- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Privacy-Preserving Technologies in Data
- Infrared Target Detection Methodologies
- Target Tracking and Data Fusion in Sensor Networks
- Software System Performance and Reliability
- Recommender Systems and Techniques
- Security in Wireless Sensor Networks
- Privacy, Security, and Data Protection
- Neural Networks and Applications
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Mobile Ad Hoc Networks
- Blockchain Technology Applications and Security
Zhejiang University of Technology
2010-2025
Friend recommendation is important and inevitable in social network. However, many strategies of networks are not necessarily consistent with user's interests. In order to avoid the randomness unreliability friend network, this paper proposed a safe efficient scheme based on privacy-preserving protocol. Target users send request for friends Center Authority (CA), CA selects candidates from all system tag matching basis choose among filtered by CA. What more, algorithm selected an appropriate...
Range query processing is a common edge computing and service in the Internet of things, which can extract user-interest information from distributed devices. How to design lightweight privacy-preserving range methods remains challenging task. Existing secure approaches suffer both high communication cost long response time, makes them unsuitable for over resource-constrained In this article, we propose two privacy-aware fuzzy schemes based on theory. Linguistic variables, overlap...
Implementation performance and key randomness are two issues for stream cipher systems. In this paper, a lightweight with good of is firstly proposed. It utilizes novel proposed model named tree parity machine to generate streams. The most superiority our scheme that 128 bits could be generated based on one time state rotation, it passes the full ENT test. Then, implementation wireless sensor networks, Tiny Stream, presented. Stream TinySec protocols, just costs 65024 bytes ROM 1659184 RAM...
Vehicular Ad Hoc Networks (VANETs) hold the opportunity to help improve safe driving and road efficiency. There are great uncertainty unpredictability in VANETs due rapid vehicle movement changeable conditions, which makes designing a Quality of Service (QoS) aware data forwarding protocol for remain significant challenge. In this paper, A novel fuzzy decision based scheme is proposed meet QoS requirements high reliability low latency. Unlike existing routing methods, information instead raw...
Recently, APT attacks have frequently happened, which are increasingly complicated and more challenging for traditional security detection models. The system logs vital cyber analysis mainly due to their effective reconstruction ability of behavior. existing log collection tools built on ETW Windows suffer from working shortages, including data loss, high overhead, weak real-time performance. Therefore, It is still very difficult apply ETW-based analyze attack scenarios. To address these...