Guowen Wu

ORCID: 0000-0001-6464-0208
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Peer-to-Peer Network Technologies
  • Smart Grid Security and Resilience
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Access Control and Trust
  • Cloud Computing and Resource Management
  • Semantic Web and Ontologies
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Advanced Database Systems and Queries
  • Advanced Vision and Imaging
  • Internet Traffic Analysis and Secure E-voting
  • Face and Expression Recognition
  • Age of Information Optimization
  • Blockchain Technology Applications and Security
  • Machine Learning and ELM
  • Web Data Mining and Analysis
  • IoT Networks and Protocols
  • Fault Detection and Control Systems
  • Chromatography in Natural Products

Donghua University
2009-2024

Communication University of China
2023

Jiangsu Changjiang Electronics Technology (China)
2004

Shanxi University
2003

Fudan University
2002-2003

In the scenario of Industry 4.0, mobile smart devices (SDs) on production lines have to process massive amounts data. These computing tasks sometimes far exceed capability SDs and require lots energy time process. How effectively reduce consumption latency is necessary be solved. To this end, we first propose a software-defined network (SDN)-based edge (MEC) system. MEC system, can offload computation servers decrease processing avoid waste energy. At same time, taking advantage SDN's...

10.1109/jiot.2023.3277541 article EN IEEE Internet of Things Journal 2023-05-18

Industrial Internet of Things (IIoT), which has the capability perception, monitoring, communication and decision–making, already exposed more security problems that are easy to be invaded by malware because many simple edge devices help smart factories, cities homes. In this paper, a two–layer spread–patch model <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">IIPV</i> is proposed based on hybrid patches distribution method according...

10.1109/tifs.2023.3307956 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Opportunistic computation offloading is an effective way to improve the computing performance of Industrial Internet Things (IIoT) devices. However, as more and tasks are being offloaded mobile-edge (MEC) servers for processing, it can lead IIoT privacy security issues, such personal usage habits. In this paper, we aim design a Lyapunov-based privacy-aware framework that defines amount user designs "reduced privacy" mechanism. We first define cumulative each trigger protection mechanism when...

10.1109/jiot.2024.3357110 article EN IEEE Internet of Things Journal 2024-01-22

Hyperspectral data usually consists of hundreds narrow spectral bands and provides more detailed characteristics compared to commonly used multispectral in remote sensing applications. However, highly correlated hyperspectral lead computational complexity, which limits many applications or traditional methods when applied data. The dimensionality reduction becomes one the most important pre-processing steps analysis. Recently, deep reinforcement learning (DRL) has been introduced band...

10.3390/rs15030682 article EN cc-by Remote Sensing 2023-01-23

Industrial Internet of Things (IIoT) has brought a lot convenience for the industrial world to digitization, automation and intelligence, but it inevitably introduces inherent cyber security risks, resulting in an issue that traditional intrusion detection techniques are no longer sufficient IIoT environments. To solve this issue, we propose open-set solution called DC-IDS based on deep reinforcement learning. In solution, recognition problem is modeled as discrete-time Markov decision...

10.1109/jiot.2023.3333903 article EN IEEE Internet of Things Journal 2023-11-20

The Industrial Internet of Things (IIoT) has experienced rapid growth in recent years, with an increasing number interconnected devices, thereby expanding the attack surface. Effectively detecting intrusions is crucial for safeguarding IIoT systems from malicious attacks. However, due to dynamic and complex nature environment, designing intrusion detection strategy that balances accuracy efficiency remains a significant challenge. In this paper, we propose novel based on stochastic games...

10.1109/jiot.2024.3406386 article EN IEEE Internet of Things Journal 2024-05-28

Mobile edge computing (MEC) provides a new development direction for emerging computing-intensive applications because it can improve performance and lower the threshold users to use such applications. However, designing an effective computation offloading strategy determine which tasks should be uninstalled server is still crucial challenge. To this end, we propose offload scheme based on dynamic resource allocation optimize energy consumption in MEC systems. We further formulate as...

10.1109/infocomwkshps54753.2022.9798323 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022-05-02

In recent years, the type and quantity of news are growing rapidly, it is not easy for users to find they interested in massive amount news. A recommendation system can score predict candidate news, finally recommend with high scores users. However, existing user models usually only consider users’ long-term interests ignore interests, which affects usage experience. Therefore, this paper introduces gated recurrent unit (GRU) sequence network capture short-term combines characterize While...

10.32604/iasc.2023.039911 article EN cc-by Intelligent Automation & Soft Computing 2023-01-01

The emergence of mobile edge computing (MEC) imposes an unprecedented pressure on privacy protection, although it helps the improvement computation performance including energy consumption and delay by offloading. To this end, we propose a deep reinforcement learning (DRL)-based offloading scheme to optimize jointly protection performance. exposure risk caused history is investigated, analysis metric defined evaluate level. find optimal strategy, algorithm combining actor-critic, off-policy,...

10.1109/infocomwkshps54753.2022.9797993 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022-05-02

A great deal of Web table information exists in cooperative learning activities. The paper presents a new method that extracts from tables documents. Using tabled abstract semantic model to describe complicated and understand the point view semantics, reduces dependence for design difference constructions extraction process. At same time, it utilizes characteristics HTML techniques natural language processing some heuristic rules, thus aids identification items. On above basis, we prototype,...

10.1109/cscwd.2001.942309 article EN 2002-11-13

To evaluate the steady-state availability of heterogeneous edge computing-enabled wireless sensor networks (HECWSNs) with malware infections, we first propose a Stackelberg attack-defence game to predict optimal strategies and intrusion detection systems (IDSs) deployed in nodes (HSNs). Next, present new infection model—heterogeneous susceptible-threatened-active-recovered-dead (HSTARD) based on epidemic theory. Then, considering heterogeneity sink common attack correlation, derive state...

10.1155/2022/4743605 article EN cc-by Mobile Information Systems 2022-04-11
Coming Soon ...