Zhaowen Lin
YOU?
Author Swipe
View article: WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets Open
Cryptocurrency wallets, acting as fundamental infrastructure to the blockchain ecosystem, have seen significant user growth, particularly among browser-based wallets (i.e., browser extensions). However, this expansion accompanies security …
View article: Nano-chitin in 3D Printing Technology: Its Structure, Preparation and Application
Nano-chitin in 3D Printing Technology: Its Structure, Preparation and Application Open
Chitin nano-materials derived from natural organisms are receiving much attention due to reduced fossil resources. In order to reduce carbon emissions and waste of valuable resources, nano-chitin materials manufacturing technology has been…
View article: Research Progress in Intrinsic Self-healing Polyurethane Materials Based on Dynamic Reversible Non-covalent Bonds
Research Progress in Intrinsic Self-healing Polyurethane Materials Based on Dynamic Reversible Non-covalent Bonds Open
Polyurethane (PU) is a polymer with great capabilities like high elasticity, low-temperature resistance, wear resistance, and corrosion resistance. However, it will inevitably be damaged in processing or long-term use, which will shorten t…
View article: Privacy-Preserving Task-Matching and Multiple-Submissions Detection in Crowdsourcing
Privacy-Preserving Task-Matching and Multiple-Submissions Detection in Crowdsourcing Open
Crowdsourcing enables requesters to publish tasks to a platform and workers are rewarded for performing tasks of interest. It provides an efficient and low-cost way to aggregate data and solve problems that are difficult for computers but …
View article: Container-Based Performance Isolation for Multi-Tenant SaaS Applications in Micro-Service Architecture
Container-Based Performance Isolation for Multi-Tenant SaaS Applications in Micro-Service Architecture Open
With the development of cloud computing technology, SaaS has become a popular delivery mode in enterprise applications. Since multi-tenant can share a set of customized software applications deployed on the cloud, it significantly reduces …
View article: MD-UCON: A Multi-Domain Access Control Model for SDN Northbound Interfaces
MD-UCON: A Multi-Domain Access Control Model for SDN Northbound Interfaces Open
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN control layer to limit …
View article: A Route Optimization Model Based on Link State Awareness in SDN
A Route Optimization Model Based on Link State Awareness in SDN Open
In addressing the routing issue in the SDN environment, an improved ant colony algorithm is proposed in this paper, in which the ants tend to balance the path with less pheromone. Besides, the Top-K optimal path algorithm is used to optimi…
View article: Malware Detection Based on Deep Learning of Behavior Graphs
Malware Detection Based on Deep Learning of Behavior Graphs Open
The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With more and more smart devices in IoT, security is not a one‐device affair. Many attacks targeted at traditional computers in IoT environment m…
View article: Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks Open
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection task…
View article: Load feedback-based resource scheduling and dynamic migration-based data locality for virtual hadoop clusters in openstack-based clouds
Load feedback-based resource scheduling and dynamic migration-based data locality for virtual hadoop clusters in openstack-based clouds Open
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service (IaaS) cloud platform. In this study, we first propose a new Dynamic Hadoop Cluster o…
View article: Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking
Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking Open
Compared with traditional networking, Software-Defined Networking (SDN) enables to solve the scalability, flexibility and other aspects of the problems.However, there still have some questions about previous relevant works for security con…
View article: Notice of Violation of IEEE Publication Principles: Group-Aware Delay-Constrained Video Transmission Over Multihomed Device-to-Device Networks
Notice of Violation of IEEE Publication Principles: Group-Aware Delay-Constrained Video Transmission Over Multihomed Device-to-Device Networks Open
The technological advancements in wireless communication systems enable mobile users to leverage different radio interfaces (e.g., cellular and WiFi) for concurrent data transmission. However, the existing transmission schemes do not serio…
View article: A Privacy‐Preserving Intelligent Medical Diagnosis System Based on Oblivious Keyword Search
A Privacy‐Preserving Intelligent Medical Diagnosis System Based on Oblivious Keyword Search Open
One of the concerns people have is how to get the diagnosis online without privacy being jeopardized. In this paper, we propose a privacy‐preserving intelligent medical diagnosis system (IMDS), which can efficiently solve the problem. In I…
View article: A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data
A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data Open
In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack beh…
View article: Cloud platform based automated security testing system for mobile internet
Cloud platform based automated security testing system for mobile internet Open
With respect to security, the use of various terminals in the mobile Internet environment is problematic. Traditional terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect th…
View article: Application of Negative Selection Theory in Intrusion Detection
Application of Negative Selection Theory in Intrusion Detection Open
Along with the rapid development of Internet, network security has become one of high-profile issues in the current life.In this paper, the problem of instruction detection based on artificial immune system model and the key technologies n…