Browsing Institutt for IKT og realfag by Author "Dai, Hong-Ning"
Now showing items 1-12 of 12
-
A Blockchain-Based Risk and Information System Control Framework
Ma, Shenglan; Wang, Hao; Dai, Hong-Ning; Cheng, Shuhan; Yi, Ruihua; Wang, Tongsen (Chapter, 2018)Risk and Information System Control Framework in business includes the methods and processes to manage risks and seize opportunities which involve identifying particular risk events relevant to the objectives, assessing ... -
A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack
Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao (Journal article; Peer reviewed, 2018)Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. ... -
An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
Li, Xuran; Wang, Hao; Dai, Hong-Ning; Wang, Yuanyuan; Zhao, Qinglin (Journal article; Peer reviewed, 2016)The security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers ... -
Banking Comprehensive Risk Management System Based on Big Data Architecture of Hybrid Processing Engines and Databases
Ma, Shenglan; Wang, Hao; Xu, Botong; Xiao, Hong; Xie, Fangkai; Dai, Hong-Ning; Tao, Ran; Yi, Ruihua; Wang, Tongsen (Chapter, 2018) -
Blockchain-Based Power Energy Trading Management
Wang, Hao; Ma, Shenglan; Guo, Chaonian; Wu, Yulei; Dai, Hong-Ning; Wu, Di (Peer reviewed; Journal article, 2021)Distributed peer-to-peer power energy markets are emerging quickly. Due to central governance and lack of effective information aggregation mechanisms, energy trading cannot be efficiently scheduled and tracked. We devise ... -
Connectivity of underwater cognitive acoustic networks under spectrum constraint
Wang, Qiu; Dai, Hong-Ning; Wang, Hao; Wang, Qubeijian (Chapter, 2018)There is an extensive attention on underwater cognitive acoustic networks (UCANs) since acoustic spectrum becomes deficient owning to the proliferation of human activity in ocean. This paper presents an overview of our ... -
Fraud Risk Monitoring System for E-Banking Transactions
Guo, Chaonian; Wang, Hao; Dai, Hong-Ning; Cheng, Shuhan; Wang, Tongsen (Chapter, 2018)Fraudulent e-banking transactions have caused great economic loss every year. Thus, it is important for financial institutions to make the e-banking system more secure, and improve the fraud detection system. Researches ... -
Impact of outcome-based education on software engineering teaching: A case study
Dai, Hong-Ning; Wei, Wei; Wang, Hao; Wong, Tak-Lam (Chapter, 2017)This paper investigates the impact of outcome- based education (OBE) on students' learning achievement from a software engineering (SE) program. It is not easy to transform an SE curriculum from traditional knowledge-based ... -
Link Connectivity and Coverage of Underwater Cognitive Acoustic Networks under Spectrum Constraint
Wang, Qiu; Dai, Hong-Ning; Cheang, Chak Fong; Wang, Hao (Journal article; Peer reviewed, 2017)Extensive attention has been given to the use of cognitive radio technology in underwater acoustic networks since the acoustic spectrum became scarce due to the proliferation of human aquatic activities. Most of the recent ... -
On Modeling Eavesdropping Attacs in Underwater Acoustic Sensor Networks
Wang, Qiu; Dai, Hong-Ning; Li, Xuran; Wang, Hao; Xiao, Hong (Journal article; Peer reviewed, 2016)The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the ... -
On performance analysis of protective jamming schemes in wireless sensor networks
Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong (Peer reviewed; Journal article, 2016)Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious ... -
R-PCNN Method to Rapidly Detect Objects on THz Images in Human Body Security Checks
Xiao, Hong; Zhang, Rongyue; Wang, Hao; Zhu, Feng; Zhang, Cheng; Dai, Hong-Ning; Zhou, Yubin (Chapter, 2018)Terahertz human body security images have low resolution and a low signal-to-noise ratio. In the traditional method, image segmentation, positioning, and identification are applied to detect objects carried by humans in ...