Browsing by Author "n 2014181566"
Now showing items 61-80 of 100
-
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
Wang, Dan; Qin, Hao; Song, Bin; Xu, Ke; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2021 , Article)Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ... -
Joint user association and resource allocation in HetNets based on user mobility prediction
Cheng, Zhipeng; Chen, Ning; Liu, Bang; Gao, Zhibin; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2020 , Article)Virtual small cell (VSC) formed by directional beams is seen as an alternative for the small base station (SBS) within the coverage of macro base station (MBS), to increase system capacity and reduce site cost. However, ... -
Key-policy attribute-based encryption with keyword search in virtualized environments
Yu, Yong; Shi, Junbin; Li, Huilin; Li, Yannan; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ... -
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things
Yang, Wenti; Wang, Ruimiao; Guan, Zhitao; Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT ... -
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems
Chen, Ning; Lin, Hongyue; Zhao, Yifeng; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( John Wiley and Sons Ltd , 2022 , Article)Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low-complexity and high-reliability ... -
Malicious mining code detection based on ensemble learning in cloud computing environment
Li, Shudong; Li, Yuan; Han, Weihong; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Elsevier B.V. , 2021 , Article)Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ... -
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
Qiao, Yanchen; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Association for Computing Machinery , 2022 , Article)With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ... -
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
Niu, Weina; Xiao, Jian'An; Zhang, Xiyue; Zhang, Xiaosong; Du, Xiaojiang; Huang, Xiaoming; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ... -
A method of chained recommendation for charging piles in internet of vehicles
Zhang, Tianle; Zheng, Liwen; Jiang, Yu; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Springer , 2021 , Article)With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ... -
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
Hu, Ning; Tian, Zhihong; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ... -
A novel chaos-based physical layer security transmission scheme for internet of things
Liu, Jingwei; Ren, Ailian; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ... -
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
Su, Yuhan; Liwang, Minghui; Gao, Zhibin; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ... -
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
Wang, Qian; Gao, Zhipeng; Li, Zifan; Du, Xiaojiang; Guizani, Mohsen ( Springer , 2020 , Article)Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ... -
Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network
Li, Bin; Guo, Xianzhen; Zhang, Ruonan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Unmanned aerial vehicles (UAVs) have played an important role in air-ground integration network. Especially in Internet of Things (IoT) services, UAV equipped with communication equipments is widely adopted as a mobile ... -
Pgride: Privacy-preserving group ridesharing matching in online ride hailing services
Yu, Haining; Zhang, Hongli; Yu, Xiangzhan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)An online ride hailing (ORH) service creates a typical supply-and-demand two-sided market, which enables riders and drivers to establish optimized rides conveniently via mobile applications. Group ridesharing is a novel ... -
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
Xu, Chang; Xie, Xuan; Zhu, Liehuang; Sharif, Kashif; Zhang, Chuan; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Science in China Press , 2020 , Article)The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ... -
A Practical Cross Device Federated Learning Frame-work over 5G N etworks
Yang, Wenti; Wang, Naiyu; Guan, Zhitao; Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without ... -
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
Liu, Jingwei; Liang, Tianyu; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ... -
Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network
Yu, Hongfang; Chen, Zhenrong; Sun, Gang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)To meet the increasing traffic demands characterized by large bandwidth and high burstiness, more traffic has been moving to inter-datacenter elastic optical networks (inter-DC EONs) for processing. The integration of two ... -
QoS provision for vehicle big data by parallel transmission based on heterogeneous network characteristics prediction
Qiao, Wenxuan; Dong, Ping; Du, Xiaojiang; Zhang, Yuyang; Zhang, Hongke; Guizani, Mohsen... more authors ... less authors ( Academic Press Inc. , 2022 , Article)Multipath parallel transmission has become an important research direction to improve big data transmission efficiency of connected vehicles. However, due to the heterogeneity and time-varying characteristics of parallel ...