Bin Li

ORCID: 0000-0003-3455-4901
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Distributed and Parallel Computing Systems
  • Real-Time Systems Scheduling
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Security and Verification in Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Steganography and Watermarking Techniques
  • Cloud Computing and Resource Management
  • Vehicular Ad Hoc Networks (VANETs)
  • Access Control and Trust
  • China's Ethnic Minorities and Relations
  • Cloud Data Security Solutions
  • Technology and Security Systems
  • Metal-Organic Frameworks: Synthesis and Applications
  • Synthesis and Characterization of Heterocyclic Compounds
  • Embedded Systems and FPGA Design
  • Advanced Authentication Protocols Security
  • Network Packet Processing and Optimization
  • Biometric Identification and Security
  • Mobile Agent-Based Network Management

Zhengzhou University
2010-2024

State Key Laboratory of Cryptology
2023

Yichun University
2011-2022

Xi'an University of Technology
2020

Harbin Institute of Technology
2018

PLA Information Engineering University
2008-2018

National University of Defense Technology
2015

Louisiana State University
2014

Beijing University of Posts and Telecommunications
2009

China United Network Communications Group (China)
2006

A convolutional neural network-based multiobject detection and tracking algorithm can be applied to vehicle traffic flow statistics, thus enabling smart transportation. Aiming at the problems of high computational complexity algorithms, a large number model parameters, difficulty in achieving throughput with low power consumption edge devices, we design implement low-power, low-latency, high-precision, configurable detector based on field programmable gate array (FPGA) YOLOv3...

10.3390/s23042208 article EN cc-by Sensors 2023-02-16

As a distributed database mapping the domain name and IP address, DNS makes it easier to access Internet However, relies on resolution of root server, which is hierarchical network topology centered root. It vulnerable single points failure data tampered, affects normal service seriously. To solve this problem, we proposed new blockchain-based decentralization storage method by studying principle characteristics blockchain. And implement system DecDNS establish multiple parallel nodes, store...

10.1109/dsc.2018.00035 article EN 2018-06-01

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems blockchains to varying degrees. As an important component blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order improve calculation performance function,...

10.1155/2020/8876317 article EN cc-by Security and Communication Networks 2020-09-14

In lattice-based postquantum cryptography (PQC), polynomial multiplication is complex and time-consuming, which affects the overall computational efficiency. addition, parameters of different algorithms require number theoretic transform (NTT) structures, limits versatility hardware design. To this end, article proposes scalable parallel optimization NTT based on a field-programmable gate array (FPGA). By analyzing algorithm flow NTT, inverse (INTT), pointwise (PWM), an FPGA loosely coupled...

10.1109/tvlsi.2023.3312423 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2023-09-28

Job-shop scheduling, a typical NP-complete problem, is an important step in planning and manufacturing control of CIMS environments. Researches on job-shop scheduling focus knowledge-based approaches heuristic searching which are useful apart from the difficulty obtaining knowledge. Genetic algorithms optimization methods use ideas evolution nature. Simple as genetic are, they efficient. Three novel models, such decimal idle time coding (DITCGA), binary (BITCGA), adaptive (AITCGA), presented...

10.1109/icsmc.1996.565434 article EN 2002-12-23

With the rapid development of Internet, increasingly more attention has been paid to network security problems. A defense technology become a very important research field. Currently, most equipment transmits data in plaintext at link layer, which exposes information, such as IP addresses, port numbers, and application protocols, an attacker provides opportunity for attacks. To protect against attacks ensure its security, this paper proposes mimic encryption system security. Based on...

10.1109/access.2018.2869174 article EN cc-by-nc-nd IEEE Access 2018-01-01

With the rapid development of Internet, security network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic (CMD) approaches provide a new way to solve this problem. To enhance data, paper proposes encryption box for security. can directly access where device is located, automatically complete negotiation, safe convenient services, effectively prevent attacks. According principles dynamization, diversification, randomization, uses...

10.1155/2020/8868672 article EN Security and Communication Networks 2020-10-28

10.1016/j.future.2018.02.018 article EN Future Generation Computer Systems 2018-02-26

In recent years, single-ISA heterogeneous chip multiprocessors (CMP) consisting of big high-performance cores and small power-saving on the same die have been proposed for exploration high energy-efficiency. On such platforms, an appropriate runtime scheduling policy lies at heart program executions to benefit from processor heterogeneity. To date, most prior works addressing this problem concentrate performance enhancement; however, they lack detailed justification energy consumption do not...

10.1109/isqed.2014.6783390 article EN 2014-03-01

Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether device being control-flow hijacked by launching challenge-response process. In the growing landscape of Internet Things, more and peer devices need to communicate share sensed data conduct inter-operations without involvement trusted center. Toward scalability CFA mechanisms mitigating single-point failure, it important design decentralized schema. This...

10.3390/s22166044 article EN cc-by Sensors 2022-08-12

10.4156/jdcta.vol4.issue9.4 article EN International Journal of Digital Content Technology and its Applications 2010-12-31

Cryptography algorithms are crucial technologies in today's network security, playing important roles areas such as cloud data, digital currencies, and blockchain. In this paper, based on the FPGA platform, we propose a high-performance hybrid encryption scheme by integrating mimic defense with multiple algorithms. Firstly, optimize 3DES, ZUC, ChaCha20 using pipelining approach incorporate them heterogeneous execution units architecture, achieving high-speed of data. Secondly, generate...

10.1109/isctis58954.2023.10213016 article EN 2023-07-07

Cryptographic algorithms are widely used in information security fields such as network protocol authentication and commercial encryption software.Password recovery based on the hash algorithm is an important means of electronic forensics, encrypted restoration, illegal filtering, maintenance.The traditional password system mainly CPU GPU has a low energy efficiency ratio cracking cannot meet high-performance computing requirements.To further improve computational application flexibility...

10.1109/access.2021.3053068 article EN cc-by IEEE Access 2021-01-01

In recent years, the adversarial example has become a non-trivial threat to deep learning model. It harms availability and integrity of as inconspicuous perturbation is hard be distinguished by human observer. Among mitigation strategies, those schemes using moving target defense methodology defend examples proclaims satisfactory performance in black-box context. As for protecting models from white-box adversaries, however, only scheduling model candidate set randomly handle these stronger...

10.1109/acctcs58815.2023.00115 article EN 2023-02-01

With the rapid development of Internet Vehicles (IoV), demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an SM9 aggregate scheme implemented on Field-Programmable Gate Array (FPGA). The includes both fault-tolerant non-fault-tolerant modes, which are designed to address challenges in various network environments. We provide security proofs these two modes based a K-ary Computational Additive Diffie-Hellman (K-CAA) difficult...

10.3390/s24186011 article EN cc-by Sensors 2024-09-17

Transport MPLS (T-MPLS) is regarded as one of the most important transport technologies in next generation network (NGN). It a connection-oriented packet technology that developed from techniques and now defined by ITU-T SG13 & SG15. In this paper, we analyze architecture T-MPLS networks. Also building blocks for modular design common wireless equipment are introduced. And based on functional blocks, four-layer simulation model developed. A cascaded transfer scheme proposed to save bandwidth...

10.1109/wicom.2009.5302668 article EN 2009-09-01

The optimal allocation of resources is great significance to improve the efficiency and reduce cost equipment manufacturing.For shortage traditional Hungary algorithm that cannot solve resource scheduling problem containing parallel jobs, an improved proposed in this paper.The converts a typical assignment by replacing link with virtual job.And then, optimizing it classical determining realizability job based on result.Finally, scheme will be got through iterative searching.In addition,...

10.2991/lemcs-15.2015.33 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2015-01-01

A current research trend is to combine multimedia data with artificial intelligence and process them on cloud servers. In this context, ensuring the security of servers critical, cyber mimic defence (CMD) technology a promising approach end. CMD, which an innovative active developed in China, can be applied many scenarios. However, although mathematical model key component universally acceptable for theoretical CMD has not been established yet. work, attack problems modelling difficulties...

10.1155/2020/8819958 article EN Security and Communication Networks 2020-11-27

To strengthen the security of edge network data and reduce latency, in this paper, we combine an advanced reduced instruction set computing machine (ARM) a field programmable gate array (FPGA) to propose lightweight ARM-FPGA architecture for protection acceleration. Firstly, access control lists are through FPGA authorize filter illegal data, thereby reducing transmission processing invalid on network. Secondly, based principles dynamization, diversification, randomization, initial random...

10.1155/2022/8458314 article EN Wireless Communications and Mobile Computing 2022-02-22

Code randomization, aka software diversification, is an effective way to mitigate code-reuse attacks. This mechanism diversifies the target into heterogeneous variants, making a specific attack chain unfeasible for transformed variants. Enhancing heterogeneity of these variants important this method reach its expected security level. Additionally, limiting their execution overhead necessary ensure availability protection. However, finding optimal subset among large number diversified...

10.1109/trustcom60117.2023.00073 article EN 2023-11-01
Coming Soon ...