Browsing by Author "n 83175105 "
Now showing items 1-11 of 11
-
An enhanced public key infrastructure to secure smart grid wireless communication networks
He, Daojing; Chan, Sammy; Zhang, Yan; Guizani, Mohsen; Chen, Chun; Bu, Jiajun... more authors ... less authors (2014 , Article)It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ... -
Battery status-aware authentication scheme for V2G networks in smart grid
Liu, Hong; Ning, Huansheng; Zhang, Yan; Guizani, Mohsen (2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
Distributed resource allocation in cloud-based wireless multimedia social networks
Nan, Guofang; Mao, Zhifei; Li, Minqiang; Zhang, Yan; Gjessing, Stein; Wang, Honggang; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ... -
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
Zhang, Xing; Zhang, Yan; Yu, Rong; Wang, Wenbo; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article Review)The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ... -
Logic programs with ordered disjunction: First-order semantics and expressiveness
Asuncion, Vernon; Zhang, Yan; Zhang, Heng ( AAAI Publications , 2014 , Conference Paper)Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ... -
Role updating in information systems using model checking
Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Secure service provision in smart grid communications
He, Daojing; Chen, Chun; Bu, Jiajun; Chan, Sammy; Zhang, Yan; Guizani, Mohsen... more authors ... less authors (2012 , Article)The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ... -
Securing cognitive radio networks against primary user emulation attacks
Yu, Rong; Zhang, Yan; Liu, Yi; Gjessing, Stein; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ... -
Securing vehicle-to-grid communications in the smart grid
Zhang, Yan; Gjessing, Stein; Liu, Hong; Ning, Huansheng; Yang, Laurence T.; Guizani, Mohsen... more authors ... less authors (2013 , Article)Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ... -
Security and privacy in emerging networks: Part 1 [Guest Editorial]
Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; Zhang, Yan... more authors ... less authors ( IEEE , 2015 , Article)With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ... -
Security and privacy in emerging networks: Part II [Guest Editorial]
Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel J. P.; Chan, Sammy; Zhang, Yan... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...