Browsing by Author "Tian, Zhihong"
Now showing items 1-20 of 21
-
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
Gu, Zhaoquan; Zhu, Yan; Wang, Yuexuan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( John Wiley and Sons Ltd , 2022 , Conference Paper)With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ... -
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
Qiu, Jing; Du, Lei; Chen, Yuanyuan; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ... -
An automated refactoring approach to improve IoT software quality
Zhang, Yang; Shao, Shuai; Ji, Minghan; Qiu, Jing; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ... -
Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations
Lv, Lingling; Zheng, Chan; Zhang, Lei; Shan, Chun; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ... -
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ... -
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
Lu, Hui; Jin, Chengjie; Helu, Xiaohan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ... -
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
Tian, Zhihong; Luo, Chaochao; Qiu, Jing; Du, Xiaojiang; Guizani, Mohsen ( IEEE Computer Society , 2020 , Article)With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ... -
An Energy-Efficient In-Network Computing Paradigm for 6G
Hu, Ning; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ... -
Epidemic Risk Assessment by a Novel Communication Station Based Method
Gu, Zhaoquan; Wang, Le; Chen, Xiaolong; Tang, Yunyi; Wang, Xingang; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ... -
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
Sun, Yanbin; Tian, Zhihong; Li, Mohan; Su, Shen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2021 , Article)In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ... -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
Gu, Zhaoquan; Li, Hao; Khan, Sajid; Deng, Lianbing; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
Du, Xiaojiang; Susilo, Willy; Guizani, Mohsen; Tian, Zhihong ( IEEE Computer Society , 2021 , Other)5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
IoT root union: A decentralized name resolving system for IoT based on blockchain
Su, Shen; Tian, Zhihong; Li, Shuang; Deng, Jinxi; Yin, Lihua; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier Ltd , 2021 , Article)A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ... -
Malicious mining code detection based on ensemble learning in cloud computing environment
Li, Shudong; Li, Yuan; Han, Weihong; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( Elsevier B.V. , 2021 , Article)Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ... -
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
Li, Shudong; Jiang, Laiyuan; Zhang, Qianqing; Wang, Zhen; Tian, Zhihong; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2022 , Article)With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ... -
A method of chained recommendation for charging piles in internet of vehicles
Zhang, Tianle; Zheng, Liwen; Jiang, Yu; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Springer , 2021 , Article)With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ... -
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
Hu, Ning; Tian, Zhihong; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ... -
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
Shafiq, Muhammad; Tian, Zhihong; Sun, Yanbin; Du, Xiaojiang; Guizani, Mohsen ( Elsevier B.V. , 2020 , Article)Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ... -
System log detection model based on conformal prediction
Ren, Yitong; Gu, Zhaojun; Wang, Zhi; Tian, Zhihong; Liu, Chunbo; Lu, Hui; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...