Dajiang Chen

ORCID: 0000-0003-0745-5836
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • IoT and Edge/Fog Computing
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Internet Traffic Analysis and Secure E-voting
  • DNA and Biological Computing
  • Cooperative Communication and Network Coding
  • Blockchain Technology Applications and Security
  • Opportunistic and Delay-Tolerant Networks
  • User Authentication and Security Systems
  • Wireless Signal Modulation Classification
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Brain Tumor Detection and Classification
  • AI in cancer detection
  • Context-Aware Activity Recognition Systems
  • Security in Wireless Sensor Networks
  • Digital Media Forensic Detection
  • Speech and Audio Processing
  • Caching and Content Delivery
  • COVID-19 diagnosis using AI
  • Physical Unclonable Functions (PUFs) and Hardware Security

University of Electronic Science and Technology of China
2016-2025

Peng Cheng Laboratory
2020-2022

University of Windsor
2022

Data Assurance and Communication Security
2022

Henan University
2018

Texas A&M University – Corpus Christi
2018

Thompson Rivers University
2018

University of North Carolina at Charlotte
2018

University of Waterloo
2016-2017

Chengdu University of Information Technology
2017

This article presents the synergistic and complementary features of big data 5G wireless networks. An overview their interplay is provided first, including big-data-driven networking assisted networking. The former exploits heterogeneous resources such as communication, caching, computing in networks to support applications services, by catering for data's volume, velocity, variety. latter leverages techniques collect extract in-depth knowledge regarding users improve network planning...

10.1109/mwc.2018.1700193 article EN IEEE Wireless Communications 2018-02-01

Internet of Medical Things (IoMT) can connect many medical imaging equipment to the information network facilitate process diagnosing and treating doctors. As image contains sensitive information, it is importance yet very challenging safeguard privacy or security patient. In this work, a deep-learning-based encryption decryption (DeepEDN) proposed fulfill encrypting decrypting image. Specifically, in DeepEDN, cycle-generative adversarial (Cycle-GAN) employed as main learning transfer from...

10.1109/jiot.2020.3012452 article EN IEEE Internet of Things Journal 2020-07-28

With emergence of Internet Things (IoT), wireless traffic has grown dramatically, posing severe strain on core network and backhaul bandwidth. Proactive caching in mobile edge computing systems can not only efficiently mitigate the congestion relieve burden but also reduce service latency for end devices. However, proactive heavily relies prediction accuracy content popularity, which is typically unknown change over time. In this paper, we propose an online scheme based bidirectional deep...

10.1109/jiot.2019.2903245 article EN IEEE Internet of Things Journal 2019-03-05

Device authentication is a critical and challenging issue for the emerging Internet of Things (IoT). One promising solution to authenticate IoT devices extract fingerprint perform device by exploiting variations in transmitted signal caused hardware manufacturing inconsistencies. In this paper, we propose lightweight protocol [named speaker-to-microphone (S2M)] leveraging frequency response speaker microphone from two wireless as acoustic fingerprint. S2M authenticates legitimate user...

10.1109/jiot.2016.2619679 article EN IEEE Internet of Things Journal 2016-10-20

As one of the most important applications industrial Internet Things, intelligent transportation system aims to improve efficiency and safety networks. In this article, we propose a novel Bayesian framework entitled variational graph recurrent attention neural networks (VGRAN) for robust traffic forecasting. It captures time-varying road-sensor readings through dynamic convolution operations is capable learning latent variables regarding sensor representation sequences. The proposed...

10.1109/tii.2020.3009280 article EN IEEE Transactions on Industrial Informatics 2020-07-14

Next generation (5G) wireless networks are expected to support massive data and accommodate a wide range of services/use cases with distinct requirements in cost-effective, flexible, agile manner. As promising solution, WNV, or network slicing, enables multiple virtual share common infrastructure on demand, be customized for different cases. This article focuses network-wide resource allocation realizing WNV. Specifically, the motivations, enabling platforms, benefits first reviewed. Then,...

10.1109/mnet.2017.1600248 article EN IEEE Network 2017-01-01

The Internet of Things (IoT) provides a new paradigm for the development heterogeneous and distributed systems, it has increasingly become ubiquitous computing service platform. However, due to lack sufficient storage resources dedicated processing huge volumes IoT data, tends adopt cloud-based architecture address issues resource constraints. Hence, series challenging security trust concerns have arisen in context. To this end, novel assessment framework reputation cloud services is...

10.1109/access.2018.2890432 article EN cc-by-nc-nd IEEE Access 2019-01-01

In a blockchain-based data trading platform, users can purchase sets and computing power through encrypted smart contracts. The security of contracts is important as it relates to that the platform. However, due inability apply detection rules with complex structures inefficiency detection, existing malicious code methods are not suitable for in platforms high transaction rate requirements. this paper, practical privacy-preserving method proposed contract Specifically, we design two kinds...

10.1109/tdsc.2024.3353827 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-15

Smart homes expects to improve the convenience, comfort, and energy efficiency of residents by connecting controlling various appliances. As personal information computing hub for smart homes, smartphones allow people monitor control their anytime anywhere. Therefore, security privacy stored data are crucial in homes. To protect from potential attacks, built-in sensors can be utilized user authentication/identification access achieve enhanced security. In this paper, we propose a framework,...

10.1109/jiot.2019.2900862 article EN IEEE Internet of Things Journal 2019-02-21

Internet of Things (IoT) security becomes great importance, as IoT is the foundation for many emerging services. To safeguard security, cryptosystems at upper layer relying on sophisticated key management alone can face challenges due to massive deployment resource constrained machine-type communication (MTC) devices. Physical (PHY) complement and enhance by exploiting characteristics bottom layer. In PHY channel state information (CSI) estimated through reverse pilot training essential...

10.1109/jiot.2019.2919743 article EN IEEE Internet of Things Journal 2019-05-28

With the rapid development of Mobile Internet and Industrial Things, a variety applications put forward an urgent demand for user device identity recognition. Digital with hidden characteristics is essential both individual users physical devices. assistance multimodalities as well fusion strategies, recognition can be more reliable robust. In this survey, we turn to investigate concepts limitations unimodal recognition, motivation, advantages multimodal summarize technologies via feature...

10.1016/j.inffus.2022.10.032 article EN cc-by Information Fusion 2022-11-07

To ensure the security of Internet Things (IoT) communications, one can use deep packet inspection (DPI) on network middleboxes to detect and mitigate anomalies suspicious activities in traffic IoT, although doing so over encrypted is challenging. Therefore, this article, an efficient privacy-preserving detection scheme proposed. The uses only lightweight cryptographic operations (i.e., symmetric encryption, hash functions, pseudorandom functions) achieve both privacy within round. A dispute...

10.1109/jiot.2022.3155355 article EN IEEE Internet of Things Journal 2022-02-28

10.1038/s44287-024-00053-6 article EN Nature Reviews Electrical Engineering 2024-06-14

Leveraging a wireless multipath channel as the source of common randomness, many key generation methods have been proposed according to information-theory security. However, existing schemes suffer low rate and entropy, mainly rely on nodes' mobility. To overcome this limitation, we present protocol with known artificial interference, named SmokeGrenade, new physical-layer approach for secret in narrowband fading channel. Our scheme utilizes interference contribute change measured values...

10.1109/tifs.2013.2278834 article EN IEEE Transactions on Information Forensics and Security 2013-08-16

In this paper, we propose a novel user cooperation scheme based on weighted fractional Fourier transform (WFRFT), to enhance the physical (PHY) layer security of wireless transmissions against eavesdropping. Specifically, instead dissipating additional transmission power for friendly jamming, by leveraging features WFRFT, information bearing signal cooperators can create an identical artificial noise effect at eavesdropper while causing no performance degradation legitimate receiver....

10.1109/twc.2017.2712158 article EN IEEE Transactions on Wireless Communications 2017-06-08

In this paper, we investigate physical (PHY) layer message authentication to combat adversaries with infinite computational capacity. Specifically, a PHY-layer framework over wiretap channel (W <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> ; W xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> ) is proposed achieve information theoretic security the same key. We develop theorem reveal requirements/conditions for be...

10.1109/tdsc.2018.2846258 article EN IEEE Transactions on Dependable and Secure Computing 2018-06-12

Nondestructive testing (NDT) techniques are widely used for inspection and evaluation of conductive materials. However, a single physical mechanism sensing cannot simultaneously satisfy multiple requirements. In this article, we propose hybrid transducer based on magnetic flux leakage (MFL) electromagnetic acoustic (EMAT) synchronous detection surface internal defects. the proposed transducer, both MFL EMAT share common field. The circuit characteristics principles fully exploited, field...

10.1109/jsen.2023.3280670 article EN IEEE Sensors Journal 2023-06-02

Histopathology diagnosis is an important standard for breast tumors identifying. However, histopathology image analysis complex, tedious and error-prone, due to the super-resolution image. In recent years, deep learning technology has been successfully applied made great progress. The well-known neural networks usually have tens of million parameters, which consume much memory deploy state-of-the-art model. addition, rely on high-performance hardware resources, impede deployment model...

10.1109/jiot.2023.3235651 article EN cc-by IEEE Internet of Things Journal 2023-01-09

In this paper, we study physical layer message authentication with perfect security for wireless networks, regardless of the computational power adversaries. Specifically, propose an efficient and feasible scheme based on low-density parity-check (LDPC) codes ϵ-AU <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> hash functions over binary-input wiretap channel. First, a multimessage noiseless main channel case is presented by leveraging...

10.1109/jsac.2018.2825079 article EN IEEE Journal on Selected Areas in Communications 2018-04-01

As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower sectors being smart, autonomous, efficient, safety. However, due the large number build-in IIoT smart devices, systems are vulnerable side-channel attack. In this article, a novel side-channel-based passwords cracking system, namely MAGLeak, is proposed recognize victim's by leveraging accelerometer, gyroscope, magnetometer touch-screen device. Specifically, event-driven data...

10.1109/tii.2020.3045161 article EN IEEE Transactions on Industrial Informatics 2020-12-18

As a lightweight, flexible, and high-performance operating system virtualization, containers are used to speed up the big data platform. However, due imperfection of resource isolation mechanism property shared kernel, meltdown spectre attacks can lead information leakage kernel space coresident containers. In this article, noise-resilient real-time detection system, named ContainerGuard, is proposed detect in container-based ContainerGuard uses nonintrusive manner collect lifecycle...

10.1109/tii.2020.3047416 article EN IEEE Transactions on Industrial Informatics 2020-12-25

Internet of Things (IoT) is vulnerable to various cyber attacks due the massive deployment IoT devices and openness wireless environments. In this article, taking as network resources competed between an attacker a defender, we study modeling analysis resource competition in attack-defense game. The defender inject different strength each device their strategies. As result, security state will change, which captured by differential equations. To interaction evolution system states, zero-sum...

10.1109/jiot.2021.3122115 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-10-25

The integration of the space–air–ground-integrated network and Internet Vehicles (IoV) enables IoV to achieve full coverage better performance. However, large scale complex cooperation mechanism make credibility nodes in service delivery questioned. In this article, hardware trusted module is used as root trust build chain running environment provide protection state attestation for services. order overcome large-scale high-concurrency performance bottlenecks remote verification states IoV,...

10.1109/jiot.2021.3084449 article EN IEEE Internet of Things Journal 2021-05-28
Coming Soon ...