Ian Zhou

ORCID: 0000-0002-7154-4561
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Cryptography and Data Security
  • Distributed systems and fault tolerance
  • Precipitation Measurement and Analysis
  • Cryospheric studies and observations
  • Greenhouse Technology and Climate Control
  • Privacy-Preserving Technologies in Data
  • Soil Moisture and Remote Sensing
  • Privacy, Security, and Data Protection
  • Energy Efficient Wireless Sensor Networks
  • Hydrological Forecasting Using AI
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • FinTech, Crowdfunding, Digital Finance
  • Software-Defined Networks and 5G
  • Plant Surface Properties and Treatments
  • Plant Water Relations and Carbon Dynamics
  • Smart Agriculture and AI
  • Advanced Wireless Communication Technologies

University of Technology Sydney
2019-2024

Applications and technologies of the Internet Things are in high demand with increase network devices. With development such as 5G, machine learning, edge computing, Industry 4.0, has evolved. This survey article discusses evolution presents vision for 2.0. The 2.0 is discussed across seven major fields. These fields learning intelligence, mission critical communication, scalability, energy harvesting-based sustainability, interoperability, user friendly IoT, security. Other than these...

10.1109/access.2021.3078549 article EN cc-by IEEE Access 2021-01-01

Machine learning is a powerful technology for extracting information from data of diverse nature and origin. As its deployment increasingly depends on multiple entities, ensuring privacy these contributors becomes paramount the integrity fairness machine endeavors. This review looks into recent advancements in secure multi-party computation (SMPC) learning, pivotal championing privacy. We evaluate applications various aspects, including security models, requirements, system types, service...

10.1109/access.2024.3388992 article EN cc-by-nc-nd IEEE Access 2024-01-01

Frost damage in broadacre cropping and horticulture (including viticulture) results substantial economic losses to producers may also disrupt associated product value chains. risk windows are changing timing, frequency, duration. Faced with the increasing cost of mitigation infrastructure competition for resources (e.g., water energy), multiperil insurance, need supply chain certainty, under pressure innovate order manage mitigate risk. protection systems cyber-physical (CPSs) consisting...

10.1109/jiot.2020.2972936 article EN IEEE Internet of Things Journal 2020-02-11

Future 6G wireless communication systems are expected to feature intelligence and automation. Knowledge-defined networking (KDN) is an evolutionary step toward autonomous self-driving networks. The building blocks of the KDN paradigm in achieving networks software-defined (SDN), packet-level network telemetry, machine learning (ML). intends integrate manage control automatically. In this study, we first introduce disadvantages current technologies. Then, associated technologies explored with...

10.1016/j.array.2022.100136 article EN cc-by-nc-nd Array 2022-04-04

As a tool for human technological advancement, the peer-review system acts as gateway ensuring academic paper qualities. However, has proven to be slow and expensive. Also, biasedness remains an unsolved problem. Such issues could become major bottleneck, which can adversely impact research progress dissemination of knowledge. This aims propose double-blind review preserve authors reviewers anonymity. also addresses concerning payment, inconsistent metrics, biased reviews. The proposed...

10.1109/icspcs47537.2019.9008695 article EN 2019-12-01

Exhibition of malicious behavior during blockchain consensus, threats against reputation systems, and high TX latency are significant issues for blockchain-based IoT systems. Hence, to mitigate such challenges we propose "Pledge", a unique Proof-of-Honesty based consensus protocol. Initial experimentation shows that Pledge is economical with low computations communications complexity in transaction confirmation.

10.1109/icbc48266.2020.9169406 article EN 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2020-05-01

The ubiquitous use of Internet Things (IoT) ranges from industrial control systems to e-Health, e-commerce, smart cities, supply chain management, cars, cyber-physical and a lot more. However, the data collected processed by IoT especially ones with centralized are vulnerable availability, integrity, privacy threats. Hence, we present “PrivySharing,” blockchain-based innovative framework for integrity privacy-preserving sharing in city environment. proposed scheme is distinct existing...

10.5220/0007829803630371 article EN Proceedings of the 15th International Joint Conference on e-Business and Telecommunications 2019-01-01

The existing lottery-based consensus algorithms, such as Proof-of-Work, and Proof-of-Stake, are mostly used for blockchain-based financial technology applications. Similarly, the Byzantine Fault Tolerance algorithms do provide finality, yet they either communications intensive, vulnerable to Denial-of-Service attacks, poorly scalable, or have a low faulty node tolerance level. Moreover, these not designed Internet of Things systems that require near-real-time transaction confirmation,...

10.1109/lcn48667.2020.9314794 article EN 2020-11-16

Frost events incur substantial economic losses to farmers. These could induce damage plants and crops by damaging the cells. In this article, a recurrent neural network-based method, automating frost prediction process, is proposed. The models leveraged in article include standard network, long short-term memory, gated unit. proposed method aims increase frequency from once per 12–24 h for next day or night minute-wise predictions hour events. To achieve goal, datasets NSW ACT of Australia...

10.1016/j.array.2022.100158 article EN cc-by-nc-nd Array 2022-04-09

The weather phenomenon of frost poses great threats to agriculture. As recent prediction methods are based on on-site historical data and sensors, extra development deployment time required for collection in any new site. aim this article is eliminate the dependency sensors methods. In article, a method spatial interpolation proposed. models use climate from existing stations, digital elevation surveys, normalized difference vegetation index estimate target site's next hour minimum...

10.48550/arxiv.2204.08465 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...