- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Privacy, Security, and Data Protection
- Cloud Data Security Solutions
- High voltage insulation and dielectric phenomena
- Power Transformer Diagnostics and Insulation
- Internet Traffic Analysis and Secure E-voting
- Indoor and Outdoor Localization Technologies
- Advanced Steganography and Watermarking Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Malware Detection Techniques
- Mobile Crowdsensing and Crowdsourcing
- Wireless Communication Security Techniques
- Electromagnetic Compatibility and Noise Suppression
- Security in Wireless Sensor Networks
- Millimeter-Wave Propagation and Modeling
- Fish Ecology and Management Studies
- Fire Detection and Safety Systems
- Access Control and Trust
- Electromagnetic Compatibility and Measurements
- Radio Wave Propagation Studies
- Microwave Engineering and Waveguides
- Lightning and Electromagnetic Phenomena
- Soil Moisture and Remote Sensing
North China University of Technology
2016-2024
China Southern Power Grid (China)
2020-2024
Chinese Academy of Sciences
2014-2024
Institute of Information Engineering
2015-2024
Xidian University
2010-2022
Chengdu Institute of Biology
2019
George Washington University
2016
Based on the blockchain, homomorphic ElGamal encryption and ring signature, an electronic voting scheme based blockchain is proposed for large-scale voting, which has properties of decentralization, self-management, non-interactive free-receipt, furthermore one-time signature ensures anonymity vote trading in blockchain. The public verifiable billboards guarantee fair, miner nodes provides ciphertext ballot counting service makes feasible. Finally, we analysis security system present...
Purchases of electric vehicles have been increasing in recent years. These differ from traditional fossil-fuel-based especially the time consumed to keep them running. Electric-Vehicle-charging Service Providers (EVSPs) must arrange reasonable charging times for users advance. Most EVSP services are based on third-party platforms, but reliance platforms creates a lack security, leaving vulnerable attacks and user-privacy leakages. In this paper, we propose an anonymous blockchain-based...
Underwater sensor networks are envisioned to enable a wide range of underwater applications such as pollution monitoring, offshore exploration, and oil/gas spill monitoring. Such require precise location information otherwise the sensed data might be meaningless. On other hand, security privacy critical issues typically deployed in harsh environments. Nevertheless, most localization schemes vulnerable many attacks suffer from potential violations they designed for benign However, scheme that...
Video surveillance has been widely adopted to ensure home security in recent years. Most video encoding standards such as H.264 and MPEG-4 compress the temporal redundancy a stream using difference coding, which only encodes residual image between frame its reference frame. Difference coding can efficiently stream, but it causes side-channel information leakage even though is encrypted, reported this paper. Particularly, we observe that traffic patterns of an encrypted are different when...
Abstract Gas-insulated switchgear (GIS) is widely used across multiple electric stages and different power grid levels. However, the threat from several inevitable faults in GIS system surrounds us for safety of electricity use. In order to improve evaluation ability safety, we propose an efficient strategy by using machine learning conduct SF 6 decomposed components analysis (DCA) further diagnosing discharge fault types GIS. Note that empirical probability function fitted Arrhenius...
The 5th generation (5G) wireless network with Unmanned aerial vehicle (UAV) is considered to be one of the most effective solutions for improving communication coverage. However, UAV easily affected by wind, accompanied a certain time delay during air communication. Thus inaccurate beamforming will performed base station (BS), resulting in unnecessary capacity loss. To address this issue, we propose novel Recurrent Neural Networks (RNN)-based arrival angle predictor predict specific location...
The advancement of Internet Medical Things (IoMT) leading to the proliferation electronic healthcare scenarios, with an expanding trend hospitals and organizations employing Electronic Records (EMRs) uploading cloud for sharing. However, security challenges exist during generation medical records, such as record tampering, key attacks, etc., which will become maximum bottleneck restricting development e-Health scenarios in near future. Some scholars consider digital signature techniques,...
To solve the problem of climate warming, countries around world have paid special attention to construction carbon governance. Carbon emission accounting is an important policy tool control vented CO2. But at present, there are third-party agencies in that cannot ensure fairness and impartiality accounting, may be risks such as illegal use leakage sensitive information process data transmission. Therefore, We design blockchain-based security scheme (BCESAS) propose cross-chain verification...
As an increasing number of people and corporations move their data to the cloud side, how ensure efficient secure access stored on side has become a key focus current research. Attribute-Based Encryption (ABE) is largely recognized as best control method for safeguarding storage environment, numerous solutions based ABE have been developed successively. However, majority research conducted within single provider, only limited schemes multi-cloud environment also fail support security...
Abstract Electromagnetic bandgap (EBG) structures consisting of fractal high impedance topologies and effective bridges are proposed employed for ultra-wideband (UWB) ground bounce noise (GBN) suppression in power plane pairs. These have shown good performance. For the first design utilizing topology with one iteration meander lines, it provides −49 dB from 202 MHz to 20 GHz. Both simulated measured results presented verify Furthermore, GBN behaviors different iterations been studied, impact...
Abstract Hydropower reservoirs are well‐known emitters of greenhouse gases to the atmosphere. This is due in part seasonal water level fluctuations that transfer terrestrial C and N from floodplains reservoirs. Partial pressures fluxes CH 4 , CO 2 O also a function situ biological cycling overall ecosystem metabolism, which varies on diel basis within inland waters. Thus, gas emissions hydropower likely vary over time scales with local hydrology metabolism. China's Three Gorges Reservoir...
Abstract Network slicing, as a key technique of 5G, provides way that network operators can segment multiple virtual logic on the same physical and each customer order specific slicing which meet his requirement 5G service. The service level agreement (NS-SLA) business signed between customers, specifies relevant requirements for services provided by operators. However, authenticity auditing results may not be guaranteed customer’s data leaked in existing NS-SLA audit scheme. In this paper,...
Crowdsourced traffic monitoring employs ubiquitous smartphone users to upload their GPS samples for estimation and prediction. The accuracy of prediction depends on the number uploaded samples; but more from a user increases probability being tracked or identified, which raises significant privacy concern. In this paper, we propose privacy-preserving mechanism that can meet users\textquoteright~diverse requirements while guaranteeing quality. mechanism, decision process is formalized as...
Pervasive smartphones boost the prosperity of location-based service (LBS) and increasing data prompt LBS providers to outsource their datasets cloud side. The privacy issues in outsourced scenario have attracted considerable interest recently. However, current schemes cannot provide sufficient preservation against practical challenges are little concerned about retrieval efficiency Therefore, we present an efficient Privacy-Preserving Query Scheme (i.e., <a:math...
Two leafy electromagnetic bandgap (EBG) structures are proposed for ultra-wideband (UWB) simultaneous switching noise (SSN) suppression in power/ground plane pairs. The valid −35 dB bandwidth of the first design is from 218 MHz to 20 GHz, −40 second 369 MHZ GHz. simulated and measured results compared presented verify good performance.
In Location Based Services (LBSs), service providers can obtain mobile users' locations or traces while receiving their requests. K-anonymity, which is the most commonly used location privacy protection method, needs cooperation among users to form a k-anonymous group. Though several incentive mechanisms have been proposed motivate participate in group, of them rely on `trustful' center. this paper, we propose distributed secure mechanism that applies blockchain smart contracts for...
Mobile traces, collected by vehicular sensor networks (VSNs), facilitate various business applications and services. However, the traces can be used to trace identify drivers or passengers, which raise significant privacy concerns. Existing protecting techniques may not suitable, due their inadequate considerations for data accuracy requirements of different adversary's knowledge strategies. In this paper, we analyze issues in VSNs with a game theoretic model, where defender uses against...
Although regarded as a promising approach for indoor localization, WiFi fingerprint-based localization can lead to potential location privacy violations. In this work, we study the issues of and propose lightweight privacy-preserving scheme that does not rely on any cryptographic primitive existing work does. our scheme, to-be-localized user sends measured signal strength values other k-1 dummy service provider who accordingly replies with k locations. The cannot distinguish user's from...
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses, which involve the calculation functions, such as matrix operations. However, functions operations are difficult on Ethereum Virtual Machine (EVM)-based contract platforms due their security environment limitations. Existing off-chain methods often result in a significant reduction execution efficiency, thus platform software development kit interface...
The power transformer is one of the important equipment for ensuring safe and stable operation in system. Accurately assessing ageing condition oil-paper insulation essential important. Polarization Depolarization Current (PDC) technique can sensitive to reflect PDC behavior mineral has been used oil paper moisture assessment, but there no report about analysis by PDC. In this paper, current under different aging time measured at 110°C thermal test. A new characteristic parameter (the...
With the rapid advancement of data sharing technology, an increasing amount is being stored on cloud servers. To enable fine-grained access control over servers, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology has been widely adopted. Recognizing that shared and files often possess a hierarchical structure, CP-ABE proposed recently. However, most existing schemes are restricted to single-domain access, which limits their flexibility universal applicability in practical...