Reliable broadcast based on online fountain codes

J Huang, Z Fei, C Cao, M **ao… - IEEE Communications …, 2020 - ieeexplore.ieee.org
In this letter, we study wireless broadcast schemes based on online fountain codes. We first
propose and analyze an online fountain code based-broadcast scheme, where the coded …

Security, Privacy and Challenges in Microservices Architecture and Cloud Computing-Survey

H Gopal, G Song, T Zhu - arxiv preprint arxiv:2212.14422, 2022 - arxiv.org
Security issues in processor architectures remain really critical since users and devices
continue to share computing as well as networking resources. So, preserving data privacy in …

ML-based Secure Low-Power Communication in Adversarial Contexts

G Song, T Zhu - arxiv preprint arxiv:2212.13689, 2022 - arxiv.org
As wireless network technology becomes more and more popular, mutual interference
between various signals has become more and more severe and common. Therefore, there …

An unmanned aerial vehicle navigation mechanism with preserving privacy

Y Pan, S Li, JL Chang, Y Yan, S Xu… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Visual-based Unmanned Aerial Vehicles (UAVs)(eg equipped with an optical camera) have
become more popular in daily life, because of their flexibility and convenience in capturing …

CDA: Coordinating data dissemination and aggregation in heterogeneous IoT networks using CTC

Y Pan, S Li, Y Zhang, T Zhu - Journal of Network and Computer …, 2020 - Elsevier
This paper presents a CDA mechanism to simultaneously coordinate data dissemination
and data aggregation services in coexisting heterogeneous IoT networks (ie, WiFi and …

Safe and efficient UAV navigation near an airport

Y Pan, B Bhargava, Z Ning, N Slavov… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Much recent effort has been devoted to employing Unmanned Aerial Vehicles (UAVs) to
implement airport-related tasks. However, a critical issue, collision avoidance, must be fully …

A secure multi‐path transmission algorithm based on fountain codes

J Liu, J Xu, S Li, X Cui, Y Zhang - Transactions on Emerging …, 2022 - Wiley Online Library
Cyber security is the basis of ensuring reliable network transmission. In addition to
encrypting the data, dividing the data into multiple paths for transmission is also an important …

A reliable nonfeedback transmission mechanism for asymmetric channels based on machine learning

J Liu, T Ma, S Li, X Cui, J Yuan, H Zhu… - Transactions on …, 2020 - Wiley Online Library
Cross‐technology communication (CTC) enables data communication between
heterogeneous wireless devices, which becomes the focus of current research. Due to the …

Utilizing Energy Efficiency and QoS awareness for Receiver-Arbitrated and Sender-Predicted MAC Protocol in Wireless Sensor Network

H Yang, L Bao, J Luo, B Deng… - Journal of Physics …, 2021 - iopscience.iop.org
In this paper, we exploit energy-efficiency and QoS-awareness for receiver-arbitrated and
sender-predicted MAC Protocol (EQAP-MAC) in wireless sensor network. EQAP-MAC …

An application-driven heterogeneous internet of things integration architecture

C Wang, S Li, Y Pan, B Li - … Systems: The 11th International Conference on …, 2020 - Springer
Smart city consists of heterogenous Internet of Things (IoTs) and urban application systems.
To achieve smart city integration, One critical challenge is that these heterogenous systems …