Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme

    Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...

    Qianchuan Xv, Yubo Song, Xuan Li, Aiqun Hu in Advances in Artificial Intelligence and Se… (2021)

  2. No Access

    Chapter and Conference Paper

    Neural Control Based Research of Endogenous Security Model

    With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...

    Tao Li, Xu Hu, Aiqun Hu in Artificial Intelligence and Security (2021)

  3. No Access

    Chapter and Conference Paper

    Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection

    Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...

    Qi Chen, Yubo Song, Aiqun Hu in Advances in Artificial Intelligence and Security (2021)

  4. No Access

    Article

    Throughput and BER of wireless powered DF relaying in Nakagami-m fading

    Energy harvesting provides a promising solution to the extra energy requirement at the relay due to relaying. In this paper, the throughput and bit error rate of a decode-and-forward relaying system are studie...

    Yan Gao, Yunfei Chen, Aiqun Hu in Science China Information Sciences (2017)