Search Results - "Cheng, Xiuzhen"
-
1
Fog Computing for the Internet of Things: Security and Privacy Issues
Published in IEEE internet computing (01-03-2017)“…The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently…”
Get full text
Journal Article -
2
Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm
Published in IEEE transactions on parallel and distributed systems (01-08-2021)“…Proof of work (PoW), the most popular consensus mechanism for blockchain, requires ridiculously large amounts of energy but without any useful outcome beyond…”
Get full text
Journal Article -
3
Edge Computing Security: State of the Art and Challenges
Published in Proceedings of the IEEE (01-08-2019)“…The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent years have been dramatically incentivizing the advancement of edge…”
Get full text
Journal Article -
4
Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks
Published in IEEE transactions on vehicular technology (01-09-2017)“…Coverage is a primary metric for ensuring the quality of services provided by a wireless sensor network (WSN). In this paper, we focus on the k-coverage…”
Get full text
Journal Article -
5
Blockchain for Large-Scale Internet of Things Data Storage and Protection
Published in IEEE transactions on services computing (01-09-2019)“…With the dramatically increasing deployment of IoT devices, storing and protecting the large volume of IoT data has become a significant issue. Traditional…”
Get full text
Journal Article -
6
Silent Positioning in Underwater Acoustic Sensor Networks
Published in IEEE transactions on vehicular technology (01-05-2008)“…In this paper, we present a silent positioning scheme termed UPS for underwater acoustic sensor networks. UPS relies on the time difference of arrivals locally…”
Get full text
Journal Article -
7
Dynamic spectrum access: from cognitive radio to network radio
Published in IEEE wireless communications (01-02-2012)“…Dynamic spectrum access is a new spectrum sharing paradigm that allows secondary users to access the abundant spectrum holes or white spaces in the licensed…”
Get full text
Journal Article -
8
Spectrum prediction in cognitive radio networks
Published in IEEE wireless communications (01-04-2013)“…Spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility are four major functions of cognitive radio systems. Spectrum sensing is utilized…”
Get full text
Journal Article -
9
Jamming Strategies for Physical Layer Security
Published in IEEE wireless communications (01-02-2018)“…This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional…”
Get full text
Journal Article -
10
Shortest Link Scheduling Algorithms in Wireless Networks Under the SINR Model
Published in IEEE transactions on vehicular technology (01-03-2017)“…This paper considers the shortest link scheduling problem in wireless networks under the signal-to-interferenceplus-noise ratio(SINR) model.We propose an…”
Get full text
Journal Article -
11
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Published in IEEE internet of things journal (01-12-2017)“…The development of the Internet of Things has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart…”
Get full text
Journal Article -
12
Mutual Privacy Preserving k -Means Clustering in Social Participatory Sensing
Published in IEEE transactions on industrial informatics (01-08-2017)“…In this paper, we consider the problem of mutual privacy protection in social participatory sensing in which individuals contribute their private information…”
Get full text
Journal Article -
13
Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey
Published in IEEE wireless communications (01-02-2020)“…Assigning bands of the wireless spectrum as resources to users is a common problem in wireless networks. Typically, frequency bands were assumed to be…”
Get full text
Journal Article -
14
IoT Applications on Secure Smart Shopping System
Published in IEEE internet of things journal (01-12-2017)“…The Internet of Things (IoT) is changing human lives by connecting everyday objects together. For example, in a grocery store, all items can be connected with…”
Get full text
Journal Article -
15
Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing
Published in IEEE internet of things journal (15-07-2023)“…Mobile crowdsensing (MCS) counting on the mobility of massive workers helps the requestor accomplish various sensing tasks with more flexibility and lower…”
Get full text
Journal Article -
16
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
Published in IEEE access (01-01-2018)“…In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering…”
Get full text
Journal Article -
17
An Attribute-Based Encryption Scheme to Secure Fog Communications
Published in IEEE access (2017)“…Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for…”
Get full text
Journal Article -
18
Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies
Published in IEEE transactions on knowledge and data engineering (01-05-2020)“…Quality control in crowdsourcing is challenging due to the heterogeneous nature of the workers. The state-of-the-art solutions attempt to address the issue…”
Get full text
Journal Article -
19
KUPS: Knowledge-based ubiquitous and persistent sensor networks for threat assessment
Published in IEEE transactions on aerospace and electronic systems (01-07-2008)“…We propose a knowledge-based ubiquitous and persistent sensor network (KUPS) for threat assessment, in which "sensor" is a broad characterization. It refers to…”
Get full text
Journal Article -
20
When blockchain meets smart grids: A comprehensive survey
Published in High-Confidence Computing (01-06-2022)“…Recent years have witnessed an increasing interest in the blockchain technology, and many blockchain-based applications have been developed to take advantage…”
Get full text
Journal Article