Wei Shao

ORCID: 0000-0001-5689-5817
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Software Testing and Debugging Techniques
  • Human Mobility and Location-Based Analysis
  • Target Tracking and Data Fusion in Sensor Networks
  • Wireless Communication Networks Research
  • GNSS positioning and interference
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Embedded Systems and FPGA Design
  • Wireless Sensor Networks and IoT
  • Spam and Phishing Detection
  • Adversarial Robustness in Machine Learning
  • Text and Document Classification Technologies
  • Anomaly Detection Techniques and Applications
  • Wireless Body Area Networks
  • Software Engineering Research
  • IoT-based Smart Home Systems
  • RFID technology advancements
  • Complexity and Algorithms in Graphs

Shanghai University
2024

Qilu University of Technology
2022-2023

Shandong Academy of Sciences
2022-2023

Shandong University
2023

Nankai University
2018-2022

Data Assurance and Communication Security
2020-2022

Xi'an University of Technology
2018

Qingdao University of Science and Technology
2014-2017

Fuzzing is an effective method to find software bugs and vulnerabilities. One of the most useful techniques coverage-guided fuzzing, whose key element tracing code coverage information. Existing fuzzers generally use number basic blocks or edges explored measure coverage. Path-coverage can provide more accurate information than block edge However, paths grows exponentially as size a program increases. It almost impossible trace all real-world application. In this paper, we propose fuzzing...

10.1145/3320269.3384736 article EN 2020-10-05

With the development of various applications blockchain, blockchain-assisted searchable encryption technology has received wide attention as it can eliminate misbehaviours malicious servers through verification and incentive mechanism blockchain. However, most existing solutions update encrypted data by means appending new transactions, which does not scale wastes resources. In this paper, we explore potential redactable blockchain propose a privacy-preserving dynamic framework (DSE-RB), is...

10.1109/tcc.2022.3228867 article EN IEEE Transactions on Cloud Computing 2022-12-15

The Internet of Things (IoT) connects everyday devices and generates real-time data that have greatly prompted business life efficiency. integration IoT blockchain has made management storage more trustworthy. However, despite the immutability property contributes a lot to trustable reputation blockchain-based systems, from processing perspective, it is desired achieve skillful secure rewriting for scenarios such as device sharing. Existing solutions usually rely on centralized modifiers...

10.1109/jiot.2023.3283092 article EN IEEE Internet of Things Journal 2023-06-19

Dynamic searchable encryption, which allows clients to outsource their encrypted data cloud servers and retain the ability query update data, has received wide attention. In setting, it is essential ensure that a server infers as little possible about content of outsourced queries processes. this article, we propose forward backward secure encryption scheme on bipartite graphs (FBSSE-BG) offers strongest level security. particular, introduce notion counter construct new bi-directional index...

10.1109/tcc.2021.3131176 article EN IEEE Transactions on Cloud Computing 2021-11-30

Network slicing in 5G and the future 6G networks will enable creation of multiple virtualized on a shared physical infrastructure. This innovative approach enables provision tailored to accommodate specific business types or industry users, thus delivering more customized efficient services. However, memory cache network introduce security vulnerabilities that have yet be fully addressed. In this paper, we reinforcement learning-based side-channel attack framework specifically designed for...

10.48550/arxiv.2409.11258 preprint EN arXiv (Cornell University) 2024-09-17

With the rapid development of new generation information technologies, including cloud computing, 5G, and Internet Things, data outsourcing storage in has brought great convenience to or access anytime anywhere. Due separation ownership management outsourced stored data, it faces security risks, loss personal privacy disclosure. The third-party audit operational behavior by logs is often employed strengthen data. However, some breach incidents recent years show that third parties who may...

10.1109/ispa-bdcloud-socialcom-sustaincom59178.2023.00091 article EN 2023-12-21

An Iteration Strong Tracking Square-root Cubature Kalman Filter (IST-SCKF) is proposed and applied to the autonomous optical navigation system which has problem of non-linear for state equation observation spacecraft cruise phase, orbit was determined real-time. The algorithm introduces method iterative updating. In update recollection sampling points performed by using estimated value square root factor. Furthermore, suboptimal fading factor in strong tracking introduced into SCKF...

10.23919/chicc.2017.8029014 article EN 2017-07-01

As a short-range wireless communication protocol technology, ZigBee has been widely used in industry, agriculture and other fields. An efficient gateway for IoT (Internet of things)between Ethernet based on STM32 is proposed this paper. The system hardware was composed STM32F407, coordinator acquisition module. software established under uVersion Keil5 environment the user interface built by C HTML, which realizes data visualization port serial port. In order to capture relevant from module,...

10.1109/icsgea.2018.00106 article EN 2018 International Conference on Smart Grid and Electrical Automation (ICSGEA) 2018-06-01

In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. the card, firewall, device, hard-disk protection and restoration, encryption machine other products are integrated. According to practical needs, function extended reduced.

10.4028/www.scientific.net/amm.532.235 article EN Applied Mechanics and Materials 2014-02-01

To ensure the security of data, more and users encrypt data for storage, which makes high-efficiency ciphertext search problem in context cloud storage a research hotspot. Existing solutions still suffer from many vexatious problems, such as need to maintain complex index structures unsatisfactory application homomorphic schemes. solve above this paper proposes multiuser scheme based on blockchain SGX. Our uses SGX protect keywords privacy complete decryption does not pregenerated indexes or...

10.1155/2022/9062615 article EN cc-by Security and Communication Networks 2022-09-23
Coming Soon ...