Skip to main content

Research Repository

See what's under the surface


Spatial-temporal data-driven service recommendation with privacy-preservation (2019)
Journal Article
Zhang, X., Qi, L., Li, S., Wan, S., Wen, Y., & Gong, W. (2020). Spatial-temporal data-driven service recommendation with privacy-preservation. Information Sciences, 515, 91-102. https://doi.org/10.1016/j.ins.2019.11.021

© 2019 Elsevier Inc. The ever-increasing popularity of web service sharing communities have produced a considerable amount of web services that share similar functionalities but vary in Quality of Services (QoS) performances. To alleviate the heavy s... Read More about Spatial-temporal data-driven service recommendation with privacy-preservation.

Symmetry Degree Measurement and Its Applications to Anomaly Detection (2019)
Journal Article
Qin, T., Liu, Z., Wang, P., Li, S., Guan, X., & Gao, L. (2019). Symmetry Degree Measurement and Its Applications to Anomaly Detection. IEEE Transactions on Information Forensics and Security, 15, https://doi.org/10.1109/TIFS.2019.2933731

IEEE Anomaly detection is an important technique used to identify patterns of unusual network behavior and keep the network under control. Today, network attacks are increasing in terms of both their number and sophistication. To avoid causing signif... Read More about Symmetry Degree Measurement and Its Applications to Anomaly Detection.

Blockchain based digital forensics investigation framework in the internet of things and social systems (2019)
Journal Article
Li, S., Qin, T., & Min, G. (2019). Blockchain based digital forensics investigation framework in the internet of things and social systems. IEEE Transactions on Computational Social Systems, 6(6), 1433-1441. https://doi.org/10.1109/TCSS.2019.2927431

The decentralised nature of blockchain technologies can well match the needs of integrity and provenances of evidences collecting in digital forensics across jurisdictional borders. In this work, a novel blockchain based digital forensics investigati... Read More about Blockchain based digital forensics investigation framework in the internet of things and social systems.

Blockchain enabled industrial Internet of Things technology (2019)
Journal Article
Zhao, S., Li, S., & Yao, Y. (2019). Blockchain enabled industrial Internet of Things technology. IEEE Transactions on Computational Social Systems, 6(6), 1442-1453. https://doi.org/10.1109/TCSS.2019.2924054

The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past a few years, many more applications... Read More about Blockchain enabled industrial Internet of Things technology.

Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud (2019)
Journal Article
Rasool, S., Iqbal, M., Dagiuklas, T., Ql-Qayyum, Z., & Li, S. (in press). Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud. Mobile Networks and Applications, https://doi.org/10.1007/s11036-019-01221-x

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resou... Read More about Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud.

Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks (2019)
Journal Article
Xu, S., Cao, J., Li, S., Legg, P., & Liu, B. (2019). Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks. IEEE Systems Journal, https://doi.org/10.1109/JSYST.2019.2913080

Abstract—Geo-Social networks (GSN) significantly improve location-aware capability of services by offering geo-located content based on the huge volumes of data generated in the GSN. The problem of user location prediction based on user generated da... Read More about Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks.

Video-based evidence analysis and extraction in digital forensic investigation (2019)
Journal Article
Xiao, J., Li, S., & Xu, Q. (2019). Video-based evidence analysis and extraction in digital forensic investigation. IEEE Access, 7, 55432-55442. https://doi.org/10.1109/ACCESS.2019.2913648

As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation. Digital videos have been widely used as key evidence sources in evidence identi... Read More about Video-based evidence analysis and extraction in digital forensic investigation.

Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities (2019)
Journal Article
Li, S., Song, H., & Iqbal, M. (2019). Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities. Sensors, 19(8), 1935. https://doi.org/10.3390/s19081935

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the he... Read More about Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities.

Local experts finding using user comments in location-based social networks (2019)
Journal Article
Cao, J., Yang, Y., Cao, B., Xue, L., Li, S., Iqbal, M., & Mumtaz, S. (2019). Local experts finding using user comments in location-based social networks. Transactions on Emerging Telecommunications Technologies, 30(9), https://doi.org/10.1002/ett.3600

The opinions of local experts in the location-based social network are of great significance to the collection and dissemination of local information. In this paper, we investigated in-depth how the user comments can be used to identify the local exp... Read More about Local experts finding using user comments in location-based social networks.

IoT forensics: Amazon Echo as a use case (2019)
Journal Article
Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT forensics: Amazon Echo as a use case. IEEE Internet of Things, 6(4), 6487-6497. https://doi.org/10.1109/JIOT.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications, such as battlefields and national security. Given the potential of these devices to be targeted by attackers, th... Read More about IoT forensics: Amazon Echo as a use case.

Distributed consensus algorithm for events detection in cyber-physical systems (2019)
Journal Article
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., & Sun, Q. (2019). Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things, 6(2), 2299-2308. https://doi.org/10.1109/JIOT.2019.2906157

In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchai... Read More about Distributed consensus algorithm for events detection in cyber-physical systems.

Time-aware distributed service recommendation with privacy-preservation (2018)
Journal Article
Xu, X., He, Q., Qi, L., Wang, R., Hu, C., & Li, S. (2019). Time-aware distributed service recommendation with privacy-preservation. Information Sciences, 480, 354-364. https://doi.org/10.1016/j.ins.2018.11.030

© 2018 As a promising way to extract insightful information from massive data, service recommendation has gained ever-increasing attentions in both academic and industrial areas. Recently, the Locality-Sensitive Hashing (LSH) technique is introduced... Read More about Time-aware distributed service recommendation with privacy-preservation.

An IoT-Oriented data placement method with privacy preservation in cloud environment (2018)
Journal Article
Xu, X., Fu, S., Qi, L., Zhang, X., Liu, Q., He, Q., & Li, S. (2018). An IoT-Oriented data placement method with privacy preservation in cloud environment. Journal of Network and Computer Applications, 124, 148-157. https://doi.org/10.1016/j.jnca.2018.09.006

© 2018 Elsevier Ltd IoT (Internet of Things) devices generate huge amount of data which require rich resources for data storage and processing. Cloud computing is one of the most popular paradigms to accommodate such IoT data. However, the privacy co... Read More about An IoT-Oriented data placement method with privacy preservation in cloud environment.

Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT) (2018)
Journal Article
Li, S., Xu, L., Song, H., & Chen, T. (2018). Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT). IET Networks, 7(5), 281-282. https://doi.org/10.1049/iet-net.2018.0046

The emerging Internet of Things (IoT) is unleashing the next wave of innovations due to its inherent capability of connecting billions of devices together, which bridges the gap between the physical world and cyber world. In recent years, the success... Read More about Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT).

Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems (2018)
Journal Article
Li, S., Zhao, S., Yuan, Y., Sun, Q., & Zhang, K. (2018). Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. IEEE Transactions on Computational Social Systems, 5(4), 1133-1141. https://doi.org/10.1109/TCSS.2018.2858440

© 2014 IEEE. Cyber-physical social system (CPSS) plays an important role in both the modern lifestyle and business models, which significantly changes the way we interact with the physical world. The increasing influence of cyber systems and social n... Read More about Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.

Local spatial obesity analysis and estimation using online social network sensors (2018)
Journal Article
Sun, Q., Wang, N., Li, S., & Zhou, H. (2018). Local spatial obesity analysis and estimation using online social network sensors. Journal of Biomedical Informatics, 83, 54-62. https://doi.org/10.1016/j.jbi.2018.03.010

© 2018 Elsevier Inc. Recently, the online social networks (OSNs) have received considerable attentions as a revolutionary platform to offer users massive social interaction among users that enables users to be more involved in their own healthcare. T... Read More about Local spatial obesity analysis and estimation using online social network sensors.