guizani
IEEE Transactions on Vehicular Technology 68 (6), 5971-5980, 2019
1262019
Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city
J Qiu, L Du, D Zhang, S Su, Z Tian
IEEE Transactions on Industrial Informatics 16 (4), 2659-2666, 2019
932019
Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles
Z Tian, X Gao, S Su, J Qiu
IEEE Internet of Things Journal 7 (5), 3901-3909, 2019
892019
A real-time correlation of host-level events in cyber range service for smart campus
Z Tian, Y Cui, L An, S Su, X Yin, L Yin, X Cui
IEEE Access 6, 35355-35364, 2018
882018
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement
Y Zhang, R Oliveira, Y Wang, S Su, B Zhang, J Bi, H Zhang, L Zhang
IEEE Journal on Selected Areas in Communications 29 (9), 1822-1836, 2011
462011
A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding
J Chen, BX Fang, LH Yin, S Su
Jisuanji Xuebao(Chinese Journal of Computers) 33 (9), 1736-1747, 2010
422010
Automatically traceback RDP-based targeted ransomware attacks
ZH Wang, CG Liu, J Qiu, ZH Tian, X Cui, S Su
Wireless Communications and Mobile Computing 2018, 2018
332018
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
332018
A reputation management scheme for efficient malicious vehicle identification over 5G networks
S Su, Z Tian, S Liang, S Li, S Du, N Guizani
IEEE Wireless Communications 27 (3), 46-52, 2020
302020
A correlation-change based feature selection method for IoT equipment anomaly detection
S Su, Y Sun, X Gao, J Qiu, Z Tian
Applied sciences 9 (3), 437, 2019
292019
IRBA: an identity-based cross-domain authentication scheme for the internet of things
X Jia, N Hu, S Su, S Yin, Y Zhao, X Cheng, C Zhang
Electronics 9 (4), 634, 2020
252020
Honeypot identification in softwarized industrial cyber–physical systems
Y Sun, Z Tian, M Li, S Su, X Du, M Guizani
IEEE Transactions on Industrial Informatics 17 (8), 5542-5551, 2020
182020
Preserving location privacy in mobile edge computing
Y Wang, Z Tian, S Su, Y Sun, C Zhu
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
162019
Automated attack and defense framework for 5G security on physical and logical layers
Z Tian, Y Sun, S Su, M Li, X Du, M Guizani
arXiv preprint arXiv:1902.04009, 2019
162019
A proactive service model facilitating stream data fusion and correlation
Y Han, C Liu, S Su, M Zhu, Z Zhang, S Zhang
International Journal of Web Services Research (IJWSR) 14 (3), 1-16, 2017
152017
User and entity behavior analysis under urban big data
Z Tian, C Luo, H Lu, S Su, Y Sun, M Zhang
ACM Transactions on Data Science 1 (3), 1-19, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20