• A Blockchain-Based Risk and Information System Control Framework 

      Ma, Shenglan; Wang, Hao; Dai, Hong-Ning; Cheng, Shuhan; Yi, Ruihua; Wang, Tongsen (Chapter, 2018)
      Risk and Information System Control Framework in business includes the methods and processes to manage risks and seize opportunities which involve identifying particular risk events relevant to the objectives, assessing ...
    • A Clinical Decision Support Framework for Heterogeneous Data Sources 

      Huang, Mengxing; Han, Huirui; Wang, Hao; Li, LeFei; Zhang, Yu; Bhatti, Uzair Aslam (Journal article; Peer reviewed, 2018)
      To keep pace with the developments in medical informatics, health medical data is being collected continually. But, owing to the diversity of its categories and sources, medical data has become so complicated in many ...
    • A co-verification interface design for high-assurance CPS 

      Zhang, Yu; Huang, Mengxing; Wang, Hao; Feng, Wenlong; Cheng, Jieren; Zhou, Hui (Journal article; Peer reviewed, 2019)
      Cyber-Physical Systems (CPS) tightly integrate cyber and physical components and transcend traditional control systems and embedded system. Such systems are often mission-critical; therefore, they must be high-assurance. ...
    • A Feature Preprocessing Framework of Remote Sensing Image for Marine Targets Recognition 

      Chen, Qiong; Huang, Mengxing; Wang, Hao; Zhang, Yu; Feng, Wenlong; Wang, Xianpeng; Wu, Di; Bhatti, Uzair Aslam (Chapter, 2018)
      The effective extraction of continuous features of marine remote sensing image is the key to the processing of marine target recognition. Since many of the existing data mining algorithms can only deal with discrete ...
    • A multivariable optical remote sensing image feature discretization method applied to marine vessel targets recognition 

      Huang, Mengxing; Chen, Qiong; Wang, Hao (Journal article; Peer reviewed, 2019)
      The effective extraction of continuous features in ocean optical remote sensing image is the key to achieve the automatic detection and identification for marine vessel targets. Since many of the existing data mining ...
    • A New Anomaly Detection System for School Electricity Consumption Data 

      Cui, Wenqiang; Wang, Hao (Journal article; Peer reviewed, 2017)
      Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, ...
    • A new replica placement mechanism for mobile media streaming in edge computing 

      Tang, Yayuan; Wang, Hao; Guo, Kehua; Luo, Tao; Chi, Tao (Journal article; Peer reviewed, 2019)
      With the advent of the Internet of things era, cloud computing platforms will face the challenges of massive equipment requirements for access, massive data, insufficient bandwidth, and high power consumption. Edge computing, ...
    • A Novel Algorithm for Estimating Purchase Incentive of The Public Based on Mobile Cloud Computing 

      Mei, Bi; Wang, Xuguang; Wen, Quansi; Tang, Yong; Wang, Hao; Zhan, Choujun (Journal article; Peer reviewed, 2019)
      Mobile Cloud Computing provides applications of cloud computing technology on mobile internet. In the era of 5G networks, Mobile Cloud Computing offers the possibility of heavy computational in parallel through different ...
    • A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack 

      Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao (Journal article; Peer reviewed, 2018)
      Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. ...
    • A Rhombic Dodecahedron Topology for Human-Centric Banking Big Data 

      Wang, Hao; Ma, Shenglan; Dai, Hong-Ning (Journal article; Peer reviewed, 2019)
      Banks are collecting an unprecedentedly large amount of data about their customers from difference sources, considering their cyber, physical, social activities. The focus of this paper is to study the problem of information ...
    • A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems 

      Li, Longpeng; Xu, Guangquan; Jiao, Litao; Li, Xiaotong; Wang, Hao; Hu, Jing; Xian, Hequn; Lian, Wenjuan; Gao, Honghao (Journal article; Peer reviewed, 2019)
      With the widely deployment of wireless sensor networks in smart industrial systems, lots of unauthorized attacking from the adversary is greatly threating the security and privacy of the entire industrial systems, of which ...
    • A Self-Adaptive Process Mining Algorithm Based on Information Entropy to Deal with Uncertain Data 

      Li, Weimin; Fan, Yuting; Liu, Wei; Xin, Minjun; Wang, Hao; Jin, Qun (Journal article; Peer reviewed, 2019)
      Process mining is a technology to gain knowledge of the business process by using the event logs and achieve a model of the process, which contributes to the detection and improvement of the business process. However, most ...
    • A Smart MCDM Framework to Evaluate the Impact of Air Pollution on City Sustainability: A Case Study from China 

      Wang, Qingyong; Dai, Hong-Ning; Wang, Hao (Journal article; Peer reviewed, 2017)
      Air pollution has become one of the key environmental concerns in the urban sustainable development. It is important to evaluate the impact of air pollution on socioeconomic development since it is the prerequisite to ...
    • A Study on Sensitive Bands of EEG Data under Different Mental Workloads 

      Qu, Hongquan; Fan, Zhanli; Cao, Shuqin; Pang, Liping; Wang, Hao; Zhang, Jie (Journal article; Peer reviewed, 2019)
      Electroencephalogram (EEG) signals contain a lot of human body performance information. With the development of the brain–computer interface (BCI) technology, many researchers have used the feature extraction and classification ...
    • A Tensor Model for Quality Analysis in Industrial Drinking Water Supply System 

      Wu, Di; Wang, Hao; Seidu, Razak (Chapter, 2019)
      Drinking Water Supply (DWS) is one of the most critical and sensitive systems to maintain city operations globally. In Europe, the contradiction between the fast growth of population and obsolete urban water supply ...
    • Activity-Driven Task Allocation in Energy-Constrained Heterogeneous GPUs Systems 

      Wang, Zhuowei; Song, Xiaoyu; Cheng, Lianglun; Wang, Hao (Peer reviewed; Journal article, 2021)
      As computing systems continue to increase in complexity, energy optimization plays a key role in the design and implementation of heterogeneous systems. Although the energy consumed by off-chip memory accounts for a large ...
    • Adversarial Samples on Android Malware Detection Systems for IoT Systems 

      Liu, Xiaolei; Du, Xiaojiang; Zhang, Xiaosong; Zhu, Qingxin; Wang, Hao; Guizani, Mohsen (Journal article; Peer reviewed, 2019)
      any IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has ...
    • Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum 

      Xu, Guangquan; Guo, Bingjiang; Su, Chunhua; Zheng, Xi; Liang, Kaitai; Wong, Duncan; Wang, Hao (Journal article; Peer reviewed, 2019)
      Blockchain security has been drawing a tremendous attention from industry and academic due to its prevalence on real-world applications in these years, such as distributed blockchain-based storage systems. Since being ...
    • Amplified locality‐sensitive hashing‐based recommender systems with privacy protection 

      Chi, Xiaoxiao; Yan, Chao; Wang, Hao; Rafique, Wajid; Qi, Lianyong (Peer reviewed; Journal article, 2020)
      With the advent of Internet of Things (IoT) age, the variety and volume of web services have been increasing at a fast speed. This often leads to users' selections for web services more complicated. Under the circumstance, ...
    • An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things 

      Li, Xuran; Wang, Hao; Dai, Hong-Ning; Wang, Yuanyuan; Zhao, Qinglin (Journal article; Peer reviewed, 2016)
      The security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers ...