Chang Liu

ORCID: 0000-0002-5058-322X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Advanced Photonic Communication Systems
  • Network Time Synchronization Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Human Mobility and Location-Based Analysis
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Privacy-Preserving Technologies in Data

State Grid Hebei Electric Power Company
2022

Recently, IoT devices have become the targets of large-scale cyberattacks, and their security issues been increasingly serious. However, due to limited memory battery power devices, it is hardly possible install traditional software, such as antivirus software for defense. Meanwhile, network-based traffic detection difficult obtain internal behavior states conduct in-depth analysis because more use encrypted traffic. Therefore, how complex behaviors inside perform defense an issue that needs...

10.1155/2022/1443978 article EN cc-by Security and Communication Networks 2022-03-18

Due to the characteristics of small volume, low power consumption and often distributed in unattended corners, node devices IoT have become main entrance for attackers control network. In order detect abnormal nodes as early possible, we study detection methods stage capture attack this paper, combine most commonly used MQTT protocol Internet things with core idea typical methods. Under server-client architecture, heartbeat message greeting are together monitor state. Finally, a review...

10.1109/icece54449.2021.9674523 article EN 2021-12-17

To solve the problem of jitter and low network throughput caused by impact background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for flows, named hierarchical crossover mechanism based time-aware shaper (HC-TAS) improving traditional counterpart. Then, model, we designed an inbound algorithm frame length matching outbound queue status, making sure that smaller data frames will not be blocked large frames. This greatly improves utilization...

10.1155/2024/8882006 article EN Wireless Communications and Mobile Computing 2024-04-15

Under the current background, it is very important to study key technologies of new power system edge-to-side security protection for massive heterogeneous IoT terminals and edge agents, including defense at levels device ontology security, communication interaction secure access. Meaning. The technology has a summary impact on privacy indoor positioning. This paper proposes an positioning method based federated learning in Mobile Edge. Computing (MEC) environment. Firstly, we analyze...

10.1155/2022/2311264 article EN Mobile Information Systems 2022-10-12
Coming Soon ...