A survey of optimization techniques for thermal-aware 3D processors

K Cao, J Zhou, T Wei, M Chen, S Hu, K Li - Journal of Systems Architecture, 2019 - Elsevier
Interconnect scaling has become a major design challenge for traditional planar (2D)
integrated circuits (ICs). Three-dimensional (3D) IC that stacks multiple device layers …

Cloud infrastructure resource allocation for big data applications

W Dai, L Qiu, A Wu, M Qiu - IEEE Transactions on Big Data, 2016 - ieeexplore.ieee.org
Increasing popular big data applications bring about invaluable information, but along with
challenges to industrial community and academia. Cloud computing with unlimited …

A comprehensive confirmation-based selfish node detection algorithm for socially aware networks

Z Xiong, X Li, X Zhang, M Deng, F Xu, B Zhou… - Journal of Signal …, 2023 - Springer
Data transmission in socially aware networks is usually accomplished through opportunistic
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …

A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance

K Gai, M Qiu, SA Elnagdy - … Conference on Big Data Security on …, 2016 - ieeexplore.ieee.org
The remarkable increasing demands of mitigating losses from cyber incidents for financial
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Data fusion based coverage optimization in heterogeneous sensor networks: A survey

X Deng, Y Jiang, LT Yang, M Lin, L Yi, M Wang - Information Fusion, 2019 - Elsevier
Sensor networks, as a promising network paradigm, have been widely applied in a great
deal of critical real-world applications. A key challenge in sensor networks is how to improve …

SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing

K Gai, L Qiu, M Chen, H Zhao, M Qiu - ACM Transactions on Embedded …, 2017 - dl.acm.org
The expected advanced network explorations and the growing demand for mobile data
sharing and transferring have driven numerous novel applications in Cyber-Physical …

NQA: A nested anti-collision algorithm for RFID systems

X Wang, LT Yang, H Li, M Lin, J Han, BO Apduhan - 2019 - dl.acm.org
Radio frequency identification (RFID) systems, as one of the key components in the Internet
of Things (IoT), have attracted much attention in the domains of industry and academia. In …

Electronic health record error prevention approach using ontology in big data

K Gai, M Qiu, LC Chen, M Liu - 2015 IEEE 17th International …, 2015 - ieeexplore.ieee.org
Electronic Health Record (EHR) systems have been playing a dramatically important role in
tele-health domains. One of the major benefits of using EHR systems is assisting physicians …

Security-aware efficient mass distributed storage approach for cloud systems in big data

K Gai, M Qiu, H Zhao - … conference on big data security on …, 2016 - ieeexplore.ieee.org
Implementing cloud computing empowers numerous paths to Web-based computing service
offerings for meeting diverse needs. However, cloud data security and privacy information …