Jingsha He
YOU?
Author Swipe
View article: MultiNet-IDS: an ensemble of DRL and LSTM for improved intrusion detection in wireless sensor networks
MultiNet-IDS: an ensemble of DRL and LSTM for improved intrusion detection in wireless sensor networks Open
Wireless Sensor Networks (WSNs) play a vital role in domains such as military surveillance, industrial automation, and environmental monitoring. However, their deployment in resource-constrained and adversarial environments exposes them to…
View article: Collaborative multi-agent XRL for threat detection in mobile edge network traffic
Collaborative multi-agent XRL for threat detection in mobile edge network traffic Open
This research delves into the integration of multi-agent systems and Explainable Reinforcement Learning (XRL) to enhance threat detection mechanisms within mobile edge network traffic. The study aims to address the complexities introduced …
View article: E-bike agents: Large Language Model-Driven E-Bike Accident Analysis and Severity Prediction
E-bike agents: Large Language Model-Driven E-Bike Accident Analysis and Severity Prediction Open
E-bikes have rapidly gained popularity as a sustainable form of urban mobility, yet their safety implications remain underexplored. This paper analyzes injury incidents involving e-bikes and traditional bicycles using two sources of data, …
View article: A Meta‐Reinforcement Learning Framework Using Deep Q‐Networks and GCNs for Graph Cluster Representation
A Meta‐Reinforcement Learning Framework Using Deep Q‐Networks and GCNs for Graph Cluster Representation Open
Background The rapid evolution of Internet of Things (IoT) technologies has driven innovations across domains such as robotics, autonomous systems, and environmental control. However, effectively learning graph‐based representations within…
View article: Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT Open
The swift proliferation of Internet of Things (IoT) devices has presented considerable challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract malware attacks, necessitating advanced detection and foren…
View article: A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem Open
The Internet of Things (IoT) landscape is witnessing rapid growth, driven by continuous innovation and a simultaneous increase in cybersecurity threats. As these threats become more sophisticated, the imperative to fortify IoT devices agai…
View article: Securing Android IoT devices with GuardDroid transparent and lightweight malware detection
Securing Android IoT devices with GuardDroid transparent and lightweight malware detection Open
The Internet of Things (IoT) has experienced significant growth in recent years and has emerged as a very dynamic sector in the worldwide market. Being an open-source platform with a substantial user base, Android has not only been a drivi…
View article: Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration Open
Ensuring robust security in the Internet of Things (IoT) landscape is of paramount importance. This research article presents a novel approach to enhance IoT security by leveraging collaborative threat intelligence and integrating blockcha…
View article: An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources Open
With the rise in the use of Android smartphones, there has been a proportional surge in the proliferation of malicious applications (apps). As mobile phone users are at a heightened risk of data theft, detecting malware on Android devices …
View article: Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques
Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques Open
The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches.This escalating security concern necessitates the development of advanced technologies capable of automatically det…
View article: Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets Open
The Internet of Things (IoT) has transformed many aspects of modern life, from healthcare and transportation to home automation and industrial control systems. However, the increasing number of connected devices has also led to an increase…
View article: An intelligent Hybrid‐Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning
An intelligent Hybrid‐Q Learning clustering approach and resource management within heterogeneous cluster networks based on reinforcement learning Open
Recently, heterogeneous cluster networks (HCNs) have been the subject of significant research. The nature of the next‐generation HCN environment is decentralized and highly dynamic; optimization techniques cannot quite express the dynamic …
View article: A Scalable Blockchain Storage Scheme for VANET
A Scalable Blockchain Storage Scheme for VANET Open
Intelligent transportation systems (ITSs) make it possible for applications such as autonomous driving, active safety systems and smart cities. As the infrastructure of ITSs, vehicular ad-hoc network (VANET) plays a key role in ensuring tr…
View article: A vector compression coding algorithm based on SIMD(VCABSIMD)
A vector compression coding algorithm based on SIMD(VCABSIMD) Open
In the vector operation system, each data operation will only increase or decrease the same number for each component of the vector, that is to say, the vector is regarded as a data object on the whole, and each operation is carried out on…
View article: Differential Privacy High-Dimensional Data Publishing Based on Feature Selection and Clustering
Differential Privacy High-Dimensional Data Publishing Based on Feature Selection and Clustering Open
As a social information product, the privacy and usability of high-dimensional data are the core issues in the field of privacy protection. Feature selection is a commonly used dimensionality reduction processing technique for high-dimensi…
View article: Outsmarting Android Malware withCutting-edge Feature Engineering andMachine Learning Techniques
Outsmarting Android Malware withCutting-edge Feature Engineering andMachine Learning Techniques Open
The authors have requested that this preprint be removed from Research Square.
View article: SSKM_DP: Differential Privacy Data Publishing Method via SFLA-Kohonen Network
SSKM_DP: Differential Privacy Data Publishing Method via SFLA-Kohonen Network Open
Data publishing techniques have led to breakthroughs in several areas. These tools provide a promising direction. However, when they are applied to private or sensitive data such as patient medical records, the published data may divulge c…
View article: A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks Open
Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information,…
View article: Differentially Private Denoise Diffusion Probability Models
Differentially Private Denoise Diffusion Probability Models Open
Diffusion models and their variants have achieved high-quality image generation without adversarial training. These algorithms provide new ideas for data shortages in some fields. But the diffusion model also faces the same problem as othe…
View article: Message from the General Chair: NetCIT 2022
Message from the General Chair: NetCIT 2022 Open
2022 2nd International Conference on Networking, Communications and Information Technology (NetCIT 2022) was held online on December 26–27, 2022. NetCIT 2022 is organized by Beijing University of Technology and Wuhan Institute of Technolog…
View article: Blockchain-Based Internet of Things Access Control Technology in Intelligent Manufacturing
Blockchain-Based Internet of Things Access Control Technology in Intelligent Manufacturing Open
The integration of information systems and physical systems is the development trend of today’s manufacturing industry. Intelligent manufacturing is a new model of manufacturing, based on advanced manufacturing technology with human–machin…
View article: Kalman Filter Algorithm for Security of Network Clock Synchronization in Wireless Sensor Networks
Kalman Filter Algorithm for Security of Network Clock Synchronization in Wireless Sensor Networks Open
Wireless sensor networks are a significant subfield of distributed systems, and a large number of their applications require time synchronization. Sensor nodes are powered by batteries. In order to reduce the interference of the peripheral…
View article: A Multi-Model Approach for User Portrait
A Multi-Model Approach for User Portrait Open
Age, gender, educational background, and so on are the most basic attributes for identifying and portraying users. It is also possible to conduct in-depth mining analysis and high-level predictions based on such attributes to learn users’ …
View article: AAAA: SSO and MFA Implementation in Multi-Cloud to Mitigate Rising Threats and Concerns Related to User Metadata
AAAA: SSO and MFA Implementation in Multi-Cloud to Mitigate Rising Threats and Concerns Related to User Metadata Open
In the modern digital era, everyone is partially or fully integrated with cloud computing to access numerous cloud models, services, and applications. Multi-cloud is a blend of a well-known cloud model under a single umbrella to accomplish…
View article: A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics
A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics Open
Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation mod…
View article: A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks Open
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the infrastructure of interconnected devices, it brings along signi…