When energy trading meets blockchain in electrical power system: The state of the art

N Wang, X Zhou, X Lu, Z Guan, L Wu, X Du… - Applied Sciences, 2019 - mdpi.com
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …

Vulnerabilities and limitations of MQTT protocol used between IoT devices

D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities

M Shen, X Tang, L Zhu, X Du… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Machine learning (ML) techniques have been widely used in many smart city sectors, where
a huge amount of data is gathered from various (IoT) devices. As a typical ML model …

A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications

J Lin, W Yu, N Zhang, X Yang… - IEEE internet of things …, 2017 - ieeexplore.ieee.org
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

Block-DEF: A secure digital evidence framework using blockchain

Z Tian, M Li, M Qiu, Y Sun, S Su - Information Sciences, 2019 - Elsevier
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

An improved deep reinforcement learning routing technique for collision-free VANET

P Upadhyay, V Marriboina, SJ Goyal, S Kumar… - Scientific Reports, 2023 - nature.com
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …