Shichang Xuan

ORCID: 0000-0003-0332-0686
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Network Packet Processing and Optimization
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Advanced Text Analysis Techniques
  • Opinion Dynamics and Social Influence
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Graph Neural Networks
  • Anomaly Detection Techniques and Applications
  • Indoor and Outdoor Localization Technologies
  • Misinformation and Its Impacts
  • Text and Document Classification Technologies
  • Caching and Content Delivery
  • User Authentication and Security Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Web Data Mining and Analysis
  • Peer-to-Peer Network Technologies

Harbin Engineering University
2014-2024

Harbin Institute of Technology
2020

Institute of Navigation
2012

Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process data sharing, challenges regarding formation mutual-trust relationships and level user participation are yet to be solved. The existing solution is use third party trust organization for but there no dynamic incentive mechanism with large number users. Blockchain 2.0 smart contract has natural advantage being able enable automated transactions...

10.1016/j.compeleceng.2020.106587 article EN cc-by Computers & Electrical Engineering 2020-02-20

Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous high data rate services between physically proximate devices without interconnection access points (AP) or service network (SN), spectral efficiency can be drastically increased. However, due to its inherent open wireless communicating features, security...

10.3390/sym11080969 article EN Symmetry 2019-08-01

Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM has been extensively studied, existing works neglect fact that location information can play an important role influence propagation. In this paper, we study location-based seeds selection problem, which aims to find positive seed set given query region block negative propagation as much possible. order overcome low efficiency of simulation-based greedy algorithm,...

10.1109/access.2019.2900708 article EN cc-by-nc-nd IEEE Access 2019-01-01

Emerging as the effective strategy of intelligent transportation system (ITS), vehicular ad hoc networks (VANETs) have capacity drastically improving driving experience and road safety. In typical VANET scenarios, high mobility volatility vehicles result in dynamic topology networks. That is, individual vehicle may pass through domain multiple neighboring road-side-units (RSUs) during a comparatively short time interval. Hence, efficient low-latency cross-domain verification with all...

10.3390/sym12061003 article EN Symmetry 2020-06-12

With the arrival of Internet Things (IoT) era and rise Big Data, cloud computing, similar technologies, data resources are becoming increasingly valuable. Organizations users can perform all kinds processing analysis on basis massive IoT data, thus adding to their value. However, this is based data-sharing transactions, most existing work focuses one aspect such as convenience, privacy protection, auditing. In paper, a data-sharing-transaction application blockchain technology proposed,...

10.3390/app9235159 article EN cc-by Applied Sciences 2019-11-28

The rapid development in network technology has resulted the proliferation of Internet Things (IoT). This trend led to a widespread utilization decentralized data and distributed computing power. While machine learning can benefit from massive amount IoT data, privacy concerns communication costs have caused silos. Although adoption blockchain federated technologies addresses security issues related collusion attacks leakage sharing, “free-rider attacks” “model poisoning process require...

10.1155/2021/9965157 article EN cc-by Security and Communication Networks 2021-07-01

Online social networks provide convenient conditions for the spread of rumors, and false rumors bring great harm to life. Rumor dissemination is a process, effective identification in early stage their appearance will reduce negative impact rumors. This paper proposes novel rumor detection (ERD) model based on reinforcement learning. In part, dual-engine deep learning proposed realize differential feature extraction original tweets replies. A double self-attention (DSA) mechanism proposed,...

10.1155/2021/5569064 article EN cc-by Security and Communication Networks 2021-05-31

In real social networks, it is often the case that opposite opinions, ideas, products, or innovations are propagating simultaneously. Although competitive influence problem has been extensively studied, existing works neglect fact location information can play an important role in propagation. this paper, we study location-aware blocking maximization (LIBM) problem, which aims to find a positive seed set maximize blocked negative for given query region. order overcome low efficiency of...

10.1109/access.2018.2876141 article EN cc-by-nc-nd IEEE Access 2018-01-01

With the development of intelligent technologies, Internet Things (IoT) opens up a new era in field automotive networks, namely, Vehicles (IoV). The main goal IoV is to provide secure and reliable network vehicles so that users can enjoy various services. However, vulnerabilities incomplete protection mechanisms have led proliferation security threats against networks. Intrusion detection technology an effective solution for security, especially when artificial intelligence (AI) has been...

10.1109/mce.2021.3137790 article EN IEEE Consumer Electronics Magazine 2021-12-23

Considering the problem that intrusion detection systems always produced duplicated alarm information, in this paper we propose an iterative self-organization clustering algorithm. It begins with calculating average value of classes as new center on basis random selection, merging and dividing dynamically, then finish procedure through iteration finally. Experimental results DARPA1999 testing data set show method is more excellent than traditional methods both aggregation rate error rate....

10.1016/j.proeng.2012.01.435 article EN Procedia Engineering 2012-01-01

Abstract The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing processing. To solve this problem, edge technology came into being. Because is closer user, processing part at can also bring a faster response user improve their experience. However, existing platforms have problems such as storage security multiparty mutual trust. Blockchain become an important means above sharing due its excellent characteristics. core...

10.1002/ett.4015 article EN Transactions on Emerging Telecommunications Technologies 2020-06-10

Node Localization technology is one of key technologies in wireless sensor network. DV-Hop localization algorithm a kind range-free algorithm. In this paper, an improved aiming to enhance accuracy proposed. To accuracy, average per-hop distance replaced by corrected value global and error . When calculating hop distance, unknown nodes use corresponding expression according different value. Comparison with algorithm, simulation results show that the can reduce more effectively.

10.4028/www.scientific.net/amm.543-547.3256 article EN Applied Mechanics and Materials 2014-03-01

With the continuous enrichment of Internet Things (IoT) applications, demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, user management space varies depending on application, where security domain stands as an example. It one key technologies data sharing organizations to cross boundary verify identity authority users in other domains. Aiming at slow speed authentication protocol during cross‐domain access without considering...

10.1155/2021/9942950 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Information‐Centric Networking with caching is a very promising future network architecture. The research on its cache deployment strategy divided into three categories, namely, noncooperative cache, explicit collaboration and implicit cache. Noncooperative can cause problems such as high content repetition rate in the web space. Explicit generally reflects best effect but requires lot of communication to satisfy exchange node information depends controller perform calculation. On this...

10.1155/2021/5648765 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Application layer firewalls protect the trusted area network against information security risks. However, firewall performance may affect user experience. Therefore, analysis plays a significant role in evaluation of application firewalls. This paper presents an analytic model firewall, based on system to evaluate capability firewall. In order enable users improve with limited resources, resource allocation was evaluated obtain optimal scheme terms throughput, delay, and packet loss rate....

10.1371/journal.pone.0167280 article EN cc-by PLoS ONE 2016-11-28

Massive security alerts produced by safety equipments make it necessary to recognize and predict multi-step attacks.In this paper, a novel method of recognizing predicting attacks is proposed.It calculates attack conversion frequencies, then mines the sequences.On basis, matches new alert sequences dynamically, recognizes predicts next step.The result experiment shows that proposed effective accurate.

10.5815/ijwmt.2012.02.04 article EN International Journal of Wireless and Microwave Technologies 2012-04-15

Occupancy information is one of the most important privacy issues a home. Unfortunately, an attacker able to detect occupancy from smart meter data. The current battery-based load hiding (BLH) methods cannot solve this problem. To thwart detection attacks, we propose framework schemes prevent (BPOD). BPOD monitors power consumption home and detects in real time. According result, modifies those statistical metrics consumption, which highly correlate with by charging or discharging battery,...

10.1155/2017/5350201 article EN cc-by Security and Communication Networks 2017-01-01

While mobile networks provide many opportunities for people, they face security problems huge enough that a firewall is essential. The in offers secure intranet through which all traffic handled and processed. Furthermore, due to the limited resources networks, execution can impact quality of communication between Internet. In this paper, performance evaluation mathematical model system developed using queuing theory multihierarchy with multiple concurrent services. addition, throughput...

10.1155/2018/8130152 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Radio frequency identification (RFID) has been widespread used in massive items tagged domains. However, tag collision increases both time and energy consumption of RFID network. Tag can seriously affect the success identification. An efficient anti-collision protocol is very crucially system. In this paper, an improved binary search namely BRTP proposed to cope with concern, which introduces a Bi-response mechanism. Biresponse mechanism, two groups tags allowed reply reader same slot....

10.32604/cmc.2020.09919 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

Federated learning (FL) has become a prominent paradigm for collaborative model training while ensuring data privacy. However, in resource-constrained environments, such as the Internet of Things (IoT), FL faces distinct challenge from Lazybone attackers, who compromise system performance by providing low-quality or conducting minimal local to reduce their computational burden. In this paper, we propose Fedeval, novel multi-dimensional evaluation framework designed defend against attacks....

10.1145/3703631 article EN ACM Transactions on Sensor Networks 2024-12-04

Due to the vast popularity of sensors, cloud computing, mobile and intelligent devices, Internet Things has seen tremendous growth in recent years. Operating system type recognition is core technology network security assessment. inherit problems such as situation risk threat information, operating seeks research attention for security. In view current identification method active system, it prone be detected by intrusion detection system. The based on transmission control protocol/Internet...

10.1177/1550147718806707 article EN cc-by International Journal of Distributed Sensor Networks 2018-10-01
Coming Soon ...