Browsing by Author "n 2014181566"
Now showing items 41-60 of 100
-
An Electric Vehicle Charging Reservation Approach Based on Blockchain
Cao, Sheng; Dang, Sixuan; Du, Xiaojiang; Guizani, Mohsen; Zhang, Xiaosong; Huang, Xiaoming... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The popularity of electric vehicles depends on convenient and efficient charging services. At present, none of existing charging services allow users to reach charging stations at desirable time and charge immediately when ... -
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV with Fog Computing Architecture
Zhai, Yanlong; Sun, Wenxin; Wu, Jianqing; Zhu, Liehuang; Shen, Jun; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The Internet of Vehicles (IoV) is one important application scenarios for the development of the Internet of things. The software-defined network (SDN) and fog computing could effectively improve the IoV network dynamics, ... -
An Energy-Efficient In-Network Computing Paradigm for 6G
Hu, Ning; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ... -
Epidemic Risk Assessment by a Novel Communication Station Based Method
Gu, Zhaoquan; Wang, Le; Chen, Xiaolong; Tang, Yunyi; Wang, Xingang; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ... -
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
Chen, Yuwen; Song, Bin; Zeng, Yuan; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2021 , Article)In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ... -
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
Song, Liangjun; Sun, Gang; Yu, Hongfang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ... -
Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid
Liu, Jingwei; Zhao, Mengjiao; Bao, Jiajia; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The smart grid is already widespread for the purpose of managing energy generation and distribution. In this system, frequent interactions between devices generate mass data, which requires robust processing capability. ... -
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
Zhai, Yanlong; Tchaye-Kondi, Jude; Lin, Kwei Jay; Zhu, Liehuang; Tao, Wenjun; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Academic Press Inc. , 2021 , Article)HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ... -
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
Sun, Yanbin; Tian, Zhihong; Li, Mohan; Su, Shen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2021 , Article)In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
Zheng, Baokun; Zhu, Liehuang; Shen, Meng; Du, Xiaojiang; Guizani, Mohsen ( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
Gu, Zhaoquan; Li, Hao; Khan, Sajid; Deng, Lianbing; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Improve the reliability of 6G vehicular communication through skip network coding
Zhang, Yuyang; Zhao, Wentao; Dong, Ping; Du, Xiaojiang; Qiao, Wenxuan; Guizani, Mohsen... more authors ... less authors ( Elsevier Inc. , 2022 , Article)One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, ... -
An incentive mechanism for data sharing based on blockchain with smart contracts
Xuan, Shichang; Zheng, Li; Chung, Ilyong; Wang, Wei; Man, Dapeng; Du, Xiaojiang; Yang, Wu; Guizani, Mohsen... more authors ... less authors ( Elsevier , 2020 , Article)© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ... -
IntegrityChain: Provable data possession for decentralized storage
Li, Yannan; Yu, Yong; Chen, Ruonan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ... -
An intelligent data uploading selection mechanism for offloading uplink traffic of cellular networks
Wang, Qian; Fang, Juan; Gong, Bei; Du, Xiaojiang; Guizani, Mohsen ( MDPI AG , 2020 , Article)Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading ... -
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
Cheng, Zhipeng; Gao, Zhibin; Liwang, Minghui; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ... -
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks
Sun, Gang; Zhang, Yijing; Yu, Hongfang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on designing an efficient routing strategy for vehicle-to-vehicle ... -
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
Du, Xiaojiang; Susilo, Willy; Guizani, Mohsen; Tian, Zhihong ( IEEE Computer Society , 2021 , Other)5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
IoT root union: A decentralized name resolving system for IoT based on blockchain
Su, Shen; Tian, Zhihong; Li, Shuang; Deng, Jinxi; Yin, Lihua; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier Ltd , 2021 , Article)A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...