Loading [MathJax]/extensions/MathZoom.js
Yanru Chen - IEEE Xplore Author Profile

Showing 1-25 of 33 results

Filter Results

Show

Results

With the rapid advancement of industrial structures, many factories are deploying anomaly detection systems. However, most existing anomaly detection algorithms are unsuitable for high-noise industrial control system (ICS) environments and constantly changing sensor patterns, resulting in low detection accuracy. To address these challenges, we propose a hierarchical temporal memory-based online an...Show More
The convenience of wireless communication has led to its widespread adoption across various application scenarios. However, existing Physical Layer Authentication (PLA) schemes still have limitations in terms of adaptability. This paper introduces a novel method based on key-less channel-based authentication framework designed to enhance PLA performance under different mobility patterns. Our metho...Show More
To address the issue of data heterogeneity and data privacy in blockchain and federated learning-based data-sharing models, this paper proposes a Two-stage-shared Federated Learning Model based on Key Feature Extraction (TSM-KFE). Specifically, in the TSM-KFE data-sharing model, data providers use Variational Autoencoders (VAE) to extract key features from their local data and share these key feat...Show More
As the concept of sustainable development becomes increasingly prevalent, the number of new energy vehicles is also on the rise. New energy vehicles, as flexible and controllable resources on the distribution network side, are a double-edged sword for the safe and stable operation of the distribution network. On the one hand, the large-scale and unorganized charging of new energy vehicles poses a ...Show More
In recent years, industrial control systems (ICSs) security incidents have revealed vulnerabilities in the system hardware, user programs, and communication protocols. The various components of the ICS are connected by the Industrial Internet of Things (IIoT) protocol. Nevertheless, malicious attackers can exploit vulnerabilities in IIoT protocol to manipulate the ICS, potentially causing damage t...Show More
Industrial control technology faces serious communication security threats. Authenticated key agreement(AKA) protocols are essential to secure communication between industrial control nodes, but they must be efficient and robust due to resource constraints. Existing AKA protocols based on encryption algorithms have limitations such as vulnerability to clone attacks. Also, there is a lack of protoc...Show More
In response to challenges characterized by strong randomness, wide spatial distribution, and high power demand within short time frames by a large volume of Electric Vehicles (EVs), a situation awareness method for electric vehicle charging pile clusters is proposed based on edge computing. In this method, some factors such as EVs charging, EVs flow speed in road network are comprehensively consid...Show More
Industrial control systems rely on wireless devices and sensors, necessitating critical security. Physical layer authentication (PLA) is a promising mechanism for device authentication, utilizing its unique spatiotemporal characteristics and channel state randomness, which offers unforgeability and high informatics security with low computational overhead and efficiency in resource-constrained sce...Show More
Mobile edge computing (MEC) can sufficiently meet the computing demands of complex application consists of multiple interdependent tasks which can be represented by a directed acyclic graph (DAG). For tasks in a DAG, different scheduling orders and offloading decisions will generate different completion time, which further affects the Quality of Experiences (QoEs). So it is important to study the ...Show More
Unlike conventional IT systems, industrial control systems (ICSs) requires tailored attack detection methods due to its unique communication protocols. Existing attack detection methods lack the ability to consider both detection accuracy and time performance, particularly for highly stealthy fake data injection attacks (FDIAs). To address these challenges, this work proposes an online parallel at...Show More
The widespread spread and continuous evolution of malicious files pose a serious threat to the security of computer systems. Therefore, developing efficient and accurate malicious file detection methods has important research value. This paper presents a malicious file detection method based on gray graph features and deep neural network (DNN). First, the file is transformed into an image represen...Show More
Recently, the use of wireless channel state information (CSI) to generate encryption keys in the physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on the variability of the wireless channel, channel reciprocity, and spatial decorrelation to ensure security, making it more lightweight and providing strong randomness. This article p...Show More
Accurate traffic flow prediction are very important for route planning, traffic control and intelligent driving. The uncertainty and complexity of traffic flow states makes it a challenging problem. In this work, we proposed a distance correlation based spatial-temporal prediction model. The double filtering criterion is developed to ensure the spatial-temporal validity and reduces the redundancy....Show More
Physical-layer secret key generation (PLKG) is a new research area that has emerged in recent years. It is aimed at scenarios where legitimate IoT devices communicate directly, interacting with confidential information for lower overhead and higher security by using wireless channel. When applying it to wireless feature extraction, noise removal is not taken into account in current deep learning n...Show More
Currently, the integration of blockchain into access control systems has become a new research trend. However, existing access control systems still have problems such as easy confusion of capability authorisation subjects, inflexible capability granting and revocation, insufficient granularity of capability, insecure capability transfer and lack of capability verification. To solve these problems...Show More
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which has brought more and more serious information security threats to the ICS at the same time. The authenticated key agreement (AKA) protocol is a common method to ensure the communication security. This work proposes a lightweight AKA protoco...Show More
Advanced metering infrastructure (AMI) is a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for AMI systems to ensure the confidentiality and integrity of communication data. Since the devices are connected to the open network and generally deployed outdoors with limited computation, comm...Show More
With the development of big data and blockchain, an increasing number of scholars have begun to study blockchain for data sharing. By studying data sharing models that are based on blockchain, we find that almost all of them have the following problems: 1) it is difficult to protect the privacy and integrity of users’ data, along with users’ data ownership; 2) the storage burden of blockchain is h...Show More
Currently, available contactless continuous authentication (CA) techniques depend on physiological biometrics to identify individuals at long intervals through complex feature extraction, resulting in poor accuracy, high computation costs, and security vacuums during lengthy intervals. To address these issues, we propose WiPT, a WiFi-based contactless CA system that utilizes contextual features an...Show More
With the development of big data, data sharing has become a hot topic. According to the previous research on data sharing, there is a problem with regard to how to design an effective incentive mechanism to make users willing to share data. First, we integrate the incentives based on reputation and payment and introduce “credibility coins” as a cryptocurrency for data-sharing transactions, to enco...Show More
According to the idea of zero trust, this paper proposed an anonymous identity authentication scheme based on hash functions and pseudo-random number generators, which effectively increased the anonymity and confidentiality when users use the mobile networks, and ensure the security of the server. This scheme first used single-packet authentication technology to realize the application stealth. Se...Show More
Mobile-edge computing (MEC) has been garnering considerable level of interests by processing computation tasks nearby mobile devices (MDs). With limited computation and communication resources and strict task deadline, balancing the energy consumption and time delay of computational tasks will be highly focused. MDs deployed energy harvesting (EH) modules can always provide service to continuous t...Show More
Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify transactions in applications. Although the TTP-based paradigm provides customers with convenience, it causes a whole set of inevitable problems such as security threats, privacy vulnerabilities, and censorship. The TTP-based paradigm is not suitable for all modern networks, e.g., 5G and beyond networks...Show More
Optical Camera Communication (OCC) systems relying on commercial-off-the-shelf (COTS) devices have attracted substantial attention recently, thanks to the pervasive deployment of indoor LED lighting infrastructure and the popularity of smartphones. However, the achievable throughput by such practical systems is still very low due to its availability for only low order modulation schemes and transm...Show More