Junling Yuan

ORCID: 0000-0001-6734-9256
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Optical Network Technologies
  • Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Software-Defined Networks and 5G
  • Interconnection Networks and Systems
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Geoscience and Mining Technology
  • Scheduling and Optimization Algorithms
  • Microbial Fuel Cells and Bioremediation
  • Control and Dynamics of Mobile Robots
  • Transport and Logistics Innovations
  • Chaos-based Image/Signal Encryption
  • Simulation and Modeling Applications
  • Industrial Technology and Control Systems
  • Peer-to-Peer Network Technologies
  • Optimization and Packing Problems
  • Advanced Neural Network Applications
  • Semiconductor Lasers and Optical Devices
  • Adversarial Robustness in Machine Learning
  • Access Control and Trust

Zhengzhou University of Light Industry
2014-2024

Chongqing University of Posts and Telecommunications
2024

Ningxia Academy of Social Sciences
2024

Henan Polytechnic University
2012-2023

University of Science and Technology Beijing
2009-2014

State Key Laboratory of Microbial Technology
2012

Zhengzhou University
2012

Shandong University
2012

Shandong University of Science and Technology
2011

Elastic optical network (EON) is a promising technology for the next generation of transport network. Routing, modulation and spectrum assignment one key issues in EON. In problem, constraints continuity contiguity must be satisfied. this paper, we propose policy named minimizing sum weighted resource reductions (min ΣwΔR) algorithm. The algorithm includes three contributions:1) concept reduction (ΔR) defined to measure variation idle resources path when block assigned connection request,...

10.1109/jlt.2019.2935506 article EN Journal of Lightwave Technology 2019-08-22

The application of intelligent computing in Internet Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more efficient. Secure communication secure resource sharing among terminals are essential. A channel for can be established through group key agreement (GKA), thereby ensuring the security terminals. Taking into account confidentiality level shared resources each terminal, different permissions a GKA protocol is proposed. Compared with previous work,...

10.1002/int.22644 article EN International Journal of Intelligent Systems 2021-08-31

Deep neural networks are extremely vulnerable to attacks and threats from adversarial examples. These examples deliberately crafted by attackers can easily fool classification models adding imperceptibly tiny perturbations on clean images. This brings a great challenge image security for deep learning. Therefore, studying designing attack algorithms generating is essential building robust models. Moreover, transferable in that they mislead multiple different classifiers across makes...

10.3390/electronics12061464 article EN Electronics 2023-03-20

Fog computing emerges as a great candidate to mitigate the unsolved problems of cloud computing. Data migration between fog nodes and datacenters is placing huge bandwidth requirements on substrate optical networks. To increase network capacity improve flexibility, broad attention has been given flexible-grid technology. This paper addresses issue how migrate networks from fixed-grid era gradually, due unbearable capital expenditure service stability. First, we model elucidate upgrade...

10.1109/access.2020.2979895 article EN cc-by IEEE Access 2020-01-01

Wireless sensor networks have some obvious characteristics, such as communication range is limited, computing power limited and energy limited. Group key agreement in this environment requires a cross-cluster, computation overhead are lightweight highly safe group protocol. Aiming at these demands, the paper proposes Self-certified cross-cluster Asymmetric (SC-AGKA). To establish efficient channel among nodes. According to cluster head bridge node realize nodes different same information,...

10.1049/cje.2018.05.010 article EN Chinese Journal of Electronics 2019-03-01

Security communication and information sharing among mobile devices are important application technologies of the intelligent system (IIS). Because IIS is vulnerable to attacks, so security seriously threatened. Thence, it necessary establish a secure channel for over an opening network. Group key agreement (GKA) can by encryption technology. Due resource-constraints devices, such as weak computing power, small storage capacity, limited range. To address these issues, asymmetric GKA protocol...

10.1002/int.22544 article EN International Journal of Intelligent Systems 2021-06-22

Elastic optical networking is a promising technology for the future core networks and advance reservation (AR) applications are rapidly increasing in recent years. Hence, routing, modulation spectrum assignment (RMSA) problem AR requests elastic (EONs) has become an important issue. In this paper we will investigate problem. We introduce metric to measure situation of each available frequency-time block request. The weighted sum four factors, namely resources consumed by (R <sub...

10.1109/access.2019.2954478 article EN cc-by IEEE Access 2019-01-01

This paper investigates the routing, modulation, and spectrum assignment (RMSA) problem for advance reservation (AR) requests in semi-filterless optical networks (semi-FONs). A link resource-aware (LRA) algorithm consisting of three parts is proposed. First, request scheduling phase, a sorting strategy based on flexible window size starting time schedules AR with respect to time. Next, routing evenly distributes across network resources, thereby avoiding blocking due excessive resource...

10.3390/photonics10091046 article EN cc-by Photonics 2023-09-14

The development of the Internet Things has led to great data sharing and interaction, which made security privacy more a concern for users. How ensure safe data, avoid leakage sensitive information, protect users is serious challenge. Access control an important issue trust Things. This paper proposes access scheme based on ciphertext attribute authentication threshold policy, uses identity hidden attributes divides user's permission grade by setting function with attributes. Users obtain...

10.3390/s19235237 article EN cc-by Sensors 2019-11-28
Coming Soon ...