Article
Chemistry, Analytical
Anna Kaszuba-Checinska, Radoslaw Checinski, Piotr Gajewski, Jerzy Lopatka
Summary: The paper discusses the issue of waveform construction for mobile ad hoc networks with cognitive radio (MANET-CR), focusing on the importance of spectrum sensing and sharing for the effectiveness of this technique. The experiments show that utilizing sensing and cognitive management mechanisms can efficiently utilize the spectrum while maintaining reasonable management overhead costs.
Article
Automation & Control Systems
Shiva Navabi, Ashutosh Nayyar
Summary: In this article, we propose a mechanism design for allocating multiple nonperishable goods to flexible consumers over multiple time steps. We use a dynamic program to characterize the allocation rule and payment function that maximize the expected revenue. By leveraging the structure of the consumers' flexibility model, we are able to provide an explicit allocation procedure and a simple payment rule.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2023)
Article
Engineering, Multidisciplinary
Liping Zhang, Zhen Wei, Wei Ren, Xianghan Zheng, Kim-Kwang Raymond Choo, Neal N. Xiong
Summary: The popularity of electronic healthcare networks has increased during pandemics such as COVID-19, highlighting the importance of ensuring security and privacy for data-in-transit. This study introduces an effective privacy protection scheme using steganography-based schemes that utilize biological signals. By leveraging multidimensional steganography and shared keys, the proposed scheme enhances security and signal processing efficiency.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Information Systems
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Byung-Seo Kim
Summary: In the rapidly evolving landscape of distributed systems, this paper proposes an innovative trust-based resource allocation framework to address the challenges posed by network node attacks. It introduces a reputation system, decentralized trust management system, and proof-of-trust consensus mechanism to enhance security and collaboration in the metaverse. Simulation results demonstrate the effectiveness of this approach in reducing latency, improving scalability, and detecting malicious nodes.
Article
Computer Science, Information Systems
Xingfu Yan, Wing W. Y. Ng, Biao Zeng, Bowen Zhao, Fucai Luo, Ying Gao
Summary: Providing appropriate rewards in mobile crowdsensing is an effective way to motivate participants, but the privacy of participants is not well protected in most incentive schemes. To address these issues, a privacy-preserving and source-reliable incentive mechanism scheme called P2SIM is proposed, which combines redactable signature with private hash function to verify the source reliability of sensing data without revealing participants' privacy. The rewards are divided into fixed rewards and floating rewards to enhance flexibility in distribution.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Xiaoyu Zhang, Xiaofeng Chen, Hongyang Yan, Yang Xiang
Summary: Crowdsourcing as a novel problem-solving paradigm faces challenges in worker privacy and intellectual property. To address these challenges, researchers proposed the PVOC protocol and evaluated its effectiveness and practicability on real data sets.
INFORMATION SCIENCES
(2021)
Article
Telecommunications
Nikolaus Kleber, Martin Haenggi, Jonathan D. Chisum, Bertrand Hochwald, J. Nicholas Laneman
Summary: This paper presents a new framework for studying directional sensors and emitters, with a focus on two-dimensional random sensor deployments. The results suggest that omnidirectional sensors optimize detection probability and provide insights into the impact of parameters on the detection probability.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2022)
Article
Telecommunications
Nikolaus Kleber, Jonathan D. Chisum, Bertrand Hochwald, J. Nicholas Laneman
Summary: This paper explores three-dimensional spectrum monitoring sensor networks and derives a closed-form expression for emitter detection probability. Optimal antenna half-power beamwidths are determined, with directional antennas being optimal for path loss exponents less than approximately 3.22, and omnidirectional antennas being optimal otherwise. The study also reveals the robustness of omnidirectional antennas in changing environments and evaluates antenna gain models against real antennas for validation.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2022)
Article
Computer Science, Theory & Methods
Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund
Summary: This paper studies a stochastic disclosure control problem using information-theoretic methods, designing a privacy mechanism to maximize disclosed information about useful data under a strong chi(2)-privacy criterion. By utilizing methods from Euclidean information geometry, the challenging optimization problem is reduced to finding the principal right-singular vector of a matrix characterizing the optimal privacy mechanism. In extensions, scenarios involving noisy messages and maximizing mutual information between variables while satisfying privacy criteria are considered.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Hardware & Architecture
Xiaoshuai Zhang, Chao Liu, Kok Keong Chai, Stefan Poslad
Summary: As Electric Vehicles become more popular, blockchain technology is utilized to enhance efficiency and security in electric power transactions. New consensus mechanisms and authentication strategies enable smarter and more private electric power trading.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Theory & Methods
Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou, Philip S. Yu
Summary: The majority of AI solutions are based on game theory, while differential privacy is becoming the most rigorous and widely adopted privacy paradigm in the field. Despite advancements, applications are still vulnerable to privacy violations, security breaches, and adversary manipulation. Differential privacy has advantageous properties that can contribute more to game theory than just privacy protection, such as building heuristic models and quantifying the cost of privacy protection. The focus on mechanism design aims to provide a new perspective on impossibilities in game theory and improve the performance of game-theoretic solutions using differentially private techniques.
ACM COMPUTING SURVEYS
(2021)
Article
Computer Science, Information Systems
M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe
Summary: Personally identifiable information (PII) can enter cyberspace through various channels, and data sharing is an important component in data science. However, due to privacy concerns, data should be enforced with strong privacy guarantees before sharing. Different parameters can influence the efficacy of the process.
COMPUTER COMMUNICATIONS
(2021)
Article
Automation & Control Systems
Huan Gao, Yongqiang Wang, Angelia Nedic
Summary: With the increased applications of decentralized optimization in various domains, the privacy of decentralized optimization is also receiving increased attention. Existing privacy solutions sacrifice optimization accuracy or incur heavy computation/communication overhead. We propose an inherently privacy-preserving decentralized optimization algorithm based on the robustness of decentralized optimization dynamics. Our algorithm adds randomness in optimization parameters to protect the privacy of participating nodes' gradients without influencing the optimization accuracy and achieves R-linear convergence for smooth and strongly convex global objective functions. Simulation results confirm the theoretical predictions.
Article
Computer Science, Information Systems
Jingwei Ye, Xin Kang, Ying-Chang Liang, Sumei Sun
Summary: The article proposes a trust-centric privacy-preserving blockchain for DSA in IoT networks, addressing challenges and improving cooperative sensing performance through a trust evaluation mechanism and PoT consensus mechanism.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Artificial Intelligence
Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, Bin Wu
Summary: In this article, a comprehensive trajectory publishing algorithm is proposed, which effectively protects the privacy of sensitive labels and location data, and achieves higher data utility.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY
(2022)
Article
Computer Science, Information Systems
Qianyi Huang, Youjing Lu, Zhicheng Luo, Hao Wang, Fan Wu, Guihai Chen, Qian Zhang
Summary: Wireless home surveillance cameras are becoming popular for elderly/baby care and burglary detection, but attackers can still infer activities even with encrypted traffic. Despite being overlooked due to requirements, attackers can recover missing packets' metadata and build inference models to launch attacks from a distance without prior knowledge. The article demonstrates that attackers can infer victims' activities up to 40m away without any personal or environmental information.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2023)
Article
Linguistics
Jing Yan, Wenjuan Li, Tingting Zhang, Qian Zhang, Junjun Zhang, Zhenlan Jin, Ling Li
Summary: This study investigated the role of the precuneus in memory encoding of abstract and concrete words using fMRI and cTBS techniques. The results showed that the precuneus plays a role in modulating abstract verbal memory encoding, and cTBS stimulation can reduce retrieval reaction time.
JOURNAL OF NEUROLINGUISTICS
(2023)
Article
Computer Science, Information Systems
Yuben Qu, Dongyu Lu, Haipeng Dai, Haisheng Tan, Shaojie Tang, Fan Wu, Chao Dong
Summary: This paper studies the problem of resilient service provisioning for edge computing, aiming to determine a service placement strategy to maximize overall utility in the presence of uncertain service failures. Two novel solutions are proposed for the general and homogeneous case, respectively, achieving constant approximation ratio within polynomial time and better approximation ratio than previous methods. Extensive simulations and field experiments validate the effectiveness of the proposed algorithms.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Wenhao Fan, Shenmeng Li, Jie Liu, Yi Su, Fan Wu, Yuan'An Liu
Summary: This article proposes a joint task offloading and resource allocation scheme for accuracy-aware machine-learning-based IIoT applications in an edge-cloud-based network architecture. The Lyapunov optimization technique is applied to convert the long-term stochastic optimization problem into a short-term deterministic problem. Two algorithms are proposed to efficiently solve the problem, and the performance of the scheme is proved by theoretical analysis and extensive simulations.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Qinya Li, Zun Li, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Zhao Zhang, Guihai Chen
Summary: With the fast-growing market demand, more and more IoT data is being traded online in cloud-based data marketplaces. However, data consumers face difficulties in making purchasing decisions due to uncertain data quality and inflexible pricing interface. To address these issues, potential solutions include launching data demonstrations and releasing free sampling data to reduce uncertainty about data quality, and implementing flexible pricing based on the volume of data used. The economic benefits of these mechanisms are not yet clear. In this paper, we design optimal data selling mechanisms for IoT data exchange and derive two main findings based on theoretical analysis and evaluation on a real-world Taxi GPS dataset.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Engineering, Electrical & Electronic
Feng Ke, Yu Lin, Yuqin Liu, Huan Zhou, Miaowen Wen, Qian Zhang
Summary: This paper investigates the problem of task caching, offloading, and stable matching in UDRNs with MEC deployed in the relays. Improved branch-and-bound and low-complexity suboptimal algorithms are proposed for task caching and offloading. An improved stable matching algorithm based on mutual preference lists is also proposed. Simulation results demonstrate significant performance gains compared with conventional algorithms.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Virology
Tingting Sun, Yingdan Wang, Peng Zou, Qimin Wang, Jiangyan Liu, Wanli Liu, Jinghe Huang, Fan Wu
Summary: The study constructed three different variants of M2e-specific monoclonal antibodies and found that IgG2a variant provided better protection against influenza virus. Additionally, the administration route and timing of administration were critical factors in determining the protective efficacy.
JOURNAL OF MEDICAL VIROLOGY
(2023)
Article
Computer Science, Artificial Intelligence
Hao Ma, Fan Wu, Yun Guan, Le Xu, Jiangcong Liu, Lixia Tian
Summary: This study aims to improve the performance of individualized predictive models based on RS-fMRI by introducing effective feature extraction and utilization strategies, and making better use of hidden information in RS-fMRI data. A novel framework called multi-facet BrainNet with connectivity attention (MFBCA) was proposed, which showed superior performance compared to baselines.
COGNITIVE COMPUTATION
(2023)
Article
Computer Science, Information Systems
Qian Zhang, Nirwan Ansari, Zuqing Zhu
Summary: The growth of IoT has led to the emergence of protocol-independent packet processing based on programmable data plane (PDP) for heterogeneous networking systems. This work focuses on leveraging hardware acceleration through offloading flow tables to SmartNIC to improve the performance of software PDP switches based on protocol-oblivious forwarding (POF). Experimental results show that the proposed OVS-POF-TC system effectively offloads POF-FTs, supports runtime programmability, and significantly improves packet processing throughput.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Xikun Jiang, Neal N. Xiong, Xudong Wang, Chenhao Ying, Fan Wu, Yuan Luo
Summary: This paper proposes an efficient and flexible online service platform architecture for data classification and investigates pricing design to maximize revenue. It addresses three significant challenges and proposes DIVINE, a query-based data classification service with an online pricing mechanism. Experimental results demonstrate that DIVINE outperforms existing pricing mechanisms in terms of revenue.
INFORMATION SCIENCES
(2023)
Article
Chemistry, Physical
Junru Yao, Jintang Zhou, Feng Yang, Guiyu Peng, Yijie Liu, Zhengjun Yao, Fan Wu, Haibo Zeng
Summary: The development of multifunctional materials and the integration of various functions are crucial for integrated and miniaturized equipment. In this study, asymmetric MXene/aramid nanofibers/polyimides (AMAP) aerogels were developed through an integrated molding process. The clever asymmetry of these aerogels allows for enhanced performances, such as low reflection electromagnetic interference (EMI) shielding, high-efficiency infrared radiation stealth, and excellent thermal management performances. These multifunctional AMAP aerogels have potential applications in electromagnetic pollution protection, insulation, and military equipment protection against infrared detection and EMI.
Article
Computer Science, Information Systems
Baoxue Li, Chunhui Zhao
Summary: In this article, a federated zero-shot fault diagnosis framework is proposed to diagnose global unseen fault categories. Firstly, a semantic knowledge base is built to provide auxiliary discriminant descriptions of different faults. Secondly, a bidirectional alignment network is designed using two coupled variational autoencoders to fuse data and attributes and allow attribute descriptions to assist in fault diagnosis tasks. Thirdly, a cloud-edge collaboration model aggregation strategy is developed to enhance the generalization and generation ability of the global model by using a generative replay mechanism and integrating the knowledge of each client. Experiments on the thermal power plant group demonstrate the feasibility and effectiveness of the proposed framework in categorizing local and global unseen classes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Review
Materials Science, Multidisciplinary
Jing Qiao, Lutong Li, Jiurong Liu, Na Wu, Wei Liu, Fan Wu, Zhihui Zeng
Summary: Rare earth plays a crucial role in electromagnetic wave absorption materials, and the strategies of doping rare earth elements and constructing rare earth oxide composites are important for the fabrication of high-efficiency electromagnetic wave absorption materials. This review provides a comprehensive summary of the research background, classification, features, progress, and future development of rare earth electromagnetic wave absorption materials, offering guidance for future development.
JOURNAL OF MATERIALS SCIENCE & TECHNOLOGY
(2024)