Li Zhang

ORCID: 0009-0005-8821-8921
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • FinTech, Crowdfunding, Digital Finance
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Cybercrime and Law Enforcement Studies
  • Cryptography and Data Security
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Computing and Resource Management
  • Interconnection Networks and Systems
  • Spam and Phishing Detection
  • Advanced Decision-Making Techniques
  • Energy Harvesting in Wireless Networks
  • Advanced Computational Techniques and Applications
  • Visual Attention and Saliency Detection
  • Auction Theory and Applications
  • Advanced Optical Network Technologies
  • Information and Cyber Security
  • Access Control and Trust
  • Law, AI, and Intellectual Property
  • Mobile Ad Hoc Networks
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems

University of Chinese Academy of Sciences
2012-2024

University of Electronic Science and Technology of China
2018-2023

Beihang University
2023

Shandong Academy of Sciences
2022

Qilu University of Technology
2022

China Academy of Transportation Sciences
2022

Jinling Institute of Technology
2021

Fiberhome Technology Group (China)
2020

Xidian University
2020

Mississippi State University
2019

A resource reservation protocol (RSVP), a flexible and scalable receiver-oriented simplex protocol, is described. RSVP provides receiver-initiated reservations to accommodate heterogeneity among receivers as well dynamic membership changes; separates the filters from reservation, thus allowing channel changing behavior; supports robust multipoint-to-multipoint communication model by taking soft-state approach in maintaining reservations; decouples routing functions. simple network...

10.1109/65.238150 article EN IEEE Network 1993-09-01

A challenging research issue in high speed networking is how to control the transmission rate of statistical data flows. This paper describes a new algorithm, VirtualClock, for traffic high-speed networks. VirtualClock maintains multiplexing flexibility pocket switching while ensuring each flow its reserved average throughput at same time. The algorithm has been tested through simulation.

10.1145/99508.99525 article EN 1990-08-01

Abstract As a new technology, blockchain can be used to analyse and process the data through effective integration of financial resources. New formats or service models are produced upgrade system promote efficiency quality operations from three layers (data, rules, application) based on customers' needs. The technology help industry automatically accurately identify customer credit conditions, restructure market system, improve cross‐border payment. Meanwhile, it also posed challenge for...

10.1002/sres.2710 article EN Systems Research and Behavioral Science 2020-06-18

Consensus protocol is a key technology enabling blockchain to provide secure and trustful services in wireless networks. However, most previous study on consensus protocols for networks relies reliable message transmissions honest leaders. In practice, blockchains inherently suffer from limited physical resources unreliable channels due environmental noises adversary attacks. This paper studies the design of Byzantine fault tolerant single-hop subject signal-to-noise constraint. For this...

10.1109/twc.2023.3293709 article EN IEEE Transactions on Wireless Communications 2023-07-14

It is of the utmost importance to achieve flexible and fine-grained access control electronic health records (EHR) in smart elderly healthcare (SEH) for providing high-quality services protecting their privacy simultaneously. In this paper, a flexible, fine-grained, elderly-centric scheme presented EHR data SEH. proposed scheme, Ciphertext Policy Attribute Based Encryption (CP-ABE), permission token, dual-key regression, blockchain techniques are leveraged realize multi-dimensional terms...

10.1109/jiot.2023.3328382 article EN IEEE Internet of Things Journal 2023-10-30

Deployment is an important issue in wireless sensor networks (WSNs). Most recent researches focus on the optimal deployment strategy to achieve full coverage WSNs. However, sensing devices practical applications are finite, and cannot whole monitored region. Moreover, objects distribute unevenly, thus significance differs from region How deploy limited number of sensors efficiently has been issue. In this study, we propose a new problem WSNs, named N-node coverage, acquire maximum...

10.1049/iet-wss.2011.0012 article EN IET Wireless Sensor Systems 2012-03-09

Mobile ad-hoc cloud can exploit the computing resources (e.g., smartphones, vehicles, and unmanned systems) scattered in mobile environment to form a self-organized local resource pool for providing opportunistic services. However, highly dynamic distributed characteristics of network bring great challenges privacy security such sharing. In this article, we first discuss attractive features blockchain sharing services secure trustful way then problems caused when using existing consensus...

10.1109/mnet.001.1800064 article EN IEEE Network 2020-06-05

Application services in cloud computing model have complex scheduling, composition, configuration and deployment conditions, even the multi-condition requirements, it can also be based on change of time to schedule virtual services. Therefore, demand optimizing scheduling strategy ensure data security recovery ability is increasingly prominent. This paper proposes a trusted distributed audit method for task which used storage information cluster. mainly uses solution that combines block...

10.1109/nana.2018.8648712 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2018-10-01

Reporter: Li Zhang, Mississippi State University LibrariesPresenters: Sandra Hirsh, San Jose and Bohyun Kim, of Rhode IslandThe Special Libraries Association 2019 Annual...

10.1080/1941126x.2019.1670488 article EN Journal of Electronic Resources Librarianship 2019-10-02

With the deep integration of blockchain, cloud computing and 5G technology, business model Internet is also undergoing subversive changes. Based on current development trends industry, this article illustrates application prospects blockchain technology in cloud-network collaboration For users to purchase network services, consensus accounting are adopted effectively avoid uploading user data company's server, thereby protecting privacy from threats. This provides a solution that uses ensure...

10.1145/3390566.3391675 article EN 2020-03-12

10.3785/j.issn.1008-973x.2019.05.003 article EN Journal of ZheJiang University (Engineering Science) 2019-05-17

In the application of cloud storage, most important technique is to ensure safety and reliability data. Therefore, mechanism user data must be solved for storage development. this paper, erasure code redundancy technology introduced into storage. The divided several blocks which are stored in different nodes, based on fragmentation method code. Byzantine environment, a subset m may decode blocks. So, verification so that it research focus

10.4028/www.scientific.net/amr.912-914.1345 article EN Advanced materials research 2014-04-01

In order to enhance the real time operability and efficiency of polling which are both crucial for network fault management, current schemes based on SNMP discussed, a novel dynamic scheme is put forward. By soft partition variation amplitude concept uncertainty reasoning cloud model, this realizes fine adjustment intervals according qualitative rules. Simulation results show that proposed can display data in detail more accurately, distortion collection effectively be minimized with...

10.1109/iwisa.2009.5072840 article EN 2009-05-01

We describe a pricing structure for the provision of IT services that ensures trust without requiring repeated interactions between service providers and users. It does so by offering elicits truthful reporting quality (QoS) while making them profitable. This mechanism also induces truth-telling on part users reserving service.

10.2139/ssrn.869266 article EN SSRN Electronic Journal 2005-01-01

China’s Agri-product supply chain has various problems such as information asymmetry and lack of trust, while blockchain technology, with its decentralization, security transparency, tamper-evident characteristics, will effectively solve the safety traceability communication in chain. This paper firstly explores basis “Dual-chain integration” between chain, then uses game model to study stability contractual cooperation companies, deepening path under application, point out direction for...

10.54691/bcpbm.v13i.66 article EN cc-by BCP Business & Management 2021-11-16

In order to meet development tendency of mobile internet and the needs LBS(location-based services) applications, we carried out a research framework called virtual street platform(VSP), which used GPS, P2P IP communitaction.

10.2991/iccnce.2013.148 article EN cc-by-nc 2013-01-01

Near Field Communication( NFC) enabled phone made it possible that the offline payment between users can be conducted with digital vouchers(eVoucher). The duplication of eVoucher and disclosure personal information are concerned by user, however current technology embedded is not sufficient to build a complete secured system. main challenges security come from lacking specific comprehensive analysis requirements in design implementation NFC payments. paper analyzed threats which may damage...

10.4156/jcit.vol8.issue4.10 article EN Journal of Convergence Information Technology 2013-02-28

With the rapid development of information technology, many products and services are now digitized, some these require intellectual property protection (IPP). In absence reliable versatile IPP solutions, various problems have arisen regarding digital tampering verification. We propose in this paper that insights from social informatics about features available blockchain technology could help technologists design develop safer systems. analyze background unclear ownership, data work abuse...

10.6919/icje.201908_5(9).0017 article EN International Core Journal of Engineering 2019-08-01

Traditional centralized management of transportation data sharing faces several actual difficulties. Besides large cost operation and management, security flexibility are two main-concerned issues. It is worth noting that Blockchain 3.0 has attracted much attention recent years due to its potential in applications various new areas addition the financial industry. To address current challenges, this paper introduces a decentralized platform into process. A model based on blockchain...

10.1117/12.2623963 article EN Sixth International Conference on Electromechanical Control Technology and Transportation (ICECTT 2021) 2022-02-07
Coming Soon ...