Hongwei Lu

ORCID: 0000-0002-4590-3874
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Cryptography and Data Security
  • Recommender Systems and Techniques
  • Advanced Graph Neural Networks
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Advanced Database Systems and Queries
  • Bone Tissue Engineering Materials
  • Image Retrieval and Classification Techniques
  • Service-Oriented Architecture and Web Services
  • Opinion Dynamics and Social Influence
  • Advanced Measurement and Detection Methods
  • Peer-to-Peer Network Technologies
  • Blockchain Technology Applications and Security
  • Infrared Target Detection Methodologies
  • Data Management and Algorithms
  • Smart Grid Security and Resilience

Jilin Agricultural Science and Technology University
2025

Huazhong University of Science and Technology
2014-2024

Yangtze River Pharmaceutical Group (China)
2023

Harbin University of Science and Technology
2023

Xi'an Technological University
2011-2012

Changchun Institute of Technology
2011

Shanghai Jiao Tong University
2004-2011

Ministry of Public Security of the People's Republic of China
2010

Union Hospital
2010

Naval Aeronautical and Astronautical University
2010

Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security privacy issues. paper, we propose new pseudo-identity-based scheme for conditional anonymity with integrity authentication VANET. The proposed uses pseudonym joining process road-side unit (RSU) protect real identity even from RSU, case it compromised. All previous identity-based schemes have been...

10.1109/access.2019.2919973 article EN cc-by-nc-nd IEEE Access 2019-01-01

Abstract This study investigates the flavour profile of volatile compounds in venison-based prepared food subjected to various reheating methods. Gas chromatography-ion mobility spectrometry (GC-IMS) and electronic nose technology were employed detect analyse characteristic three types venison prefabricated samples, which underwent different treatments. During research, 41 distinct identified from samples. Following normalisation ion peaks statistical analysis techniques, 21 organic (VOCs)...

10.1556/066.2024.00224 article EN Acta Alimentaria 2025-02-25

Image encryption is an efficient and vital way to protect classified secret images. With the advancement of processing power computer, AES, DES, or chaotic series type just alike image schemes are not as secure before. Therefore, in this paper, we present a new hybrid method for protecting imperative images by employing logistic sine system (LSS) together with two-dimensional cellular automata FSM-based DNA rule generator. The hash (SHA-256) algorithm used generate key compute initial values...

10.1109/access.2019.2920383 article EN cc-by-nc-nd IEEE Access 2019-01-01

With the booming integration of IoT technology in our daily life applications such as smart industrial, city, home, grid, and healthcare, it is essential to ensure security privacy challenges these systems. Furthermore, time‐critical healthcare require access from external parties (users) their real‐time private information via wireless communication devices. Therefore, user authentication must be addressed sensor networks (WSNs). In this paper, we propose a secure lightweight three‐factor...

10.1155/2021/8871204 article EN cc-by Journal of Sensors 2021-01-01

The Internet of things (IoT) is a system smart technologies and services that mutually communicate data between users devices or via the Internet. Since are shared remote user various sensing over network, it essential to design secure, lightweight efficient authentication protocol for IoT environment. In context security network privacy, mutual necessary securely accessing However, faces substantial new challenges realizing due constraints. this paper, we present lightweight, robust secure...

10.1109/access.2019.2946400 article EN cc-by IEEE Access 2019-01-01

With the booming of online social networks, trust has been used to cluster users in recommender systems. It proven improve recommendation accuracy when communities are integrated into memory-based collaborative filtering algorithms. However, existing community mining methods only consider relationships, regardless distrust information. In this paper, considering both and a SVD signs based method is proposed process relationship matrix order discover communities. A modified metric which...

10.1145/2661829.2662085 article EN 2014-11-03

The vehicular ad hoc network (VANET) is an intelligent transportation system application that aims to ensure the security of road traffic information over V2V communication and V2I communication. In this paper, we propose a blockchain-based privacy-preserving authentication scheme in VANETs. We explore strategy local blockchain for make use private public managing event messages. trusted authority (TA) responsible making transactions within boundary countries, are identity required vehicles...

10.1145/3377458.3377466 article EN 2019-12-21

Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well computation communication overheads.In this paper, we a robust conditional privacypreserving scheme based on pseudonym root with cuckoo filter to meet requirements reduce our scheme, used new idea generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named "pseudonym root," generates all the same...

10.3837/tiis.2019.12.018 article EN KSII Transactions on Internet and Information Systems 2019-12-31

Wireless sensor network (WSN) plays an important role in information collection and processing Intelligent Transportation Systems (ITS) recently. With rapid development of ITS, the size complexity WSN is rapidly increasing. Thus, how to evaluate reliability large-scale has attracted more attention. In this article, defined as probability that functional. A confident coverage (CIC) model-based algorithm (CICRA) proposed comprehensively consider connectivity reliability. Especially, determine...

10.1109/tvt.2023.3275579 article EN IEEE Transactions on Vehicular Technology 2023-06-07

MapReduce is a widely adopted computing framework for data-intensive applications running on clusters. This paper proposed an approach to exploit data parallelisms in XML processing using Hadoop. The authors' solution seamlessly integrates storage, labeling, indexing, and parallel queries process massive amount of data. Specifically, the authors introduce SDN labeling algorithm distributed hierarchical index DHTs. More importantly, advanced two-phase are designed that able efficiently...

10.4018/ijghpc.2016070105 article EN International Journal of Grid and High Performance Computing 2016-07-01

A novel color image retrieval method using both and local spatial feature histograms (CLSFH) is proposed. In CLSFH, the non-uniform quantized HSV model used; mean standard deviation of 5/spl times/5 neighbors every pixel are calculated, used to generate histogram histogram; directional difference unit 3/spl times/3 defined computed, histogram. The three as indexes retrieve images. Experimental results show that CLSFH has better performance than other color-spatial based methods for images,...

10.1109/icccas.2004.1346332 article EN 2004-10-26

In addition to the security and privacy challenges in vehicular ad hoc network (VANET), computational communicational costs are huge challenges, since they increase latency, thus casing reduce network's communication efficiency, providing attacker with an opportunity penetrate network. this paper, we propose a new scheme eliminate mentioned VANET systems. first part of scheme, initialize register On-Board Units (OBUs) Road Side (RSUs). second part, exchange between RSU OBU mutual...

10.1109/hpcc/smartcity/dss.2019.00212 article EN 2019-08-01

Abstract Freshly, an innumerable chaotic system based complex and more time‐consuming image encryption algorithms have been proposed. The majority of those scrambling diffusion like two phases or rounds before performing the actual encryption, which leads toward extra time consumption. So unlike those, this article presents a novel algorithm that is on game trick. proposed method DNA it can accomplish dual function with one round, is, for bit planes pixels, we called as DNA‐SPD. First all,...

10.1002/ett.4034 article EN Transactions on Emerging Telecommunications Technologies 2020-07-07
Coming Soon ...