Anfeng Liu

ORCID: 0000-0001-5190-4761
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Security in Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Mobile Crowdsensing and Crowdsourcing
  • Mobile Ad Hoc Networks
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • UAV Applications and Optimization
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Indoor and Outdoor Localization Technologies
  • Human Mobility and Location-Based Analysis
  • Age of Information Optimization
  • Cloud Computing and Resource Management
  • Caching and Content Delivery
  • Wireless Body Area Networks
  • Cloud Data Security Solutions
  • Software-Defined Networks and 5G
  • Distributed and Parallel Computing Systems
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • IoT Networks and Protocols
  • Context-Aware Activity Recognition Systems

Central South University
2016-2025

Nanjing Forestry University
2016-2020

National Dong Hwa University
2004-2019

ORCID
2018-2019

State Key Laboratory of Industrial Control Technology
2018

Zhejiang University of Technology
2018

Muroran Institute of Technology
2018

Anhui Agricultural University
2018

Zhejiang University
2018

Zero to Three
2016

Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they prone to various security attacks, and a black hole attack is type that seriously affects data collection. To conquer challenge, an active detection-based trust routing scheme named ActiveTrust proposed for WSNs. The most important innovation it avoids holes through the creation number detection routes quickly detect obtain...

10.1109/tifs.2016.2570740 article EN IEEE Transactions on Information Forensics and Security 2016-05-20

Mobile edge computing (MEC) is a promising technique to enhance computation capacity at the of mobile networks. The joint problem partial offloading decision, scheduling, and resource allocation for MEC systems challenging issue. In this paper, we investigate scheduling with multiple independent tasks. A power (POSP) in single-user formulated. goal minimize weighted sum execution delay energy consumption while guaranteeing transmission constraint tasks running both device considered. task...

10.1109/jiot.2019.2911455 article EN IEEE Internet of Things Journal 2019-04-16

The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only enhances IoT's capability but also expands scope its applications. However, it exhibits significant security efficiency problems that must be solved. Internal attacks account for a large fraction associated problems, however, traditional strategies are capable addressing these effectively. Moreover, as repeated/similar service requirements become greater in number, IoT-Cloud services is seriously...

10.1109/jiot.2018.2870288 article EN IEEE Internet of Things Journal 2018-09-13

We propose a novel event data collection approach named reliability and multipath encounter routing (RMER) for meeting energy efficiency requirements. The contributions of the RMER are as follows. 1) Fewer monitor nodes selected in hotspot areas that close to Sink, more nonhotspot areas, which can lead increased network lifetime detection reliability. 2) sends Sink by converging routes monitoring into one-path route aggregate data. Thus, consumption be greatly reduced, thereby enabling...

10.1109/jiot.2016.2517405 article EN IEEE Internet of Things Journal 2016-01-12

Network lifetime is a crucial performance metric to evaluate data-gathering wireless sensor networks (WSNs) where battery-powered nodes periodically sense the environment and forward collected samples sink node. In this paper, we propose an analytic model estimate entire network from initialization until it completely disabled, determine boundary of energy hole in WSN. Specifically, theoretically traffic load, consumption, during lifetime. Furthermore, investigate temporal spatial evolution...

10.1109/tii.2015.2411231 article EN IEEE Transactions on Industrial Informatics 2015-03-09

With the advent of 5G, industrial Internet Things has developed rapidly. The sensor-cloud system (SCS) also received widespread attention. In future, a large number integrated sensors that simultaneously collect multifeature data will be added to SCS. However, collected big are not trustworthy due harsh environment sensor. If at bottom networks directly uploaded cloud for processing, query and mining results inaccurate, which seriously affect judgment feedback cloud. traditional method...

10.1109/tii.2019.2938861 article EN IEEE Transactions on Industrial Informatics 2019-09-03

As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data collection, processing, analysis, storage, and sharing on demand. However, compromised or malicious nodes may cause the collected to be invalid even endanger normal operation entire IoT system. Therefore, designing effective mechanism ensure trustworthiness is a critical issue. existing computing models cannot provide direct management nodes. Meanwhile, insufficient computation storage ability makes...

10.1109/tii.2019.2930286 article EN IEEE Transactions on Industrial Informatics 2019-07-23

With the development of Internet Things (IoT) technologies, increasingly many devices are connected, and large amounts data produced. By offloading computing-intensive tasks to edge devices, cloud-based storage technology has become mainstream. However, if end IoT send all their cloud, then privacy becomes a great issue. In this paper, we propose new architecture for synchronization based on fog computing. part computing work servers, can be guaranteed. Moreover, decrease communication cost...

10.1109/jiot.2018.2875915 article EN IEEE Internet of Things Journal 2018-10-16

The development of the Internet Things (IoT) and intelligent vehicles brings a comfortable environment for users. Various emerging vehicular applications using artificial intelligence (AI) technologies are expected to enrich users' daily life. However, how execute computation-intensive on resource-constrained based AI still faces great challenges. In this article, we consider computation offloading problem in mobile-edge computing (MEC), which multiple mobile select nearby MEC servers...

10.1109/jiot.2020.3040768 article EN IEEE Internet of Things Journal 2020-11-26

Mobile edge computing (MEC) is an emergent architecture, which brings computation and storage resources to the of mobile network provides rich services applications near end users. The joint problem task offloading resource allocation in multi-user collaborative (C-MEC) based on Orthogonal Frequency-Division Multiple Access (OFDMA) a challenging issue. In this paper, we investigate decision, collaboration communication C-MEC. delay-sensitive tasks users can be computed locally, offloaded...

10.1109/twc.2021.3108641 article EN IEEE Transactions on Wireless Communications 2021-09-06

The high mobility of Internet Unmanned Aerial Vehicles (IUAVs) has attracted attention in the field data collection. With rapid development Things (IoT), more and are generated by IoT networks. IUAV-aided networks can efficiently collect specific areas, which is great significance disaster relief. In collection task, it necessary to plan flight trajectory for collector—IUAV, so that IUAV efficiently. However, existing research basically only considers efficiency IUAVs, but rarely safety...

10.1109/jiot.2023.3348837 article EN IEEE Internet of Things Journal 2024-01-01

UAVs-enabled Mobile Crowdsensing (UMCS) has gained considerable attention recently, but it is challenging to meet the data collection needs of entire city using only UAV with limited energy. Furthermore, how effectively minimize Age-of-Information (AoI) and ensure quality not been well solved in previous studies. Therefore, this paper proposes a hybrid optimization framework for AoI minimization, which recruits massive distributed workers as main force collection, while acts collaborator...

10.1109/tsc.2025.3528339 article EN IEEE Transactions on Services Computing 2025-01-01

Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not well studied literature for IoT ecosystem. The sinkhole attack is one serious destructive attacks as it easy to launch and difficult defend it. In this paper, a Probe Route based Defense Sinkhole Attack (PRDSA) scheme proposed resist guarantee IoT, which first work that can detect, bypass locate at same time. PRDSA proposes routing mechanism combining far-sink reverse...

10.1109/tnse.2018.2881152 article EN IEEE Transactions on Network Science and Engineering 2018-11-13

The catalytic transfer hydrogenation of furfural to the fuel additives 2-methylfuran (2-MF) and 2-methyltetrahydrofuran (2-MTHF) was investigated over various bimetallic catalysts in presence hydrogen donor 2-propanol. Of all as-prepared catalysts, Cu-Pd showed highest activities towards formation 2-MF 2-MTHF with a total yield up 83.9 % at 220 °C 4 h. By modifying Pd ratios catalyst, or could be obtained selectively as prevailing product. other reaction conditions also had great influence...

10.1002/cssc.201601122 article EN ChemSusChem 2016-11-09

This paper first presents an analysis strategy to meet requirements of a sensing application through trade-offs between the energy consumption (lifetime) and source-to-sink transport delay under reliability constraint wireless sensor networks. A novel data gathering protocol named Broadcasting Combined with Multi-NACK/ACK (BCMN/A) is proposed based on strategy. The BCMN/A achieves efficiency during process both in intra-cluster inter-cluster. In intra-cluster, after each round TDMA...

10.1109/tpds.2015.2388482 article EN IEEE Transactions on Parallel and Distributed Systems 2015-01-23

Billions of devices are connected to the Internet Things (IoT). These generate a large volume data, which poses an enormous burden on conventional networking infrastructures. As effective computing model, edge is collaborative with cloud by moving part intensive computation and storage resources devices, thus optimizing network latency energy consumption. Meanwhile, software-defined networks (SDNs) technology promising in improving quality service (QoS) for complex IoT-driven applications....

10.1109/jiot.2019.2952767 article EN IEEE Internet of Things Journal 2019-11-11

Billions of sensors and devices are connecting to the Internet Thing (IoT) generating massive data which benefit for smart network systems. However, low-cost, secure, efficient collection from billions IoT in city is a huge challenge. Recruiting mobile vehicles (MVs) has been proved be an effective scheme. previous approaches rarely considered security. In this paper, novel Baseline Data based Verifiable Trust Evaluation (BD-VTE) scheme proposed guarantee security at low cost. BD-VTE...

10.1109/tnse.2020.3014455 article EN IEEE Transactions on Network Science and Engineering 2020-08-07

The rapid and convenient travel of people the timely transportation goods depend on correct decision Intelligent Transportation Systems (ITS). Due to decision-making ITS requires a large amount data support, UAV-enabled periodic collection is an effective method. However, due limited resources UAV, UAV cannot directly collect from all storage devices, resulting in unfair collection. Therefore, we propose Speed Control based Fairness Data Collection (USCFDC) scheme. First, since fairness will...

10.1109/tits.2020.3040557 article EN IEEE Transactions on Intelligent Transportation Systems 2020-12-17

Recent advances in microelectromechanical system (MEMS) technology have boosted the deployment of wireless sensor networks (WSNs). Limited by energy storage capability nodes, it is crucial to jointly consider security and efficiency data collection WSNs. The disjoint multipath routing scheme with secret sharing widely recognized as one effective strategies ensure safety information. This kind transforms each packet into several shares enhance transmission. However, many-to-one WSNs, high...

10.1109/tvt.2012.2205284 article EN IEEE Transactions on Vehicular Technology 2012-06-19

Real-time surveillance systems with green wireless sensor networks (WSNs) are vital for maintaining high energy efficiency in many situations. This paper considers a scenario utilizing WSNs to monitor the situation of Internet Things (IoT), which constitute one most crucial sources electricity consumption information and communications technologies (ICT). More specifically, we focus on optimizing cluster structure minimize delay aggregation convergecast WSNs. We first find optimal value...

10.1109/tetc.2018.2844282 article EN IEEE Transactions on Emerging Topics in Computing 2018-06-05
Coming Soon ...