Browsing by Author "n 2014181566"
Now showing items 81-100 of 136
-
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
Wang, Dan; Qin, Hao; Song, Bin; Xu, Ke; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2021 , Article)Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ... -
Joint user association and resource allocation in HetNets based on user mobility prediction
Cheng, Zhipeng; Chen, Ning; Liu, Bang; Gao, Zhibin; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2020 , Article)Virtual small cell (VSC) formed by directional beams is seen as an alternative for the small base station (SBS) within the coverage of macro base station (MBS), to increase system capacity and reduce site cost. However, ... -
Key-policy attribute-based encryption with keyword search in virtualized environments
Yu, Yong; Shi, Junbin; Li, Huilin; Li, Yannan; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ... -
Lightweight and Privacy-Preserving Medical Services Access for Healthcare Cloud
Liu, Jingwei; Tang, Huifang; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)With the popularity of cloud computing technology, the healthcare cloud system is becoming increasingly perfect, which reduces the time of disease diagnosis and brings great convenience to people's lives. But meanwhile, ... -
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things
Yang, Wenti; Wang, Ruimiao; Guan, Zhitao; Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT ... -
Location privacy preservation for mobile users in location-based services
Sun, Gang; Cai, Shuai; Yu, Hongfang; Maharjan, Sabita; Chang, Victor; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ... -
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
Zhu, Wenlong; Yang, Wu; Xuan, Shichang; Man, Dapeng; Wang, Wei; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ... -
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems
Chen, Ning; Lin, Hongyue; Zhao, Yifeng; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( John Wiley and Sons Ltd , 2022 , Article)Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low-complexity and high-reliability ... -
Malicious mining code detection based on ensemble learning in cloud computing environment
Li, Shudong; Li, Yuan; Han, Weihong; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Elsevier B.V. , 2021 , Article)Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ... -
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
Qiao, Yanchen; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Association for Computing Machinery , 2022 , Article)With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ... -
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
Niu, Weina; Xiao, Jian'An; Zhang, Xiyue; Zhang, Xiaosong; Du, Xiaojiang; Huang, Xiaoming; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ... -
Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach
Wang, Dan; Zhang, Wei; Song, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ... -
A method of chained recommendation for charging piles in internet of vehicles
Zhang, Tianle; Zheng, Liwen; Jiang, Yu; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Springer , 2021 , Article)With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ... -
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
Hu, Ning; Tian, Zhihong; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ... -
A novel chaos-based physical layer security transmission scheme for internet of things
Liu, Jingwei; Ren, Ailian; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ... -
Online parallelized service function chain orchestration in data center networks
Sun, Gang; Chen, Zhenrong; Yu, Hongfang; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ... -
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
Su, Yuhan; Liwang, Minghui; Gao, Zhibin; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ... -
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
Wang, Qian; Gao, Zhipeng; Li, Zifan; Du, Xiaojiang; Guizani, Mohsen ( Springer , 2020 , Article)Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ... -
Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network
Li, Bin; Guo, Xianzhen; Zhang, Ruonan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Unmanned aerial vehicles (UAVs) have played an important role in air-ground integration network. Especially in Internet of Things (IoT) services, UAV equipped with communication equipments is widely adopted as a mobile ... -
Pgride: Privacy-preserving group ridesharing matching in online ride hailing services
Yu, Haining; Zhang, Hongli; Yu, Xiangzhan; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)An online ride hailing (ORH) service creates a typical supply-and-demand two-sided market, which enables riders and drivers to establish optimized rides conveniently via mobile applications. Group ridesharing is a novel ...