- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Energy Efficient Wireless Sensor Networks
- Software Testing and Debugging Techniques
- Human Mobility and Location-Based Analysis
- Target Tracking and Data Fusion in Sensor Networks
- Wireless Communication Networks Research
- GNSS positioning and interference
- Physical Unclonable Functions (PUFs) and Hardware Security
- Embedded Systems and FPGA Design
- Wireless Sensor Networks and IoT
- Spam and Phishing Detection
- Adversarial Robustness in Machine Learning
- Text and Document Classification Technologies
- Anomaly Detection Techniques and Applications
- Wireless Body Area Networks
- Software Engineering Research
- IoT-based Smart Home Systems
- RFID technology advancements
- Complexity and Algorithms in Graphs
Shanghai University
2024
Qilu University of Technology
2022-2023
Shandong Academy of Sciences
2022-2023
Shandong University
2023
Nankai University
2018-2022
Data Assurance and Communication Security
2020-2022
Xi'an University of Technology
2018
Qingdao University of Science and Technology
2014-2017
Fuzzing is an effective method to find software bugs and vulnerabilities. One of the most useful techniques coverage-guided fuzzing, whose key element tracing code coverage information. Existing fuzzers generally use number basic blocks or edges explored measure coverage. Path-coverage can provide more accurate information than block edge However, paths grows exponentially as size a program increases. It almost impossible trace all real-world application. In this paper, we propose fuzzing...
With the development of various applications blockchain, blockchain-assisted searchable encryption technology has received wide attention as it can eliminate misbehaviours malicious servers through verification and incentive mechanism blockchain. However, most existing solutions update encrypted data by means appending new transactions, which does not scale wastes resources. In this paper, we explore potential redactable blockchain propose a privacy-preserving dynamic framework (DSE-RB), is...
The Internet of Things (IoT) connects everyday devices and generates real-time data that have greatly prompted business life efficiency. integration IoT blockchain has made management storage more trustworthy. However, despite the immutability property contributes a lot to trustable reputation blockchain-based systems, from processing perspective, it is desired achieve skillful secure rewriting for scenarios such as device sharing. Existing solutions usually rely on centralized modifiers...
Dynamic searchable encryption, which allows clients to outsource their encrypted data cloud servers and retain the ability query update data, has received wide attention. In setting, it is essential ensure that a server infers as little possible about content of outsourced queries processes. this article, we propose forward backward secure encryption scheme on bipartite graphs (FBSSE-BG) offers strongest level security. particular, introduce notion counter construct new bi-directional index...
Network slicing in 5G and the future 6G networks will enable creation of multiple virtualized on a shared physical infrastructure. This innovative approach enables provision tailored to accommodate specific business types or industry users, thus delivering more customized efficient services. However, memory cache network introduce security vulnerabilities that have yet be fully addressed. In this paper, we reinforcement learning-based side-channel attack framework specifically designed for...
With the rapid development of new generation information technologies, including cloud computing, 5G, and Internet Things, data outsourcing storage in has brought great convenience to or access anytime anywhere. Due separation ownership management outsourced stored data, it faces security risks, loss personal privacy disclosure. The third-party audit operational behavior by logs is often employed strengthen data. However, some breach incidents recent years show that third parties who may...
An Iteration Strong Tracking Square-root Cubature Kalman Filter (IST-SCKF) is proposed and applied to the autonomous optical navigation system which has problem of non-linear for state equation observation spacecraft cruise phase, orbit was determined real-time. The algorithm introduces method iterative updating. In update recollection sampling points performed by using estimated value square root factor. Furthermore, suboptimal fading factor in strong tracking introduced into SCKF...
As a short-range wireless communication protocol technology, ZigBee has been widely used in industry, agriculture and other fields. An efficient gateway for IoT (Internet of things)between Ethernet based on STM32 is proposed this paper. The system hardware was composed STM32F407, coordinator acquisition module. software established under uVersion Keil5 environment the user interface built by C HTML, which realizes data visualization port serial port. In order to capture relevant from module,...
In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. the card, firewall, device, hard-disk protection and restoration, encryption machine other products are integrated. According to practical needs, function extended reduced.
To ensure the security of data, more and users encrypt data for storage, which makes high-efficiency ciphertext search problem in context cloud storage a research hotspot. Existing solutions still suffer from many vexatious problems, such as need to maintain complex index structures unsatisfactory application homomorphic schemes. solve above this paper proposes multiuser scheme based on blockchain SGX. Our uses SGX protect keywords privacy complete decryption does not pregenerated indexes or...