Wei Ren

ORCID: 0000-0001-8590-1737
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Mobile Ad Hoc Networks
  • Internet Traffic Analysis and Secure E-voting
  • Benford’s Law and Fraud Detection
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Cooperative Communication and Network Coding
  • User Authentication and Security Systems
  • Advanced MIMO Systems Optimization
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Service-Oriented Architecture and Web Services
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT and Edge/Fog Computing
  • Cognitive Radio Networks and Spectrum Sensing
  • Complex Network Analysis Techniques
  • Advanced Authentication Protocols Security
  • Opportunistic and Delay-Tolerant Networks
  • Academic integrity and plagiarism
  • Advanced Computational Techniques and Applications
  • Security in Wireless Sensor Networks
  • Mobile Crowdsensing and Crowdsourcing

Soochow University
2025

National Administration of Surveying, Mapping and Geoinformation of China
2024-2025

China Pharmaceutical University
2025

Suzhou Guangji Hospital
2025

Hubei University Of Economics
2025

University of California, Riverside
2012-2025

China University of Geosciences
2015-2024

Huawei Technologies (China)
2024

Harbin Engineering University
2024

Chuzhou University
2023-2024

Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any devices and systems may be compromised hence untrusted. In addition, data collected by sent from IoT shared with processed edge computing systems, order to reduce reliance on centralized (cloud) servers, leading further security privacy issues. To cope these challenges, this paper proposes an innovative blockchain-enabled information sharing solution context guarantee anonymity yet entity...

10.1109/tc.2022.3157996 article EN IEEE Transactions on Computers 2022-03-09

We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous local spectrum opportunities without causing unacceptable interference to primary users. qualitatively characterize the impacts of transmission on occurrence reliability opportunity detection. Based a Poisson model network, we quantify these by showing that (i) probability decreases exponentially with users, exponential decay constant is given traffic load users; (ii) reliable...

10.1109/jsac.2009.090923 article EN IEEE Journal on Selected Areas in Communications 2009-09-01

Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architecture, engineering, and construction (AEC) industries a revolutionary technology process. Smart relies on BIM for manipulating information flow, data management flow. Currently, model has been explored mainly utilization, but rare works pay efforts to security, e.g., critical audit sensitive exposure. Moreover, few systems are proposed chase after upcoming computing paradigms, such mobile cloud...

10.1155/2019/5349538 article EN cc-by Mathematical Problems in Engineering 2019-01-01

The volume, variety and value of data generated by Internet Things (IoT) devices are expected to increase significantly in foreseeable future, hence, reinforcing the importance secure efficient access control solutions for these their networks. However, existing not generally lightweight or scalable, particularly geographically disperse, inexpensive resource constrained IoT devices. To tackle above challenges, we propose a consortium blockchain based architecture enable intelligent...

10.1109/tsc.2022.3179727 article EN IEEE Transactions on Services Computing 2022-06-02

Major and trace element, Sr–Nd–Pb isotope mineral chemical data are presented for newly discovered ultrapotassic lavas in the Tangra Yumco–Xuruco graben southern Tibet. The characterized by high MgO, K2O TiO2, low Al2O3 Na2O contents, also have molar K2O/Al2O3, (K2O + Na2O)/Al2O3 K2O/Na2O ratios. Their abundances of incompatible elements such as large ion lithophile (LILE) light rare earth (LREE) reach extreme levels typical lamproites. lamproites show highly radiogenic 87Sr/86Sr (0· 7166–0·...

10.1093/petrology/egl080 article EN Journal of Petrology 2007-01-09

The role of the Industrial Internet Things (IIoT) in critical infrastructure sectors, such as power, chemistry, and manufacturing, will be increasingly important we move toward Industry 5.0. For example, IIoT devices are deployed factories to help manufacturing companies (e.g., automotive) gain in-depth insight into various states production, thus improving production efficiency achieving cost reductions. However, malicious code may compromise if either exposed outside or unexposed inner...

10.1109/jiot.2019.2947339 article EN IEEE Internet of Things Journal 2019-10-15

Traditional construction supply chains suffer from extra delays, costs and information wastages due to intermediaries. Blockchain, a decentralized infrastructure, can provide irreversibility, undeniableness, uniqueness anonymity for trades. Hence, we first propose blockchain-based chain framework reduce limitations in traditional ones. However, payment security by blockchain must be guaranteed token assets accounts protected. Although the loss of private keys will not result exposure or...

10.1109/access.2019.2937917 article EN cc-by IEEE Access 2019-01-01

Electronic healthcare (e-health) systems have received renewed interest, particularly in the current COVID-19 pandemic (e.g., lockdowns and changes hospital policies due to pandemic). However, ensuring security of both data-at-rest data-in-transit remains challenging achieve, since data is collected sent from less insecure devices patients' wearable or home devices). While there been a number authentication schemes, such as those based on three-factor authentication, provide privacy...

10.1109/tsc.2022.3149940 article EN IEEE Transactions on Services Computing 2022-02-09

We address the percolation-based connectivity of large-scale ad hoc heterogeneous wireless networks, where secondary users exploit channels temporarily unused by primary and existence a communication link between two depends on not only distance them but also transmitting receiving activities nearby users. introduce concept region defined as set density pairs-the transmitters - under which network is connected. Using theories techniques from continuum percolation, we analytically...

10.1109/tit.2011.2145650 article EN IEEE Transactions on Information Theory 2011-06-21

Electric vehicle charging is becoming more commonplace, but a number of challenges remain. For example, the wireless communications between users and aggregators can be subject to exploitation hence, several authentication schemes have been designed support varying levels privacy protection. However, there are limitations observed in existing schemes, examples include lack anonymity not considering peak their design (and consequently, meeting low energy consumption requirement smart grid...

10.1109/jiot.2021.3078175 article EN IEEE Internet of Things Journal 2021-05-08

Pattern formation of spiral waves in an inhomogeneous excitable medium with small-world connections is investigated. In both cases, completely local regular and random connections, cannot survive the given medium. It found that (basically plus a small number connections) well behaved wave can be formed against destructive role There also exists optimal fraction which greatly enhance probability formation; this resembles behavior stochastic resonance.

10.1103/physreve.65.055204 article EN Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics 2002-05-06

Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers. This paradigm empowers to pervasively access a large volume storage resources with portable in distributed cooperative manner. During the period between uploading downloading files (data), privacy integrity need be guaranteed. To this end, family schemes are proposed for different situations. All lightweight terms computational overhead, resilient compromise on devices, do not...

10.1016/s1007-0214(11)70070-0 article EN Tsinghua Science & Technology 2011-10-01

We analyze the multihop delay of ad hoc cognitive radio networks, where transmission each hop consists propagation and waiting time for availability communication channel (i.e. occurrence a spectrum opportunity at this hop). Using theories techniques from continuum percolation ergodicity, we establish scaling law minimum with respect to source-destination distance in networks. When is negligible, show starkly different behavior instantaneously connected networks as compared that are only...

10.1109/jsac.2011.110412 article EN IEEE Journal on Selected Areas in Communications 2011-03-29

In the big data era, are envisioned as critical resources with various values, e.g., business intelligence, management efficiency, and financial evaluations. Data sharing is always mandatory for value exchanges profit promotion. Currently, certain markets have been created facilitating dissemination coordinating transaction, but we to assume that such centralized of must be trustworthy privacy fairness, which very likely imposes limitations joining admission, extra costly commissions. To...

10.3390/fi11110225 article EN cc-by Future Internet 2019-10-24

In order to acquire the degradation state of rolling bearings and achieve predictive maintenance, this paper proposed a novel Remaining Useful Life (RUL) prediction based on Long Short Term Memory (LSTM) neural net-work. The method is divided into two parts: feature extraction RUL prediction. Firstly, large number features are extracted from original vibration signal. After correlation analysis, that can better reflect trend selected as input model. part prediction, LSTM making full use...

10.32604/jai.2019.05817 article EN Journal on artificial intelligence 2019-01-01
Coming Soon ...