Integration of blockchain and edge computing in internet of things: A survey

H Xue, D Chen, N Zhang, HN Dai, K Yu - Future Generation Computer …, 2023 - Elsevier
As an important technology to ensure data security, consistency, traceability, etc., blockchain
has been increasingly used in Internet of Things (IoT) applications. The integration of …

DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things

Y Ding, G Wu, D Chen, N Zhang, L Gong… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the
medical information network to facilitate the process of diagnosing and treating doctors. As …

Variational graph neural networks for road traffic prediction in intelligent transportation systems

F Zhou, Q Yang, T Zhong, D Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As one of the most important applications of industrial Internet of Things, intelligent
transportation system aims to improve the efficiency and safety of transportation networks. In …

Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT

D Chen, H Wang, N Zhang, X Nie… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
To ensure the security of Internet of Things (IoT) communications, one can use deep packet
inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious …

ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation

Y Ding, C Zhang, M Cao, Y Wang, D Chen, N Zhang… - Neurocomputing, 2021 - Elsevier
Brain tumor segmentation using MRI data remains challenging for some reasons. Hence,
how to accurately segment the brain tumor is kept as a significant topic in the area of …

Flexible and fine-grained access control for ehr in blockchain-assisted e-healthcare systems

D Chen, L Zhang, Z Liao, HN Dai… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
It is of the utmost importance to achieve flexible and fine-grained access control of electronic
health records (EHRs) in smart elderly healthcare (SEH) for providing high-quality …

MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment

D Chen, Z Zhao, X Qin, Y Luo, M Cao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …

Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach

Q Wang, X Chen, X Jin, X Li, D Chen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The integration of the space–air–ground-integrated network and the Internet of Vehicles
(IoV) enables the IoV to achieve full network coverage and better network performance …

On message authentication channel capacity over a wiretap channel

D Chen, S Jiang, N Zhang, L Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a novel message authentication model using the same key over wiretap
channel is proposed to achieve information-theoretic security. Specifically, in the proposed …

Audio-based security techniques for secure device-to-device communications

D Chen, N Zhang, H Wu, K Zhang, R Lu… - IEEE Network, 2022 - ieeexplore.ieee.org
In this article, we investigate audio-based security techniques to secure Device-to-Device
(D2D) communications. First, the key distribution techniques for secure D2D communication …