Search Results - "Zuo, Yanjun"
-
1
Tokenizing Renewable Energy Certificates (RECs) - a Blockchain Approach for REC Issuance and Trading
Published in IEEE access (01-01-2022)“…Renewable Energy Certificate (REC) is a market-based instrument and tracking mechanism for electricity generated from renewable sources as they flow into the…”
Get full text
Journal Article -
2
Survivable RFID Systems: Issues, Challenges, and Techniques
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-07-2010)“…Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen…”
Get full text
Journal Article -
3
A Blockchain-Based IoT Framework for Oil Field Remote Monitoring and Control
Published in IEEE access (2022)“…The oil and gas industry involves a high level of operational expenditure and often faces high risks of asset safety and operational failures. It has never…”
Get full text
Journal Article -
4
Spatial characteristics and driving factors of groundwater hydrochemistry and heavy metals in peri-urban agricultural areas of in Southwest China
Published in Environmental earth sciences (01-05-2024)“…The hydrogeochemical evolution of groundwater in peri-urban agricultural areas is influenced by the convergence of natural processes, agricultural practices,…”
Get full text
Journal Article -
5
Belief-Based Decision Making for Service Migration
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…Service migration is an important strategy to improve a system's ability to survive malicious attacks and to continually provide mission-critical services. By…”
Get full text
Conference Proceeding Journal Article -
6
Survivability Experiment and Attack Characterization for RFID
Published in IEEE transactions on dependable and secure computing (01-03-2012)“…Radio Frequency Identification (RFID) has been developed as an important technique for many high security and high integrity settings. In this paper, we study…”
Get full text
Journal Article -
7
Mesoporous Mn-based multi-component metal oxide for fast chemical warfare agent degradation
Published in AIP advances (01-03-2022)“…Protection against harmful chemical compounds is a major social concern, especially chemical warfare agents (CWAs) that are easy to synthesize and can cause…”
Get full text
Journal Article -
8
Making smart manufacturing smarter - a survey on blockchain technology in Industry 4.0
Published in Enterprise information systems (26-11-2021)“…Blockchain is distributed digital ledger technology that facilitates reliable and transparent transactions among the participants of a system. Blockchain has…”
Get full text
Journal Article -
9
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags
Published in 2010 43rd Hawaii International Conference on System Sciences (01-01-2010)“…In a Radio Frequency Identification (RFID) enabled system, RFID tags often need to change hands from one owner to another during their lifetime. In this paper,…”
Get full text
Conference Proceeding -
10
A Framework of Survivability Requirement Specification for Critical Information Systems
Published in 2010 43rd Hawaii International Conference on System Sciences (01-01-2010)“…Survivability represents a system's ability to provide essential services in the presence of attacks and failures, and to recover full services in a timely…”
Get full text
Conference Proceeding -
11
Composition and combination-based object trust evaluation for knowledge management in virtual organizations
Published in VINE. Very informal newsletter on library automation (2013)“…Purpose - This paper aims to develop a framework for object trust evaluation and related object trust principles to facilitate knowledge management in a…”
Get full text
Journal Article -
12
Two-level trust-based decision model for information assurance in a virtual organization
Published in Decision Support Systems (01-05-2008)“…Like other unstructured decision problems, selection of external trustworthy objects are challenging particularly in a virtual organization (VO). Novel methods…”
Get full text
Journal Article -
13
Study on solvent extraction of propionic acid from simulated discharged water in vitamin B₁₂ production by anaerobic fermentation
Published in Bioresource technology (01-06-2009)“…The potential of recovering propionic acid from discharged water in vitamin B₁₂ production by anaerobic fermentation was investigated in this paper. A primary…”
Get full text
Journal Article -
14
Reputation-based service migration for moving target defense
Published in 2016 IEEE International Conference on Electro Information Technology (EIT) (01-05-2016)“…As a proactive security approach, service migration can be used as a mechanism for moving target defense. By strategically moving services to different…”
Get full text
Conference Proceeding Journal Article -
15
A reputation-based model for mobile agent migration for information search and retrieval
Published in International journal of information management (01-10-2017)“…•A reputation-based model is developed for mobile agent migration to search and retrieve information in decentralized, open systems.•We use opinion-based…”
Get full text
Journal Article -
16
Fuzzy inference for service migration strategy
Published in 2015 IEEE International Conference on Electro/Information Technology (EIT) (01-05-2015)“…Service migration is an important approach for service availability and system survivability in a security incident. When a system is under attack and some…”
Get full text
Conference Proceeding Journal Article -
17
Data labeling for integrity in SCADA systems
Published in 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS) (01-06-2014)“…Supervisory Control and Data Acquisition (SCADA) systems attain important data for critical infrastructure monitoring and control. The data is also used by…”
Get full text
Conference Proceeding -
18
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability
Published in 2013 IEEE 7th International Conference on Software Security and Reliability (01-06-2013)“…Given the increasing scale and complexity of cyberattacks, innovative techniques must be developed to effectively respond to intrusions and enable affected…”
Get full text
Conference Proceeding -
19
Microwave-assisted hydrothermal synthesis of highly dispersed cerium–zirconium solid solution on Ti3C2Tx nanosheets as an efficient decontamination towards sulfur mustard simulants
Published in Journal of hazardous materials (05-12-2024)“…The microwave-assisted hydrothermal method has facilitated the straightforward and efficient production of nanoscale CexZr1−xO2/Ti3C2Tx composites. This…”
Get full text
Journal Article -
20
Alkaline fillers for high-temperature reduction of divalent mercury: Influence of flue gas components
Published in Separation and purification technology (01-03-2025)“…[Display omitted] •SO2 and CO2 form product layers on alkaline filler surface, obstructing HCl removal.•CaO preferentially adsorbs SO2 when SO2 and HCl…”
Get full text
Journal Article