Jie Wang

ORCID: 0000-0002-3772-426X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Information and Cyber Security
  • Cloud Computing and Resource Management
  • Internet Traffic Analysis and Secure E-voting
  • Service-Oriented Architecture and Web Services
  • Anomaly Detection Techniques and Applications
  • Power Systems and Technologies
  • Blockchain Technology Applications and Security
  • Technology and Security Systems
  • Network Traffic and Congestion Control
  • Smart Grid Security and Resilience
  • Software System Performance and Reliability
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Advanced Data Storage Technologies
  • Advanced Queuing Theory Analysis
  • Smart Grid and Power Systems
  • Energy, Environment, Economic Growth
  • Web Data Mining and Analysis
  • Power Systems and Renewable Energy
  • Software Testing and Debugging Techniques
  • Advanced Decision-Making Techniques
  • Distributed and Parallel Computing Systems

Northwest Institute of Nuclear Technology
2024

Zhejiang A & F University
2024

Guizhou Electric Power Design and Research Institute
2024

Tongji University
2012-2024

National University of Defense Technology
2024

Xiamen University of Technology
2023

Southeast University
2023

China University of Petroleum, East China
2023

Chongqing University of Posts and Telecommunications
2023

Wuhan University of Science and Technology
2023

As the core of blockchain technology, consensus algorithm directly affects security, stability, and decentralisation numerous other important characteristics. Choosing an appropriate for different scenarios is currently a challenge in implementation applications. This paper classifies improvement schemes proof stake (PoS) into three categories: PoS-based algorithms, PoS- PoW-based BFT-based algorithms. First, study introduces PoS variants then summarises ideas, effects, advantages,...

10.1155/2022/2812526 article EN cc-by Security and Communication Networks 2022-05-29

Non-adherence to 5-aminosalicylic acid (5-ASA) medication can limit the established benefits of this therapy in ulcerative colitis (UC).To determine rates and predictors non-adherence 5-ASA UC patients.Medication adherence was assessed using self-report data urinary drug excretion measurements. Participants completed a study-specific questionnaire two validated questionnaires: Beliefs about Medicine Questionnaire (BMQ)-Specific Satisfaction with Information Medicines Scale.A total 169...

10.1111/j.1365-2036.2009.04152.x article EN Alimentary Pharmacology & Therapeutics 2009-09-24

Network Intrusion Detection Systems (NIDS) have become a strong tool to alarm attacks in computer and communication systems. Machine learning, especially deep has made huge success fields of industry academic. intrusion activity can be time series event. In this paper, we adopt time-related learning approach detect network intrusions. A stacked sparse autoencoder (SSAE) is first built extract the features with greedy layer-wise strategy. And then, propose time- related detection system based...

10.1109/globecom38437.2019.9013302 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

Distributed Denial of Service (DDoS) is a serious computer network attack which can cause extreme performance degradation on the victim server. This paper presents formal and methodical way modeling DDoS by method Augmented Attack Tree (AAT), an AAT-based detection algorithm. explicitly captures particular subtle incidents triggered corresponding state transitions from view traffic transmission primary Two major contributions are given in this paper: (1) model (ADDoSAT) developed to assess...

10.1109/cit.2010.185 article EN 2010-06-01

Abstract Based on the data of listed small and medium‐sized enterprises (SMEs) from 2011 to 2020, this paper studies effects fintech financing constraints SMEs in China. The results denote that can significantly ease SMEs; with a 1% increase fintech, decrease by 0.0767%. intermediary mechanism analysis illustrates alleviating financial industry concentration information asymmetry. Besides, regions higher degree marketization industries relatively free competition are both more conducive SMEs.

10.1002/mde.3920 article EN Managerial and Decision Economics 2023-06-27

Modern vehicles are equipped with more than 100 Electrical Control Units (ECUs) over 2500 signals to transmit internally. The application of advanced electronics and communication techniques helps a vehicle transform from an information island into powerful distribution center. However, large number ECUs have introduced wider range security threats for vehicles. attackers can compromise remotely through vulnerable ECU. How evaluate the cyber in-vehicle has become important issue. Current...

10.1109/access.2021.3124565 article EN cc-by IEEE Access 2021-01-01

The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access databases. SQLIA adversary intelligently exploits the statement parsing operation by servers via specially constructed statements that subtly lead non-explicit executions or modifications of corresponding database tables. In this paper, we present formal methodical way modeling SQLIAs augmented attack trees. This explicitly captures particular...

10.1109/icime.2010.5478321 article EN 2010-01-01

How to achieve energy efficiency run a cloud data center is major challenge in the era of rising electricity cost and environmental protection. Various techniques have been devised help reduce consumption for centers that consist large number identical servers, including dynamic allocation active consolidating diverse applications on them, adjusting CPU speed an server. Leveraging these techniques, we use Online Coloring Bin Packing problem model consolidation devise effective...

10.1109/ccgrid.2012.50 article EN 2012-05-01

Network attacks occur in high proportion on the internet, thus aside from security as a means of defense there is need for being able to detect they so that measures can be put place tackle them.In this paper, we focus attack trees tool model thereby facilitating detection.More precisely, present unified parametrizable tree; applied intrusion detection and instantiated produce particular types literature.

10.20533/ijisr.2042.4639.2011.0003 article EN International Journal for Information Security Research 2011-03-01

10.1016/j.compeleceng.2011.04.010 article EN Computers & Electrical Engineering 2011-05-22

Cloud service selection with multi-type cloud computing resources is a novel research and catching increasing attention. To help users efficiently select integrate their desired services, the agent-based paradigm has emerged. In this work, we propose an intermediary agent model called ISAM which lets each manage some clustered services of same type. And based on model, dynamic strategy named DCS given. The core uses adaptive learning mechanism consisting incentive forgetting functions,...

10.1504/ijhpcn.2016.074660 article EN International Journal of High Performance Computing and Networking 2016-01-01

The regular assessment of the distribution network's hosting capacity (HC) is crucial for secure and stable operation power system as installed distributed photovoltaic (DPV) continues to increase. This paper introduces a multi-level estimation method evaluating regional HC DPVs. addresses limitations existing studies, which have small scale use complex methodologies. It conducts comprehensive integrated calculations three hierarchical levels networks, ranging from equipment level county...

10.1109/acpee60788.2024.10532288 article EN 2022 7th Asia Conference on Power and Electrical Engineering (ACPEE) 2024-04-11

In Vehicular Ad hoc NETworks (VANETs), IEEE 802.11p MAC (WAVE MAC) and its variations suffer from low spectrum efficiency, especially in densely populated Vehicular-to-Infrastructure (V2I) communication scenarios. Focusing on multi-channel coordination allocation, this paper proposes a Road Side Unit (RSU)-coordinated with centralized multi-criteria service channel allocation scheduling scheme. By separating safety function control further dividing messages into different types, the...

10.1109/iccve.2012.19 article EN 2012-12-01

This paper presents a comprehensive system modeling and analysis approach for both predicting controlling queuing delay at an expected value under multi-class traffic in single buffer. could effectively enhance QoS delivery sensitive applications. Six major contributions are given the paper: (1) discrete-time analytical model is developed capturing with binomial distribution; (2) control strategy dynamic queue thresholds used simulation experiments to specified within buffer; (3) feasibility...

10.1109/aina.2009.48 article EN 2009-01-01

Workflows have been used to represent a variety of applications that involve coordinating set business services or scientific services, which are generally geographically distributed. With the development cloud computing, workflow engine can be deployed as service, responsible for executing customers' instances. In components placed into different regions. Thus, one challenging problem arises is how select appropriate regions place in order efficiently execute service instance. Because this...

10.1109/icws.2016.56 article EN 2016-06-01

Network slicing is a new network architecture that provides multiple logical networks on the same shared infrastructure, each serving specific business type or industry user. The feature will provide end-to-end isolation between slices and ability to customize slice based service requirements (bandwidth, coverage, security, latency, reliability, etc.). This paper uses random forest deep neural (DNN) algorithms build intelligent models capable of proactively detecting eliminating incoming...

10.1109/icbda57405.2023.10104899 article EN 2023-03-03

Intelligent connected vehicles (ICVs) are equipped with extensive electronic control units which offer convenience but also pose significant cybersecurity risks. Penetration testing, recommended in ISO/SAE 21434 “Road vehicles—Cybersecurity engineering”, is an effective approach to identify vulnerabilities ICVs. However, there limited research on vehicle penetration testing from a black-box perspective due the complex architecture of Additionally, no framework has been proposed guide...

10.3390/app14010204 article EN cc-by Applied Sciences 2023-12-25
Coming Soon ...