Hao Xu

ORCID: 0000-0001-7237-7905
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Technology and Security Systems
  • Distributed systems and fault tolerance
  • Smart Grid and Power Systems
  • COVID-19 Digital Contact Tracing
  • Mobile Ad Hoc Networks
  • Privacy, Security, and Data Protection
  • Advanced Wireless Communication Technologies
  • Peer-to-Peer Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Anomaly Detection Techniques and Applications
  • Smart Grid Security and Resilience
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Software-Defined Networks and 5G
  • Power Systems and Renewable Energy
  • Age of Information Optimization
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Caching and Content Delivery

State Grid Corporation of China (China)
2019-2025

University of Nevada, Reno
2016-2024

University of Glasgow
2020-2024

Tongji University
2024

Huawei Technologies (United Kingdom)
2022-2023

China Three Gorges University
2014-2021

Beijing Institute of Technology
2019-2020

Sichuan University
2020

Philadelphia University
2014

University of Pennsylvania
2014

Practical Byzantine Fault Tolerance (PBFT) consensus mechanism shows a great potential to break the performance bottleneck of Proof-of-Work (PoW)-based blockchain systems, which typically support only dozens transactions per second and require minutes hours for transaction confirmation. However, due frequent inter-node communications, PBFT has poor node scalability thus it is adopted in small networks. To enable large systems such as massive Internet Things (IoT) ecosystems blockchain, this...

10.1109/tpds.2020.3042392 article EN IEEE Transactions on Parallel and Distributed Systems 2020-12-03

The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due nature tracing, public concern on privacy issues been a bottleneck existing solutions, which is significantly affecting uptake across globe. In this paper, we present blockchain-enabled privacy-preserving scheme: BeepTrace, where propose adopt blockchain bridging user/patient and authorized solvers...

10.1109/jiot.2020.3025953 article EN IEEE Internet of Things Journal 2020-09-22

The sixth-generation (6G) network must provide better performance than previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, higher reliability, sub-1 ​ms latency ubiquitous connection for Internet Everything (IoE). However, with scarcity spectrum resources, efficient resource management sharing are crucial achieving all these ambitious requirements. One possible technology achieve this is blockchain. Because its...

10.1016/j.dcan.2020.06.002 article EN cc-by-nc-nd Digital Communications and Networks 2020-07-15

Blockchain shows great potential to be applied in wireless IoT ecosystems for establishing the trust and consensus mechanisms without central authority's involvement. Based on RAFT mechanism, this letter investigates security performance of blockchain networks presence malicious jamming. We first map model transaction as a network composed uplink downlink transmissions by assuming follower nodes' position Poisson Point Process (PPP) with selected leader location. The probability achieving...

10.1109/lwc.2020.2971469 article EN cc-by IEEE Wireless Communications Letters 2020-02-04

Blockchain is built on a peer-to-peer network that relies frequent communications among distributively located nodes. In particular, the consensus mechanisms (CMs), which play pivotal role in blockchain, are communication resource-demanding and largely determine blockchain security bounds (i.e., fault tolerances) other key performance metrics such as transaction throughput, latency scalability. Most systems designed stable wired running advanced devices under assumption of sufficient...

10.1109/mnet.101.2100208 article EN IEEE Network 2021-09-15

Metaverse depicts a vista of constructing virtual environment parallel to the real world so people can communicate with others and objects through digital entities. In world, communication relies on identities addresses that are recognized by authorities, no matter link is established via post, email, mobile phone, or landline. Metaverse, however, different from which requires single identity belongs individual. This be an encrypted address in metaverse but one trace verify it. order achieve...

10.1109/iccworkshops53468.2022.9814538 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2022-05-16

Due to the number of confirmed cases and casualties new COVID-19 virus diminishing day after day, several countries around world are discussing how return normal way life. In order keep spread disease under control avoid a second wave infection, one alternative being considered is utilization contact tracing. However, despite alternatives available, tracing still faces issues in terms maintaining user privacy security, making its mass adoption quite difficult. Based on that, novel framework...

10.1109/iotm.0001.2000078 article EN IEEE Internet of Things Magazine 2020-09-01

Achieving ubiquitous ultra-reliable low latency consensus in centralized wireless communication systems can be costly and hard to scale up. The mechanism, which has been widely utilized distributed systems, provide fault tolerance the critical consensus, even though individual link reliability is relatively low. In this article, a used Raft, introduced Industrial Internet of Things (IIoT) achieve where performance terms nodes number transmission investigated. We propose new concept,...

10.1109/lcomm.2020.3021367 article EN cc-by IEEE Communications Letters 2020-09-02

Web3 brings an emerging outlook for the value of decentralization, boosting decentralized infrastructure. People can benefit from Web3, facilitated by advances in distributed ledger technology, to read, write and own web content, services applications more freely without revealing their real identities. Although features merits have been widely discussed, network architecture how achieve complete decentralization considering law compliance are still unclear. Here, we propose a perspective...

10.1109/mcom.005.2200481 article EN IEEE Communications Magazine 2023-06-05

The increasing integration of renewable energy sources (RESs) introduces significant uncertainties in both generation and demand, presenting critical challenges to the convergence, feasibility, real-time performance optimal power flow (OPF). To address these challenges, a multi-agent deep reinforcement learning (DRL) model is proposed solve OPF while ensuring constraints are satisfied rapidly. A heterogeneous proximal policy optimization (H-MAPPO) DRL algorithm introduced for multi-area...

10.3390/en18071809 article EN cc-by Energies 2025-04-03

As 6G networks evolve towards a synergistic system of Communication, Sensing, and Computing, Radio Access Networks become more distributed, necessitating robust end-to-end authentication. We propose Blockchain-enabled Networks, novel decentralized RAN architecture enhancing security, privacy, efficiency in authentication processes. BE-RAN leverages distributed ledger technology to establish trust, offering user-centric identity management, enabling mutual authentication, facilitating...

10.48550/arxiv.2101.10856 preprint EN other-oa arXiv (Cornell University) 2021-01-01

With the popular use of IoT devices, edge computing has been widely applied in Internet things (IoT) and regarded as a promising solution for its wide distribution, decentralization, low latency. At same time, response to massive data intelligent requirements various applications IoT, artificial intelligence (AI) technology also achieved rapid development. As result, (EI) Things attracted widespread attention. Driven by requirement that making full data, machine learning (ML) models trained...

10.1109/access.2021.3051945 article EN cc-by IEEE Access 2021-01-01

Connected critical autonomous systems (C-CASs) are envisioned to significantly change our life and work styles through emerging vertical applications, such as vehicles cooperative robots. However, the scale of connected nodes continues grow, their heterogeneity cybersecurity threats more eminent, conventional centralized communications decision-making methodology reaching limit. This article is first exploration a trustworthy fault-tolerant framework for C-CAS achieving hyperreliable global...

10.1109/jiot.2022.3229746 article EN IEEE Internet of Things Journal 2022-12-16

In this paper, the security problem for mobile satellite communication networks (MSNET) has been investigated. With rapidly growth of needs, systems represent a significant solution to provide high-quality services users in under-populated regions, emergency areas, on planes, trains and ships. However, lacking an effective framework secure seriously limited practicality services. Therefore, new have developed paper address challenges network. Firstly, formulated as delay-tolerance network...

10.1109/sahcn.2019.8824889 article EN 2019-06-01

Recent data leak scandals, together with the under-utilization of collected (estimated that around 90% never leaves a device’s local storage), limits applicability and potential novel driven applications. Thus, ways to treat data, in which users are guaranteed control, usability, privacy over their generated needed. In this paper we propose privacy-preserving blockchain framework for sharing marketplace. The proposed allows (such as sensors devices) generate store it external servers, while...

10.1145/3573894 article EN Deleted Journal 2022-12-06

Due to the explosion of mobile users and ever-increasing heterogeneity scale wireless networks, traditional communication protocols optimizing methods can not satisfy future network (FWN) requirements. As promising technologies, artificial intelligence (AI) blockchain are deemed as solution for FWN. AI, famous its big data processing ability, will enable FWN self-update itself better adapt dynamic condition. Blockchain, a distributed ledger, guarantee integrity, security, privacy. In this...

10.1145/3644369 article EN Deleted Journal 2024-03-01

Most of flooding algorithm recent Ad Hoc multicast routing protocols are suitable under specific networks conditions. If the condition changes like increasing number source nodes and or having higher node speed more traffic loads, they will not work well. To provide support for a wide range operational condition, we propose new protocol (CBSRP) that integrates effectiveness scheme efficiency mesh scheme. The constructs metric stability selects stable path with help entropy to reduce route...

10.1109/euc.2008.50 article EN 2008-12-01

The design of sharding aims to solve the scalability challenge in a blockchain network. Typically, by splitting whole network into smaller shards, transaction throughput can be significantly improved. However, distributing fewer attesting nodes for transactions shard may cause higher security risks. This paper analyzes level verification different types shards and transactions. analyzed result indicates that size validating number influence shards. And random distribution reduce such improve...

10.1109/pimrc50174.2021.9569351 article EN 2021-09-13

Future data communication networks show three emerging trends: increasing size of networks, traffic volumes and dynamic network topologies. Efficient management solutions are required that scalable, can cope with large, increasing, provide decentralised adaptive routing strategies the dynamics topology. Routing an important aspect as they have a significant influence on overall performance. This paper introduces preliminary studies for FUNNet, new algorithm inspired by kingdom Fungi. Fungi...

10.1109/ctrq.2009.23 article EN 2009-07-01

The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such Secure BGP (S-BGP). In this paper, we develop a sound program logic for SANDLog-a declarative specification language protocols verifying properties these protocols. We prove invariant SANDLog programs that run in an adversarial environment. As step towards automated verification, implement...

10.2168/lmcs-11(4:19)2015 article EN cc-by Logical Methods in Computer Science 2015-12-29

Since the coronavirus disease 19 (COVID-19) outbreak, epidemiological analysis has raised a strong requirement for more effective and accurate contact tracing solution. However, existing solutions either lacked evaluation of proximity or features used were susceptible to certain negative environmental factors (e.g., body shielding). In this article, we propose novel distance estimation algorithm based on machine learning tracing: DISTERNING, where leverage algorithms including Learning...

10.1109/jsac.2022.3214277 article EN IEEE Journal on Selected Areas in Communications 2022-10-14

Blockchain has the potential to reform architecture of cyberspace and transform storage, circulation exchange information through decentralization, transparency de-identification. Meaning that ordinary participants can become traders, miners, retailers, customers simultaneously, breaking barriers reducing gap between in community, contributing futuristic metaverse with an open progressive equal ideology. Such transformation empowered by blockchain also profoundly impacts our methodological...

10.2139/ssrn.4144586 article EN SSRN Electronic Journal 2022-01-01
Coming Soon ...