Skip to main content

Research Repository

Advanced Search

All Outputs (46)

Deep learning based customer preferences analysis in industry 4.0 environment (2021)
Journal Article
Sun, Q., Feng, X., Zhao, S., Cao, H., Li, S., & Yao, Y. (2021). Deep learning based customer preferences analysis in industry 4.0 environment. Mobile Networks and Applications, 26, 2329–2340. https://doi.org/10.1007/s11036-021-01830-5

Customer preferences analysis and modelling using deep learning in edge computing environment are critical to enhance customer relationship management that focus on a dynamically changing market place. Existing forecasting methods work well with ofte... Read More about Deep learning based customer preferences analysis in industry 4.0 environment.

Deep learning-based security behaviour analysis in IoT environments: A survey (2021)
Journal Article
Yue, Y., Li, S., Legg, P., & Li, F. (2021). Deep learning-based security behaviour analysis in IoT environments: A survey. Security and Communication Networks, 2021, 1-13. https://doi.org/10.1155/2021/8873195

Internet of Things (IoT) applications have been used in a wide variety of domains ranging from smart home, healthcare, smart energy, and Industrial 4.0. While IoT brings a number of benefits including convenience and efficiency, it also introduces a... Read More about Deep learning-based security behaviour analysis in IoT environments: A survey.

An LSH-based offloading method for IoMT services in integrated cloud-edge environment (2021)
Journal Article
Xu, X., Huang, Q., Zhang, Y., Li, S., Qi, L., & Dou, W. (2021). An LSH-based offloading method for IoMT services in integrated cloud-edge environment. ACM Transactions on Multimedia Computing, Communications and Applications, 16(3s), Article 94. https://doi.org/10.1145/3408319

© 2021 ACM. Benefiting from the massive available data provided by Internet of multimedia things (IoMT), enormous intelligent services requiring information of various types to make decisions are emerging. Generally, the IoMT devices are equipped wit... Read More about An LSH-based offloading method for IoMT services in integrated cloud-edge environment.

Wearable sensor-based human activity recognition using hybrid deep learning techniques (2020)
Journal Article
Wang, H., Zhao, J., Li, J., Tian, L., Tu, P., Cao, T., …Li, S. (2020). Wearable sensor-based human activity recognition using hybrid deep learning techniques. Security and Communication Networks, 2020, Article 2132138. https://doi.org/10.1155/2020/2132138

Human activity recognition (HAR) can be exploited to great benefits in many applications, including elder care, health care, rehabilitation, entertainment, and monitoring. Many existing techniques, such as deep learning, have been developed for speci... Read More about Wearable sensor-based human activity recognition using hybrid deep learning techniques.

Computational intelligence-enabled cybersecurity for the Internet of Things (2020)
Journal Article
Zhao, S., Li, S., Qi, L., & Xu, L. D. (2020). Computational intelligence-enabled cybersecurity for the Internet of Things. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 666-674. https://doi.org/10.1109/TETCI.2019.2941757

The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber-physical-systems (CPS), etc. The current IoT is facing increasingly security... Read More about Computational intelligence-enabled cybersecurity for the Internet of Things.

Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment (2020)
Journal Article
Zhong, W., Yin, X., Zhang, X., Li, S., Dou, W., Wang, R., & Qi, L. (2020). Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. Computer Communications, 157, 116-123. https://doi.org/10.1016/j.comcom.2020.04.018

© 2020 Elsevier B.V. With the advance of mobile edge computing (MEC), the number of edge services running on mobile devices grows explosively. In this situation, it is becoming a necessity to recommend the most suitable edge services to a mobile user... Read More about Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment.

A two-stage approach for social identity linkage based on an enhanced weighted graph model (2019)
Journal Article
Qin, T., Liu, Z., Li, S., & Guan, X. (2020). A two-stage approach for social identity linkage based on an enhanced weighted graph model. Mobile Networks and Applications, 25, 1364 - 1375. https://doi.org/10.1007/s11036-019-01456-8

Social identity linkage refers to identify the accounts belong to the same person across different social networks. This work can assist in building more complete social profiles, which is valuable for many social-powered applications. In this paper,... Read More about A two-stage approach for social identity linkage based on an enhanced weighted graph model.

A stream processing framework based on linked data for information collaborating of regional energy networks (2019)
Journal Article
Yu, H., Da Xu, L., Cai, H., Li, S., Xu, B., & Jiang, L. (2021). A stream processing framework based on linked data for information collaborating of regional energy networks. IEEE Transactions on Industrial Informatics, 17(1), 179-188. https://doi.org/10.1109/tii.2019.2957517

© 2005-2012 IEEE. Coordinating of energy networks to form a city-level multidimensional integrated energy system becomes a new trend in Energy Internet (EI). The collaborating in the information layer is a core issue to achieve smart integration. How... Read More about A stream processing framework based on linked data for information collaborating of regional energy networks.

Spatial-temporal data-driven service recommendation with privacy-preservation (2019)
Journal Article
Zhang, X., Qi, L., Li, S., Wan, S., Wen, Y., & Gong, W. (2020). Spatial-temporal data-driven service recommendation with privacy-preservation. Information Sciences, 515, 91-102. https://doi.org/10.1016/j.ins.2019.11.021

© 2019 Elsevier Inc. The ever-increasing popularity of web service sharing communities have produced a considerable amount of web services that share similar functionalities but vary in Quality of Services (QoS) performances. To alleviate the heavy s... Read More about Spatial-temporal data-driven service recommendation with privacy-preservation.

Symmetry degree measurement and its applications to anomaly detection (2019)
Journal Article
Qin, T., Liu, Z., Wang, P., Li, S., Guan, X., & Gao, L. (2019). Symmetry degree measurement and its applications to anomaly detection. IEEE Transactions on Information Forensics and Security, 15, 1040-1055. https://doi.org/10.1109/TIFS.2019.2933731

IEEE Anomaly detection is an important technique used to identify patterns of unusual network behavior and keep the network under control. Today, network attacks are increasing in terms of both their number and sophistication. To avoid causing signif... Read More about Symmetry degree measurement and its applications to anomaly detection.

Blockchain based digital forensics investigation framework in the internet of things and social systems (2019)
Journal Article
Li, S., Qin, T., & Min, G. (2019). Blockchain based digital forensics investigation framework in the internet of things and social systems. IEEE Transactions on Computational Social Systems, 6(6), 1433-1441. https://doi.org/10.1109/TCSS.2019.2927431

The decentralised nature of blockchain technologies can well match the needs of integrity and provenances of evidences collecting in digital forensics across jurisdictional borders. In this work, a novel blockchain based digital forensics investigati... Read More about Blockchain based digital forensics investigation framework in the internet of things and social systems.

Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud (2019)
Journal Article
Rasool, S., Iqbal, M., Dagiuklas, T., Ql-Qayyum, Z., & Li, S. (2020). Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud. Mobile Networks and Applications, 25, 153-163. https://doi.org/10.1007/s11036-019-01221-x

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resou... Read More about Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud.

Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks (2019)
Journal Article
Xu, S., Cao, J., Legg, P., Liu, B., & Li, S. (2020). Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks. IEEE Systems Journal, 14(2), 1740-1751. https://doi.org/10.1109/JSYST.2019.2913080

Geo-Social Networks (GSN) significantly improve location-aware capability of services by offering geo-located content based on the huge volumes of data generated in the GSN. The problem of user location prediction based on user-generated data in GSN... Read More about Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks.

Video-based evidence analysis and extraction in digital forensic investigation (2019)
Journal Article
Xiao, J., Li, S., & Xu, Q. (2019). Video-based evidence analysis and extraction in digital forensic investigation. IEEE Access, 7, 55432-55442. https://doi.org/10.1109/ACCESS.2019.2913648

As a result of the popularity of smart mobile devices and the low cost of surveillance systems, visual data are increasingly being used in digital forensic investigation. Digital videos have been widely used as key evidence sources in evidence identi... Read More about Video-based evidence analysis and extraction in digital forensic investigation.

Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities (2019)
Journal Article
Li, S., Song, H., & Iqbal, M. (2019). Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities. Sensors, 19(8), 1935. https://doi.org/10.3390/s19081935

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the he... Read More about Privacy and security for resource-constrained IOT devices and networks: Research challenges and opportunities.

Local experts finding using user comments in location-based social networks (2019)
Journal Article
Cao, J., Yang, Y., Cao, B., Xue, L., Li, S., Iqbal, M., & Mumtaz, S. (2019). Local experts finding using user comments in location-based social networks. Transactions on Emerging Telecommunications Technologies, 30(9), Article e3600. https://doi.org/10.1002/ett.3600

The opinions of local experts in the location-based social network are of great significance to the collection and dissemination of local information. In this paper, we investigated in-depth how the user comments can be used to identify the local exp... Read More about Local experts finding using user comments in location-based social networks.

IoT forensics: Amazon Echo as a use case (2019)
Journal Article
Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT forensics: Amazon Echo as a use case. IEEE Internet of Things, 6(4), 6487-6497. https://doi.org/10.1109/JIOT.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications, such as battlefields and national security. Given the potential of these devices to be targeted by attackers, th... Read More about IoT forensics: Amazon Echo as a use case.

Distributed consensus algorithm for events detection in cyber-physical systems (2019)
Journal Article
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., & Sun, Q. (2019). Distributed consensus algorithm for events detection in cyber-physical systems. IEEE Internet of Things, 6(2), 2299-2308. https://doi.org/10.1109/JIOT.2019.2906157

In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchai... Read More about Distributed consensus algorithm for events detection in cyber-physical systems.