Skip to main content

Research Repository

Advanced Search

Computational intelligence-enabled cybersecurity for the Internet of Things (2020)
Journal Article
Zhao, S., Li, S., Qi, L., & Xu, L. D. (in press). Computational intelligence-enabled cybersecurity for the Internet of Things. IEEE Transactions on Emerging Topics in Computational Intelligence, https://doi.org/10.1109/TETCI.2019.2941757

The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber-physical-systems (CPS), etc. The current IoT is facing increasingly security... Read More about Computational intelligence-enabled cybersecurity for the Internet of Things.

Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment (2020)
Journal Article
Zhong, W., Yin, X., Zhang, X., Li, S., Dou, W., Wang, R., & Qi, L. (2020). Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. Computer Communications, 157, 116-123. https://doi.org/10.1016/j.comcom.2020.04.018

© 2020 Elsevier B.V. With the advance of mobile edge computing (MEC), the number of edge services running on mobile devices grows explosively. In this situation, it is becoming a necessity to recommend the most suitable edge services to a mobile user... Read More about Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment.

A two-stage approach for social identity linkage based on an enhanced weighted graph model (2019)
Journal Article
Qin, T., Liu, Z., Li, S., & Guan, X. (in press). A two-stage approach for social identity linkage based on an enhanced weighted graph model. Mobile Networks and Applications, https://doi.org/10.1007/s11036-019-01456-8

Social identity linkage refers to identify the accounts belong to the same person across different social networks. This work can assist in building more complete social profiles, which is valuable for many social-powered applications. In this paper,... Read More about A two-stage approach for social identity linkage based on an enhanced weighted graph model.

Spatial-temporal data-driven service recommendation with privacy-preservation (2019)
Journal Article
Zhang, X., Qi, L., Li, S., Wan, S., Wen, Y., & Gong, W. (2020). Spatial-temporal data-driven service recommendation with privacy-preservation. Information Sciences, 515, 91-102. https://doi.org/10.1016/j.ins.2019.11.021

© 2019 Elsevier Inc. The ever-increasing popularity of web service sharing communities have produced a considerable amount of web services that share similar functionalities but vary in Quality of Services (QoS) performances. To alleviate the heavy s... Read More about Spatial-temporal data-driven service recommendation with privacy-preservation.

Symmetry degree measurement and its applications to anomaly detection (2019)
Journal Article
Qin, T., Liu, Z., Wang, P., Li, S., Guan, X., & Gao, L. (2019). Symmetry degree measurement and its applications to anomaly detection. IEEE Transactions on Information Forensics and Security, 15, https://doi.org/10.1109/TIFS.2019.2933731

IEEE Anomaly detection is an important technique used to identify patterns of unusual network behavior and keep the network under control. Today, network attacks are increasing in terms of both their number and sophistication. To avoid causing signif... Read More about Symmetry degree measurement and its applications to anomaly detection.

Blockchain based digital forensics investigation framework in the internet of things and social systems (2019)
Journal Article
Li, S., Qin, T., & Min, G. (2019). Blockchain based digital forensics investigation framework in the internet of things and social systems. IEEE Transactions on Computational Social Systems, 6(6), 1433-1441. https://doi.org/10.1109/TCSS.2019.2927431

The decentralised nature of blockchain technologies can well match the needs of integrity and provenances of evidences collecting in digital forensics across jurisdictional borders. In this work, a novel blockchain based digital forensics investigati... Read More about Blockchain based digital forensics investigation framework in the internet of things and social systems.

Blockchain enabled industrial Internet of Things technology (2019)
Journal Article
Zhao, S., Li, S., & Yao, Y. (2019). Blockchain enabled industrial Internet of Things technology. IEEE Transactions on Computational Social Systems, 6(6), 1442-1453. https://doi.org/10.1109/TCSS.2019.2924054

The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past a few years, many more applications... Read More about Blockchain enabled industrial Internet of Things technology.

Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud (2019)
Journal Article
Rasool, S., Iqbal, M., Dagiuklas, T., Ql-Qayyum, Z., & Li, S. (2020). Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud. Mobile Networks and Applications, 25, 153-163. https://doi.org/10.1007/s11036-019-01221-x

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resou... Read More about Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud.

Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks (2019)
Journal Article
Xu, S., Cao, J., Legg, P., Liu, B., & Li, S. (2020). Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks. IEEE Systems Journal, 14(2), 1740-1751. https://doi.org/10.1109/JSYST.2019.2913080

Geo-Social Networks (GSN) significantly improve location-aware capability of services by offering geo-located content based on the huge volumes of data generated in the GSN. The problem of user location prediction based on user-generated data in GSN... Read More about Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks.

Video-based evidence analysis and extraction in digital forensic investigation (2019)
Journal Article
Xiao, J., Li, S., & Xu, Q. (2019). Video-based evidence analysis and extraction in digital forensic investigation. IEEE Access, 7, 55432-55442. https://doi.org/10.1109/ACCESS.2019.2913648

As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation. Digital videos have been widely used as key evidence sources in evidence identi... Read More about Video-based evidence analysis and extraction in digital forensic investigation.

Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities (2019)
Journal Article
Li, S., Song, H., & Iqbal, M. (2019). Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities. Sensors, 19(8), 1935. https://doi.org/10.3390/s19081935

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the he... Read More about Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities.

IoT forensics: Amazon Echo as a use case (2019)
Journal Article
Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT forensics: Amazon Echo as a use case. IEEE Internet of Things, 6(4), 6487-6497. https://doi.org/10.1109/JIOT.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications, such as battlefields and national security. Given the potential of these devices to be targeted by attackers, th... Read More about IoT forensics: Amazon Echo as a use case.

Local experts finding using user comments in location-based social networks (2019)
Journal Article
Cao, J., Yang, Y., Cao, B., Xue, L., Li, S., Iqbal, M., & Mumtaz, S. (2019). Local experts finding using user comments in location-based social networks. Transactions on Emerging Telecommunications Technologies, 30(9), https://doi.org/10.1002/ett.3600

The opinions of local experts in the location-based social network are of great significance to the collection and dissemination of local information. In this paper, we investigated in-depth how the user comments can be used to identify the local exp... Read More about Local experts finding using user comments in location-based social networks.

Distributed consensus algorithm for events detection in cyber-physical systems (2019)
Journal Article
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., & Sun, Q. (2019). Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things, 6(2), 2299-2308. https://doi.org/10.1109/JIOT.2019.2906157

In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchai... Read More about Distributed consensus algorithm for events detection in cyber-physical systems.


;