Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Multi-area short-term load forecasting based on spatiotemporal graph neural network
Engineering Applications of Artificial Intelligence (EAAI), Volume 138, Issue PAhttps://doi.org/10.1016/j.engappai.2024.109398AbstractShort term power load forecasting can accurately evaluate the overall power load changes and provide accurate reference for power system operation decision-making. To address the limitations of traditional load forecasting methods, which are ...
- surveyMay 2024
Exploring Blockchain Technology through a Modular Lens: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 9Article No.: 242, Pages 1–39https://doi.org/10.1145/3657288Blockchain has attracted significant attention in recent years due to its potential to revolutionize various industries by providing trustlessness. To comprehensively examine blockchain systems, this article presents both a macro-level overview on the ...
- research-articleApril 2024
An Adaptive and Modular Blockchain Enabled Architecture for a Decentralized Metaverse
IEEE Journal on Selected Areas in Communications (JSAC), Volume 42, Issue 4Pages 893–904https://doi.org/10.1109/JSAC.2023.3345432A metaverse breaks the boundaries of time and space between people, realizing a more realistic virtual experience, improving work efficiency, and creating a new business model. Blockchain, as one of the key supporting technologies for a metaverse design, ...
- research-articleJanuary 2024
Enhancing Malware Classification via Self-Similarity Techniques
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7232–7244https://doi.org/10.1109/TIFS.2024.3433372Despite continuous advancements in defense mechanisms, attackers often find ways to circumvent security measures. Windows operating systems, in particular, are vulnerable due to fewer restrictions on downloading software from unknown sources, facilitating ...
- research-articleNovember 2023
Non‐fungible token‐based health record marketplace
AbstractWith an increasing affinity towards patient‐centric care, sharing real‐time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the ...
In this work, a non‐fungible token‐based system is proposed to implement a health record marketplace, which provides dual ownership along with finer access control and efficiency in data sharing. Stackelberg game theory is utilized to determine pricing ...
-
- research-articleNovember 2023
Black Swan in Blockchain: Micro Analysis of Natural Forking
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 6Pages 4443–4454https://doi.org/10.1109/TDSC.2022.3219443Natural forking is tantamount to the “black swan” event in blockchain since it emerges unexpectedly with a small probability, and may incur low resource utilization and costly economic loss. The ongoing literature analyzes natural forking ...
- research-articleMay 2023
Incentive Mechanism Design for Joint Resource Allocation in Blockchain-Based Federated Learning
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 34, Issue 5Pages 1536–1547https://doi.org/10.1109/TPDS.2023.3253604Blockchain-based federated learning (BCFL) has recently gained tremendous attention because of its advantages, such as decentralization and privacy protection of raw data. However, there has been few studies focusing on the allocation of resources for the ...
- research-articleMay 2023
Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning
IEEE Transactions on Mobile Computing (ITMV), Volume 22, Issue 5Pages 2850–2861https://doi.org/10.1109/TMC.2021.3123195The explosive amount of data generated at the network edge makes mobile edge computing an essential technology to support real-time applications, calling for powerful data processing and analysis provided by machine learning (ML) techniques. In particular,...
- research-articleMay 2023
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 3Pages 2450–2465https://doi.org/10.1109/TDSC.2022.3184185Smart home systems are both technologically and economically advancing rapidly. As people become gradually inalienable to smart home infrastructures, their security conditions are getting more and more closely tied to everyone's privacy and safety. ...
- research-articleApril 2023
Online Learning for Failure-Aware Edge Backup of Service Function Chains With the Minimum Latency
IEEE/ACM Transactions on Networking (TON), Volume 31, Issue 6Pages 2730–2744https://doi.org/10.1109/TNET.2023.3265127Virtual network functions (VNFs) have been widely deployed in mobile edge computing (MEC) to flexibly and efficiently serve end users running resource-intensive applications, which can be further serialized to form service function chains (SFCs), ...
- research-articleMarch 2023
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain
IEEE/ACM Transactions on Networking (TON), Volume 31, Issue 5Pages 2376–2388https://doi.org/10.1109/TNET.2023.3249206Though voting-based consensus algorithms in blockchain outperform proof-based ones in energy- and transaction-efficiency, they are prone to incur wrong elections and bribery elections. The former originates from the uncertainties of candidates’ ...
- review-articleJanuary 2023
Time Series Compression for IoT: A Systematic Literature Review
Time series are widely used to record information in applications developed with Internet of Things (IoT) devices, where sensors are used to collect large amounts of data. These devices, even with the exponential technological evolution of the last years, ...
- research-articleJuly 2022
Strategic signaling for utility control in audit games
AbstractAs an effective method to protect the daily access to sensitive data against malicious attacks, the audit mechanism has been widely deployed in various practical fields. In order to examine security vulnerabilities and prevent the ...
- research-articleJuly 2022
Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks
Journal of Computer Science and Technology (JCST), Volume 37, Issue 4Pages 888–905https://doi.org/10.1007/s11390-022-2032-xAbstractScalability has long been a major challenge of cryptocurrency systems, which is mainly caused by the delay in reaching consensus when processing transactions on-chain. As an effective mitigation approach, the payment channel networks (PCNs) enable ...
- research-articleApril 2022
Defense Strategies Toward Model Poisoning Attacks in Federated Learning: A Survey
2022 IEEE Wireless Communications and Networking Conference (WCNC)Pages 548–553https://doi.org/10.1109/WCNC51071.2022.9771619Advances in distributed machine learning can empower future communications and networking. The emergence of federated learning (FL) has provided an efficient framework for distributed machine learning, which, however, still faces many security challenges. ...
- research-articleJanuary 2022
Calcium Phosphorus Nanoparticles Coloaded with Paclitaxel and ADAM-10-siRNA for the Treatment of Triple Negative Breast Cancer
It is urgent to develop nonside effects and targeting and effective therapeutic agents for triple negative breast cancer (TNBC). Herein, first-line chemotherapeutic drug paclitaxel (PTX) and a disintegrin and metalloproteinase 10 (ADAM10) small ...
- research-articleAugust 2021
Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 32, Issue 8Pages 2074–2085https://doi.org/10.1109/TPDS.2021.3056773Proof of work (PoW), the most popular consensus mechanism for blockchain, requires ridiculously large amounts of energy but without any useful outcome beyond determining accounting rights among miners. To tackle the drawback of PoW, we propose a novel ...
- research-articleDecember 2020
Correlated Participation Decision Making for Federated Edge Learning
GLOBECOM 2020 - 2020 IEEE Global Communications ConferencePages 1–6https://doi.org/10.1109/GLOBECOM42002.2020.9321981Driven by the sheer amount of data generated at the network edge and improved computation capabilities of mobile devices, federated edge learning (FEL) emerges as a novel paradigm to achieve edge intelligence with a favorable property of protecting ...
- ArticleSeptember 2020
Sync or Fork: Node-Level Synchronization Analysis of Blockchain
Wireless Algorithms, Systems, and ApplicationsPages 170–181https://doi.org/10.1007/978-3-030-59016-1_15AbstractAs the cornerstone of blockchain, block synchronization plays a vital role in maintaining the security. Without full blockchain synchronization, unexpected forks will emerge and thus providing a breeding ground for various malicious attacks. The ...
- research-articleJune 2019
A game theoretic analysis on block withholding attacks using the zero-determinant strategy
IWQoS '19: Proceedings of the International Symposium on Quality of ServiceArticle No.: 41, Pages 1–10https://doi.org/10.1145/3326285.3329076In Bitcoin's incentive system that supports open mining pools, block withholding attacks incur huge security threats. In this paper, we investigate the mutual attacks among pools as this determines the macroscopic utility of the whole distributed ...