- Mobile Ad Hoc Networks
- Privacy-Preserving Technologies in Data
- Adversarial Robustness in Machine Learning
- Access Control and Trust
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Advanced Graph Neural Networks
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Complex Network Analysis Techniques
- Wireless Networks and Protocols
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Cooperative Communication and Network Coding
- Carbohydrate Chemistry and Synthesis
- Cloud Computing and Resource Management
- Glycosylation and Glycoproteins Research
- Security and Verification in Computing
- Energy Efficient Wireless Sensor Networks
- Age of Information Optimization
- Mobile Crowdsensing and Crowdsourcing
Ocean University of China
2019-2025
Shandong University
2011-2024
Heilongjiang International University
2024
Jiangsu Maritime Institute
2024
Shenzhen Institutes of Advanced Technology
2023
Qingdao University
2013-2020
Qingdao University of Science and Technology
2016-2020
Qilu University of Technology
2019-2020
Shandong Academy of Sciences
2019-2020
State Key Laboratory of Microbial Technology
2019
The problem of routing security in vehicular ad hoc networks has become a major concern for researchers. Compared with cryptography-based solutions, trust-based solutions are considered to be more acceptable as promising approach, which mainly define two operations: trust computing and application. In this paper we first study properties construct novel inference model, where attributes named subjective recommendation trust, selected quantify the level specific vehicle. SCGM(1,1)-weighted...
The concept of social networking is integrated into Internet things (IoT) to socialize smart objects by mimicking human behaviors, leading a new paradigm Social Things (SIoT). A crucial problem that needs be solved how establish reliable relationships autonomously among objects, i.e., building trust. This paper focuses on exploring an efficient context-aware trustworthiness inference framework address this issue. Based the sociological and psychological principles trust generation between...
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple wireless nodes. Due to the openness in topology and absence of centralized administration management, MANET vulnerable attacks from malicious In order reduce hazards these nodes, we incorporate concept trust into MANET, build subjective management model with decision factors based on analytic hierarchy process (AHP) theory fuzzy logic rules prediction method - AFStrust. We consider factors, including direct...
Currently, the conventional mode of power data transaction is mediated by Web pages. Nevertheless, there are challenging issues such as privacy protection, security and reliability in trading. In this paper, we present a novel secure trading scheme (SPDTS). Firstly, zero-knowledge proof employed to achieve availability consistency without revealing data. Then, SPDTS takes full advantage dispersibility immutability blockchain ensure transactions. To keep process efficient, processing tasks...
There is an inherent reliance on collaboration among the participants of mobile ad hoc networks in order to achieve fixed functionalities. However, they are susceptible destruction malicious attacks or denial cooperation. Therefore, it becomes obvious that security issue urgently needed be addressed. Over last few years, many trust-considered countermeasures have been proposed. The design trust quantification methods key these countermeasures. In this study, we abstract a novel light-weight...
As one of the key technologies to enable internet things (IoT), cloud computing plays a significant role in providing huge and storage facilities for large-scale data. Though brings great advantages, new issues emerge, such as data security breach privacy disclosure. In this paper, we introduce novel secure privacy-preserving outsourcing scheme (hereafter referred SPOCS) tackle issue. SPOCS, effective use Intel SGX, trusted execution environment (TEE), ensures confidence integrity sensitive...
Digital Twins (DTs) can generate digital replicas for mobile networks (MNs) that accurately reflect the state of MN. Machine learning (ML) models trained in DT MN (DTMN) virtual environments be more robustly implemented This avoid training difficulties and runtime errors caused by instability multiple failures. However, when using data from various devices system, DTs must prioritize privacy. Federated (FL) enables construction without leaving to protect DTMN Nevertheless, FL's privacy...
Edge computing extends computational capabilities to the physical edge of world, providing faster and more efficient responses consumer devices such as smart home appliances, smartphones, wearable devices. However, it raises a critical question: How can we efficiently manage time-sensitive computationally intensive tasks meet device performance needs? To address this, propose cost-driven strategy for computation offloading based on reinforcement learning Firstly, convert problem minimizing...