- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Adversarial Robustness in Machine Learning
- Cloud Computing and Resource Management
- Software-Defined Networks and 5G
- Water Quality Monitoring Technologies
- Wireless Communication Security Techniques
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Software System Performance and Reliability
- Advanced Computational Techniques and Applications
- Water Quality Monitoring and Analysis
- Image and Video Quality Assessment
- Security and Verification in Computing
- Genomics and Phylogenetic Studies
- Distributed systems and fault tolerance
- Educational Reforms and Innovations
- Advanced Steganography and Watermarking Techniques
- Video Analysis and Summarization
- Video Coding and Compression Technologies
- Mobile Crowdsensing and Crowdsourcing
- Advanced Algorithms and Applications
Xidian University
2018-2025
Hunan Agricultural University
2014-2024
Peking University
2009
This paper examines the Galileo Open Service Navigation Message Authentication (OSNMA) and, for first time, discovers two critical vulnerabilities, namely artificially-manipulated time synchronization (ATS) and interruptible message authentication (IMA). ATS allows attackers falsify a receiver's signals and/or local reference (LRT) while still fulfilling (TS) requirement. IMA temporary interruption of navigation data process due to reception broken (probably caused by spoofing attacks)...
Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor. The data of water quality in the environment comes from different sensors, thus must be ... | Find, read cite all research you need on Tech Science Press
Mobile crowdsensing systems (MCSs) are widely used in data collection due to their flexible deployment and comprehensive coverage many IoT scenarios (e.g., road condition monitoring). Recently, the difference between workers' perception on location privacy has drawn researchers' attention. The only trading mechanism MCSs been designed, however, a single auction single-minded way. Realizing task requesters' competition requirement preference variance, this article, we first propose double MCS...
The advances in deep neural networks (DNNs) have driven many companies to offer their carefully-trained DNNs as inference services for clients’ private data. privacy concerns increasingly motivated the need (PI), where DNN inferences are performed directly on encrypted data without revealing client’s inputs server or server’s proprietary weights client. However, existing cryptographic protocols PI suffer from impractically high latency, stemming mostly non-linear operators like ReLU...
Auction is an efficient trading mechanism for cloud markets and adopted by many major providers, such as Amazon EC2. However, most auction designs only target at economic robustness without considering the bidding privacy leakage, which would dramatically hamper practical applications of truthful auctions. Existing secure mechanisms work on single-sided rather than more two-sided markets, these schemes are too unwieldy to be due significant computation communication overheads. To fill gaps,...
As the Internet of things (IoT) is increasingly popular, number IoT devices such as sensors and smart equipments are growing at an astonishing rate data generated by these exploding. However, massive data, stored in form isolated centers, can not be shared others who also need it. Moreover, exchange now needing a secure fair mechanism to guarantee provider's rights security. Data providers lack motivation share their no effective exists reward this behavior. To solve problems, we propose...
As convolutional neural networks (CNNs) exhibit remarkable performance in various inference tasks, it is increasingly important to enable Internet of Things (IoT) devices perform CNN-based applications. Many companies provide their carefully trained as services for resource-constrained clients (e.g., IoT devices). However, the use CNN many applications raises privacy concerns. Cryptographic a way efficiently and, at same time, preserve both client's input data and server's proprietary model....
The vision of the Internet Things (IoT) is creating an open and shared world connected to everything, making people’s lives more smart, convenient, efficient. Currently, there are various isolated IoT applications developed by different manufacturers for a single specific function. nodes classified into administrative domains according their affiliation, resulting in multi-domain environment. In order realize true with data sharing, this paper introduces sharing architecture based on...
Organic RFID tags have the features of two-dimensional bar codes, inexpensive, flexible and thin, while also integrated merits inorganic tags, making them promising in facilitating wide application technology. In this paper, organic technology its characteristics are analyzed, feasibility rice tracing is studied. Based on analysis each links supply chain, with as means, a chain system designed using database sensors. Focusing major requirements electronic scheme proposed for tracking chain....
The massive heterogeneous devices and open channels of the Internet Things (IoT) lead to low efficiency privacy leakage in authentication process, which brings great challenges identity authentication. This paper focuses on anonymous between IoT edge device cloud server. In this work, we first propose a novel lightweight protocol (LAAP) meet security requirements. Especially, proposed uses dynamic pseudonyms prevent traceable attacks caused by fixed identification also symmetric encryption...
Outsourcing neural network (NN) inference services to the cloud gives rise considerable privacy concerns about model provider's proprietary and user's private data. Current cryptography-based secure NN schemes are not suited for high-latency networks due their numerous communication overhead computing non-linear components of networks. In this paper, we present ParaNN, a cloud-based outsourced computation framework that supports lightweight inference. At core design parallel method...
Covert communication has recently been recognized as a highly promising security technology that enables transmitter Alice to reliably and covertly communicate with receiver Bob without being detected by malicious warden. Available works on covert mainly focus scenarios only one warden, while the fundamental limits of in more practical multi-warden remain largely unknown. This paper therefore investigates over an additive white Gaussian noise (AWGN) channel presence multiple wardens. We...
The advances in machine learning technology has promoted its great potential for deep neural network (DNN) inference powered applications of Internet Things (IoT), such as facial verification cameras and speech recognition assistants. current deployment these also raises serious privacy concerns, especially when sensitive individual information is accessed easily by various IoT devices. Fortunately, the cryptography-based solutions are able to execute secure without infringing user’s raw...
This paper focuses on the problem of protocol identification in industrial internet and proposes an unknown method. We first establish detection model to classify known protocols, interference signals then store protocols for manual analysis. Based Eps-neighborhood idea, we further develop hit algorithm propose method identify where supervised learning classification is realized. Finally, extensive experimental results are provided illustrate our theoretical findings. It indicates that...
Software-as-a-service (SaaS) clouds grow dramatically due to cost-effectiveness, availability, and flexibility. Quality of service (QoS) power, which represent performance cost, respectively, are conflicting yet critical issues in the scheduling SaaS clouds, some researchers have investigated tradeoff between them. However, existing works do not involve QoS attacks untrusted providers provide fake values absorb requests, resulting lower user experience system profits. In this paper, we...
The non-standard machinery refers to customized produced meet specific customer demands. mainstream research direction in data stream anomaly detection focuses on deep learning, which involves learning distribution through a large amount of training data. However, equipment has the characteristics small production scale and sparse samples, making it difficult obtain sufficient annotated sets. This inadequacy results model not enough, thereby rendering unable effectively detect abnormal...
Video shot boundary detection is a fundamental step for the organization of large video data. The classical VSB basically sequential frame to compute frame-by-frame, however this approach computationally very expensive databases .In work we propose dichotomy detection. proposed technique can improve performance algorithm and reduce calculation. Our experimental results show that produces faster rapid.
The meteorological factors play an important role in rice yield.In this paper, according to the current agricultural on impact of production, yield prediction model was established by using multiple stepwise regression analysis.The experimental results show that average forecast accuracy is more than 98%,and result consistent with trend measured results, and are credible.
The fuzzy query scheme based on vector index uses Bloom filter to construct for key words. Then the statistical attack deviation of frequency distribution brings out sensitive information disclosure. Using noise vector, a resistant serving encrypted database, i.e. S-BF, is introduced. With clear up index, attacks are resolved. Demonstrated by lab experiment, S-BF can achieve secure with powerful privation protection capability cloud database without loss efficiency.
The Internet of Things (IoT), as a emerging strategic industry, is widely used in digital homes, smart manufacturing, cities, and other fields. However since service capability single IoT device limited, it difficult to meet the complex requirements users. Multi-domain sharing, dynamic integration, collaborative development have become new tendencies development. This paper focuses on privacy leakage detection such composite services. Firstly, due heterogeneity various information, we study...
The microservice architecture has become a key technology in the development of Internet. It brings revolutionary to software production relationship and effectively improves scalability stability system. However, as system evolves splitting granularity is wrefined, scale microservices explodes problems such extended service discovery time high maintenance costs arise. For these problems, this paper proposes detection mesh scheme (DM) based on semantics, which divided into two main parts:...