Browsing by Author "n 2014181566"
Now showing items 61-80 of 136
-
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
Song, Liangjun; Sun, Gang; Yu, Hongfang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ... -
Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid
Liu, Jingwei; Zhao, Mengjiao; Bao, Jiajia; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The smart grid is already widespread for the purpose of managing energy generation and distribution. In this system, frequent interactions between devices generate mass data, which requires robust processing capability. ... -
Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV
Liwang, Minghui; Wang, Jiexiang; Gao, Zhibin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)With the growing popularity of the fifth-generation (5G) wireless systems and cloud-enabled Internet of Vehicles, vehicular cloud has been introduced as a novel mobile device computing mode, which enables vehicles to offload ... -
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
Zhao, Di; Qin, Hao; Song, Bin; Han, Beichen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI , 2020 , Article)Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ... -
Haddle: A framework for investigating data leakage attacks in hadoop
Gao, Yun; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ... -
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
Zhai, Yanlong; Tchaye-Kondi, Jude; Lin, Kwei Jay; Zhu, Liehuang; Tao, Wenjun; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Academic Press Inc. , 2021 , Article)HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ... -
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
Sun, Yanbin; Tian, Zhihong; Li, Mohan; Su, Shen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2021 , Article)In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
Zheng, Baokun; Zhu, Liehuang; Shen, Meng; Du, Xiaojiang; Guizani, Mohsen ( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
Gu, Zhaoquan; Li, Hao; Khan, Sajid; Deng, Lianbing; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Improve the reliability of 6G vehicular communication through skip network coding
Zhang, Yuyang; Zhao, Wentao; Dong, Ping; Du, Xiaojiang; Qiao, Wenxuan; Guizani, Mohsen... more authors ... less authors ( Elsevier Inc. , 2022 , Article)One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, ... -
An incentive mechanism for data sharing based on blockchain with smart contracts
Xuan, Shichang; Zheng, Li; Chung, Ilyong; Wang, Wei; Man, Dapeng; Du, Xiaojiang; Yang, Wu; Guizani, Mohsen... more authors ... less authors ( Elsevier , 2020 , Article)© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ... -
Infrared Small Target Detection Through Multiple Feature Analysis Based on Visual Saliency
Chen, Yuwen; Song, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Infrared small target detection in extreme environments such as low illumination or complex background with low signal clutter ratio is of crucial significance and counted as a difficult task in infrared search and tracking ... -
IntegrityChain: Provable data possession for decentralized storage
Li, Yannan; Yu, Yong; Chen, Ruonan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ... -
An intelligent data uploading selection mechanism for offloading uplink traffic of cellular networks
Wang, Qian; Fang, Juan; Gong, Bei; Du, Xiaojiang; Guizani, Mohsen ( MDPI AG , 2020 , Article)Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading ... -
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
Cheng, Zhipeng; Gao, Zhibin; Liwang, Minghui; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ... -
Interest-Related Item Similarity Model Based on Multimodal Data for Top-N Recommendation
Lv, Junmei; Song, Bin; Guo, Jie; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Nowadays, the recommendation systems are applied in the fields of e-commerce, video websites, social networking sites, which bring great convenience to people's daily lives. The types of information are diversified and ... -
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks
Sun, Gang; Zhang, Yijing; Yu, Hongfang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on designing an efficient routing strategy for vehicle-to-vehicle ... -
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
Du, Xiaojiang; Susilo, Willy; Guizani, Mohsen; Tian, Zhihong ( IEEE Computer Society , 2021 , Other)5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
IoT root union: A decentralized name resolving system for IoT based on blockchain
Su, Shen; Tian, Zhihong; Li, Shuang; Deng, Jinxi; Yin, Lihua; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier Ltd , 2021 , Article)A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...