Jing Huang

ORCID: 0000-0002-3376-2218
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Inertial Sensor and Navigation
  • Software-Defined Networks and 5G
  • GNSS positioning and interference
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Advanced Data Storage Technologies
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Peer-to-Peer Network Technologies

China Academy of Safety Sciences and Technology
2022

China Mobile (China)
2020-2022

High-precision positioning is critical for many Internet-of-Things (IoT) applications; however, most existing approaches are too expensive to be used in commercial products. A highly accurate differential global system (DGPS) has not been widely because of the difficulty solving integer ambiguities single-frequency carrier phase. Multipath interference and receiver noise main reasons limiting DGPS accuracy efficiency ambiguities. In this article, we propose a combination anti-multipath...

10.1109/jiot.2020.2972746 article EN IEEE Internet of Things Journal 2020-02-11

摘要: 具有 VCR 功能的流媒体服务系统由于请求的随机性会影响用户的点播体验,该文结合数据预取机制以及基于分段的缓存策略计算出用户点播延迟的期望,给出一个较优的缓存管理策略,并通过在线计算逼近最优解,同时在缓存已知的情况下,给出相应的数据预取算法,利用缓存和预取两种数据获取方法的相互协作减小客户端点播延迟,提高缓存效率。仿真结果证实了所提算法的有效性。 关键词: 多媒体通信 / 预取机制 缓存策略 服务质量

10.3724/sp.j.1146.2009.01333 article ZH-CN cc-by JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2010-12-02

Security of Internet things network is difficult to manage because devices are heterogeneous and always deployed in remote places. Based on these features, attacks against like distributed denial-of-service system intrusion easier than traditional network. In order enhance network’s security, this article we propose the concept intrinsic security establish a trusted autonomy Intrinsic emphasizes that itself must be autonomous address problems which caused by heterogeneous. thought, designed...

10.1177/1550147720974535 article EN cc-by International Journal of Distributed Sensor Networks 2020-11-01

Due to the emergence of various new technologies, Internet things (IoT) is gradually becoming one most valued technologies at present. The IoT makes our life more and convenient through interconnection everything, but brings many advantages also raises some security issues, such as perception layer main means sensing data delivery, due limited resources nodes their vulnerability, diversity data, heterogeneity network, making vulnerable malicious attacks. Therefore, guaranteeing trustworthy...

10.1155/2022/6603754 article EN Wireless Communications and Mobile Computing 2022-01-22

Abstract As the important transmission approach of perception data, security and privacy layer nodes have been paid more attention. To evaluate credibility protect autologous identity privacy, a remote attestation mechanism using group signature (GS-RAM) for centralized networking is proposed in this paper. First, RAM, based on computational Diffie–Hellman (CDH) problem GS, established data source nodes. Second, specific construction GS-RAM given to identify trusted state sources without...

10.1186/s13638-022-02092-9 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2022-02-08
Coming Soon ...