Anping Xiong

ORCID: 0000-0001-8098-5599
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Advanced Data Storage Technologies
  • Cloud Computing and Resource Management
  • Cryptography and Data Security
  • Caching and Content Delivery
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Energy Efficient Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Data Mining Algorithms and Applications
  • Indoor and Outdoor Localization Technologies
  • Advanced Computational Techniques and Applications
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • Mobile Agent-Based Network Management
  • Cloud Computing and Remote Desktop Technologies
  • User Authentication and Security Systems
  • Food Supply Chain Traceability
  • Digital Rights Management and Security
  • Innovative Energy Harvesting Technologies
  • Advanced Authentication Protocols Security
  • Brake Systems and Friction Analysis

Chongqing University of Posts and Telecommunications
2012-2024

China Telecom
2024

Jilin Business and Technology College
2024

China Telecom (China)
2024

Jiangxi Agricultural University
2020

National Animal Husbandry Service
2020

Heilongjiang Bayi Agricultural University
2019

Education Department of Heilongjiang Province
2019

University of Electronic Science and Technology of China
2012-2014

10.1016/j.dcan.2022.04.012 article EN Digital Communications and Networks 2022-04-20

The Zoned Namespace (ZNS) SSD is a newly introduced storage device and provides several new ZNS commands to upper-level applications. Zone-reset command one of the erase all flash blocks within zone. Since data grouped erased in zone units, SSDs are widely used LSM-tree-based stores. However, basic invalidated unit LSM-tree an SST/WAL file, which mismatches erasing SSD. Placing different files same zone, on faces dramatic space amplification extensive migration problems.

10.1145/3673038.3673096 article EN 2024-08-08

Cloud storage is an important service of cloud computing, which offers services for data owners to host their in the cloud. But computing also brings new and challenging security threats outsourced data. In order regain assurances access control storage, we analyzes algorithm Ciphertext-policy attribute-based encryption. this paper, combining a homomorphic encryption with traditional CP-ABE algorithm, constructed Searchable Encryption (SE-CP-ABE) scheme, give analysis experimental scheme....

10.1109/iccwamtip.2013.6716664 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2013-12-01

With the integrated development of Internet, wireless sensor technology, cloud computing, and mobile there has been a lot attention given to research about applications Internet Things. A Wireless Sensor Network (WSN) is one important information technologies in Things; it integrates multi-technology detect gather network environment by mutual cooperation, using variety methods process analyze data, implement awareness, perform tests. This paper mainly researches localization algorithm nodes...

10.3390/s16111934 article EN cc-by Sensors 2016-11-18

As a revolutionary and profound technology, the Internet of Things (IoT) has potential to fundamentally transform our society by simply connecting sensors smart devices Internet. It is no doubt that security communications between an important issue in IoT. In this paper, we deal with scheme for ESP8266 modules, which can provide embedded Wi-Fi capabilities at low cost. Based on existed ESP8266, proposed enhanced mutual authentication mechanism ECDH-key agreement curve25519. Compared...

10.1109/iccsn.2019.8905268 article EN 2019-06-01

The establishment of quality safety traceability system for food industry is an important technical means to meet the consumers' right know, choose and realize government supervision. There are following major problems in current whole chain information traceability: general sharing cannot be achieved between different enterprises, which caused formation isolated islands, identifiers among circulation heterogeneous nested. Therefore, it difficult trace back information, this paper proposes a...

10.1109/ithings-greencom-cpscom-smartdata.2016.43 article EN 2016-12-01

Nowadays, big data analytics has been widely applied in addressing the growing cybercrime threats. However, energy consumption is explosive increasing with fast growth of processing anti-cybercrime. In this paper, an energy-efficient framework for applications proposed to reduce while satisfying deadline constrains. First, problem tasks scheduling a single Spark job modeled as integer program. We design algorithm minimize application Spark. To avoid service-level agreement violations...

10.1109/access.2018.2855720 article EN cc-by-nc-nd IEEE Access 2018-01-01

Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable for mechanism. Due to the problems such that system attribute revocation not flexible, overhead too big and other issues existing CP-ABE under cloud environment, with limited condition of `AND' `OR' an tree, based on AB-ACER schemes, we proposed scheme Cloud storage. This many minimum sets which shared Re-encryption keys, storage service provider re-encrypts...

10.1109/iccwamtip.2014.7073420 article EN 2014-12-01

With the integrated development of Internet, wireless sensor technology, cloud computing, and mobile there has been a lot attention given to research about applications Internet Things. A Wireless Sensor Network (WSN) is one important information technologies in Things; it integrates multi-technology detect gather network environment by mutual cooperation, using variety methods process analyze data, implement awareness, perform tests. This paper mainly researches localization algorithm nodes...

10.20944/preprints201611.0082.v1 preprint EN 2016-11-16

It's necessary to equip WSNs with authentication mechanism accounts for that the nodes of are vulnerable various attacks since they open and resource-limited. However, traditional such as signature cannot be utilized achieve this goal, because its heavy computation. On-line/off-line can considered a practical solution WSNs, only need perform lightweight on-line sign, while computation performed off-sign phase using efficient computational devices, but it is not perfect certain circumstances....

10.1080/10798587.2015.1015777 article EN Intelligent Automation & Soft Computing 2015-03-03

10.4156/ijact.vol5.issue8.51 article EN International Journal of Advancements in Computing Technology 2013-04-30

With the development of market economic, customer churn prediction play a critical role in company management. How-ever, information is complex, it contains multi-dimensional features. What's worse, number very small among whole consumers, and features are dynamically changing, which challenging for traditional statistical methods. Fortunately, as rise edge computing, more computing related to data-intensive applications will be de-centralized smart terminals. Moreover, focuses on real-time,...

10.1109/ithings/greencom/cpscom/smartdata.2019.00121 article EN 2019-07-01

As it can provide high throughput data access, and easy to deploy on a cheap machine ,Distributed File System HDFS is used widely.All file access requests are required by the metadata server node .so single nodes often become bottleneck of whole system problem, this paper design multi-node distributed management solution in directory Hash-based storage strategy, proposed protocol based two-phase commit ensure consistency.Experimental results show that program improve efficiency.

10.2991/asei-15.2015.190 article EN cc-by-nc Advances in engineering research/Advances in Engineering Research 2015-01-01

AbstractCiphertext Policy Attribute-Based Encryption (CP-ABE) has been widely studied in recent years because it is more suitable for access control of shared data under cloud storage environment. In view problems flexibility and efficiency the existing encryption schemes environment, combined with digital envelopes technology, paper puts forward an optimized scheme based on supporting fine-grained control. The following advantages: Adopting reducing computational overhead Data Owner...

10.1080/10798587.2015.1095488 article EN Intelligent Automation & Soft Computing 2015-11-13

Abstract This paper proposes a microservice deployment strategy based on interactive weights to optimize the of microservices in edge environments. In an computing environment, this is particularly important reduce data transmission latency and improve processing efficiency as processed stored closer where generated. The proposed evaluates dependencies between their interaction weights, models computation transport minimize overall applications network. By introducing weight factor...

10.21203/rs.3.rs-3916188/v1 preprint EN cc-by Research Square (Research Square) 2024-02-05

For disc brakes, the heat dissipation performance of brake during braking process directly affects safety automotive braking. Use COMSOL Multiphysics 5.6 to numerically simulate friction generation and brakes Simulate transient heating convective cooling find minimum interval between a series actions avoid excessive temperature caused by delayed continuous degradation efficiency. Import field solution results into solid mechanics process, finally solve obtain thermal strain brake,...

10.1117/12.3039484 article EN 2024-08-28

In MongoDB database, data objects are queried by means of the index. Under pressure mass data, all its index could not be stored in memory, which is bound to affect system query performance. For this issue, paper proposes a layered storage mechanism based on K- center PAM optimization algorithm, clusters hot and cold through objects, uses structure Redis cache reduce times access disk during improve Through experimental comparison with original MongoDB, verifies that Kcenter can enhance

10.12783/dtetr/iceta2016/6998 article EN DEStech Transactions on Engineering and Technology Research 2017-04-10
Coming Soon ...