Integrated structural health monitoring in bridge engineering

Z He, W Li, H Salehi, H Zhang, H Zhou, P Jiao - Automation in construction, 2022 - Elsevier
Integrated structural health monitoring (SHM) uses the mechanism analysis, monitoring
technology and data analytics to diagnose the classification, location and significance of …

Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges

I Yaqoob, E Ahmed, IAT Hashem… - IEEE wireless …, 2017 - ieeexplore.ieee.org
Recent years have witnessed tremendous growth in the number of smart devices, wireless
technologies, and sensors. In the foreseeable future, it is expected that trillions of devices …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

Robust and secure wireless communications via intelligent reflecting surfaces

X Yu, D Xu, Y Sun, DWK Ng… - IEEE Journal on Selected …, 2020 - ieeexplore.ieee.org
In this paper, intelligent reflecting surfaces (IRSs) are employed to enhance the physical
layer security in a challenging radio environment. In particular, a multi-antenna access point …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

BPDS: A blockchain based privacy-preserving data sharing for electronic medical records

J Liu, X Li, L Ye, H Zhang, X Du… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot
of attention. Sharing health data is considered to be a critical approach to improve the …

[HTML][HTML] When energy trading meets blockchain in electrical power system: The state of the art

N Wang, X Zhou, X Lu, Z Guan, L Wu, X Du… - Applied Sciences, 2019 - mdpi.com
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …

Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city

J Qiu, L Du, D Zhang, S Su… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things and big data technology, the intelligent
transportation system is becoming the main development direction of future transportation …