Hui Xia

ORCID: 0000-0001-7326-5796
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Security in Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Graph Neural Networks
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Complex Network Analysis Techniques
  • Wireless Networks and Protocols
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Carbohydrate Chemistry and Synthesis
  • Cloud Computing and Resource Management
  • Glycosylation and Glycoproteins Research
  • Security and Verification in Computing
  • Energy Efficient Wireless Sensor Networks
  • Age of Information Optimization
  • Mobile Crowdsensing and Crowdsourcing

Ocean University of China
2019-2025

Shandong University
2011-2024

Heilongjiang International University
2024

Jiangsu Maritime Institute
2024

Shenzhen Institutes of Advanced Technology
2023

Qingdao University
2013-2020

Qingdao University of Science and Technology
2016-2020

Qilu University of Technology
2019-2020

Shandong Academy of Sciences
2019-2020

State Key Laboratory of Microbial Technology
2019

The problem of routing security in vehicular ad hoc networks has become a major concern for researchers. Compared with cryptography-based solutions, trust-based solutions are considered to be more acceptable as promising approach, which mainly define two operations: trust computing and application. In this paper we first study properties construct novel inference model, where attributes named subjective recommendation trust, selected quantify the level specific vehicle. SCGM(1,1)-weighted...

10.1109/tvt.2019.2919681 article EN IEEE Transactions on Vehicular Technology 2019-05-29

The concept of social networking is integrated into Internet things (IoT) to socialize smart objects by mimicking human behaviors, leading a new paradigm Social Things (SIoT). A crucial problem that needs be solved how establish reliable relationships autonomously among objects, i.e., building trust. This paper focuses on exploring an efficient context-aware trustworthiness inference framework address this issue. Based the sociological and psychological principles trust generation between...

10.1109/infocom.2019.8737491 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

A mobile ad hoc network (MANET) is a self-organized system comprised by multiple wireless nodes. Due to the openness in topology and absence of centralized administration management, MANET vulnerable attacks from malicious In order reduce hazards these nodes, we incorporate concept trust into MANET, build subjective management model with decision factors based on analytic hierarchy process (AHP) theory fuzzy logic rules prediction method - AFStrust. We consider factors, including direct...

10.1109/greencom.2011.30 article EN 2011-08-01

Currently, the conventional mode of power data transaction is mediated by Web pages. Nevertheless, there are challenging issues such as privacy protection, security and reliability in trading. In this paper, we present a novel secure trading scheme (SPDTS). Firstly, zero-knowledge proof employed to achieve availability consistency without revealing data. Then, SPDTS takes full advantage dispersibility immutability blockchain ensure transactions. To keep process efficient, processing tasks...

10.1109/tnsm.2022.3181814 article EN IEEE Transactions on Network and Service Management 2022-06-09

There is an inherent reliance on collaboration among the participants of mobile ad hoc networks in order to achieve fixed functionalities. However, they are susceptible destruction malicious attacks or denial cooperation. Therefore, it becomes obvious that security issue urgently needed be addressed. Over last few years, many trust-considered countermeasures have been proposed. The design trust quantification methods key these countermeasures. In this study, we abstract a novel light-weight...

10.1109/tsusc.2018.2817219 article EN IEEE Transactions on Sustainable Computing 2018-03-19

10.1016/j.jnca.2015.12.005 article EN publisher-specific-oa Journal of Network and Computer Applications 2016-01-01

As one of the key technologies to enable internet things (IoT), cloud computing plays a significant role in providing huge and storage facilities for large-scale data. Though brings great advantages, new issues emerge, such as data security breach privacy disclosure. In this paper, we introduce novel secure privacy-preserving outsourcing scheme (hereafter referred SPOCS) tackle issue. SPOCS, effective use Intel SGX, trusted execution environment (TEE), ensures confidence integrity sensitive...

10.1109/tcc.2022.3201401 article EN IEEE Transactions on Cloud Computing 2022-08-24

Digital Twins (DTs) can generate digital replicas for mobile networks (MNs) that accurately reflect the state of MN. Machine learning (ML) models trained in DT MN (DTMN) virtual environments be more robustly implemented This avoid training difficulties and runtime errors caused by instability multiple failures. However, when using data from various devices system, DTs must prioritize privacy. Federated (FL) enables construction without leaving to protect DTMN Nevertheless, FL's privacy...

10.1109/jsac.2023.3310049 article EN IEEE Journal on Selected Areas in Communications 2023-08-30

Edge computing extends computational capabilities to the physical edge of world, providing faster and more efficient responses consumer devices such as smart home appliances, smartphones, wearable devices. However, it raises a critical question: How can we efficiently manage time-sensitive computationally intensive tasks meet device performance needs? To address this, propose cost-driven strategy for computation offloading based on reinforcement learning Firstly, convert problem minimizing...

10.1109/tce.2024.3357459 article EN IEEE Transactions on Consumer Electronics 2024-01-23
Coming Soon ...