Browsing Computer Science & Engineering by Author "n 2014181566"
Now showing items 1-20 of 136
-
A Course-Aware Opportunistic Routing Protocol for FANETs
He, Yixin; Tang, Xiao; Zhang, Ruonan; Du, Xiaojiang; Zhou, Deyun; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In recent years, unmanned aerial vehicles (UAVs) have gained popularity in various applications and services in both the military and civilian domains. Compared with the single-UAV scenario, flying ad hoc networks (FANETs) ... -
A measurement study on the topologies of BitTorrent networks
Su, Majing; Zhang, Hongli; Du, Xiaojiang; Fang, Binxing; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ... -
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
Rathore, Heena; Al-Ali, Abdulla Khalid; Mohamed, Amr; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ... -
A review of security challenges, attacks and resolutions for wireless medical devices
Rathore, Heena; Mohamed, Amr; Al-Ali, Abdulla; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have ... -
Access Control Schemes for Implantable Medical Devices: A Survey
Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen; Mohamed, Amr ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's ... -
Accountable credential management system for vehicular communication
Khan, Salabat; Zhu, Liehuang; Yu, Xiaoyan; Zhang, Zijian; Rahim, Mussadiq Abdul; Khan, Maqbool; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier Inc. , 2020 , Article)Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ... -
An adaptive cache management approach in ICN with pre-filter queues
Man, Dapeng; Lu, Qi; Wang, Yao; Wu, Yang; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2020 , Article)In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ... -
An adaptive network coding scheme for multipath transmission in cellular-based vehicular networks
Yin, Chenyang; Dong, Ping; Du, Xiaojiang; Zheng, Tao; Zhang, Hongke; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has ... -
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
Kang, Xu; Song, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ... -
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
Xu, Chang; Zhang, Lvhan; Zhu, Liehuang; Zhang, Chuan; Du, Xiaojiang; Guizani, Mohsen; Sharif, Kashif... more authors ... less authors ( Elsevier B.V. , 2020 , Article)Information-Centric Networking (ICN) is a novel future network architecture which in contrast to IP-based networks relies on content and its name. It separates the physical location of data from the discovery and forwarding ... -
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
Lv, Zefang; Wang, Lirong; Guan, Zhitao; Wu, Jun; Du, Xiaojiang; Zhao, Hongtao; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ... -
Analysis of discovery and access procedure for D2D communication in 5G cellular network
Lin, Zhijian; Du, Liang; Gao, Zhibin; Huang, Lianfen; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Device-To-device (D2D) communication, which is defined as a direct communication between two mobile users without traversing the Base Station (BS) or the core network to offload the increasing traffic to the user equipments, ... -
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
Gu, Zhaoquan; Zhu, Yan; Wang, Yuexuan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( John Wiley and Sons Ltd , 2022 , Conference Paper)With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ... -
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
Qiu, Jing; Du, Lei; Chen, Yuanyuan; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ... -
Auditing cloud service level agreement on VM CPU speed
Houlihan, Ryan; Du, Xiaojiang; Tan, Chiu C.; Wu, Jie; Guizani, Mohsen ( IEEE Computer Society , 2014 , Conference Paper)In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ... -
An automated refactoring approach to improve IoT software quality
Zhang, Yang; Shao, Shuai; Ji, Minghan; Qiu, Jing; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( MDPI AG , 2020 , Article)Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ... -
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City
Qiu, Jing; Chai, Yuhan; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)With the rapid development of smart cities, various types of sensors can rapidly collect a large amount of data, and it becomes increasingly important to discover effective knowledge and process information from massive ... -
Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid
Yang, Wenti; Guan, Zhitao; Wu, Longfei; Du, Xiaojiang; Lv, Zefang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the development of information and communication technologies in smart grid, peer-to-peer (P2P) energy trading for distributed energy resources (DER) has achieved an efficient two-way flow of information and power. ... -
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
Shen, Meng; Liu, Huisen; Zhu, Liehuang; Xu, Ke; Yu, Hongbo; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ... -
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
Yu, Yong; Zhao, Yanqi; Li, Yannan; Du, Xiaojiang; Wang, Lianhai; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2020 , Article)Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...