Jinpeng Wang

ORCID: 0000-0001-5764-9589
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Service-Oriented Architecture and Web Services
  • Mobile Ad Hoc Networks
  • Semantic Web and Ontologies
  • Energy Harvesting in Wireless Networks
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Database Systems and Queries
  • Advancements in Solid Oxide Fuel Cells
  • Electronic and Structural Properties of Oxides
  • Blockchain Technology Applications and Security
  • Wireless Communication Networks Research
  • Magnetic and transport properties of perovskites and related materials
  • Cryptography and Data Security
  • Construction Project Management and Performance
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Satellite Communication Systems
  • Advanced Text Analysis Techniques
  • Educational Technology and Assessment
  • Advanced oxidation water treatment
  • Natural Language Processing Techniques
  • Evacuation and Crowd Dynamics
  • Diverse Interdisciplinary Research Innovations

Wuhan University of Technology
2025

Shandong Academy of Sciences
2021-2023

Qilu University of Technology
2021-2023

Harbin Institute of Technology
2023

Kailuan General Hospital
2022

University of Manchester
2022

National Supercomputing Center in Wuxi
2021

Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes
2017-2019

Centre National de la Recherche Scientifique
2017-2019

Université Clermont Auvergne
2017-2019

Blockchain, which has a distributed structure, been widely used in many areas. Especially the area of smart cities, blockchain technology shows great potential. The security issues affect construction cities to varying degrees. With rapid development quantum computation, elliptic curves cryptosystems are not secure enough. This paper presents system based on lattice cipher, can resist attack computation. most challenge is that size public keys and signatures by typically very large. As...

10.1155/2021/6671648 article EN cc-by Security and Communication Networks 2021-03-03

Weizheng Chen, Jinpeng Wang, Yan Zhang, Hongfei Yan, Xiaoming Li. Proceedings of the 53rd Annual Meeting Association for Computational Linguistics and 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). 2015.

10.3115/v1/p15-2080 article EN cc-by 2015-01-01

The Ba 0.95 La 0.05 Fe 0.9 Nb 0.1 O 3− δ electrode provides a unique combination of good tolerance for H 2 -reduction and low polarization resistances the oxygen reduction reaction hydrogen oxidation reaction.

10.1039/d1se01291f article EN Sustainable Energy & Fuels 2021-01-01

Integrating data from multiple heterogeneous sources entail dealing with different models, schemas and query languages. The burgeoning Semantic Web has provided several new methods for integration. This paper focuses on integration of relational database XML data. To solve the problem we propose an ontology-based approach. A semantic infrastructure is presented. In this infrastructure, ontology used as mediated schema representation source semantics. model schemas, a describing method based...

10.4304/jsw.4.8.843-850 article EN Journal of Software 2009-10-01

The Internet of Things (IoT) connects everyday devices and generates real-time data that have greatly prompted business life efficiency. integration IoT blockchain has made management storage more trustworthy. However, despite the immutability property contributes a lot to trustable reputation blockchain-based systems, from processing perspective, it is desired achieve skillful secure rewriting for scenarios such as device sharing. Existing solutions usually rely on centralized modifiers...

10.1109/jiot.2023.3283092 article EN IEEE Internet of Things Journal 2023-06-19

The emergence of the semantic Web has given rise to several researches on integration heterogeneous relational databases using ontology. This paper studies query rewriting problem in such an scenario. RDFpsilas graph model lends itself well expressing data. To schema, we propose a data source describing method based SPARQL patterns and give some principles for mapping between schema RDF is further discussed algorithm presented so that can access without converting into physical triples.

10.1109/icis.2009.11 article EN 2009-01-01

In recent years, Low Power and Lossy Networks (LLNs) have attracted the attention of researchers. They typically operate with strict resource constraints in communication, computation, memory, energy. Routing Protocol for Low-Power (RPL) is an ad-hoc Distance Vector routing protocol LLNs that adapts IPv6 runs on top IEEE 802.15.4 standard. Although RPL was originally designed static topologies, many applications mobility support has been a major requirement LLNs. This paper focuses...

10.23919/pemwn.2017.8308027 preprint EN 2017-11-01

Data integration is the main problem encountered by applications that need to query across multiple autonomous and heterogeneous data sources. This paper addresses this using logic-based approach. We present a semantic infrastructure for relational data. In infrastructure, ontology used as mediated schema. The formal semantics of SPARQL defined according W3C candidate recommendation translation algorithm from datalog provided. A rewriting based on also provided integration.

10.1109/iita.2008.72 article EN 2008-12-01

10.1007/s12243-018-0689-5 article EN Annals of Telecommunications 2019-01-02

In this paper, we design an efficient deduplication algorithm based on the distributed storage architecture of Ceph. The uses on-line block-level data technology to complete slicing, which neither affects process in Ceph nor alter other interfaces and functions Without relying any central node, maintains characteristics by designing a special hash object store fingerprint, CRUSH judge duplication calculation, instead global search. replaces duplicate with deduplicated objects, their...

10.1109/nas.2019.8834729 article EN 2019-08-01

In recent years, mobility support has become an important requirement in various wireless sensor network (WSN) applications. However, due to the strict resource constraints of power, memory, and processing resources WSNs, routing protocols are mainly designed without considering mobility. Low-Power Lossy Networks (LLNs) a special type WSNs that tolerate data loss. The Routing Protocol for (RPL) is protocol LLNs adapts IPv6 (Internet version 6) runs on top IEEE (Institute Electrical...

10.3390/fi9040086 article EN cc-by Future Internet 2017-11-17

Recently, mobility support has become an important requirement in various Wireless Sensor Networks (WSNs). Low-power and Lossy (LLNs) are a special type of WSNs that tolerate certain degree packet loss. However, due to the strict resource constraints computation, energy, memory LLNs, most routing protocols only static network topologies. Data collection data dissemination two basic traffic modes LLNs. Unlike collection, is less investigated There sorts data-dissemination methods:...

10.3390/fi11010018 article EN cc-by Future Internet 2019-01-15

With the development of supply chain, information-sharing has received great attention recently. At same time, partners in chain improve efficiency through information sharing, but private needs to be protected. We propose a data sharing scheme based on Quorum blockchain, namely Sharingchain. Distribute keys transactions achieve access control information. Access rights can revoked or authorized key management. In addition, public transaction structure is designed transmit encrypted data....

10.1109/imcec51613.2021.9482088 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2021-06-18

Cloud data management has significant benefits for storage and processing. However, it also brings some security concerns, such as the integrity of reliability online verification. To solve this problem, paper proposes a blockchain edge computing based public audit scheme, which is different from traditional third-part auditor common blockchain-based two-party scheme. Specifically, scheme consists owners, servers, cloud service providers. According to privacy data, owner generates...

10.23919/ccc55666.2022.9902871 article EN 2022 41st Chinese Control Conference (CCC) 2022-07-25
Coming Soon ...