Towards energy-efficient wireless networking in the big data era: A survey

X Cao, L Liu, Y Cheng, X Shen - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
With the proliferation of wireless devices, wireless networks in various forms have become
global information infrastructure and an important part of our daily life, which, at the same …

Solving a system of linear equations: From centralized to distributed algorithms

P Wang, S Mou, J Lian, W Ren - Annual Reviews in Control, 2019 - Elsevier
For a wide range of control engineering applications, the problem of solving a system of
linear equations is often encountered and has been well studied. Traditionally, this problem …

Blockchain-based public integrity verification for cloud storage against procrastinating auditors

Y Zhang, C Xu, X Lin, X Shen - IEEE Transactions on Cloud …, 2019 - ieeexplore.ieee.org
The deployment of cloud storage services has significant benefits in managing data for
users. However, it also causes many security concerns, and one of them is data integrity …

Event-based security control for stochastic networked systems subject to attacks

H Yan, J Wang, H Zhang, H Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper is concerned with the event-based security control problems for a set of discrete-
time stochastic systems suffered from randomly occurred attacks, especially the denial-of …

Multi-replica and multi-cloud data public audit scheme based on blockchain

X Yang, X Pei, M Wang, T Li, C Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Cloud storage services provide convenient data storage services for individuals and
enterprises. Data owners can remotely access and update outsourcing data. But there are …

Merkle tree and blockchain-based cloud data auditing

AP Mohan, A Gladston - International Journal of Cloud …, 2020 - igi-global.com
Cloud computing is the fastest growing and most promising field in the service provisioning
segment. It has become a challenging task to provide security in the cloud. The purpose of …

Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance

H Li, J Yu, H Zhang, M Yang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and 5G, edge computing, as a new
computing paradigm, has been widely popularized in academia and industry. Due to the …

AMCloud: Toward a secure autonomic mobile ad hoc cloud computing system

DM Shila, W Shen, Y Cheng, X Tian… - IEEE Wireless …, 2016 - ieeexplore.ieee.org
Cloud computing is a revolutionary paradigm to deliver computing resources, ranging from
data storage/processing to software, as a service over the network, with the benefits of …

Non-Interactive and secure outsourcing of PCA-Based face recognition

Y Ren, X Xu, G Feng, X Zhang - Computers & security, 2021 - Elsevier
In recent years, there have been more and more researches focus on the field of face
recognition with the development of artificial intelligence (AI). Principal Component Analysis …

A distributed algorithm for solving linear algebraic equations over random networks

SS Alaviani, N Elia - IEEE Transactions on Automatic Control, 2020 - ieeexplore.ieee.org
This article considers the problem of solving linear algebraic equations of the form Ax= b
among multiagents, which seek a solution by using local information in presence of random …