Efficient data access control with fine-grained data protection in cloud-assisted IIoT

S Qi, Y Lu, W Wei, X Chen - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …

Multi-sink distributed power control algorithm for cyber-physical-systems in coal mine tunnels

W Wei, X **a, M Wozniak, X Fan, R Damaševičius… - Computer Networks, 2019 - Elsevier
A coal mine tunnel usually has a long-strip shape. Traditional single-sink cyber-physical-
systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel …

QoS-DPSO: QoS-aware task scheduling for cloud computing system

W **g, C Zhao, Q Miao, H Song, G Chen - Journal of Network and …, 2021 - Springer
Dynamic provisioning of computational resources in cloud computing system is a
challenging problem. With many VMs being deployed in clouds, managing so much …

Fully convolutional neural network with augmented atrous spatial pyramid pool and fully connected fusion path for high resolution remote sensing image segmentation

G Chen, C Li, W Wei, W **g, M Woźniak… - Applied Sciences, 2019 - mdpi.com
Recent developments in Convolutional Neural Networks (CNNs) have allowed for the
achievement of solid advances in semantic segmentation of high-resolution remote sensing …

Risk assessment of hypertension in steel workers based on LVQ and fisher-SVM deep excavation

JH Wu, W Wei, L Zhang, J Wang, R Damaševičius… - Ieee …, 2019 - ieeexplore.ieee.org
The steel industry is one of the pillar industries in China. The physical and mental health of
steel workers is related to the development of China's steel industry. Steel workers have …

Software aging analysis of the android mobile os

D Cotroneo, F Fucci, AK Iannillo… - 2016 IEEE 27th …, 2016 - ieeexplore.ieee.org
Mobile devices are significantly complex, feature-rich, and heavily customized, thus they are
prone to software reliability and performance issues. This paper considers the problem of …

Algorithm research of known-plaintext attack on double random phase mask based on WSNs

W Wei, M Woźniak, R Damaševičius… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
With the development and popularization of computer and Internet, information
communication plays an irreplaceable role in the modern society. Security problems of the …

Testing the resilience of MEC-based IoT applications against resource exhaustion attacks

R Pietrantuono, M Ficco… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is an emerging computing model that provides the
necessary on-demand resources and services to the edge of the network, ensuring powerful …

Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing

Y Lu, Y Qi, S Qi, F Zhang, W Wei, X Yang… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Data deduplication technique could greatly save the storage overhead of the cloud by
eliminating duplicated data and retaining one copy. In order to ensure the privacy of the data …

Adaptive management and multi-objective optimization of virtual machine in cloud computing based on particle swarm optimization

S Li, X Pan - EURASIP Journal on Wireless Communications and …, 2020 - Springer
In order to improve the adaptive management ability of virtual machine placement in cloud
computing, an adaptive management and multi-objective optimization method for virtual …