• A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems 

      Li, Longpeng; Xu, Guangquan; Jiao, Litao; Li, Xiaotong; Wang, Hao; Hu, Jing; Xian, Hequn; Lian, Wenjuan; Gao, Honghao (Journal article; Peer reviewed, 2019)
      With the widely deployment of wireless sensor networks in smart industrial systems, lots of unauthorized attacking from the adversary is greatly threating the security and privacy of the entire industrial systems, of which ...
    • Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum 

      Xu, Guangquan; Guo, Bingjiang; Su, Chunhua; Zheng, Xi; Liang, Kaitai; Wong, Duncan; Wang, Hao (Journal article; Peer reviewed, 2019)
      Blockchain security has been drawing a tremendous attention from industry and academic due to its prevalence on real-world applications in these years, such as distributed blockchain-based storage systems. Since being ...
    • Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies 

      Dai, Hong-Ning; Wang, Hao; Xu, Guangquan; Wan, Jiafu; Imran, Muhammad (Journal article; Peer reviewed, 2019)
      Data analytics in massive manufacturing data can extract huge business values while can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. ...
    • ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts 

      Wang, Wei; Song, Jingjing; Xu, Guangquan; Li, Yidong; Wang, Hao; Su, Chunhua (Journal article, 2020)
      Smart contracts are decentralized applications running on Blockchain. A very large number of smart contracts has been deployed on Ethereum. Meanwhile, security flaws of contracts have led to huge pecuniary losses and ...
    • DT-CP: A Double-TTPs Based Contract-signing Protocol with Lower Computational Cost 

      Xu, Guangquan; Zhang, Yao; Jiao, Litao; Panaousis, Emmanouil; Liang, Kaitai; Wang, Hao; Li, Xiaotong (Journal article; Peer reviewed, 2019)
      This paper characterizes a contract signing protocol with high efficiency in Internet of Things. Recent studies show that existing contract-signing protocols can achieve abuse-freeness and resist inference attack, but ...
    • A Feature Discretization Method Based on Fuzzy Rough Sets for High-resolution Remote Sensing Big Data Under Linear Spectral Model 

      Chen, Qiong; Huang, Mengxing; Wang, Hao; Xu, Guangquan (Peer reviewed; Journal article, 2021)
      As one of the most relevant data preprocessing techniques, discretization has played an important role in data mining, which is widely applied in industrial control. It can transform continuous features to discrete ones, ...
    • HUCDO: A Hybrid User-Centric Data Outsourcing Scheme. 

      Huang, Ke; Zhang, Xiaosong; Wang, Xiaofeng; Mu, Yi; REZAEIBAGHA, FATEMEH; Xu, Guangquan; Wang, Hao; Zheng, Xi (Peer reviewed; Journal article, 2020)
      Outsourcing helps relocate data from the cyber-physical system (CPS) for efficient storage at low cost. Current server-based outsourcing mainly focuses on the benefits of servers. This cannot attract users well, as their ...
    • SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs 

      Cheng, Lichen; Liu, Jiqiang; Xu, Guangquan; Zhang, Zonghua; Wang, Hao; Dai, Hong-Ning; Wu, Yulei; Wang, Wei (Journal article; Peer reviewed, 2019)
      Assisting traffic control is one of the most important applications on the Internet of Vehicles (IoVs). Traffic information provided by vehicles is desired since drivers or vehicle sensors are sensitive in perceiving or ...
    • Sensing Users' Emotional Intelligence in Social Networks 

      Wei, Xiangyu; Xu, Guangquan; Wang, Hao; He, Yongzhong; Han, Zhen; Wang, Wei (Journal article; Peer reviewed, 2019)
      Social networks have integrated into the daily lives of most people in the way of interactions and of lifestyles. The users' identity, relationships, or other characteristics can be explored from the social networking data, ...
    • TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things 

      Ning, Zhenhu; Xu, Guangquan; Xiong, Naixue; Yang, Yongli; Shen, Changxiang; Panaousis, Emmanouil; Wang, Hao; Liang, Kaitai (Journal article; Peer reviewed, 2019)
      In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. ...
    • UAV-enabled friendly jamming scheme to secure industrial Internet of Things 

      Wang, Qubeijian; Dai, Hong-Ning; Wang, Hao; Xu, Guangquan; Sangaiahs, Arun Kumar (Journal article; Peer reviewed, 2019)
      Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since many malicious attacks often follow eavesdropping activities. In this paper, we present an anti-eavesdropping scheme based ...