- Advanced Optical Network Technologies
- Optical Network Technologies
- Advanced Photonic Communication Systems
- Cryptography and Data Security
- Security in Wireless Sensor Networks
- Software-Defined Networks and 5G
- Interconnection Networks and Systems
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Geoscience and Mining Technology
- Scheduling and Optimization Algorithms
- Microbial Fuel Cells and Bioremediation
- Control and Dynamics of Mobile Robots
- Transport and Logistics Innovations
- Chaos-based Image/Signal Encryption
- Simulation and Modeling Applications
- Industrial Technology and Control Systems
- Peer-to-Peer Network Technologies
- Optimization and Packing Problems
- Advanced Neural Network Applications
- Semiconductor Lasers and Optical Devices
- Adversarial Robustness in Machine Learning
- Access Control and Trust
Zhengzhou University of Light Industry
2014-2024
Chongqing University of Posts and Telecommunications
2024
Ningxia Academy of Social Sciences
2024
Henan Polytechnic University
2012-2023
University of Science and Technology Beijing
2009-2014
State Key Laboratory of Microbial Technology
2012
Zhengzhou University
2012
Shandong University
2012
Shandong University of Science and Technology
2011
Elastic optical network (EON) is a promising technology for the next generation of transport network. Routing, modulation and spectrum assignment one key issues in EON. In problem, constraints continuity contiguity must be satisfied. this paper, we propose policy named minimizing sum weighted resource reductions (min ΣwΔR) algorithm. The algorithm includes three contributions:1) concept reduction (ΔR) defined to measure variation idle resources path when block assigned connection request,...
The application of intelligent computing in Internet Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more efficient. Secure communication secure resource sharing among terminals are essential. A channel for can be established through group key agreement (GKA), thereby ensuring the security terminals. Taking into account confidentiality level shared resources each terminal, different permissions a GKA protocol is proposed. Compared with previous work,...
Deep neural networks are extremely vulnerable to attacks and threats from adversarial examples. These examples deliberately crafted by attackers can easily fool classification models adding imperceptibly tiny perturbations on clean images. This brings a great challenge image security for deep learning. Therefore, studying designing attack algorithms generating is essential building robust models. Moreover, transferable in that they mislead multiple different classifiers across makes...
Fog computing emerges as a great candidate to mitigate the unsolved problems of cloud computing. Data migration between fog nodes and datacenters is placing huge bandwidth requirements on substrate optical networks. To increase network capacity improve flexibility, broad attention has been given flexible-grid technology. This paper addresses issue how migrate networks from fixed-grid era gradually, due unbearable capital expenditure service stability. First, we model elucidate upgrade...
Wireless sensor networks have some obvious characteristics, such as communication range is limited, computing power limited and energy limited. Group key agreement in this environment requires a cross-cluster, computation overhead are lightweight highly safe group protocol. Aiming at these demands, the paper proposes Self-certified cross-cluster Asymmetric (SC-AGKA). To establish efficient channel among nodes. According to cluster head bridge node realize nodes different same information,...
Security communication and information sharing among mobile devices are important application technologies of the intelligent system (IIS). Because IIS is vulnerable to attacks, so security seriously threatened. Thence, it necessary establish a secure channel for over an opening network. Group key agreement (GKA) can by encryption technology. Due resource-constraints devices, such as weak computing power, small storage capacity, limited range. To address these issues, asymmetric GKA protocol...
Elastic optical networking is a promising technology for the future core networks and advance reservation (AR) applications are rapidly increasing in recent years. Hence, routing, modulation spectrum assignment (RMSA) problem AR requests elastic (EONs) has become an important issue. In this paper we will investigate problem. We introduce metric to measure situation of each available frequency-time block request. The weighted sum four factors, namely resources consumed by (R <sub...
This paper investigates the routing, modulation, and spectrum assignment (RMSA) problem for advance reservation (AR) requests in semi-filterless optical networks (semi-FONs). A link resource-aware (LRA) algorithm consisting of three parts is proposed. First, request scheduling phase, a sorting strategy based on flexible window size starting time schedules AR with respect to time. Next, routing evenly distributes across network resources, thereby avoiding blocking due excessive resource...
The development of the Internet Things has led to great data sharing and interaction, which made security privacy more a concern for users. How ensure safe data, avoid leakage sensitive information, protect users is serious challenge. Access control an important issue trust Things. This paper proposes access scheme based on ciphertext attribute authentication threshold policy, uses identity hidden attributes divides user's permission grade by setting function with attributes. Users obtain...