Research review for broad learning system: Algorithms, theory, and applications

X Gong, T Zhang, CLP Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In recent years, the appearance of the broad learning system (BLS) is poised to
revolutionize conventional artificial intelligence methods. It represents a step toward building …

When energy trading meets blockchain in electrical power system: The state of the art

N Wang, X Zhou, X Lu, Z Guan, L Wu, X Du… - Applied Sciences, 2019 - mdpi.com
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

Real-time lateral movement detection based on evidence reasoning network for edge computing environment

Z Tian, W Shi, Y Wang, C Zhu, X Du… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …

Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory

Z Tian, X Gao, S Su, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Conducting reputation management is very important for Internet of vehicles. However, most
of the existing work evaluate the effectiveness of their schemes with settled attacking …

Consortium blockchain-based malware detection in mobile devices

J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang - IEEE Access, 2018 - ieeexplore.ieee.org
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …

A data-driven method for future Internet route decision modeling

Z Tian, S Su, W Shi, X Du, M Guizani, X Yu - Future Generation Computer …, 2019 - Elsevier
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone
network routing behavior, locating network failure and, evaluating network performance for …