Browsing by Author "n 2014181566"
Now showing items 21-40 of 100
-
Cloud database encryption technology based on combinatorial encryption
Chen, Meng; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ... -
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
Chen, Yuzhe; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ... -
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks
Sun, Jianan; Dong, Ping; Du, Xiaojiang; Zheng, Tao; Qin, Yajuan; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the development of communication technologies, vehicular network applications have evolved from basic traffic safety and efficiency applications to information and entertainment applications. The implementation of ... -
A co-design-based reliable low-latency and energy-efficient transmission protocol for uwsns
Wei, Xiaohui; Guo, Hao; Wang, Xingwang; Wang, Xiaonan; Wang, Chu; Guizani, Mohsen; Du, Xiaojiang... more authors ... less authors ( MDPI AG , 2020 , Article)Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. ... -
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach
Shu, Jiangang; Zhou, Lei; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Vehicular Ad hoc Network (VANET) is an enabling technology to provide a variety of convenient services in intelligent transportation systems, and yet vulnerable to various intrusion attacks. Intrusion detection systems ... -
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
Guo, Jie; Song, Bin; Chen, Siqi; Yu, Fei Richard; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ... -
Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations
Lv, Lingling; Zheng, Chan; Zhang, Lei; Shan, Chun; Tian, Zhihong; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ... -
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ... -
A deep learning based static taint analysis approach for IoT software vulnerability location
Niu, Weina; Zhang, Xiaosong; Du, Xiaojiang; Zhao, Lingyuan; Cao, Rong; Guizani, Mohsen... more authors ... less authors ( Elsevier B.V. , 2020 , Article)Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ... -
A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system
Chen, Yuwen; Song, Bin; Zeng, Yuan; Du, Xiaojiang; Guizani, Mohsen ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the ... -
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
Lu, Hui; Jin, Chengjie; Helu, Xiaohan; Du, Xiaojiang; Guizani, Mohsen; Tian, Zhihong... more authors ... less authors ( IEEE Computer Society , 2022 , Article)The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ... -
A design of firewall based on feedback of intrusion detection system in cloud environment
Ma, Xiaoyu; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ... -
A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid
Guan, Zhitao; Lv, Zefang; Sun, Xianwen; Wu, Longfei; Wu, Jun; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( IEEE Computer Society , 2020 , Article)Smart systems, including smart grid (SG) and Internet of Things (IoT), have been playing a critical role in addressing contemporary issues. Taking full advantage of the big data generated by the smart grid can enhance the ... -
A Differentially Private Classification Algorithm with High Utility for Wireless Body Area Networks
Sun, Xianwen; Shi, Lingyun; Wu, Longfei; Guan, Zhitao; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The advancement of the wireless body area networks (WBAN) and sensor technologies allows us to collect a variety of physiological and behavioral data from human body. And appropriate application of machine learning methods ... -
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
Tian, Zhihong; Luo, Chaochao; Qiu, Jing; Du, Xiaojiang; Guizani, Mohsen ( IEEE Computer Society , 2020 , Article)With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ... -
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
Zhang, Yuyang; Dong, Ping; Du, Xiaojiang; Luo, Hongbin; Zhang, Hongke; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ... -
ECBCM: A prestige-based edge computing blockchain security consensus model
Xuan, Shichang; Chen, Zhiyu; Chung, Ilyong; Tan, Haowen; Man, Dapeng; Du, Xiaojiang; Yang, Wu; Guizani, Mohsen... more authors ... less authors ( John Wiley and Sons Inc , 2021 , Article)The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing data processing. To solve this problem, edge computing technology came into being. Because the ... -
Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking
Chi, Kuo; Du, Xiaojiang; Yin, Guisheng; Wu, Jie; Guizani, Mohsen; Han, Qilong; Yang, Yaling... more authors ... less authors ( Elsevier B.V. , 2020 , Article)With the increasingly huge mobile traffic, numerous mobile operators try to seek some ways to alleviate the situation, such as expanding the LTE (Long Term Evolution) system into unlicensed spectrums. However, LTE-U (LTE ... -
An efficient and privacy-preserving energy trading scheme based on blockchain
Lu, Xin; Guan, Zhitao; Zhou, Xiao; Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ... -
An Efficient Network Coding Scheme for Heterogeneous Wireless Networks
Wang, Zongzheng; Dong, Ping; Du, Xiaojiang; Zheng, Tao; Zhang, Hongke; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)As the demand of mobile services for high bandwidth grows, aggregation of various wireless network resources in hybrid communication system becomes a trend. Network coding has been widely studied to solve the packet ...