Chaosheng Feng

ORCID: 0000-0002-1797-5280
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Peer-to-Peer Network Technologies
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Access Control and Trust
  • Multimodal Machine Learning Applications
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Cryptography and Residue Arithmetic
  • Chaos-based Image/Signal Encryption
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Data and IoT Technologies
  • UAV Applications and Optimization
  • Spam and Phishing Detection
  • Cybersecurity and Information Systems
  • Complex Network Analysis Techniques
  • Advanced Steganography and Watermarking Techniques
  • Energy Efficient Wireless Sensor Networks
  • Advanced Neural Network Applications
  • Security and Verification in Computing
  • Privacy, Security, and Data Protection

Sichuan Normal University
2008-2025

University of Electronic Science and Technology of China
2008-2014

Edge intelligence is an emerging concept referring to processes in which data are collected and analyzed insights delivered close where the captured a network using selection of advanced intelligent technologies. As promising solution solve problems insufficient computing capacity transmission latency, edge intelligence-empowered Internet Vehicles (IoV) being widely investigated both academia industry. However, sharing security IoV challenge that should be solved with priority. Although...

10.1109/tvt.2020.3027568 article EN IEEE Transactions on Vehicular Technology 2020-09-29

The drone's open and untrusted environment may create problems for authentication data sharing. To address this issue, we propose a blockchain-enabled efficient secure sharing model 5G flying drones. In model, blockchain attribute-based encryption (ABE) are applied to ensure the security of instruction issues mechanism in employs smart contract access control, public key cryptography providing accounts ensuring accounts' security, distributed ledger audit. addition, speed up out-sourced...

10.1109/mnet.011.2000223 article EN IEEE Network 2021-01-01

While 5G can facilitate high-speed Internet access and make over-the-horizon control a reality for unmanned aerial vehicles (UAVs; also known as drones), there are potential security privacy considerations, example, authentication among drones. Centralized approaches not only suffer from single point of failure but they incapable cross-domain authentication. This complicates the cooperation drones different domains. To address these limitations, blockchain-based scheme intelligent 5G-enabled...

10.1109/jiot.2021.3113321 article EN IEEE Internet of Things Journal 2021-09-17

Motivated by Industry 4.0, 5G-enabled unmanned aerial vehicles (UAVs; also known as drones) are widely applied in various industries. However, the open nature of 5G networks threatens safe sharing data. In particular, privacy leakage can lead to serious losses for users. As a new machine learning paradigm, federated (FL) avoids allowing data models be shared instead raw Unfortunately, traditional FL framework is strongly dependent on centralized aggregation server, which will cause system...

10.1109/tii.2021.3116132 article EN IEEE Transactions on Industrial Informatics 2021-09-28

The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable devices connected to the can communicate with each other. As one most important components smart health monitoring and improvement systems, IoHT presents numerous challenges, among which cybersecurity priority. well-received security solution achieve fine-grained access control, ciphertext-policy weighted attribute-based encryption (CP-WABE) has potential ensure data in IoHT. However, many issues...

10.1109/jbhi.2021.3075995 article EN IEEE Journal of Biomedical and Health Informatics 2021-04-27

Deep reinforcement learning has achieved significant success in complex decision-making tasks. However, the high computational cost of policies based on deep neural networks restricts their practical application. Specifically, each decision made by an agent requires a complete network computation, leading to linear increase with number interactions and agents. Inspired human patterns, which involve reasoning only critical states continuous tasks without considering all states, we introduce...

10.1371/journal.pone.0318778 article EN cc-by PLoS ONE 2025-02-06

Abstract Spatial reasoning in Large Language Models (LLMs) serves as a foundation for embodied intelligence. However, even simple maze environments, LLMs often struggle to plan correct paths due hallucination issues. To address this, we propose S2ERS , an LLM-based technique that integrates entity and relation extraction with the on-policy reinforcement learning algorithm Sarsa optimal path planning. We introduce three key improvements: (1) tackle of spatial, extract graph structure entities...

10.1038/s41598-025-93601-5 article EN cc-by Scientific Reports 2025-03-14

While 5G facilitates high-speed Internet access and makes over-the-horizon control a reality for unmanned aerial vehicles (UAVs), there are also potential security privacy considerations, example, authentication among drones. The centralized approaches not only suffer from single point of failure, but they incapable cross-domain authentication, which complicates the cooperation drones different domains. To address these challenges, we propose blockchain-based solution to achieve 5G-enabled...

10.1145/3477090.3481053 article EN 2021-10-21

10.1016/j.jisa.2024.103894 article EN Journal of Information Security and Applications 2024-10-30

P2P worms pose heavy threatens to networks. exploit common vulnerabilities in member hosts of a network and spread topologically the network, potentially more effective strategy than random scanning for locating victims. Considering that topology networks has important effect on active worm spreading, it is very difficult model propagation worms. For this reason, so far few models are proposed. In paper, we propose based discrete-time method. The analysis simulation results shows there...

10.1109/icycs.2008.237 article EN 2008-11-01

As a kind of protocol for transferring files, the File Transferring Protocol (FTP) has already been widely used many years. However, there exist some secure vulnerabilities in protocol. For example, both passwords and files are transmitted plaintext. Although new FTPs such as FTPS have proposed applied to overcome these vulnerabilities, drawbacks lack flexibility use, failing meet specific security requirements, etc. Given facts, FTP its requirements studied deeply system is designed this...

10.1109/icccas.2010.5582002 article EN 2010-07-01

Recent years, researchers have recognized the damage resulting from P2P worms, and some works on worms been done. However, compared with study of active worm propagation, passive propagation has less highlighted. Passive propagate slowly in Internet, but system can be a potential vehicle to fast worms. In this paper, we address issue by analyzing models networks is modeled mean-field method. The fact that theory values are consistence simulation shows these proposed valid used analyze...

10.1109/iccis.2008.4670790 article EN IEEE Conference on Cybernetics and Intelligent Systems 2008-09-01

Passive worms pose threats to mobile P2P(peer-to-peer) networks. To predict the tendency of propagation P2P passive and analyze their behaviors, it is necessary model worm propagation. In this paper, protocols networks features are studied. On basis, mathematical proposed in applying Epidemiology. For purpose examining effect P2P-related parameters on propagation, simulation experiments carried out. The results these show that different have among which average downloading rate recovery...

10.1109/icccas.2010.5582004 article EN 2010-07-01

The characteristics of P2P networks bring great convenience for the users. Meanwhile, it causes also some security problems. It is an effective method response that reputation mechanism built in networks. In most existing models, global flooding and local query are used achieving information recommendation. inadvisable methods affect accuracy efficiency evaluating reputation. To make up lack a new trust evaluation model based on Ant Colony Algorithm proposed this paper. recommendation...

10.1109/icccas.2010.5582006 article EN 2010-07-01

In P2P networks, the behavior of free-ride is growing. It causes negative impact on robustness and availability networks. The enthusiasm users should be guaranteed by containing free-riders. An allocation method resource based global reputation value proposed in this paper. weight recommender assigned through introduction cluster algorithm, values are synthesized iteration. Based value, problem summed up as a linear programming issue. can ensure peer with more contribution have priority to...

10.1109/icccas.2010.5582000 article EN 2010-07-01

<title>Abstract</title> Spatial reasoning in Large Language Models (LLMs) serves as a foundation for embodied intelligence. However, even simple maze environments, LLMs often struggle to plan correct paths due hallucination issues. To address this, we propose S2ERS, an LLM-based technique that integrates entity and relation extraction with the on-policy reinforcement learning algorithm Sarsa optimal path planning. We introduce three key improvements: 1) tackle of spatial, extract graph...

10.21203/rs.3.rs-4609889/v1 preprint EN Research Square (Research Square) 2024-07-15

Spatial reasoning in Large Language Models (LLMs) is the foundation for embodied intelligence. However, even simple maze environments, LLMs still encounter challenges long-term path-planning, primarily influenced by their spatial hallucination and context inconsistency reasoning. To address this challenge, study proposes an innovative model, Spatial-to-Relational Transformation Curriculum Q-Learning (S2RCQL). of LLMs, we propose approach, which transforms prompts into entity relations paths...

10.48550/arxiv.2408.13184 preprint EN arXiv (Cornell University) 2024-08-23

We analyse different worm and patch propagation models along with the ones we have developed evaluated as a part of our ongoing passive P2P & modelling project. This is followed by brief discussion on detection mechanisms proposed various authors. Towards very end this article, propose distributed framework for throttling in networks discuss its feasibility efficiency keeping view design considerations.

10.1109/ccnc.2009.4784961 article EN 2009-01-01

To counter the attacks of virus in P2P file-sharing networks, model propagation networks is proposed based on deep analysis features file sharing and propagation. In order to examine effects different parameters this model, large scale simulating experiments are carried out. The numerical impact P2P-relatedfactors such as number initially infected peers, downloading rate, recovery etc, shows that attack performance viruses very sensitive system parameters.

10.1109/icmlc.2008.4621036 article EN International Conference on Machine Learning and Cybernetics 2008-07-01
Coming Soon ...