• A Blockchain-Based Risk and Information System Control Framework 

      Ma, Shenglan; Wang, Hao; Dai, Hong-Ning; Cheng, Shuhan; Yi, Ruihua; Wang, Tongsen (Chapter; Conference object, 2018)
      Risk and Information System Control Framework in business includes the methods and processes to manage risks and seize opportunities which involve identifying particular risk events relevant to the objectives, assessing ...
    • A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack 

      Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao (Journal article; Peer reviewed, 2018)
      Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. ...
    • An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things 

      Li, Xuran; Wang, Hao; Dai, Hong-Ning; Wang, Yuanyuan; Zhao, Qinglin (Journal article; Peer reviewed, 2016)
      The security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers ...
    • Blockchain-Based Power Energy Trading Management 

      Wang, Hao; Ma, Shenglan; Guo, Chaonian; Wu, Yulei; Dai, Hong-Ning; Wu, Di (Peer reviewed; Journal article, 2021)
      Distributed peer-to-peer power energy markets are emerging quickly. Due to central governance and lack of effective information aggregation mechanisms, energy trading cannot be efficiently scheduled and tracked. We devise ...
    • Connectivity of underwater cognitive acoustic networks under spectrum constraint 

      Wang, Qiu; Dai, Hong-Ning; Wang, Hao; Wang, Qubeijian (Chapter; Conference object, 2018)
      There is an extensive attention on underwater cognitive acoustic networks (UCANs) since acoustic spectrum becomes deficient owning to the proliferation of human activity in ocean. This paper presents an overview of our ...
    • Fraud Risk Monitoring System for E-Banking Transactions 

      Guo, Chaonian; Wang, Hao; Dai, Hong-Ning; Cheng, Shuhan; Wang, Tongsen (Chapter, 2018)
      Fraudulent e-banking transactions have caused great economic loss every year. Thus, it is important for financial institutions to make the e-banking system more secure, and improve the fraud detection system. Researches ...
    • Impact of outcome-based education on software engineering teaching: A case study 

      Dai, Hong-Ning; Wei, Wei; Wang, Hao; Wong, Tak-Lam (Chapter, 2017)
      This paper investigates the impact of outcome- based education (OBE) on students' learning achievement from a software engineering (SE) program. It is not easy to transform an SE curriculum from traditional knowledge-based ...
    • Link Connectivity and Coverage of Underwater Cognitive Acoustic Networks under Spectrum Constraint 

      Wang, Qiu; Dai, Hong-Ning; Cheang, Chak Fong; Wang, Hao (Journal article; Peer reviewed, 2017)
      Extensive attention has been given to the use of cognitive radio technology in underwater acoustic networks since the acoustic spectrum became scarce due to the proliferation of human aquatic activities. Most of the recent ...
    • On Modeling Eavesdropping Attacs in Underwater Acoustic Sensor Networks 

      Wang, Qiu; Dai, Hong-Ning; Li, Xuran; Wang, Hao; Xiao, Hong (Journal article; Peer reviewed, 2016)
      The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the ...
    • On performance analysis of protective jamming schemes in wireless sensor networks 

      Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong (Peer reviewed; Journal article, 2016)
      Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious ...
    • R-PCNN Method to Rapidly Detect Objects on THz Images in Human Body Security Checks 

      Xiao, Hong; Zhang, Rongyue; Wang, Hao; Zhu, Feng; Zhang, Cheng; Dai, Hong-Ning; Zhou, Yubin (Chapter, 2018)
      Terahertz human body security images have low resolution and a low signal-to-noise ratio. In the traditional method, image segmentation, positioning, and identification are applied to detect objects carried by humans in ...