Liangmin Wang

ORCID: 0000-0001-8905-3456
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Magnetic properties of thin films
  • Chaos-based Image/Signal Encryption
  • Advanced Optical Network Technologies
  • IoT and Edge/Fog Computing
  • Magnetic Properties and Applications
  • Advanced Steganography and Watermarking Techniques
  • Network Traffic and Congestion Control
  • Ultrasound Imaging and Elastography
  • Surface and Thin Film Phenomena
  • Cryptographic Implementations and Security
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • Flow Measurement and Analysis
  • Insurance and Financial Risk Management
  • Magnetic and transport properties of perovskites and related materials
  • Access Control and Trust
  • Internet of Things and Social Network Interactions
  • Network Packet Processing and Optimization
  • Advanced Memory and Neural Computing

Southeast University
2008-2024

Second Affiliated Hospital of Fujian Medical University
2022-2024

Fujian Medical University
2022-2024

Jiangsu University
2008-2022

Intel (United Kingdom)
2019-2021

Intel (United States)
2018

Anhui University
2013-2016

Southwest University
2008-2009

Shanxi Agricultural University
2008

Pennsylvania State University
1996

<b>Highlights</b> <list list-type=bullet><list-item> The proposed system aims to reduce the high cost of wide-area agricultural production caused by uneven distribution machinery resources in different regions. </list-item><list-item> solves current problem that differences business models regions make it hard establish a centralized dispatching platform. It can also improve utilization rate and solve trust between participants. We implement our on Hyperledger Fabric meets needs all farmers...

10.13031/aea.15332 article EN Applied Engineering in Agriculture 2023-01-01

Aiming to embed large amount of data while minimize the sum costs all changed pixels, a novel high capacity hiding scheme based on (7, 4) Hamming code is realized by family algorithms. Firstly, n (n = 1, 2, 3) cover pixels are assigned one set according payload. Then, 128 binary strings length seven divided into eight sets syndrome every string. Binary that share same classified set. Finally, string in certain determined be embedded chosen modify some least significant bits pixels. The...

10.1186/s40064-016-1818-0 article EN SpringerPlus 2016-02-24

Blockchain technology finds widespread application in the management of Internet Things (IoT) devices. In response to challenges posed by performance scalability and convergence multiple ledgers stemming from an expanding network, this study introduces concept Co-Sharding . Within framework, ledger maintained sub-chains overseeing IoT operations distinct geographic regions is conceptualized as a shard within Large-scale (LIoT) ledger. Meanwhile, elected nodes each region assume...

10.1145/3641290 article EN Deleted Journal 2024-01-19

The ubiquity of mobile devices equipped with various sensors has promoted the advent a novel data sensing paradigm. Based on traditional static mode, (sensor) nodes collaboratively collect sensor nodes. This large volume hybrid sensed is then sent to storage for flexible management and top-<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:math> query services. One crucial security issue that compromised node may falsify or drop some...

10.1155/2016/1685054 article EN cc-by Mobile Information Systems 2016-01-01

Payment channel (PC) greatly improves blockchain scalability by allowing an unlimited number of off-chain transactions instead committing every transaction to the blockchain. However, one PC just confines two nodes. Thus, for a node, like Cafe, who frequently receives money from multiple nodes, massive PCs need be created, which leads massively and repeatedly information addition channels costs much fees. In this paper, we introduce multi-node payment (MPC) method solve problem above. MPC...

10.1109/icc45855.2022.9838626 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

LEACH exhausts a few nodes much earlier than others, which remarkably decreases the lifetime of whole network. An improved method based on time slots to prolong minimum in is presented, cluster-head selecting approach difference cluster size and responsibility mechanism for active node makes energy consumption uniform cluster. Simulation comparison show that effective extending network more saving some related work.

10.1109/icmlc.2008.4620374 article EN International Conference on Machine Learning and Cybernetics 2008-07-01

To solve the problems of limited energy nodes and security routing in wireless sensor networks, load-balanced secure protocol (LSRP), a for is proposed. Based on structured topology hexagonal mesh, hops at different directions are calculated optimal route transmitting data packets LSRP. Depending characters hops, can rapidly find among multiple routes by policy twice probability selection. Data breach prevented encryption, realized one-way hash key chain symmetric authentication. LSRP offers...

10.1155/2013/596352 article EN cc-by International Journal of Distributed Sensor Networks 2013-06-01

This paper presents a secure group communication scheme to relieve the bottleneck problem of vehicular authentication efficiency using batch verification accelerate speed during construction phase. We use certificateless public key cryptosystem encryption overcome escrow problem. Specific revocation malicious vehicles, bloom filter is applied issuing information revoked vehicles instead time-consuming list. By performance evaluation, proposed outperforms previously reported schemes in terms...

10.1360/112013-136 article EN Scientia Sinica Informationis 2013-10-01

Network measurement is critical in network management such as performance monitoring, diagnosis, and traffic engineering. However, conventional solutions are limited by simple fixed functionalities well coarse-grained statistics which often fail to precisely illustrate conditions. In this paper, we propose an event-driven declarative query language, EQuery, for programmable order design sophisticated tasks enable event mechanism avoid human intervene. Furthermore, a compiler support the...

10.1109/noms.2018.8406142 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2018-04-01

The P4 language was originally proposed as a means of providing programmable network data plane functions with the potential to implement, understand, and interpret custom protocols. However, recompilation process re-instantiation on target device introduces measurable downtime for services. In this work, we present Ripple, an efficient, runtime reconfigurable engine multicore systems eliminate process. Ripple framework adopts "generic static" philosophy, uses highly optimized universal...

10.1109/nana.2019.00034 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2019-10-01

As SDN-based networking infrastructure continues to evolve, an increasing number of traditional network functions are deployed over virtualized network. Like networks, traffic monitoring in a Software Defined Network is critical order ensure security and performance the underlying infrastructure. In context deployment TAP service has been reported as effective VNF that can provide same capabilities physical TAP. Unfortunately, para-virtualization environment, e.g. OVS, where inter-VM...

10.1109/noms47738.2020.9110293 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2020-04-01

One of the major drawbacks ultrasonic Doppler instruments in measuring blood flow is their inability to measure velocity perpendicular beam. Time domain RF echo or speckle tracking has been studied as an alternative overcome this problem. By acquiring two-dimensional (2-D) signals, both lateral (perpendicular beam) and axial (parallel velocities can be calculated with 2-D pattern correlation algorithms. disadvantages current algorithms extensive computation time involved computing...

10.1109/58.535490 article EN IEEE Transactions on Ultrasonics Ferroelectrics and Frequency Control 1996-09-01

10.1109/tsc.2024.3463394 article EN IEEE Transactions on Services Computing 2024-01-01

10.1109/globecom52923.2024.10901636 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2024-12-08

Time delay estimation is a very important operation in ultrasound time-domain flow mapping and correction of phase aberration an array transducer. As the interest increases application one half-dimensional (1.5-D) two-dimensional (2-D) transducers to improving image quality three-dimensional (3-D) imaging, need simple, fast, sufficiently accurate algorithms for real-time time becomes exceedingly crucial. In this paper, we present adaptive time-delay algorithm which minimizes problem noise...

10.1109/58.489407 article EN IEEE Transactions on Ultrasonics Ferroelectrics and Frequency Control 1996-05-01
Coming Soon ...