تصفح حسب المؤلف "Du, X"
-
A comparison between the effectiveness of PBL and LBL on improving problem-solving abilities of medical students using questioning
He Y.; Du X.; Toft E.; Zhang X.; Qu B.; Shi J.; Zhang H.; Zhang H.... more authors ... less authors ( Routledge , 2018 , Article)In daily patient-history taking and diagnosis practice, doctors ask questions to gather information from patients and narrow down diagnostic hypotheses. Training medical students to be efficient problem solvers through the ... -
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
Liwang M.; Dai S.; Gao Z.; Du X.; Guizani M.; Dai H.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ... -
A fog computing solution for context-based privacy leakage detection for android healthcare devices
Gu J.; Huang R.; Jiang L.; Qiao G.; Du X.; Guizani M.... more authors ... less authors ( MDPI AG , 2019 , Article)Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their ... -
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles
He D.; Qiao Y.; Chen S.; Du X.; Chen W.; Zhu S.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)As a result of continuous cost reduction and device miniaturization, small UAVs are now more easily accessible to the public. Consequently, numerous new applications in the civilian and commercial domains have emerged. ... -
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
Niu W.; Zhuo Z.; Zhang X.; Du X.; Yang G.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ... -
A Novel DCT-Based Compression Scheme for 5G Vehicular Networks
Su Y.; Lu X.; Huang L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Next-generation (5G) vehicular networks will support various network applications, leading to specific requirements and challenges for wireless access technologies. This trend has motivated the development of the long-term ... -
A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing
Zhang C.; Zhu L.; Xu C.; Du X.; Guizani M. ( MDPI AG , 2019 , Article)The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic ... -
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
Lu X.; Guan Z.; Zhou X.; Du X.; Wu L.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ... -
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Obour Agyekum K.O.-B.; Xia Q.; Sifah E.B.; Gao J.; Xia H.; Du X.; Guizani M.... more authors ... less authors ( NLM (Medline) , 2019 , Article)Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ... -
A self-selective correlation ship tracking method for smart ocean systems
Kang X.; Song B.; Guo J.; Du X.; Guizani M. ( MDPI AG , 2019 , Article)In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count ... -
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Al-Garadi M.A.; Mohamed A.; Al-Ali A.K.; Du X.; Ali I.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ... -
Adversarial samples on android malware detection systems for IoT systems
Liu X.; Du X.; Zhang X.; Zhu Q.; Wang H.; Guizani M.... more authors ... less authors ( MDPI AG , 2019 , Article)Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has ... -
An Anti-Interference Scheme for UAV Data Links in Air–Ground Integrated Vehicular Networks
He Y.; Zhai D.; Zhang R.; Du X.; Guizani M. ( MDPI AG , 2019 , Article)As one of the main applications of the Internet of things (IoT), the vehicular ad-hoc network (VANET) is the core of the intelligent transportation system (ITS). Air–ground integrated vehicular networks (AGIVNs) assisted ... -
An Optimal Channel Occupation Time Adjustment Method for LBE in Unlicensed Spectrum
Wang Q.; Du X.; Gao Z.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Load Based Equipment (LBE) mechanism is a category of Listen-Before-Talk (LBT) protocol adopted by LTE to access unlicensed channels to realize fair coexistence between LTE and Wi-Fi networks. However, most LBE optimization ... -
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations
Belkhouja T.; Du X.; Mohamed A.; Al-Ali A.K.; Guizani M. ( Elsevier B.V. , 2019 , Article)Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ... -
Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications
Guo J.; Song B.; Chi Y.; Jayasinghe L.; Yuen C.; Guan Y.L.; Du X.; Guizani M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)Ultra-reliable low-latency communications (URLLC) is a key technology in 5G supporting real-time multimedia services, which requires a low-cost signal recovery technology in the physical layer. A kind of well-known ... -
Development of Self-Regulation amongst Dental Students in Problem-based Learning Curricula: A Qualitative Study
Ali, Kamran; Daud, Alaa; Ba Hattab, Raidan; Philip, Nebu; Matoug- Elwerfelli, Manal; Anwegi, Lamiya; Al Khabuli, Jumma; Du, Xiangyun... more authors ... less authors ( Wiley , 2022 , Article)To explore the value of problem-based learning in the development of self-regulation amongst undergraduate dental students. A qualitative approach using focus groups was used to explore the perceptions and experiences of ... -
Does Problem-based Learning Facilitate Enactment of Learner Agency in Undergraduate Dental Curricula? A Q Study.
Ali, K; Du, X; Lundberg, A ( John Wiley & Sons, Ltd , 2022 , Article)Addressing a literature gap on leaner agency in health profession education, this study explores students' perceptions on which aspects of a problem-based learning (PBL) environment cradle their leaner agency enactment. ... -
DTW based Authentication for Wireless Medical Device Security
Rathore H.; Al-Ali A.; Mohamed A.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Wireless medical devices play an important role in providing safety and privacy to patients suffering from major health issues. These light-weight devices can be worn inside or outside the patient's body and provide more ... -
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
Tian Z.; Gao X.; Su S.; Qiu J.; Du X.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot ...