How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective

Z Wu, S Xuan, J Xie, C Lin, C Lu - Computers in biology and medicine, 2022 - Elsevier
From a technical perspective, for electronic medical records (EMR), this paper proposes an
effective confidential management solution on the cloud, whose basic idea is to deploy a …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

Joint differential game and double deep q–networks for suppressing malware spread in industrial internet of things

S Shen, L Xie, Y Zhang, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), which has the capability of perception, monitoring,
communication and decision-making, has already exposed more security problems that are …

Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT

G Wu, Z Xu, H Zhang, S Shen, S Yu - Journal of Parallel and Distributed …, 2023 - Elsevier
Abstract In the Industrial Internet of Things (IIoT), there exist numerous sensor devices with
weak computing power and small energy storage. To meet the real-time and big data …

Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL

G Wu, X Chen, Z Gao, H Zhang, S Yu, S Shen - Journal of Parallel and …, 2024 - Elsevier
With the development of industrialization and intelligence, the Industrial Internet of Things
(IIoT) has gradually become the direction for traditional industries to transform into modern …

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

G Wu, L Xie, H Zhang, J Wang, S Shen, S Yu - Journal of Network and …, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) with deep integration of Internet of Things and social
networks has become a target of a large number of hackers who attempt to spread viruses …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

Y Shen, S Shen, Q Li, H Zhou, Z Wu, Y Qu - Digital Communications and …, 2023 - Elsevier
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …

Blockchain-aided network resource orchestration in intelligent internet of things

C Wang, C Jiang, J Wang, S Shen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The proliferation of users and data traffic poses substantial pressure on resource
management in the Internet of Things (IoT). In addition to beneficially allocating scarce …

An effective method for the protection of user health topic privacy for health information services

Z Wu, H Liu, J Xie, G Xu, G Li, C Lu - World Wide Web, 2023 - Springer
With the rapid development of emerging network technologies such as cloud computing, the
background server-side of public health information services is widely deployed on the …