Follow
Ilsun You
Title
Cited by
Cited by
Year
Malware obfuscation techniques: A brief survey
I You, K Yim
2010 International conference on broadband, wireless computing …, 2010
8642010
Study and investigation on 5G technology: A systematic review
R Dangi, P Lalwani, G Choudhary, I You, G Pau
Sensors 22 (1), 26, 2021
3262021
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
3012017
Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices
F Lin, Y Zhou, X An, I You, KKR Choo
IEEE Consumer Electronics Magazine 7 (6), 45-50, 2018
1892018
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1812015
AES-128 based secure low power communication for LoRaWAN IoT environments
KL Tsai, YL Huang, FY Leu, I You, YL Huang, CH Tsai
Ieee Access 6, 45325-45334, 2018
1582018
Comparative handover performance analysis of IPv6 mobility management protocols
JH Lee, JM Bonnin, I You, TM Chung
IEEE Transactions on Industrial Electronics 60 (3), 1077-1088, 2012
1572012
Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey
V Sharma, I You, K Andersson, F Palmieri, MH Rehmani, J Lim
IEEE access 8, 167123-167163, 2020
1422020
Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain
F Song, M Zhu, Y Zhou, I You, H Zhang
IEEE Internet of Things Journal 7 (7), 6046-6055, 2019
1402019
Intrusion detection systems for networked unmanned aerial vehicles: A survey
G Choudhary, V Sharma, I You, K Yim, R Chen, JH Cho
2018 14th International Wireless Communications & Mobile Computing …, 2018
1262018
A chain-cluster based routing algorithm for wireless sensor networks
F Tang, I You, S Guo, M Guo, Y Ma
journal of intelligent manufacturing 23, 1305-1313, 2012
1262012
A smartphone-based wearable sensors for monitoring real-time physiological data
I You, KKR Choo, CL Ho
Computers & Electrical Engineering 65, 376-392, 2018
1202018
New order preserving encryption model for outsourced databases in cloud environments
Z Liu, X Chen, J Yang, C Jia, I You
Journal of Network and Computer Applications 59, 198-207, 2016
1192016
SeDaTiVe: SDN-enabled deep learning architecture for network traffic control in vehicular cyber-physical systems
A Jindal, GS Aujla, N Kumar, R Chaudhary, MS Obaidat, I You
IEEE network 32 (6), 66-73, 2018
1162018
Internet of drones (iod): Threats, vulnerability, and security perspectives
G Choudhary, V Sharma, T Gupta, J Kim, I You
arXiv preprint arXiv:1808.00203, 2018
1142018
Neural-blockchain-based ultrareliable caching for edge-enabled UAV networks
V Sharma, I You, DNK Jayakody, DG Reina, KKR Choo
IEEE Transactions on Industrial Informatics 15 (10), 5723-5736, 2019
1132019
Bluetooth 5.1: An analysis of direction finding capability for high-precision location services
G Pau, F Arena, YE Gebremariam, I You
Sensors 21 (11), 3589, 2021
1122021
Secure and energy-efficient handover in fog networks using blockchain-based DMM
V Sharma, I You, F Palmieri, DNK Jayakody, J Li
IEEE Communications Magazine 56 (5), 22-31, 2018
1082018
LoRaWAN-based energy-efficient surveillance by drones for intelligent transportation systems
V Sharma, I You, G Pau, M Collotta, JD Lim, JN Kim
Energies 11 (3), 573, 2018
1082018
Drone secure communication protocol for future sensitive applications in military zone
Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau
Sensors 21 (6), 2057, 2021
1072021
The system can't perform the operation now. Try again later.
Articles 1–20