A Caching-based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …

DANTD: A deep abnormal network traffic detection model for security of industrial internet of things using high-order features

G Shi, X Shen, F Xiao, Y He - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the development of blockchain, artificial intelligence and data mining technology,
abnormal network traffic data has become easy to obtain. The traffic detection model detects …

[PDF][PDF] LightNestle: quick and accurate neural sequential tensor completion via meta learning

Y Li, W Liang, K Xie, D Zhang, S Xie, KC Li - IEEE Infocom, 2023 - merrillli.github.io
Network operation and maintenance rely heavily on network traffic monitoring. Due to the
measurement overhead reduction, lack of measurement infrastructure, and unexpected …

GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network

J Cai, W Liang, X Li, K Li, Z Gui… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the expansion of scale, the Internet of Things (IoT) suffers more and more security
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …

[HTML][HTML] Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems

S Hajj, J Azar, J Bou Abdo, J Demerjian, C Guyeux… - Sensors, 2023 - mdpi.com
With the proliferation of IoT devices, ensuring the security and privacy of these devices and
their associated data has become a critical challenge. In this paper, we propose a federated …

[HTML][HTML] A Video Target Tracking and Correction Model with Blockchain and Robust Feature Location

Y Jiang, D Han, M Cui, Y Fan, Y Zhou - Sensors, 2023 - mdpi.com
In this paper, a cutting-edge video target tracking system is proposed, combining feature
location and blockchain technology. The location method makes full use of feature …

[HTML][HTML] VASERP: an adaptive, lightweight, secure, and efficient RFID-based authentication scheme for IoV

Y Gong, K Li, L Xiao, J Cai, J Xiao, W Liang, MK Khan - Sensors, 2023 - mdpi.com
With the rapid growth in wireless communication and IoT technologies, Radio Frequency
Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of …

A DRL-Based Decentralized Computation Offloading Method: An Example of an Intelligent Manufacturing Scenario

S Lu, S Liu, Y Zhu, W Liang, K Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of edge computing and 5G, the demand for resources-limited devices
to execute computation-intensive tasks can be effectively alleviated. The research of …

Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm

P Zhou, H Zhang, W Liang - Connection Science, 2023 - Taylor & Francis
Aiming at the problem of low detection accuracy of network traffic data types by traditional
intrusion detection methods, we propose an improved Harris Hawk hybrid intrusion …

MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance

J Long, F Fang, C Luo, Y Wei, TH Weng - Connection Science, 2023 - Taylor & Francis
Online transaction fraud has become increasingly rampant due to the convenience of mobile
payment. Fraud detection is critical to ensure the security of online transactions. With the …