Guangcheng Li

ORCID: 0000-0003-0186-7653
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Electrocatalysts for Energy Conversion
  • Advanced battery technologies research
  • Privacy-Preserving Technologies in Data
  • Cloud Computing and Resource Management
  • Full-Duplex Wireless Communications
  • Distributed systems and fault tolerance
  • Optical Network Technologies
  • Catalysis and Oxidation Reactions
  • Advancements in Battery Materials
  • MXene and MAX Phase Materials
  • Cooperative Communication and Network Coding
  • Age of Information Optimization
  • Data Stream Mining Techniques
  • Energy Harvesting in Wireless Networks
  • Ammonia Synthesis and Nitrogen Reduction
  • Nerve injury and regeneration
  • User Authentication and Security Systems
  • Acute Ischemic Stroke Management
  • Caching and Content Delivery
  • Mobile Crowdsensing and Crowdsourcing
  • Peptidase Inhibition and Analysis
  • Vehicular Ad Hoc Networks (VANETs)
  • Wireless Communication Security Techniques

Soochow University
2025

Soochow University
2025

Macau University of Science and Technology
2018-2023

Dongguan University of Technology
2023

University of Macau
2018-2022

Collaborative Innovation Center of Chemical Science and Engineering Tianjin
2018

Tianjin University
2018

Fiberhome Technology Group (China)
2005

In his blogs of 2012, Dr. Göte Nyman coined Internet Behaviors (IoB). idea, people's behaviors are very good predictors their needs, and hence technology companies can network human construct behavior-based systems to deliver more timely, responsive, intelligent services with privacy protection. 2020, Gartner ranked IoB first among its top nine strategic trends suggested that would touch almost half the world population. Built on core idea IoB, this paper is one comprehensively,...

10.1109/comst.2023.3246993 article EN IEEE Communications Surveys & Tutorials 2023-01-01

The thermally reduced Pt/TiO<sub>2</sub>(B) catalysts show high catalytic activity and good water resistance for the oxidation of CO.

10.1039/c8cy01410h article EN Catalysis Science & Technology 2018-01-01

Abstract Iridium (Ir) is recognized to have extremely high catalytic activity in the hydrogen evolution reaction (HER). However, there are still technical challenges maximizing utilization of Ir atoms process through dimensional regulation strategies. Herein, an innovative strategy utilized fabricate porous phosphorus‐doped iridium (P‐Ir) with a 2D structure, specifically reduction 1T phase‐IrO 2 (1T‐IrO ) nanosheets using phosphine gas. The optimized P‐Ir achieves overpotential 17.2 mV (vs...

10.1002/smll.202412338 article EN Small 2025-02-11

The design of bifunctional catalytic electrodes with high performance and low cost is the key to improving hydrogen production efficiency by water splitting. However, achieving coexistence activity stability materials still faces challenges. Herein, we designed prepared a self‐supported electrode material (Ni₂P/NiSe@CNTs/CC) through combined action metal‐catalyzed carbon nanotube (CNTs) growth, selenization, phosphating. In this process, CNTs are grown in situ on cloth (CC) surface, inner...

10.1002/cctc.202500071 article EN ChemCatChem 2025-03-05

Blockchain is a disruptive technology that enables disparate users to share their information in blocks trustworthily without centralized entity. One fundamental problem how stable the block interval. To address this problem, our method is: 1. predict computing power (i.e., hashrate) of blockchain system by cryptocurrency price; 2. interval according predicted power. This paper focuses on prediction global In prediction, we adopt LSTM-based regression algorithm handle hysteresis changes...

10.1109/icmlc48188.2019.8949188 article EN 2019-07-01

Hyperautomation can automate complex business processes, reduce human intervention and improve operational efficiency. Recommendation systems (RS) facilitate hyperautomation greatly. However, these require a large amount of user data to train their machine learning (ML) models hence privacy has received great attention. In this paper, we propose decentralized federated framework with privacy-preserving for RS. our framework, users the private public parameters locally but share only....

10.1080/17517575.2023.2193163 article EN Enterprise Information Systems 2023-03-28

Objective: To explore the effect of minimally invasive hematoma aspiration (MIHA) on c-Jun NH2-terminal kinase (JNK) signal transduction pathway after intracerebral hemorrhage (ICH). Methods: In this experiment, 300 adult male Wistar rats were randomly and averagely divided into sham-operated group, ICH group MIHA group. each 60 used in detection indexes while other 40 to replace which reached exclusion criteria (accidental death or operation failure). was induced by injection 70 µL...

10.3390/ijms17050710 article EN International Journal of Molecular Sciences 2016-05-13

In Industrial Internet of Things (IIoT), a number mutually untrusted devices with diverse computing resources and application requirements often need to work together serve industrial production. When applying permissionless blockchain process transactions among these devices, we are concerned two types fairness: mining fairness (i.e., miners should obtain commensurate rewards according their respective invested power) transaction-processing transaction packing confirming is in desired fair...

10.1109/tnse.2021.3099953 article EN IEEE Transactions on Network Science and Engineering 2021-07-26

The blockchain has been considered as a new decentralized computing paradigm that great potential to meet various needs. Considering private network (such data center) where incentive mechanisms are not required, this paper innovatively remolds the transaction-recording for processing. In our design, workers have different processing capacity and tasks resource requirements. Workers first get task information from then process locally, next perform proof of useful work (PoUW) consensus...

10.1109/tnse.2021.3086332 article EN IEEE Transactions on Network Science and Engineering 2021-06-04

Nakamoto's blockchain faces fairness and security barriers. Recently a famous protocol called FruitChain has been proposed to solve the two problems. In FruitChain, each miner performs hashing operations with low difficulty mine fruit containing transactions. These fruits are then packed into blocks. The implies that many miners might in short interval broadcasting nature of network means these pack transactions from similar transaction set fruits. Therefore, be multiple This paper is first...

10.1145/3449301.3449335 article EN 2020-11-20

In-band wireless full-duplex supports simultaneous transmission and reception, therefore has a great potential of doubling the physical-layer (PHY) rate. However, adopting conventional CSMA/CA protocol for might seriously deteriorate MAC throughput efficiency because its long contention delay high collision cost. In this paper, we propose novel design that fully employs characteristics to overcome two drawbacks. Taking into account feature our shortens size basic slot can reduce delay. On...

10.1109/smartiot.2018.00024 article EN 2018-08-01

Chain-structured blockchains (e.g., Bitcoin and Ethereum) are often criticized for resource waste, low scalability, high transaction fees. Tangle has been proposed to overcome these drawbacks by adopting a directed acyclic graph structure, new consensus mechanisms, etc. Particularly, defines transaction-processing rule, which requires that incoming transactions should approve several existing before being attached Tangle, exclude miners However, this rule makes it difficult support smart...

10.1109/icnsc55942.2022.10004163 article EN 2021 IEEE International Conference on Networking, Sensing and Control (ICNSC) 2022-12-15

The advent of 6G networks with their capabilities for massive communication and low latency presents opportunities a more intelligent way life. This paper proposes secure, flexible, decentralized data sharing approach, tailor-made the complexities networks. Building upon famous framework called Droplet, proposed approach furnishes users fine-grained access to time-series data, while maintaining overhead minimizing potential leakage. We spotlight an underlying vulnerability within Droplet...

10.1109/access.2023.3336399 article EN cc-by-nc-nd IEEE Access 2023-01-01

An ASTN (Automatic Switched Transport Network) enhances the traditional transport network by a control plane. The plane implements signalling and routing mechanisms that allow automatic configuration of end-to-end connections on client requests. Consequently management ASTNs requires integrated layer underlying network. This article describes generic architecture for ASON systems tuned to this requirement. centre piece is CORBA level interface which allows an easy integration several...

10.1117/12.573676 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2005-02-08
Coming Soon ...