Hongbing Cheng

ORCID: 0000-0002-8504-1092
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Cryptography and Data Security
  • Advanced MIMO Systems Optimization
  • Atmospheric chemistry and aerosols
  • Advanced Wireless Communication Techniques
  • Air Quality and Health Impacts
  • Mobile Ad Hoc Networks
  • Cloud Data Security Solutions
  • IoT and Edge/Fog Computing
  • Advanced Authentication Protocols Security
  • Caching and Content Delivery
  • Wireless Communication Networks Research
  • Energy Efficient Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Millimeter-Wave Propagation and Modeling
  • Cloud Computing and Resource Management
  • Air Quality Monitoring and Forecasting
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • RFID technology advancements
  • Advanced Malware Detection Techniques
  • Atmospheric Ozone and Climate
  • Privacy-Preserving Technologies in Data
  • Indoor Air Quality and Microbial Exposure

Zhejiang University of Technology
2016-2025

Chinese Academy of Meteorological Sciences
2011-2024

Yangtze University
2022-2023

Nanjing University
2012-2023

Chongqing University of Technology
2023

Guangdong University of Technology
2023

China Meteorological Administration
2011-2022

Samsung (United States)
2016-2021

ORCID
2018

University of Stavanger
2011-2017

In recent years, the security issues of cognitive radio (CR) networks have drawn a lot research attentions. Primary user emulation attack (PUEA), as one common attacks, compromises spectrum sensing, where malicious forestalls vacant channels by impersonating primary to prevent other secondary users from accessing idle frequency bands. this paper, we propose new cooperative sensing scheme, considering existence PUEA in CR networks. proposed information different is combined at fusion center...

10.1109/twc.2011.041311.100626 article EN IEEE Transactions on Wireless Communications 2011-04-26

Abstract. The real-time measurements of NH3 and trace gases were conducted, in conjunction with semi-continuous water-soluble ions PM2.5 at a rural site the North China Plain (NCP) from May to September 2013 order better understand chemical characteristics ammonia impact secondary ammonium aerosols on formation NCP. Extremely high NH4+ concentrations observed after precipitation event within 7–10 days following urea application. Elevated levels coincided elevated NH4+, indicating that likely...

10.5194/acp-18-167-2018 article EN cc-by Atmospheric chemistry and physics 2018-01-08

The Cloud is increasingly being used to store and process big data for its tenants classical security mechanisms using encryption are neither sufficiently efficient nor suited the task of protecting in Cloud. In this paper, we present an alternative approach which divides into sequenced parts stores them among multiple storage service providers. Instead itself, proposed scheme protects mapping various elements each provider a trapdoor function. Analysis, comparison simulation prove that...

10.1109/cc.2015.7122469 article EN China Communications 2015-06-01

Secondary aerosol (SA) frequently drives severe haze formation on the North China Plain. However, previous studies mostly focused submicron SA formation, thus our understanding of supermicron particles remains poor. In this study, PM2.5 chemical composition and PM10 number size distribution measurements revealed that occurred in very distinct ranges. particular, dust-dominated was surprisingly high increased with relative humidity (RH). formed aerosols reached comparable levels during...

10.1021/acs.est.0c07243 article EN Environmental Science & Technology 2020-11-25

The destruction of communication infrastructure after a disaster makes it impossible for vehicles to timely transmit important data, such as casualty locations, road conditions and rescue demands, which brings great difficulties ensure safe driving efficient rescue. Some existing schemes have proposed the use Unmanned Aerial Vehicles (UAVs) assist data sharing in Internet (IoV) perform instant missions. However, untrusted network environment mutual unbelief among lead potential security...

10.1109/tnsm.2024.3394162 article EN IEEE Transactions on Network and Service Management 2024-04-26

Considering the openness and cross-domains of cloud computing, traditional privacy-preserving technology cannot be applied in computing efficiently. In this paper, inspired by accountability idea, we proposed an accountable mechanism based on identity-based encryption for which focuses constraining illegal network behavior performing to protect privacy participants. First, description logic, defined basic concepts about guarantee, request, attribute, exposure condition system, at same time,...

10.1109/access.2018.2851599 article EN cc-by-nc-nd IEEE Access 2018-01-01

Sharding is a promising technique to improve the scalability of blockchain systems via processing transactions in parallel. However, there an overwhelmingly high proportion cross-shard requiring complicated consensus among involved shards. To solve problem, most state-of-the-art works adopt centralized or decentralized coordinator harmonize consensus. Nevertheless, they usually incur confirmation latency at least three rounds and fail avoid unnecessary communication costs for invalid...

10.1109/tsc.2024.3349539 article EN IEEE Transactions on Services Computing 2024-01-04

<title>Abstract</title> Public Key Searchable Encryption (PKSE) enables secure keyword searches over encrypted data, making it a critical tool for outsourced storage systems. However, existing PKSE schemes remain vulnerable to two types of guessing attacks: offline attacks, where adversaries leverage the public key systematically generate and test indices potential keywords, online attackers inject spurious documents infer queried keywords based on server responses. While most focus...

10.21203/rs.3.rs-6137308/v1 preprint EN Research Square (Research Square) 2025-04-15

10.1016/s1005-8885(07)60034-x article EN The Journal of China Universities of Posts and Telecommunications 2006-12-01

10.1016/s1005-8885(08)60111-9 article EN The Journal of China Universities of Posts and Telecommunications 2008-09-01

With the proliferation of Android malicious applications, malware becomes more capable hiding or confusing its intent through use code obfuscation, which has significantly weaken effectiveness conventional defense mechanisms.Therefore, in order to effectively detect unknown applications on platform, we propose DroidVecDeep, an detection method using deep learning technique.First, extract various features and rank them Mean Decrease Impurity.Second, transform into compact vectors based...

10.3837/tiis.2019.04.025 article EN KSII Transactions on Internet and Information Systems 2019-04-30

Due to the limited service capabilities of centralized controllers, it is difficult process high volume flows within reasonable time. This particularly degrades strict quality (QoS) requirements interactive media applications, which non-negligible factor. To alleviate this concern, distributed deployments software-defined network (SDN) controllers are inevitable and have gained a predominant position. However, maintain application specific QoS requirements, number resources used in directly...

10.1109/access.2016.2621770 article EN cc-by-nc-nd IEEE Access 2016-01-01

Acute lung injury (ALI) is a continuum of changes associated with uncontrolled excessive inflammation. However, the pathogenesis ALI still complicated and effective clinical pharmacological management required. Various signaling pathways are involved in inflammatory responses ALI. Here, we aimed to explore role nesfatin-1, an amino-acid peptide anti-inflammatory action, LPS-induced mice model, its regulating macrophages response LPS stimulation vitro. This was clarify underlying mechanisms...

10.1186/s13019-022-01952-1 article EN cc-by Journal of Cardiothoracic Surgery 2022-08-26

This paper proposes to use a cognitive-relay technique mitigate intercell interference (ICI) in cellular systems. In the proposed system, several relay stations (RSs) that are equipped with cognitive radio deployed near cell boundary. The base station (BS) and RS each operate same spectrum band as primary secondary transmitters, respectively. Once an interference-limited mobile (MS) requests for assistance, senses accesses hole forward its received signal (and interference) MS. At receiver...

10.1109/tvt.2010.2040399 article EN IEEE Transactions on Vehicular Technology 2010-01-26

The Bitcoin system uses a fully replicated data storage mechanism in which each node keeps full copy of the blockchain. As number nodes increases and transactions get more complex, space are needed to store block data. scalability has become bottleneck, limiting practical application This paper proposes scheme, called RESS, integrate erasure coding technology into blockchain encode multiple blocks. Under proposed grouping method, can reduce times coded decoding. In addition, scheme based on...

10.23919/cje.2022.00.343 article EN Chinese Journal of Electronics 2023-05-01

Circulating exosomal microRNAs (miRNAs) have shown great potential for the diagnosis, prognosis, and treatment monitoring of patients with non-small-cell lung cancer (NSCLC). Our main purpose was to determine clinical value serum miR-4497 as a new non-invasive biomarker NSCLC. The exoRNeasy Kit (QIAGEN, Hilden, Germany) used isolate exosomes exoRNA from 84 NSCLC (NSCLC group), 30 benign lesion (BLL 47 healthy controls. Six miRNAs (Let-7b-5p, miR-122-5p, miR-155-5p, miR-223-3p, miR-320c,...

10.1177/15353702231184223 article EN Experimental Biology and Medicine 2023-08-01
Coming Soon ...