- IPv6, Mobility, Handover, Networks, Security
- Wireless Communication Networks Research
- Wireless Networks and Protocols
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Network Traffic and Congestion Control
- Data Management and Algorithms
- Mobile Agent-Based Network Management
- Data-Driven Disease Surveillance
- Advanced Data Compression Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Data Mining Algorithms and Applications
- Distributed and Parallel Computing Systems
- Cultural Heritage Management and Preservation
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Blockchain Technology Applications and Security
- Algorithms and Data Compression
- Conservation Techniques and Studies
- Distributed systems and fault tolerance
- Biometric Identification and Security
- Advanced Image and Video Retrieval Techniques
- Speech Recognition and Synthesis
- Advanced Computational Techniques and Applications
Hangzhou Normal University
2012-2024
Oracle (United States)
2008-2016
Human Resource Development Group
2008
Motorola (United States)
2004-2007
Cisco Systems (China)
2004
University of Delaware
2004
University of British Columbia
2002
As a national Lingnan intangible cultural heritage, Dongguan’s Qian Jiao Lantern—featuring thousand-bamboo frames and oil lamps symbolizing clan prosperity—faces extinction due to aging inheritors (<5 remaining) prolonged crafting cycles (3–6 months/lantern), with no new lanterns produced since 2010. Analysis of 410 potential revealed that its transmission hinges on youth engagement in community affairs (Q4: β=0.202; Q5: β=0.204), forming “cognition-action” pathway contributing 13.3%...
With the increasing number of vehicles connected to Internet Vehicles (IoV), accommodate evolving needs and patterns new vehicles, passengers, drivers, traditional single Trusted Authority (TA) authentication model may no longer be suitable for IoV scenario, it is crucial develop secure, lightweight, efficient, cross-TA identity key agreement algorithms. In 2021, Xu et al. proposed a blockchain-based Roadside Unit (RSU)-assisted protocol IoV. However, we describe that their vulnerable...
To ensure the secure access control mechanisms for wireless sensor networks (WSN) with a 5G-enabled IoT system, very recently, Sahoo et al. (IEEE Internet of Things Journal, 10(17), pp. 15087-15099, DOI: 10.1109/JIOT.2023.3264565, Sep. 1, 2023) proposed three-factor-based authentication scheme 5G WSN and claimed that their can achieve all security properties. However, in this paper, we carefully analyze point out is vulnerable to user impersonation attacks, node captured simultaneous attacks...
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless network. order prevent unwarranted users from accessing network obtain patients’ data, designing lightweight and privacy-preserving authentication protocols plays crucial role. Many for IoT-based healthcare have been proposed recent years, but most them may suffer one or more security problems. particular, few can resist node-captured attacks achieve n-factor...
In 2009, Tsai proposed an efficient convertible multi-authenticated encryption (CMAE) scheme. However, the author shows that his scheme is distinguishable under adaptive chosen-message attack, and designated verifier can generate signature of same message for other verifiers. Since no formal model CMAE has been presented in literature, presents first complete CMAE. Then, a new proposed. The provably secure random oracle model.
Vehicle-to-grid (V2G) technology can achieve bidirectional energy flow between electric vehicles and the power grid, but it also faces serious safety privacy leakage issues. Recently, Shureshkumar et al. proposed a lightweight authentication protocol for V2G communication claimed that their scheme is secure against various known attacks supports many security features. In this paper, we demonstrate lacks of anonymity, unlinkability, session key secrecy, perfect forward secrecy. addition, not...
This paper summarizes the general requirements and specific characteristics of both geospatial raster database management system data processing platform from a domain-specific perspective as well computing point view. It also discusses need tight integration between system. These resulted in Oracle Spatial GeoRaster, global scale high performance earth imagery platform. The rationale, design, implementation, benefits GeoRaster are described. Basically, system, defines an integrated model,...
It is found that the performance of classifier designed with this method similar to traditional NN in terms classification accuracy. At same time significantly more economical and easier implement than NN.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>