How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective

Z Wu, S Xuan, J Xie, C Lin, C Lu - Computers in biology and medicine, 2022 - Elsevier
From a technical perspective, for electronic medical records (EMR), this paper proposes an
effective confidential management solution on the cloud, whose basic idea is to deploy a …

Computation offloading method using stochastic games for software-defined-network-based multiagent mobile edge computing

G Wu, H Wang, H Zhang, Y Zhao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In the scenario of Industry 4.0, mobile smart devices (SDs) on production lines have to
process massive amounts of data. These computing tasks sometimes far exceed the …

Joint differential game and double deep q–networks for suppressing malware spread in industrial internet of things

S Shen, L Xie, Y Zhang, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), which has the capability of perception, monitoring,
communication and decision-making, has already exposed more security problems that are …

Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL

G Wu, X Chen, Z Gao, H Zhang, S Yu, S Shen - Journal of Parallel and …, 2024 - Elsevier
With the development of industrialization and intelligence, the Industrial Internet of Things
(IIoT) has gradually become the direction for traditional industries to transform into modern …

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

G Wu, L Xie, H Zhang, J Wang, S Shen, S Yu - Journal of Network and …, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) with deep integration of Internet of Things and social
networks has become a target of a large number of hackers who attempt to spread viruses …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks

S Shen, C Cai, Z Li, Y Shen, G Wu, S Yu - Applied Soft Computing, 2024 - Elsevier
How to process and classify zero-day attacks due to their huge damage to social Internet of
Things (SIoT) systems has become a hot research issue. To solve this issue, we propose a …

Blockchain-aided network resource orchestration in intelligent internet of things

C Wang, C Jiang, J Wang, S Shen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The proliferation of users and data traffic poses substantial pressure on resource
management in the Internet of Things (IoT). In addition to beneficially allocating scarce …

An effective method for the protection of user health topic privacy for health information services

Z Wu, H Liu, J Xie, G Xu, G Li, C Lu - World Wide Web, 2023 - Springer
With the rapid development of emerging network technologies such as cloud computing, the
background server-side of public health information services is widely deployed on the …

Combining lyapunov optimization with actor-critic networks for privacy-aware IIoT computation offloading

G Wu, X Chen, Y Shen, Z Xu, H Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Opportunistic computation offloading is an effective way to improve the computing
performance of Industrial Internet of Things (IIoT) devices. However, as more and more …