Rui Chen

ORCID: 0009-0006-9762-059X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Wireless Communication Technologies
  • Full-Duplex Wireless Communications
  • Smart Systems and Machine Learning
  • Concrete and Cement Materials Research
  • TiO2 Photocatalysis and Solar Cells
  • Advanced Steganography and Watermarking Techniques
  • Phase Change Materials Research
  • Quantum-Dot Cellular Automata
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Microbial Applications in Construction Materials
  • COVID-19 impact on air quality
  • Air Quality Monitoring and Forecasting
  • Chaos-based Image/Signal Encryption
  • Aerogels and thermal insulation
  • Internet of Things and AI
  • Blockchain Technology Applications and Security
  • Air Quality and Health Impacts
  • Energy Harvesting in Wireless Networks
  • Transition Metal Oxide Nanomaterials

China Three Gorges University
2020-2025

Mobile Edge Computing (MEC) migrates the computing center to network edge provide services for Users (MUs). However, due limited capacity of MUs and insufficient types stored by servers, it brings great challenges computation offloading service caching in Internet Things (IoT) network. In this paper, we investigate joint optimization problem offloading, resource allocation replacement a collaborative MEC system minimize total cost all under latency constraints. Accordingly, formulate as...

10.1109/infocomwkshps54753.2022.9797916 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022-05-02

The Vehicular Edge Computing (VEC) provides powerful computing resources for intelligent terminals. However, the diversity of at edge nodes (i.e., servers and idle vehicles) mobility vehicles impose great challenges on computation offloading. In this paper, we investigate joint optimization problem offloading resource allocation in a cooperative vehicular network by exploiting Road Side Units (RSUs) equipped with servers. order to minimize task completion time under latency constraint, Soft...

10.1109/infocomwkshps54753.2022.9798187 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022-05-02

In recent years, more and occupants have suffered from respiratory illness due to poor indoor air quality (IAQ). order address this issue, paper presents a method achieve efficient monitoring adaptive control of IAQ. Firstly, an system (IAQMCS) is developed using IoT technology. Then, based on fuzzy inference, novel index (FAQI) model proposed effectively assess Furthermore, simple mechanism, called SACM, designed automatically the IAQMCS according real-time FAQI value. Finally, extensive...

10.1155/2022/4127079 article EN cc-by Wireless Communications and Mobile Computing 2022-09-26

In this study, effects of metakaolin and lime on the microstructural characteristics, unconfined compressive strength (UCS), shrinkage, suction, shear resistance laterite were investigated. Soil samples treated with 5 wt% (LaL) or 4 (LaLM) prepared. Samples an optimal water content 32% compacted cured for 180 days, followed by saturation dehydration until desirable was attained. Then, UCS, suction at a normal stress 200 kPa determined. addition, scanning electron microscopy imaging as well...

10.1155/2020/6347597 article EN cc-by Advances in Civil Engineering 2020-01-01

In this article, we investigate the covert communication for a cooperative cognitive radio (CCR) system, where secondary transmitters (STs) help primary transmitter (PT) to transmit information while covertly transmitting their own receiver (SR) against warden of PT. particular, different ST scheduling schemes are proposed communications, namely, rate maximization (CRM), best channel gain (BCG), and fairness oriented (FO). The closed-form expression is derived expected detection error...

10.1109/jsen.2023.3238002 article EN IEEE Sensors Journal 2023-01-27

Covert communication is able to provide high-level security by protecting behavior. In this paper, we develop a covert cooperative cognitive radio (CCCR) network, where primary transmitter (PT) transmits information with the aid of multiple secondary transmitters (STs). return, STs are transmit private exploiting PT's spectrum in presence powerful eavesdropper (Eve). Meanwhile, propose user scheduling scheme based on link and maximum-minimum principle. Moreover, derive Eve's expected...

10.1109/globecom48099.2022.10001374 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2022-12-04

10.1109/wcnc57260.2024.10571222 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2024-04-21

10.1109/vtc2024-spring62846.2024.10683321 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2024-06-24

Covert communication is capable of enhancing user privacy by protecting behavior. In this article, employing overlay and underlay spectrum access modes, we investigate a covert cooperative cognitive radio (CCCR) system, where primary transmitter (PT) secondary (ST) cooperate with each other to secretly transmit their own confidential information. Specifically, PT can initiate the transmission directly or information aid ST. return, ST able exploiting PT's spectrum. our assume that both send...

10.1109/tvt.2023.3293481 article EN IEEE Transactions on Vehicular Technology 2023-07-10

Federated learning (FL) enables the training of a global model using clients' local datasets, leveraging their computing resources for efficient machine while preserving user privacy. This paper explores FL in wireless networks, focusing on client selection and bandwidth allocation as key factors impacting latency, covert constraint energy consumption. We propose per-round drift plus cost (PEDPC) algorithm to address this optimization problem from an online perspective. The performance PEDPC...

10.1145/3666025.3699410 article EN 2024-11-04

Frequency hopping (FH) technique has been extensively used for high security communication because of its strong anti-jamming ability and good confidentiality. However, with the continuous advancement electronic attacks, plenty energy limited devices in Internet Things (IoT) are experiencing a sharp increase interference, which poses serious challenges to current FH sequence generation techniques. In this paper, we propose novel scheme by exploiting an ultra-lightweight block cipher...

10.1109/icct59356.2023.10419759 article EN 2023-10-20
Coming Soon ...