- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- FinTech, Crowdfunding, Digital Finance
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Cybercrime and Law Enforcement Studies
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- Interconnection Networks and Systems
- Spam and Phishing Detection
- Advanced Decision-Making Techniques
- Energy Harvesting in Wireless Networks
- Advanced Computational Techniques and Applications
- Visual Attention and Saliency Detection
- Auction Theory and Applications
- Advanced Optical Network Technologies
- Information and Cyber Security
- Access Control and Trust
- Law, AI, and Intellectual Property
- Mobile Ad Hoc Networks
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
University of Chinese Academy of Sciences
2012-2024
University of Electronic Science and Technology of China
2018-2023
Beihang University
2023
Shandong Academy of Sciences
2022
Qilu University of Technology
2022
China Academy of Transportation Sciences
2022
Jinling Institute of Technology
2021
Fiberhome Technology Group (China)
2020
Xidian University
2020
Mississippi State University
2019
A resource reservation protocol (RSVP), a flexible and scalable receiver-oriented simplex protocol, is described. RSVP provides receiver-initiated reservations to accommodate heterogeneity among receivers as well dynamic membership changes; separates the filters from reservation, thus allowing channel changing behavior; supports robust multipoint-to-multipoint communication model by taking soft-state approach in maintaining reservations; decouples routing functions. simple network...
A challenging research issue in high speed networking is how to control the transmission rate of statistical data flows. This paper describes a new algorithm, VirtualClock, for traffic high-speed networks. VirtualClock maintains multiplexing flexibility pocket switching while ensuring each flow its reserved average throughput at same time. The algorithm has been tested through simulation.
Abstract As a new technology, blockchain can be used to analyse and process the data through effective integration of financial resources. New formats or service models are produced upgrade system promote efficiency quality operations from three layers (data, rules, application) based on customers' needs. The technology help industry automatically accurately identify customer credit conditions, restructure market system, improve cross‐border payment. Meanwhile, it also posed challenge for...
Consensus protocol is a key technology enabling blockchain to provide secure and trustful services in wireless networks. However, most previous study on consensus protocols for networks relies reliable message transmissions honest leaders. In practice, blockchains inherently suffer from limited physical resources unreliable channels due environmental noises adversary attacks. This paper studies the design of Byzantine fault tolerant single-hop subject signal-to-noise constraint. For this...
It is of the utmost importance to achieve flexible and fine-grained access control electronic health records (EHR) in smart elderly healthcare (SEH) for providing high-quality services protecting their privacy simultaneously. In this paper, a flexible, fine-grained, elderly-centric scheme presented EHR data SEH. proposed scheme, Ciphertext Policy Attribute Based Encryption (CP-ABE), permission token, dual-key regression, blockchain techniques are leveraged realize multi-dimensional terms...
Deployment is an important issue in wireless sensor networks (WSNs). Most recent researches focus on the optimal deployment strategy to achieve full coverage WSNs. However, sensing devices practical applications are finite, and cannot whole monitored region. Moreover, objects distribute unevenly, thus significance differs from region How deploy limited number of sensors efficiently has been issue. In this study, we propose a new problem WSNs, named N-node coverage, acquire maximum...
Mobile ad-hoc cloud can exploit the computing resources (e.g., smartphones, vehicles, and unmanned systems) scattered in mobile environment to form a self-organized local resource pool for providing opportunistic services. However, highly dynamic distributed characteristics of network bring great challenges privacy security such sharing. In this article, we first discuss attractive features blockchain sharing services secure trustful way then problems caused when using existing consensus...
Application services in cloud computing model have complex scheduling, composition, configuration and deployment conditions, even the multi-condition requirements, it can also be based on change of time to schedule virtual services. Therefore, demand optimizing scheduling strategy ensure data security recovery ability is increasingly prominent. This paper proposes a trusted distributed audit method for task which used storage information cluster. mainly uses solution that combines block...
Reporter: Li Zhang, Mississippi State University LibrariesPresenters: Sandra Hirsh, San Jose and Bohyun Kim, of Rhode IslandThe Special Libraries Association 2019 Annual...
With the deep integration of blockchain, cloud computing and 5G technology, business model Internet is also undergoing subversive changes. Based on current development trends industry, this article illustrates application prospects blockchain technology in cloud-network collaboration For users to purchase network services, consensus accounting are adopted effectively avoid uploading user data company's server, thereby protecting privacy from threats. This provides a solution that uses ensure...
In the application of cloud storage, most important technique is to ensure safety and reliability data. Therefore, mechanism user data must be solved for storage development. this paper, erasure code redundancy technology introduced into storage. The divided several blocks which are stored in different nodes, based on fragmentation method code. Byzantine environment, a subset m may decode blocks. So, verification so that it research focus
In order to enhance the real time operability and efficiency of polling which are both crucial for network fault management, current schemes based on SNMP discussed, a novel dynamic scheme is put forward. By soft partition variation amplitude concept uncertainty reasoning cloud model, this realizes fine adjustment intervals according qualitative rules. Simulation results show that proposed can display data in detail more accurately, distortion collection effectively be minimized with...
We describe a pricing structure for the provision of IT services that ensures trust without requiring repeated interactions between service providers and users. It does so by offering elicits truthful reporting quality (QoS) while making them profitable. This mechanism also induces truth-telling on part users reserving service.
China’s Agri-product supply chain has various problems such as information asymmetry and lack of trust, while blockchain technology, with its decentralization, security transparency, tamper-evident characteristics, will effectively solve the safety traceability communication in chain. This paper firstly explores basis “Dual-chain integration” between chain, then uses game model to study stability contractual cooperation companies, deepening path under application, point out direction for...
In order to meet development tendency of mobile internet and the needs LBS(location-based services) applications, we carried out a research framework called virtual street platform(VSP), which used GPS, P2P IP communitaction.
Near Field Communication( NFC) enabled phone made it possible that the offline payment between users can be conducted with digital vouchers(eVoucher). The duplication of eVoucher and disclosure personal information are concerned by user, however current technology embedded is not sufficient to build a complete secured system. main challenges security come from lacking specific comprehensive analysis requirements in design implementation NFC payments. paper analyzed threats which may damage...
With the rapid development of information technology, many products and services are now digitized, some these require intellectual property protection (IPP). In absence reliable versatile IPP solutions, various problems have arisen regarding digital tampering verification. We propose in this paper that insights from social informatics about features available blockchain technology could help technologists design develop safer systems. analyze background unclear ownership, data work abuse...
Traditional centralized management of transportation data sharing faces several actual difficulties. Besides large cost operation and management, security flexibility are two main-concerned issues. It is worth noting that Blockchain 3.0 has attracted much attention recent years due to its potential in applications various new areas addition the financial industry. To address current challenges, this paper introduces a decentralized platform into process. A model based on blockchain...