Jianqun Cui

ORCID: 0000-0003-1447-8761
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Network Traffic and Congestion Control
  • Mobile Ad Hoc Networks
  • Distributed and Parallel Computing Systems
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Satellite Communication Systems
  • Mobile Agent-Based Network Management
  • RFID technology advancements
  • Service-Oriented Architecture and Web Services
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Advanced Wireless Communication Technologies
  • Transportation Planning and Optimization
  • UAV Applications and Optimization
  • Advanced Data Storage Technologies
  • Molecular Communication and Nanonetworks
  • Evacuation and Crowd Dynamics
  • Traffic Prediction and Management Techniques
  • Energy Efficient Wireless Sensor Networks
  • Distributed systems and fault tolerance

Central China Normal University
2013-2025

Wuhan University
2006-2008

With the increasing popularity and wide application of Internet, users (such as managers data consumers) in Industrial Internet Things (IIoT) can remotely analyze control real-time collected by various smart sensor devices. However, there are many security privacy issues process transmitting through public channels IIoT environment. In order to against illegal access opponents, a novel anonymous user authentication key agreement scheme based on hash elliptic curve encryption is proposed this...

10.1109/tsc.2023.3257569 article EN IEEE Transactions on Services Computing 2023-03-16

Traffic prediction is vital to traffic planning, control, and optimization, which necessary for intelligent management. Existing methods mostly capture spatiotemporal correlations on a fine-grained graph, cannot make full use of cluster information in coarse-grained graph. However, the flow variation clusters graph more stable compared with nodes And node generally consistent trend belongs. Thus can guide feature learning To this end, we propose Spatiotemporal Multiscale Graph Convolutional...

10.1109/tits.2024.3354802 article EN IEEE Transactions on Intelligent Transportation Systems 2024-08-01

In this paper, we propose a novel ant colony optimization algorithm based on improved brainstorm (IBSO-ACO) to solve the vehicle routing problem with soft time windows. Compared traditional algorithm, proposed IBSO-ACO can better address local optimum problem, since have carefully designed an brainstorming update solutions obtained by which enhance solution diversity and global search ability. Furthermore, use classification method accelerate convergence of algorithm. The extensive...

10.1109/access.2019.2894681 article EN cc-by-nc-nd IEEE Access 2019-01-01

The Internet of Things is one the new emerging application domains that require delay tolerant network (DTN) support, where an end-to-end path between source and destination may not always exist. Due to intermittent connectivity DTN, design efficient routing algorithm main challenge. In this paper, we first define a metric called message handling capacity determine ability node forward messages. Then, introduce concept connection strength reflect time nodes then integrate into delivery...

10.1109/access.2019.2904750 article EN cc-by-nc-nd IEEE Access 2019-01-01

Reconfigurable intelligent surface (RIS) is playing a growing and ever-more significant role in constructing six-generation (6G) wireless networks due to its properties of low-cost easy-integration. Current studies about RIS-assisted communication generally assume the RISs are deployed at fixed position or devices, however with rapid development unmanned aerial vehicle (UAV) technology, this readily flying access platform increasingly used realize reliable communication. If mounted on random...

10.1109/jiot.2024.3401042 article EN IEEE Internet of Things Journal 2024-05-14

With the rapid developments of Internet Things (IoT) technologies, security sensitive data has attracted more and attention for many resource-asymmetric smart environments, such as home, agriculture so on. The resource-asymmetry environment refers to uneven distribution resources on different devices side, which is specifically manifested gateway side resource-rich, user device are resource-restricted. Hence, a secure practical authentication key establishment scheme environments urgently...

10.1109/tdsc.2022.3203874 article EN IEEE Transactions on Dependable and Secure Computing 2022-09-02

Opportunistic mobile networks, as an important supplement to the traditional communication methods in unique environments, are composed of devices. It is a network form that realizes message transmission by using opportune encounter these Consequently, devices necessitate periodic contact detection order identify potential opportunities, thereby leading substantial reduction already limited battery life such Previous studies on opportunistic networks have often utilized geographic...

10.3390/electronics13050868 article EN Electronics 2024-02-23

In delay-tolerant networks(DTN), the timeliness of node's social circle and encounter time between nodes have a different effect in designing router algorithms. Considering these factors, this paper proposes an improved spray wait algorithm based on node tree (TNST). Specifically, we will first combine own attributes with ability to calculate delivery capability value. Followed by it, build update for each node. Finally, predict nodes, which their motion information. The select as relay if...

10.1109/icpads56603.2022.00017 article EN 2023-01-01

Reservation in advance provides a solution for the need of reserving network resource future. Advance reservation global grids becomes an important research area as it allows users to gain concurrent access their applications be executed parallel, and guarantees availability resources at specified future times. But performance grid was seldom considered. In this paper, adaptive is introduced. It can modify not only parameters latest request but also that admitted requests because sometimes...

10.1109/pdcat.2005.67 article EN 2005-01-01

In the past several years, alert correlation methods have been advocated to discover high-level attack scenarios by correlating low-level alerts. The causal method based on prerequisites and consequences has great advantages in process of But it must depend complicated background knowledge base some limits discovering new attacks. cluster can aggregate relational alerts computing similarity between attributes, as well simple However, is difficult establish attribute weights membership...

10.1109/paciia.2008.285 article EN 2008-12-01

Clustering technology used in routing protocols can reduce energy consumption and prolong the lifetime of wireless sensor networks. Cluster head selection is one most important parts clustering routing. An Energy Prediction based method on LEACH (LEACH-EP) proposed this paper. Its core to maintain structure clusters unchanged K rounds. In first round, cluster heads are selected according LEACH, then prediction remaining K-1 LEACH-EP reduces updates clusters’ delays dead time nodes....

10.6138/jit.2018.19.2.20151118 article EN 網際網路技術學刊 2018-01-01

How to select proper relay nodes ensure the successful delivery of messages is still a hot topic in delay tolerant networks (DTN). In this paper, we propose probabilistic Spray-and-Wait routing algorithm based on node interest preference (called NIP-PSW). Firstly, considering influence social attributes nodes, define metric called (NIP) measure probability becoming friends. Secondly, view quality and connection time between message forwarding, (DP). Finally, according historical information...

10.1155/2022/7323978 article EN cc-by Wireless Communications and Mobile Computing 2022-05-17

In delay tolerant networks(DTN), non-social attributes and social relating to nodes have a different effect in designing router algorithms, we can combine these two design algorithms. our paper, put forward an improved spray-and-wait routing algorithm (NSSAWRouter) based on relationship between DTN, which mainly selects relay by adopting transmission values assigns message copies dynamically the spray stage. Specifically, will first build circle for each node record dynamic its nodes....

10.1109/mass56207.2022.00017 article EN 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) 2022-10-01

UDDI acts a very important role in the web service. It can be used to publish and lookup services. Most of current models are centralized so that performance will decrease if there too many services registered or queried. In this paper, an interoperable model distributed is proposed. The divides whole servers into types: root server, super domain server normal server. simulation results show get better performance.

10.1109/nas.2008.16 article EN 2008-06-01

Application-layer multicast (ALM) can easily address most of the problems IP-based such as forwarding state scalability, full router dependence and so on. The topology-aware approach ALM is more attractive because it exploits underlying network topology data to construct overlay networks. In this paper, a efficient mechanism construction called subnet grouping (STAG) introduced. Under mechanism, new node who wants join tree will broadcast JOIN message in firstly or at same time when sends...

10.1109/nas.2007.40 article EN 2007-07-01
Coming Soon ...