Loading [MathJax]/extensions/MathZoom.js
Bing Guo - IEEE Xplore Author Profile

Showing 1-25 of 73 results

Filter Results

Show

Results

The upcoming 6G technology, with its high speed and low latency, is poised to become a foundational technology for intelligent transportation systems. To handle the massive data generated by connected vehicles in 6G environments, federated learning methods are essential. However, traditional centralized federated learning approaches still face challenges related to data and device heterogeneity, w...Show More
In unmanned aerial vehicle (UAV) enabled mobile edge computing (MEC) system, rotary-wing UAV can be dispatched to fly close to ground terminals (GTs) to execute their offloaded tasks. This can extend GTs' computing capability and save their energy cost. However, to enhance the energy efficiency of UAV propulsion, ensure successful completion of each GT's mission, and maintain a stable UAV-GT uplin...Show More
Accurate sales forecasting serves as a critical foundation for informed business decision-making and numerous methodologies have been advanced by scholars predominantly rely on complete datasets, however, in practice, uncontrollable variables often result in the presence of missing data, diminishing the applicability of established techniques, so the sales forecasting research based on missing dat...Show More
The emerging field of Artificial Intelligence of Things (AIoT) is propelled by the remarkable success of deep learning and hardware evolution, which has a significant impact on our daily lives. However, because of their notorious computing resource intensity, the widespread deployment of AIoT devices requires substantial electricity consumption as support, inevitably escalating energy consumption,...Show More
Low rank tensor ring based data recovery algorithms have been widely used in data-driven consumer electronics to recover missing data entries in the collecting data pre-processing stage for providing stable and reliable service. However, traditional recovery methods often fail to utilize the abundant prior knowledge of data and the non-local self-similarity of the data, thus leading to the failure...Show More
Industrial control technology faces serious communication security threats. Authenticated key agreement(AKA) protocols are essential to secure communication between industrial control nodes, but they must be efficient and robust due to resource constraints. Existing AKA protocols based on encryption algorithms have limitations such as vulnerability to clone attacks. Also, there is a lack of protoc...Show More
Quantum circuit mapping (QCM) is a crucial preprocessing step for executing a logical circuit (LC) on noisy intermediate-scale quantum (NISQ) devices. Balancing the introduction of extra gates and the efficiency of preprocessing poses a significant challenge for the mapping process. To address this challenge, we propose the mutual-influence-aware (MIA) heuristic method by integrating an initial ma...Show More
Designing blockchains for collaborative edge-end computing systems in open environments is challenging, especially in balancing security and performance. While sharding enhances throughput and security, most methods overlook collaborative edge-end computing requirements, disregarding diverse IIoT device reputations. Additionally, many lack effective consensus mechanisms, undermining resource colla...Show More
In the rapidly evolving landscape of the sixth generation (6G) network, smart contracts emerge as a pivotal technology for enforcing trustful rules. However, the conventional lifecycle model of smart contracts—encompassing stages from initiation to the termination of a contract instance—suffers from rigidity and lack of customization, leading to notable operational challenges. These challenges pri...Show More
Industrial control systems rely on wireless devices and sensors, necessitating critical security. Physical layer authentication (PLA) is a promising mechanism for device authentication, utilizing its unique spatiotemporal characteristics and channel state randomness, which offers unforgeability and high informatics security with low computational overhead and efficiency in resource-constrained sce...Show More
In this paper, we study the deployment of $K$ heterogeneous UAVs to monitor Points of Interest (PoIs) in a disaster zone, where a PoI may represent a school building or an office building, in which people are trapped. A UAV can take images/videos of PoIs and send its collected information back to a nearby rescue station for decision-making. Unlike most existing studies that focused on only homog...Show More
Unlike conventional IT systems, industrial control systems (ICSs) requires tailored attack detection methods due to its unique communication protocols. Existing attack detection methods lack the ability to consider both detection accuracy and time performance, particularly for highly stealthy fake data injection attacks (FDIAs). To address these challenges, this work proposes an online parallel at...Show More
Recently, the use of wireless channel state information (CSI) to generate encryption keys in the physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on the variability of the wireless channel, channel reciprocity, and spatial decorrelation to ensure security, making it more lightweight and providing strong randomness. This article p...Show More
Blockchain exchanges have been widely used for IoT-based resource sharing. An exchange consists of several related transactions where participants exchange their assets. However, the exchange can take a long time to complete due to different reasons (such as IoT device failure). Meanwhile, exchange fees are an important aspect, because an exchange usually contains multiple transactions, and the ex...Show More
Physical-layer secret key generation (PLKG) is a new research area that has emerged in recent years. It is aimed at scenarios where legitimate IoT devices communicate directly, interacting with confidential information for lower overhead and higher security by using wireless channel. When applying it to wireless feature extraction, noise removal is not taken into account in current deep learning n...Show More
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which has brought more and more serious information security threats to the ICS at the same time. The authenticated key agreement (AKA) protocol is a common method to ensure the communication security. This work proposes a lightweight AKA protoco...Show More
With the development of the modern smart city, sharing-bikes require behaviors prediction for grid-level areas which is essential for intelligent transportation systems. A model which can predict bike sharing demand behaviours accurately can allocate sharing-bikes in advance to satisfy travel demands alongside saving energy, reducing traffic, cutting down waste for those sharing-bikes companies pu...Show More
Internet of Things (IoT) devices and services have become increasingly ubiquitous in recent years as they greatly facilitate our daily life. To promote IoT data and semantic interoperability, we propose an edge–cloud framework. The edge end is responsible for handling customized data processing tasks and transferring the processed data, while the cloud end deals with semantic information processin...Show More
Federated learning(FL) enables multiple partici-pants to build a common, robust machine learning model without sharing data, which is a key technique to address data privacy, security, access rights, and access to heterogeneous data. However, existing FL algorithms still fall short of expectations in unsupervised learning and Non-iid data, which are two major challenges that limit the applicabilit...Show More
Recently, many approaches have performed Chinese NER using pre-trained models adding lexicon information, which has been proven to be more effective. A recent study LEBERT improves performance by fusing lexicon feature between the beginning layers of BERT. However, LEBERT ignores the po-sition information of words in sentences. In this paper, we propose Lexicon and Position Enhanced BERT (POSLEBER...Show More
In parallel and green computing, real-time multicore energy-aware scheduling is used to reduce the energy consumption of multicore processors. To evaluate such scheduling algorithms, theoretical simulation is a great approach in the early designing stage of the algorithm. However, numeral precision errors of the simulation progress can lead to unexpected results. This paper presents a precision me...Show More