• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
Browsing by Author 
  •   Qatar University Digital Hub
  • Browsing by Author
  • Qatar University Digital Hub
  • Browsing by Author
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Author "Tian, Zhihong"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 21

    • title
    • publication date
    • submit date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        Applying artificial bee colony algorithm to the multidepot vehicle routing problem 

        Gu, Zhaoquan; Zhu, Yan; Wang, Yuexuan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( John Wiley and Sons Ltd , 2022 , Conference)
        With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ...
      • Thumbnail

        Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task 

        Qiu, Jing; Du, Lei; Chen, Yuanyuan; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
        With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
      • Thumbnail

        An automated refactoring approach to improve IoT software quality 

        Zhang, Yang; Shao, Shuai; Ji, Minghan; Qiu, Jing; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)
        Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ...
      • Thumbnail

        Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations 

        Lv, Lingling; Zheng, Chan; Zhang, Lei; Shan, Chun; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
        Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ...
      • Thumbnail

        CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques 

        Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
        Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
      • Thumbnail

        DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System 

        Lu, Hui; Jin, Chengjie; Helu, Xiaohan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)
        The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ...
      • Thumbnail

        A Distributed Deep Learning System for Web Attack Detection on Edge Devices 

        Tian, Zhihong; Luo, Chaochao; Qiu, Jing; Du, Xiaojiang; Guizani, Mohsen ( IEEE Computer Society , 2020 , Article)
        With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...
      • Thumbnail

        An Energy-Efficient In-Network Computing Paradigm for 6G 

        Hu, Ning; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
        In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ...
      • Thumbnail

        Epidemic Risk Assessment by a Novel Communication Station Based Method 

        Gu, Zhaoquan; Wang, Le; Chen, Xiaolong; Tang, Yunyi; Wang, Xingang; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)
        The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
      • Thumbnail

        Honeypot Identification in Softwarized Industrial Cyber-Physical Systems 

        Sun, Yanbin; Tian, Zhihong; Li, Mohan; Su, Shen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2021 , Article)
        In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
      • Thumbnail

        IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT 

        Gu, Zhaoquan; Li, Hao; Khan, Sajid; Deng, Lianbing; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
        With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ...
      • Thumbnail

        Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense 

        Du, Xiaojiang; Susilo, Willy; Guizani, Mohsen; Tian, Zhihong ( IEEE Computer Society , 2021 , Article)
        5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
      • Thumbnail

        IoT malicious traffic identification using wrapper-based feature selection mechanisms 

        Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)
        Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
      • Thumbnail

        IoT root union: A decentralized name resolving system for IoT based on blockchain 

        Su, Shen; Tian, Zhihong; Li, Shuang; Deng, Jinxi; Yin, Lihua; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier Ltd , 2021 , Article)
        A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
      • Thumbnail

        Malicious mining code detection based on ensemble learning in cloud computing environment 

        Li, Shudong; Li, Yuan; Han, Weihong; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Elsevier B.V. , 2021 , Article)
        Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
      • Thumbnail

        A Malicious Mining Code Detection Method Based on Multi-Features Fusion 

        Li, Shudong; Jiang, Laiyuan; Zhang, Qianqing; Wang, Zhen; Tian, Zhihong; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2022 , Article)
        With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
      • Thumbnail

        A method of chained recommendation for charging piles in internet of vehicles 

        Zhang, Tianle; Zheng, Liwen; Jiang, Yu; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Springer , 2021 , Article)
        With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ...
      • Thumbnail

        A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks 

        Hu, Ning; Tian, Zhihong; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)
        The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ...
      • Thumbnail

        Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city 

        Shafiq, Muhammad; Tian, Zhihong; Sun, Yanbin; Du, Xiaojiang; Guizani, Mohsen ( Elsevier B.V. , 2020 , Article)
        Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
      • Thumbnail

        System log detection model based on conformal prediction 

        Ren, Yitong; Gu, Zhaojun; Wang, Zhi; Tian, Zhihong; Liu, Chunbo; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)
        With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...

        Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

        Contact Us | Send Feedback
        Contact Us | Send Feedback | QU

         

         

        Home

        Submit your QU affiliated work

        Browse

        All of Digital Hub
          Communities & Collections Publication Date Author Title Subject Type Language Publisher

        My Account

        Login

        Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

        Contact Us | Send Feedback
        Contact Us | Send Feedback | QU