Genshe Chen
YOU?
Author Swipe
View article: Reputation-Enhanced Practical Byzantine Fault Tolerance Algorithm for Node Capture Attacks on UAV Networks
Reputation-Enhanced Practical Byzantine Fault Tolerance Algorithm for Node Capture Attacks on UAV Networks Open
The rapid growth of the Unmanned Aerial Vehicles (UAVs) market has led to increased reliance on UAV technologies across various application domains such as aerial Internet of Things (IoT). However, the vulnerability of UAV infrastructure t…
View article: Reputation-Enhanced Practical Byzantine Fault Tolerance Algorithm for Node Capture Attacks on UAV Networks
Reputation-Enhanced Practical Byzantine Fault Tolerance Algorithm for Node Capture Attacks on UAV Networks Open
The rapid growth of the Unmanned Aerial Vehicles (UAVs) market has led to increased reliance on UAV technologies across various application domains such as aerial Internet of Things (IoT). However, the vulnerability of UAV infrastructures …
View article: Optimal Preprocessing for Joint Detection and Classification of Wireless Communication Signals in Congested Spectrum Using Computer Vision Methods
Optimal Preprocessing for Joint Detection and Classification of Wireless Communication Signals in Congested Spectrum Using Computer Vision Methods Open
The joint detection and classification of RF signals has been a critical problem in the field of wideband RF spectrum sensing. Recent advancements in deep learning models have revolutionized this field, remarkably through the application o…
View article: Joint Detection and Classification of Communication and Radar Signals in Congested RF Environments Using YOLOv8
Joint Detection and Classification of Communication and Radar Signals in Congested RF Environments Using YOLOv8 Open
In this paper, we present a comprehensive study on the application of YOLOv8, a state-of-the-art computer vision (CV) model, to the challenging problem of joint detection and classification of signals in a highly dynamic and congested RF e…
View article: Prioritized Multi-Tenant Traffic Engineering for Dynamic QoS Provisioning in Autonomous SDN-OpenFlow Edge Networks
Prioritized Multi-Tenant Traffic Engineering for Dynamic QoS Provisioning in Autonomous SDN-OpenFlow Edge Networks Open
This letter indicates the critical need for prioritized multi-tenant quality-of-service (QoS) management by emerging mobile edge systems, particularly for high-throughput beyond fifth-generation networks. Existing traffic engineering tools…
View article: Ground-Based HPA Pre-Distorter Using Machine Learning and Artificial Intelligent for Satellite Communication Applications
Ground-Based HPA Pre-Distorter Using Machine Learning and Artificial Intelligent for Satellite Communication Applications Open
This chapter describes an innovative design and implementation approach of a ground-based pre-distorter framework using machine learning and artificial intelligence (ML-AI) technology for high power amplifier (HPA) pre-distortion. The ML-A…
View article: Targeted adversarial discriminative domain adaptation
Targeted adversarial discriminative domain adaptation Open
Domain adaptation is a technology enabling aided target recognition and other algorithms for environments and targets with data or labeled data that is scarce. Recent advances in unsupervised domain adaptation have demonstrated excellent p…
View article: Privacy-Preserving Surveillance as an Edge Service Based on Lightweight Video Protection Schemes Using Face De-Identification and Window Masking
Privacy-Preserving Surveillance as an Edge Service Based on Lightweight Video Protection Schemes Using Face De-Identification and Window Masking Open
With a myriad of edge cameras deployed in urban and suburban areas, many people are seriously concerned about the constant invasion of their privacy. There is a mounting pressure from the public to make the cameras privacy-conscious. This …
View article: Game Theoretic Training Enabled Deep Learning Solutions for Rapid Discovery of Satellite Behaviors
Game Theoretic Training Enabled Deep Learning Solutions for Rapid Discovery of Satellite Behaviors Open
The chapter presents a game theoretic training model enabling a deep learning solution for rapid discovery of satellite behaviors from collected sensor data. The solution has two parts, namely, Part 1 and Part 2. Part 1 is a PE game model …
View article: Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems
Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems Open
Advancement in artificial intelligence (AI) and machine learning (ML), dynamic data driven application systems (DDDAS), and hierarchical cloud-fog-edge computing paradigm provide opportunities for enhancing multi-domain systems performance…
View article: Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT
Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT Open
A blockchain and smart contract enabled security mechanism for IoT applications has been reported recently for urban, financial, and network services. However, due to the power-intensive and a low-throughput consensus mechanism in existing…
View article: Computer vision and pursuit–evasion game theoretical controls for ground robots
Computer vision and pursuit–evasion game theoretical controls for ground robots Open
A hardware-in-loop control framework with robot dynamic models, pursuit–evasion game models, sensor and information solutions, and entity tracking algorithms is designed and developed to demonstrate discrete-time robotic pursuit–evasion ga…
View article: Blockchain Methods for Trusted Avionics Systems
Blockchain Methods for Trusted Avionics Systems Open
Blockchain is a popular method to ensure security for trusted systems. The benefits include an auditable method to provide decentralized security without a trusted third party, but the drawback is the large computational resources needed t…
View article: Special Section Guest Editorial: Sensors and Systems for Space Applications
Special Section Guest Editorial: Sensors and Systems for Space Applications Open
This guest editorial introduces the Special Section on Sensors and Systems for Space Applications
View article: Electricity Consumption Forecasting for Smart Grid using the Multi-Factor Back-Propagation Neural Network
Electricity Consumption Forecasting for Smart Grid using the Multi-Factor Back-Propagation Neural Network Open
With the development of modern information technology (IT), a smart grid has become one of the major components of smart cities. To take full advantage of the smart grid, the capability of intelligent scheduling and planning of electricity…
View article: Diffusion-based cooperative space object tracking
Diffusion-based cooperative space object tracking Open
We propose the diffusion-based enhanced covariance intersection cooperative space object tracking (DeCiSpOT) filter. The main advantage of the proposed DeCiSpOT algorithm is that it can balance the computational complexity and communicatio…
View article: A joint manifold leaning-based framework for heterogeneous upstream data fusion
A joint manifold leaning-based framework for heterogeneous upstream data fusion Open
A joint manifold learning fusion (JMLF) approach is proposed for nonlinear or mixed sensor modalities with large streams of data. The multimodal sensor data are stacked to form joint manifolds, from which the embedded low intrinsic dimensi…
View article: BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT Open
While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is cri…
View article: BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for IoT
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for IoT Open
While the Internet of Things (IoT) technology has been widely recognized as the essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which i…
View article: A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)
A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs) Open
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart …
View article: BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs
BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs Open
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird o…
View article: Prediction of compression-induced image interpretability degradation
Prediction of compression-induced image interpretability degradation Open
Image compression is an important component in modern imaging systems as the volume of the raw data collected is increasing. To reduce the volume of data while collecting imagery useful for analysis, choosing the appropriate image compress…
View article: Dynamic multi-arm bandit game based multi-agents spectrum sharing strategy design
Dynamic multi-arm bandit game based multi-agents spectrum sharing strategy design Open
For a wireless avionics communication system, a Multi-arm bandit game is\nmathematically formulated, which includes channel states, strategies, and\nrewards. The simple case includes only two agents sharing the spectrum which is\nfully stu…
View article: Machine learning based Intelligent cognitive network using fog computing
Machine learning based Intelligent cognitive network using fog computing Open
In this paper, a Cognitive Radio Network (CRN) based on artificial\nintelligence is proposed to distribute the limited radio spectrum resources\nmore efficiently. The CRN framework can analyze the time-sensitive signal data\nclose to the s…
View article: Eliminating drift of the head gesture reference to enhance Google Glass-based control of an NAO humanoid robot
Eliminating drift of the head gesture reference to enhance Google Glass-based control of an NAO humanoid robot Open
This article presents a strategy for hand-free control of an NAO humanoid robot via head gesture detected by Google Glass-based multi-sensor fusion. First, we introduce a Google Glass-based robot system by integrating the Google Glass and …
View article: A Real-Time High Performance Computation Architecture for Multiple Moving Target Tracking Based on Wide-Area Motion Imagery via Cloud and Graphic Processing Units
A Real-Time High Performance Computation Architecture for Multiple Moving Target Tracking Based on Wide-Area Motion Imagery via Cloud and Graphic Processing Units Open
This paper presents the first attempt at combining Cloud with Graphic Processing Units (GPUs) in a complementary manner within the framework of a real-time high performance computation architecture for the application of detecting and trac…
View article: Object Extraction in Cluttered Environments via a P300-Based IFCE
Object Extraction in Cluttered Environments via a P300-Based IFCE Open
One of the fundamental issues for robot navigation is to extract an object of interest from an image. The biggest challenges for extracting objects of interest are how to use a machine to model the objects in which a human is interested an…
View article: Progress in EEG-Based Brain Robot Interaction Systems
Progress in EEG-Based Brain Robot Interaction Systems Open
The most popular noninvasive Brain Robot Interaction (BRI) technology uses the electroencephalogram- (EEG-) based Brain Computer Interface (BCI), to serve as an additional communication channel, for robot control via brainwaves. This techn…
View article: Visual Sensor Based Image Segmentation by Fuzzy Classification and Subregion Merge
Visual Sensor Based Image Segmentation by Fuzzy Classification and Subregion Merge Open
The extraction and tracking of targets in an image shot by visual sensors have been studied extensively. The technology of image segmentation plays an important role in such tracking systems. This paper presents a new approach to color ima…