Search Results - "Cheng, Xiuzhen"

Refine Results
  1. 1

    Fog Computing for the Internet of Things: Security and Privacy Issues by Alrawais, Arwa, Alhothaily, Abdulrahman, Chunqiang Hu, Xiuzhen Cheng

    Published in IEEE internet computing (01-03-2017)
    “…The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently…”
    Get full text
    Journal Article
  2. 2

    Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm by Qu, Xidi, Wang, Shengling, Hu, Qin, Cheng, Xiuzhen

    “…Proof of work (PoW), the most popular consensus mechanism for blockchain, requires ridiculously large amounts of energy but without any useful outcome beyond…”
    Get full text
    Journal Article
  3. 3

    Edge Computing Security: State of the Art and Challenges by Xiao, Yinhao, Jia, Yizhen, Liu, Chunchi, Cheng, Xiuzhen, Yu, Jiguo, Lv, Weifeng

    Published in Proceedings of the IEEE (01-08-2019)
    “…The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent years have been dramatically incentivizing the advancement of edge…”
    Get full text
    Journal Article
  4. 4

    Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks by Yu, Jiguo, Wan, Shengli, Cheng, Xiuzhen, Yu, Dongxiao

    Published in IEEE transactions on vehicular technology (01-09-2017)
    “…Coverage is a primary metric for ensuring the quality of services provided by a wireless sensor network (WSN). In this paper, we focus on the k-coverage…”
    Get full text
    Journal Article
  5. 5

    Blockchain for Large-Scale Internet of Things Data Storage and Protection by Li, Ruinian, Song, Tianyi, Mei, Bo, Li, Hong, Cheng, Xiuzhen, Sun, Limin

    Published in IEEE transactions on services computing (01-09-2019)
    “…With the dramatically increasing deployment of IoT devices, storing and protecting the large volume of IoT data has become a significant issue. Traditional…”
    Get full text
    Journal Article
  6. 6

    Silent Positioning in Underwater Acoustic Sensor Networks by Xiuzhen Cheng, Xiuzhen Cheng, Haining Shu, Haining Shu, Qilian Liang, Qilian Liang, Hung-Chang Du, D

    Published in IEEE transactions on vehicular technology (01-05-2008)
    “…In this paper, we present a silent positioning scheme termed UPS for underwater acoustic sensor networks. UPS relies on the time difference of arrivals locally…”
    Get full text
    Journal Article
  7. 7

    Dynamic spectrum access: from cognitive radio to network radio by Min Song, Chunsheng Xin, Yanxiao Zhao, Xiuzhen Cheng

    Published in IEEE wireless communications (01-02-2012)
    “…Dynamic spectrum access is a new spectrum sharing paradigm that allows secondary users to access the abundant spectrum holes or white spaces in the licensed…”
    Get full text
    Journal Article
  8. 8

    Spectrum prediction in cognitive radio networks by Xing, Xiaoshuang, Jing, Tao, Cheng, Wei, Huo, Yan, Cheng, Xiuzhen

    Published in IEEE wireless communications (01-04-2013)
    “…Spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility are four major functions of cognitive radio systems. Spectrum sensing is utilized…”
    Get full text
    Journal Article
  9. 9

    Jamming Strategies for Physical Layer Security by Huo, Yan, Tian, Yuqi, Ma, Liran, Cheng, Xiuzhen, Jing, Tao

    Published in IEEE wireless communications (01-02-2018)
    “…This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional…”
    Get full text
    Journal Article
  10. 10

    Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model by Jiguo Yu, Baogui Huang, Xiuzhen Cheng, Atiquzzaman, Mohammed

    Published in IEEE transactions on vehicular technology (01-03-2017)
    “…This paper considers the shortest link scheduling problem in wireless networks under the signal-to-interferenceplus-noise ratio(SINR) model.We propose an…”
    Get full text
    Journal Article
  11. 11

    A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes by Song, Tianyi, Li, Ruinian, Mei, Bo, Yu, Jiguo, Xing, Xiaoshuang, Cheng, Xiuzhen

    Published in IEEE internet of things journal (01-12-2017)
    “…The development of the Internet of Things has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart…”
    Get full text
    Journal Article
  12. 12

    Mutual Privacy Preserving k -Means Clustering in Social Participatory Sensing by Xing, Kai, Hu, Chunqiang, Yu, Jiguo, Cheng, Xiuzhen, Zhang, Fengjuan

    “…In this paper, we consider the problem of mutual privacy protection in social participatory sensing in which individuals contribute their private information…”
    Get full text
    Journal Article
  13. 13

    Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey by Li, Feng, Yu, Dongxiao, Yang, Huan, Yu, Jiguo, Karl, Holger, Cheng, Xiuzhen

    Published in IEEE wireless communications (01-02-2020)
    “…Assigning bands of the wireless spectrum as resources to users is a common problem in wireless networks. Typically, frequency bands were assumed to be…”
    Get full text
    Journal Article
  14. 14

    IoT Applications on Secure Smart Shopping System by Ruinian Li, Tianyi Song, Capurso, Nicholas, Jiguo Yu, Couture, Jason, Xiuzhen Cheng

    Published in IEEE internet of things journal (01-12-2017)
    “…The Internet of Things (IoT) is changing human lives by connecting everyday objects together. For example, in a grocery store, all items can be connected with…”
    Get full text
    Journal Article
  15. 15

    Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing by Hu, Qin, Wang, Zhilin, Xu, Minghui, Cheng, Xiuzhen

    Published in IEEE internet of things journal (15-07-2023)
    “…Mobile crowdsensing (MCS) counting on the mobility of massive workers helps the requestor accomplish various sensing tasks with more flexibility and lower…”
    Get full text
    Journal Article
  16. 16

    A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications by He, Yunhua, Li, Hong, Cheng, Xiuzhen, Liu, Yan, Yang, Chao, Sun, Limin

    Published in IEEE access (01-01-2018)
    “…In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering…”
    Get full text
    Journal Article
  17. 17

    An Attribute-Based Encryption Scheme to Secure Fog Communications by Alrawais, Arwa, Alhothaily, Abdulrahman, Chunqiang Hu, Xiaoshuang Xing, Xiuzhen Cheng

    Published in IEEE access (2017)
    “…Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for…”
    Get full text
    Journal Article
  18. 18

    Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies by Hu, Qin, Wang, Shengling, Ma, Peizi, Cheng, Xiuzhen, Lv, Weifeng, Bie, Rongfang

    “…Quality control in crowdsourcing is challenging due to the heterogeneous nature of the workers. The state-of-the-art solutions attempt to address the issue…”
    Get full text
    Journal Article
  19. 19

    KUPS: Knowledge-based ubiquitous and persistent sensor networks for threat assessment by Qilian Liang, Qilian Liang, Xiuzhen Cheng, Xiuzhen Cheng

    “…We propose a knowledge-based ubiquitous and persistent sensor network (KUPS) for threat assessment, in which "sensor" is a broad characterization. It refers to…”
    Get full text
    Journal Article
  20. 20

    When blockchain meets smart grids: A comprehensive survey by Guo, Yihao, Wan, Zhiguo, Cheng, Xiuzhen

    Published in High-Confidence Computing (01-06-2022)
    “…Recent years have witnessed an increasing interest in the blockchain technology, and many blockchain-based applications have been developed to take advantage…”
    Get full text
    Journal Article