default search action
William Grant Hatcher
Person information
- affiliation: Towson University, Department of Computer and Information Sciences, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]William Grant Hatcher, Cheng Qian, Fan Liang, Weixian Liao, Erik Philip Blasch, Wei Yu:
Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction. IEEE Internet Things J. 9(18): 16807-16823 (2022) - 2021
- [j12]William Grant Hatcher, Cheng Qian, Weichao Gao, Fan Liang, Kun Hua, Wei Yu:
Towards Efficient and Intelligent Internet of Things Search Engine. IEEE Access 9: 15778-15795 (2021) - [j11]Hansong Xu, Xing Liu, William Grant Hatcher, Guobin Xu, Weixian Liao, Wei Yu:
Priority-Aware Reinforcement-Learning-Based Integrated Design of Networking and Control for Industrial Internet of Things. IEEE Internet Things J. 8(6): 4668-4680 (2021) - [c11]Pu Tian, William Grant Hatcher, Weixian Liao, Wei Yu, Erik Blasch:
FALIoTSE: Towards Federated Adversarial Learning for IoT Search Engine Resiliency. DASC/PiCom/CBDCom/CyberSciTech 2021: 290-297 - [c10]Weichao Gao, Cheng Qian, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Towards Scalability of the IoT Search Engine. DASC/PiCom/CBDCom/CyberSciTech 2021: 521-528 - 2020
- [j10]Weichao Gao, Wei Yu, Fan Liang, William Grant Hatcher, Chao Lu:
Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption. IEEE Trans. Netw. Sci. Eng. 7(2): 776-791 (2020) - [j9]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. ACM Trans. Internet Techn. 20(4): 38:1-38:24 (2020) - [c9]Cheng Qian, Weichao Gao, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Search Engine for Heterogeneous Internet of Things Systems and Optimization. DASC/PiCom/CBDCom/CyberSciTech 2020: 475-482
2010 – 2019
- 2019
- [j8]Xing Liu, Cheng Qian, William G. Hatcher, Hansong Xu, Weixian Liao, Wei Yu:
Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities. IEEE Access 7: 79523-79544 (2019) - [j7]Fan Liang, Cheng Qian, William Grant Hatcher, Wei Yu:
Search Engine for the Internet of Things: Lessons From Web Search, Vision, and Opportunities. IEEE Access 7: 104673-104691 (2019) - [j6]Fan Liang, William Grant Hatcher, Weixian Liao, Weichao Gao, Wei Yu:
Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly. IEEE Access 7: 158126-158147 (2019) - [j5]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Towards Deep Learning-Based Approach for Detecting Android Malware. Int. J. Softw. Innov. 7(4): 1-24 (2019) - [c8]Fan Liang, William Grant Hatcher, Guobin Xu, James H. Nguyen, Weixian Liao, Wei Yu:
Towards Online Deep Learning-Based Energy Forecasting. ICCCN 2019: 1-9 - [c7]Josh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu, Erik Blasch, Chao Lu:
Towards Multimodal Learning for Android Malware Detection. ICNC 2019: 432-436 - 2018
- [j4]Wei Yu, Fan Liang, Xiaofei He, William G. Hatcher, Chao Lu, Jie Lin, Xinyu Yang:
A Survey on the Edge Computing for the Internet of Things. IEEE Access 6: 6900-6919 (2018) - [j3]William G. Hatcher, Wei Yu:
A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends. IEEE Access 6: 24411-24432 (2018) - [j2]Zhijiang Chen, Sixiao Wei, Wei Yu, James H. Nguyen, William G. Hatcher:
A cloud/edge computing streaming system for network traffic monitoring and threat detection. Int. J. Secur. Networks 13(3): 169-186 (2018) - [c6]Weichao Gao, William G. Hatcher, Wei Yu:
A Survey of Blockchain: Techniques, Applications, and Challenges. ICCCN 2018: 1-11 - [c5]Fan Liang, James H. Nguyen, Weichao Gao, William G. Hatcher, Wei Yu:
Towards UAV Assisted Multi-Path Data Streaming in Mobile Ad-Hoc Networks. ICNC 2018: 599-603 - [c4]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Tuning Deep Learning Performance for Android Malware Detection. SNPD 2018: 140-145 - 2017
- [j1]Weichao Gao, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku, William G. Hatcher:
Toward Emulation-Based Performance Assessment of Constrained Application Protocol in Dynamic Networks. IEEE Internet Things J. 4(5): 1597-1610 (2017) - [c3]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks. ICCCN 2017: 1-9 - 2016
- [c2]Zhijiang Chen, Hanlin Zhang, William G. Hatcher, James H. Nguyen, Wei Yu:
A streaming-based network monitoring and threat detection system. SERA 2016: 31-37 - [c1]William G. Hatcher, David Maloney, Wei Yu:
Machine learning-based mobile threat monitoring and detection. SERA 2016: 67-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint