Dapeng Man

ORCID: 0000-0003-1177-3693
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Networks and Protocols
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Security in Wireless Sensor Networks
  • Information and Cyber Security
  • Underwater Vehicles and Communication Systems
  • Advanced Graph Neural Networks
  • Network Packet Processing and Optimization
  • Blockchain Technology Applications and Security
  • Complex Network Analysis Techniques
  • Cryptography and Data Security
  • Adversarial Robustness in Machine Learning
  • Web Data Mining and Analysis
  • Mobile Agent-Based Network Management
  • Distributed Sensor Networks and Detection Algorithms
  • Natural Language Processing Techniques
  • Digital Media Forensic Detection
  • Carbon and Quantum Dots Applications
  • Speech and Audio Processing

Harbin Engineering University
2016-2025

Institute of Navigation
2012

Harbin University
2008-2009

Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process data sharing, challenges regarding formation mutual-trust relationships and level user participation are yet to be solved. The existing solution is use third party trust organization for but there no dynamic incentive mechanism with large number users. Blockchain 2.0 smart contract has natural advantage being able enable automated transactions...

10.1016/j.compeleceng.2020.106587 article EN cc-by Computers & Electrical Engineering 2020-02-20

As an innovative strategy, edge computing has been considered a viable option to address the limitations of cloud in supporting Internet-of-Things applications. However, due instability network and increase attack surfaces, security edge-assisted IoT needs be better guaranteed. In this paper, we propose intelligent intrusion detection mechanism, FedACNN, which completes task by assisting deep learning model CNN through federated mechanism. order alleviate communication delay limit federal...

10.1155/2021/9361348 article EN cc-by Security and Communication Networks 2021-10-05

With the rapid development of WLAN technology, wireless device-free passive human detection becomes a newly-developing technique and holds more potential to worldwide ubiquitous smart applications. Recently, indoor fine-grained motion based on PHY layer information is rapidly developed. Previous systems either rely deploying specialized with dense transmitter-receiver links or elaborate off-line training process, which blocks deployment weakens system robustness. In paper, we explore...

10.3390/s151229896 article EN cc-by Sensors 2015-12-21

10.1109/icassp49660.2025.10887770 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Intrusion detection plays a critical role in security of people's possessions. Approaches such as video-based, infrared-based, RFID, UWB, etc. can provide satisfying accuracy. However, they all require specialized hardware deployment and strict using conditions which hinder their wide deployment. Beyond communication, WLANs also act generalized sensor networks there are several researches working on motion via WLAN due to its advantages flexibility, coverage, cost efficiency. Nevertheless,...

10.1109/glocom.2016.7842238 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Device-free passive identity identification attracts much attention in recent years, and it is a representative application sensorless sensing. It can be used many applications such as intrusion detection smart building. Previous studies show the sensing potential of WiFi signals device-free manner. confirmed that human's gait unique from each other similar to fingerprint iris. However, accuracy existing approaches not satisfactory practice. In this paper, we present Wii, WiFi-based Identity...

10.3390/s17112520 article EN cc-by Sensors 2017-11-02

Backdoors on federated learning will be diluted by subsequent benign updates. This is reflected in the significant reduction of attack success rate as iterations increase, ultimately failing. We use a new metric to quantify degree this weakened backdoor effect, called persistence. Given that research improve performance has not been widely noted, we propose Full Combination Backdoor Attack (FCBA) method. It aggregates more combined trigger information for complete pattern global model....

10.1609/aaai.v38i19.30131 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

Device-free passive localization (DFPL) has been an emerging application with fast increasing development. Channel State Information- (CSI-) based DFPL is recently paid more attention to for fine-granularity and stability of CSI. However, lots dead spots exist in the area interest. And accuracy not still completely satisfactory, especially outside first Fresnel zone. In our paper, we put forward a new metric estimate sensitivity receiver changes detecting area. experiment, observe that...

10.1155/2015/256162 article EN cc-by International Journal of Distributed Sensor Networks 2015-11-01

Anchor link prediction enhances the effectiveness of digital forensics through identification multiple social network users. The current methods based on deep learning are characterized by both exaggerated similarity between adjacent nodes in same latent space and variation feature spaces caused semantics. A novel approach is developed to fuse semantic features different networks this paper. proposed method divided into two stages. Firstly, representation pays more attention influence...

10.1109/tifs.2024.3364066 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

The rapid development in network technology has resulted the proliferation of Internet Things (IoT). This trend led to a widespread utilization decentralized data and distributed computing power. While machine learning can benefit from massive amount IoT data, privacy concerns communication costs have caused silos. Although adoption blockchain federated technologies addresses security issues related collusion attacks leakage sharing, “free-rider attacks” “model poisoning process require...

10.1155/2021/9965157 article EN cc-by Security and Communication Networks 2021-07-01

Existing attack graph generation methods can only generate graphs for the single target, and scale of generated is too large. To solve these problems, a global method proposed on basis breadth-first search algorithm. The strategies that limit steps success probability paths are adopted to reduce graph. experimental results indicate using which by this analyze network vulnerabilities from angle. In addition, validated it effective remove redundancy edges nodes graph, consequently reduces

10.1109/icnsc.2008.4525217 article EN 2008-04-01

Considering the problem that intrusion detection systems always produced duplicated alarm information, in this paper we propose an iterative self-organization clustering algorithm. It begins with calculating average value of classes as new center on basis random selection, merging and dividing dynamically, then finish procedure through iteration finally. Experimental results DARPA1999 testing data set show method is more excellent than traditional methods both aggregation rate error rate....

10.1016/j.proeng.2012.01.435 article EN Procedia Engineering 2012-01-01

Abstract The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing processing. To solve this problem, edge technology came into being. Because is closer user, processing part at can also bring a faster response user improve their experience. However, existing platforms have problems such as storage security multiparty mutual trust. Blockchain become an important means above sharing due its excellent characteristics. core...

10.1002/ett.4015 article EN Transactions on Emerging Telecommunications Technologies 2020-06-10

Anchor link prediction exacerbates the risk of privacy leakage via de-anonymization social network data. Embedding-based methods for anchor are limited by excessive similarity associated nodes in a latent feature space and variation between spaces caused semantics different networks. In this article, we propose novel method which reduces impact semantic discrepancies networks space. The proposed consists two phases. First, graph embedding focuses on structural roles increases distinction...

10.1109/tdsc.2023.3242009 article EN IEEE Transactions on Dependable and Secure Computing 2023-02-03

WiFi-based device-free passive localization is an emerging technique and holds great potentials to ubiquitous location-based service security-critical applications. Recently, channel state information (CSI) can be expediently extracted from commercial WiFi NICs, which offers a chance for fine-grained high-accuracy localization. Current systems either rely on deploying specialized with dense transmitter-receiver links high economic cost or elaborating intensive training process labor cost. In...

10.1109/trustcom.2016.0185 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2016-08-01

There is a new cache pollution attack in the information-centric network (ICN), which fills router by sending large number of requests for nonpopular content. This will severely reduce hit rate. Therefore, detection attacks also an urgent problem current information center network. In existing research on detection, most methods manually setting threshold are used detection. The accuracy result depends setting, and adaptability to different environments weak. order improve environments, this...

10.1155/2021/6658066 article EN cc-by Security and Communication Networks 2021-06-15

With the continuous enrichment of Internet Things (IoT) applications, demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, user management space varies depending on application, where security domain stands as an example. It one key technologies data sharing organizations to cross boundary verify identity authority users in other domains. Aiming at slow speed authentication protocol during cross‐domain access without considering...

10.1155/2021/9942950 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Anchor link prediction across social networks plays an important role in multiple network analysis. Traditional methods rely heavily on user privacy information or high-quality topology information. These are not suitable for analysis real-life. Deep learning based graph embedding restricted by the impact of active protection policy users structure. In this paper, we propose a novel method which neutralizes users’ evasion strategies. First, with conditional estimation is used to obtain...

10.1145/3548685 article EN ACM Transactions on Privacy and Security 2022-07-18

With the eruptible popularity of wireless sensing, device-free passive human detection has received widespread attention. Indoor fine-grained motion based on PHY layer information is rapidly developed. Since signal features can vary under different multipath propagation conditions, in paper, we propose a lightweight and real-time via physical phase information, which independent indoor scenarios needs no re-calibration. We firstly obtain available feature by linear transformation raw channel...

10.1109/uic-atc-scalcom-cbdcom-iop.2015.65 article EN 2015-08-01
Coming Soon ...