How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective
Z Wu, S Xuan, J **e, C Lin, C Lu - Computers in biology and medicine, 2022 - Elsevier
From a technical perspective, for electronic medical records (EMR), this paper proposes an
effective confidential management solution on the cloud, whose basic idea is to deploy a …
effective confidential management solution on the cloud, whose basic idea is to deploy a …
Computation offloading method using stochastic games for software-defined-network-based multiagent mobile edge computing
G Wu, H Wang, H Zhang, Y Zhao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In the scenario of Industry 4.0, mobile smart devices (SDs) on production lines have to
process massive amounts of data. These computing tasks sometimes far exceed the …
process massive amounts of data. These computing tasks sometimes far exceed the …
Joint differential game and double deep q–networks for suppressing malware spread in industrial internet of things
S Shen, L **e, Y Zhang, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), which has the capability of perception, monitoring,
communication and decision-making, has already exposed more security problems that are …
communication and decision-making, has already exposed more security problems that are …
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL
G Wu, X Chen, Z Gao, H Zhang, S Yu, S Shen - Journal of Parallel and …, 2024 - Elsevier
With the development of industrialization and intelligence, the Industrial Internet of Things
(IIoT) has gradually become the direction for traditional industries to transform into modern …
(IIoT) has gradually become the direction for traditional industries to transform into modern …
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things
G Wu, L **e, H Zhang, J Wang, S Shen, S Yu - Journal of Network and …, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) with deep integration of Internet of Things and social
networks has become a target of a large number of hackers who attempt to spread viruses …
networks has become a target of a large number of hackers who attempt to spread viruses …
A survey of iot privacy security: Architecture, technology, challenges, and trends
P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …
and report environmental changes, prevent fires, and perform many more beneficial …
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
S Shen, C Cai, Z Li, Y Shen, G Wu, S Yu - Applied Soft Computing, 2024 - Elsevier
How to process and classify zero-day attacks due to their huge damage to social Internet of
Things (SIoT) systems has become a hot research issue. To solve this issue, we propose a …
Things (SIoT) systems has become a hot research issue. To solve this issue, we propose a …
Blockchain-aided network resource orchestration in intelligent internet of things
The proliferation of users and data traffic poses substantial pressure on resource
management in the Internet of Things (IoT). In addition to beneficially allocating scarce …
management in the Internet of Things (IoT). In addition to beneficially allocating scarce …
An effective method for the protection of user health topic privacy for health information services
With the rapid development of emerging network technologies such as cloud computing, the
background server-side of public health information services is widely deployed on the …
background server-side of public health information services is widely deployed on the …
Combining lyapunov optimization with actor-critic networks for privacy-aware IIoT computation offloading
G Wu, X Chen, Y Shen, Z Xu, H Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Opportunistic computation offloading is an effective way to improve the computing
performance of Industrial Internet of Things (IIoT) devices. However, as more and more …
performance of Industrial Internet of Things (IIoT) devices. However, as more and more …