Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List no author result Created with Sketch.
Loading Scinapse...
Xiuzhen Cheng
George Washington University
301Publications
41H-index
6,751Citations
Publications 301
Newest
2019 in Computer NetworksIF: 2.52
Siyao Cheng (Harbin Institute of Technology), Yingshu Li32
Estimated H-index: 32
(Georgia State University)
+ 2 AuthorsXiuzhen Cheng41
Estimated H-index: 41
(George Washington University)
Abstract With the development of Internet of Things (IoT), heterogeneous sensory data appears everywhere in our lives. Unlike traditional sensory data, heterogeneous sensory data often involves variety modalities of data in one set, so that it is called as the multi-modal sensory data in this paper. The appearance of such data making it possible to monitor more complicated objects and improve monitoring accuracy. However, due to lack of integration model for multi-modal sensory data, most of the...
Source Cite
Shengling Wang10
Estimated H-index: 10
(Beijing Normal University),
Xiangheng Meng1
Estimated H-index: 1
(Beijing Normal University)
+ 3 AuthorsXiuzhen Cheng41
Estimated H-index: 41
(George Washington University)
Location-based services (LBSs) are becoming an increasingly important component in our social and business life. All existing LBS providers support the nearest place searching via a single point of interest (POI) query. That is, in one query, a user is allowed to search for only one type of service. However, in real life, people usually need to search multiple different types of services and hope that their locations are as close as possible for convenience. For example, one user would like to s...
1 Citations Source Cite
2018 in IEEE NetworkIF: 7.20
Wei Cheng2
Estimated H-index: 2
,
Jiguo Yu14
Estimated H-index: 14
+ 1 AuthorsXiuzhen Cheng41
Estimated H-index: 41
In this article, we propose a novel networking paradigm called Small-world SSDNet, servicing applications such as public safety, proximity based services, and fog computing based on device-todevice multi-hop wireless communications. The "small-world" feature is determined by the service area, whose size is usually within a community level, and the well known small-world properties existing in SSDNets; the "super-dense" feature comes from the fact that the increased direct communication range and...
1 Citations Source Cite
Yan Huo11
Estimated H-index: 11
,
Yuqi Tian1
Estimated H-index: 1
+ 2 AuthorsTao Jing12
Estimated H-index: 12
This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available. Among the physical layer security techniques, jamming is an effective way to degrade the channel quality of the eavesdroppers for ensuring security. We start by giving a brief i...
6 Citations Source Cite
2018
Chunqiang Hu11
Estimated H-index: 11
,
Jiguo Yu14
Estimated H-index: 14
+ 3 Authorsand Limin Sun1
Estimated H-index: 1
In this paper, we present a signcryption scheme called CP_ABSC based on Ciphertext-Policy Attribute Based Encryption (CP_ABE) [ 7 ] to secure the multicast communications in smart grids that require access control, data encryption, and authentication to ensure message integrity and confidentiality. CP_ABSC provides algorithms for key management, signcryption, and designcryption. It can be used to signcrypt a message based on the access rights specified by the message itself. A user can designcry...
1 Citations Source Cite
Arwa Alrawais3
Estimated H-index: 3
(George Washington University),
Abdulrahman Alhothaily3
Estimated H-index: 3
(George Washington University)
+ 2 AuthorsJiguo Yu14
Estimated H-index: 14
(Qufu Normal University)
Certificate validation in public key infrastructure (PKI) is a vital phase of establishing secure connections on any network. There has been a great deal of speculation on how to efficiently validate digital certificates in PKI on which the security of network communications rests. Developing such a system is challenging because digital certificates need to be quickly and securely validated for a large number of clients in a short period of time at a low cost. On the other hand, our analysis on ...
1 Citations Source Cite
2018 in International Conference on Computer Communications
Yizhen Jia (George Washington University), Yinhao Xiao (George Washington University)+ 3 AuthorsZhiguo Wan (Shandong University)
Smart home IoT devices have been more prevalent than ever before but the relevant security considerations fail to keep up with due to device and technology heterogeneity and resource constraints, making IoT systems susceptible to various attacks. In this paper, we propose a novel graph-based mechanism to identify the vulnerabilities in communication of IoT devices for smart home systems. Our approach takes one or more packet capture files as inputs to construct a traffic graph by passing the cap...
Source Cite
2018 in IEEE AccessIF: 3.56
Yunhua He2
Estimated H-index: 2
(North China University of Technology),
Hong Li2
Estimated H-index: 2
(Chinese Academy of Sciences)
+ 3 AuthorsLimin Sun15
Estimated H-index: 15
(Chinese Academy of Sciences)
In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering messages, or uploading data. Nevertheless, users are selfish in nature and they may refuse to cooperate due to their concerns on energy and bandwidth consumption. Thus each user should receive a satisfying reward to compensate its resource consumption for cooperation. However, suitable incentive mechanisms that can meet the diverse requireme...
4 Citations Source Cite
12345678910