Skip to main content

Research Repository

Advanced Search

All Outputs (8)

Time-aware distributed service recommendation with privacy-preservation (2018)
Journal Article
Xu, X., He, Q., Qi, L., Wang, R., Hu, C., & Li, S. (2019). Time-aware distributed service recommendation with privacy-preservation. Information Sciences, 480, 354-364. https://doi.org/10.1016/j.ins.2018.11.030

© 2018 As a promising way to extract insightful information from massive data, service recommendation has gained ever-increasing attentions in both academic and industrial areas. Recently, the Locality-Sensitive Hashing (LSH) technique is introduced... Read More about Time-aware distributed service recommendation with privacy-preservation.

Behavior rhythm: A new model for behavior visualization and its application in system security management (2018)
Journal Article
He, C., Liu, Z., Guan, X., Li, S., & Qin, T. (2018). Behavior rhythm: A new model for behavior visualization and its application in system security management. IEEE Access, 6, 73940-73951. https://doi.org/10.1109/ACCESS.2018.2882812

© 2018 IEEE. The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and mo... Read More about Behavior rhythm: A new model for behavior visualization and its application in system security management.

An IoT-oriented data placement method with privacy preservation in cloud environment (2018)
Journal Article
Xu, X., Fu, S., Qi, L., Zhang, X., Liu, Q., He, Q., & Li, S. (2018). An IoT-oriented data placement method with privacy preservation in cloud environment. Journal of Network and Computer Applications, 124, 148-157. https://doi.org/10.1016/j.jnca.2018.09.006

© 2018 Elsevier Ltd IoT (Internet of Things) devices generate huge amount of data which require rich resources for data storage and processing. Cloud computing is one of the most popular paradigms to accommodate such IoT data. However, the privacy co... Read More about An IoT-oriented data placement method with privacy preservation in cloud environment.

Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT) (2018)
Journal Article
Li, S., Xu, L., Song, H., & Chen, T. (2018). Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT). IET Networks, 7(5), 281-282. https://doi.org/10.1049/iet-net.2018.0046

The emerging Internet of Things (IoT) is unleashing the next wave of innovations due to its inherent capability of connecting billions of devices together, which bridges the gap between the physical world and cyber world. In recent years, the success... Read More about Guest Editorial: Privacy, data assurance, security solutions for Internet of Things (PASS4IoT).

Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems (2018)
Journal Article
Li, S., Zhao, S., Yuan, Y., Sun, Q., & Zhang, K. (2018). Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. IEEE Transactions on Computational Social Systems, 5(4), 1133-1141. https://doi.org/10.1109/TCSS.2018.2858440

© 2014 IEEE. Cyber-physical social system (CPSS) plays an important role in both the modern lifestyle and business models, which significantly changes the way we interact with the physical world. The increasing influence of cyber systems and social n... Read More about Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.

Local spatial obesity analysis and estimation using online social network sensors (2018)
Journal Article
Sun, Q., Wang, N., Li, S., & Zhou, H. (2018). Local spatial obesity analysis and estimation using online social network sensors. Journal of Biomedical Informatics, 83, 54-62. https://doi.org/10.1016/j.jbi.2018.03.010

© 2018 Elsevier Inc. Recently, the online social networks (OSNs) have received considerable attentions as a revolutionary platform to offer users massive social interaction among users that enables users to be more involved in their own healthcare. T... Read More about Local spatial obesity analysis and estimation using online social network sensors.

5G Internet of Things: A survey (2018)
Journal Article
Li, S., Xu, L. D., & Zhao, S. (2018). 5G Internet of Things: A survey. Journal of Industrial Information Integration, 10, 1-9. https://doi.org/10.1016/j.jii.2018.01.005

© 2018 The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today's IoT that... Read More about 5G Internet of Things: A survey.

MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755

© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.