Chuanhe Huang

Chuanhe Huang
Wuhan University | WHU ·  College of Computer Science

About

95
Publications
6,639
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
788
Citations

Publications

Publications (95)
Article
Full-text available
Due to good maneuverability, UAVs and vehicles are often used for environment perception in smart cities. In order to improve the efficiency of sensor data sharing in UAV-assisted mmWave vehicular network (VN), this paper proposes a sensor data sharing method based on blockage effect identification and network coding. The concurrent sending vehicle...
Article
Full-text available
Content naming and lookup are decisive functions of the future architecture named data network (NDN). The core concept of NDN is the content distribution between consumers and content providers. The NDN supports advance vehicular networks that is famous with vehicular-named data network (VNDN) with different naming schemes such as hybrid, flat, att...
Article
Full-text available
The traditional handover decision methods depend on the handover threshold and measurement reports, which cannot efficiently resolve the frequent handover issue and ping-pong effect in 5G (5 generation) ultradense networks. To reduce the unnecessary handover and improve the QoS (quality of service), combine with the analysis of dwell time, we propo...
Article
Full-text available
Effective emergency message dissemination is a great importance on a specific road in vehicular networks (VN). The existing methods are not most efficient solutions for message dissemination on the curve road, which primarily focus on highway and urban road. In order to improve the efficiency of message dissemination on the curved road, the paper p...
Article
Full-text available
Due to its complexity and mobility, VANET (vehicle ad hoc network) security has long plagued the development of the IoT industry. It is still a big challenge for users to decide the trustworthiness of an anonymous message or the preservation of personal information. Group signature is widely used in VANET anonymous authentication, but the existing...
Article
In a post-pandemic era with personal precautions and vaccination, the emergence of COVID-19 variants with higher transmissibility and the socio-economic reopening have raised new challenges to existing human-to-human digital contact tracing systems, where privacy, efficiency and energy consumption issues are major concerns. In this paper, we propos...
Article
Full-text available
Information leakage and efficiency are the two main concerns of data sharing in cloud-aided IoT. The main problem is that smart devices cannot afford both energy and computation costs and tend to outsource data to a cloud server. Furthermore, most schemes focus on preserving the data stored in the cloud but omitting the access policy is typically s...
Article
Full-text available
With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions...
Article
In Vehicular Networks (VANETs), the rapid movement of vehicles leads to highly time-varying network topology and brings the problem of blind spots in signal coverage. To address these issues, drones are employed to assist data dissemination in VANETs attribute to the flexible development of drones. As random data transmission will result in decreas...
Article
Full-text available
We introduce a new two-side approximation method for the channel scheduling problem, which controls the accuracy of approximation in two sides by a pair of parameters f,g. We present a series of simple and practical-for-implementation greedy algorithms which give constant factor approximation in both sides. First, we propose four approximation algo...
Article
Full-text available
As data dissemination is of great importance for applications in connected vehicular networks (VANETs), we aim to facilitate the performance of data dissemination in this study. Consider strongly connected VANETs where a set of vehicular nodes exists to disseminate information. To reduce redundant transmissions and improve data dissemination delay,...
Article
Full-text available
Due to the dynamically changing topology of Internet of Vehicles (IoV), it is a challenging issue to achieve efficient data dissemination in IoV. This paper considers strongly connected IoV with a number of heterogenous vehicular nodes to disseminate information and studies distributed replication-based data dissemination algorithms to improve the...
Article
Full-text available
Due to the high mobility of vehicles, the frequent path failures caused by dynamic network topology, and a variety of obstructions, efficient data dissemination with delay constraint in vehicular ad hoc networks (VANETs) is a challenging issue. To address these problems, a novel mobile relaying technique by employing unmanned aerial vehicles (UAVs)...
Chapter
In Vehicular Ad-Hoc Network (VANET), fast and reliable emergency message dissemination among vehicles on the road has positive significance. Besides, the topology of VANET is dynamic and we need to consider the adaptability of message dissemination scheme to different scenarios. By studying the relation between reliable broadcast scheme and differe...
Chapter
Software defined networking is a network paradigm which separates the control plane and the data plane. In a large SDN network, multiple controllers are used for handling switches’ requests. Because of the unbalanced requests, sometimes some controllers get overloaded. If switch’s management can be shifted from the overloaded controller to idle con...
Article
Full-text available
This paper aims at solving the end-to-end delay-constrained routing problem in a local way for flying ad hoc networks (FANETs). Due to the high mobility, it is difficult for each node in FANETs to obtain the global information. To solve this issue, we propose an adaptive delay-constrained routing with the aid of a stochastic model, which allows the...
Chapter
Full-text available
Efficient data dissemination in vehicular ad hoc networks (VANETs) is a challenging issue due to the high mobility of vehicles. We consider a novel mobile relaying technique by employing unmanned aerial vehicles (UAVs) to assist VANETs when the communication infrastructure is not available or network connectivity is poor. A throughput maximization...
Article
Full-text available
Efficient data dissemination in vehicular ad hoc networks (VANETs) is a challenging issue due to the dynamic nature of the network. To improve the performance of data dissemination, we study distributed data replication algorithms in VANETs for exchanging information and computing in an arbitrarily-connected network of vehicle nodes. To achieve low...
Article
Cloud provides outsourced storage services in a cost-effective manner. A key challenge of cloud storage is the security and privacy of outsourced data. A security mechanism known as attribute-based encryption (ABE) represents the state-of-the-art in providing fine-grained access control for cloud storage. The managing of access policy is a critical...
Conference Paper
Motivated by message delivery in vehicular ad hoc networks, we study distributed data replication algorithms for information delivery in a special completely connected network. To improve the efficiency of data dissemination, the number of message copies that can be spread is controlled and a distributed randomized data replication algorithm is pro...
Article
Ciphertext-policy attribute-based encryption is becoming a cryptographic solution to realize fine-grained access control. However, some important problems have not been effectively solved yet such as (i) low efficiency of dynamic change of a user or his attribute and (ii) high computation cost at user end. In this paper, we propose an access contro...
Article
Collective I/O is a widely used middleware technique that exploits I/O access correlation among multiple processes to improve I/O system performance. However, most existing implementations of collective I/O strategies are designed and optimized for homogeneous I/O systems. In practice, the homogeneity assumptions do not hold in heterogeneous parall...
Article
Software defined networking (SDN) has emerged as an efficient network technology for lowering operating cost through simplified hardware, software and management. Specific research focus has been placed to achieve a successful carrier grade network with SDN, in terms of scalability, reliability, QoS and service management. In this paper, graph theo...
Article
Hybrid parallel file systems (PFSs), which consist of solid-state drive servers (SServer) and hard disk drive servers (HServer), have recently attracted growing attention. Compared to a traditional HServer, an SServer consistently provides improved storage performance but lacks storage space. However, most current data layout schemes do not conside...
Conference Paper
Cloud storage provides outsourced storage services in a cost-effective manner. A key challenge in cloud storage is the security and integrity of outsourced data. A security mechanism known as Attribute-Based Encryption (ABE) represents the state-of-the-art in providing fine-grained access control for cloud storage. A critical issue in ABE is the ma...
Article
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In t...
Article
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a p...
Article
Full-text available
In cloud, data access control is a crucial way to ensure data security. Functional encryption (FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud. In FE, every ciphertext is specified with an access policy, a decryptor can access the data if and only if his secret key matches with the access pol...
Article
Full-text available
The placement of roadside units (RSUs) is a difficult and yet important issue in vehicular networks. If too few RSUs are placed, the system performance would be very poor. However, with too many RSUs, it would incur high installation cost and maintenance cost of these RSUs. In this paper, we study the problem of delay bounded roadside unit placemen...
Article
Recent advances in machine learning and data mining have led to powerful methods for the analysis and visualization of high dimensional data. This paper proposes an unsupervised linear dimension reduction algorithm named critical points preserving projection (CPPP). Selecting some key data points to represent the others has become more and more pop...
Data
Description: This dataset contains 660 Flying-Apsaras painting images from Mogao Grottoes in Dunhuang, China. These images were labeled into three categories according to the eras of the Flying-Apsaras art they were created – 220 images from the infancy period of the Flying-Apsaras art (421–556), 220 images from the creative period of the Flyi...
Data
This dataset contains 660 Flying-Apsaras painting images from Mogao Grottoes in Dunhuang, China. These images were labeled into three categories according to the eras of the Flying-Apsaras art they were created – 220 images from the infancy period of the Flying-Apsaras art (421–556), 220 images from the creative period of the Flying-Apsaras art...
Data
This dataset contains 660 Flying-Apsaras painting images from Mogao Grottoes in Dunhuang, China. These images were labeled into three categories according to the eras of the Flying-Apsaras art they were created – 220 images from the infancy period of the Flying-Apsaras art (421–556), 220 images from the creative period of the Flying-Apsaras art (55...
Article
Full-text available
In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and...
Article
Full-text available
In an Incremental Support Vector Machine classification, the data objects labelled as non-support vectors by the previous classification are re-used as training data in the next classification along with new data samples verified by Karush-Kuhn-Tucker (KKT) condition. This paper proposes Half-partition strategy of selecting and retaining non-suppor...
Conference Paper
With rapid growth of the demand for computation power, which has led to establish plenty of large-scale data centers consuming enormous amount of electrical power. Energy consumption has become a critical problem. We propose an energy efficient multi-dimension resource allocation algorithm for virtualized Cloud datacenters that reduces energy costs...
Conference Paper
Full-text available
Cloud storage allows owners to host their data in the cloud, and provides users with online access anywhere and anytime. With CP-ABE, data owners are allowed to specify policy autonomously, which can realize fine-grained access control. However, some important problems have not been yet effectively solved: 1) Low efficiency for attribute revocation...
Article
The link is easy to break due to the high mobility of nodes and the constraint of road in a VANET. In this paper, we present an efficient traffic geographic routing (ETGR) with static node assistance. It includes road information collection, road weight information dissemination, the efficient traffic geographic routing and the duration estimation...
Article
Cloud storage has recently appeared as a promising solution to handle the immense volume of data produced in nowadays' rich digital environment. In order to address the departmental information silos, the digital divide, and truly realize the sharing of information, we can outsourced the heterologous and heterogeneous mass data to the cloud so as t...
Conference Paper
Full-text available
Energy consumption has become a major concern to the widespread deployment of cloud data centers. Many techniques have been devised to help reduce energy consumption for cloud data centers that consist of a large number of identical servers, including dynamic allocation of active servers, consolidating diverse applications, and adjusting the CPU fr...
Conference Paper
Full-text available
Cloud storage enables users to remotely store their data. However, this new paradigm of storage service also makes the integrity protection of outsourced data a very challenging issue. Recently many integrity auditing protocols have been proposed, but most of them focus on the single cloud environment or don't support batch auditing. In this paper,...
Article
Ubiquitous and heterogeneous wireless network is an important form of network, and vertical handoff is one of the key issues of the mobility management in this type of network. In Ad hoc network, multihop-enabled forwarding is able to expand network coverage and reduce single-hop propagation distance. Based on the above, TMVHA (trusted and multihop...
Article
Full-text available
Vehicular Ad Hoc Network (VANET) is a new paradigm of wireless network. Reliable and efficient unicast and multicast routing protocols are critical for VANETs. As a possible solution, opportunistic routing (OR) has received much attention recently. This paper focuses on the aspect of soft security by building trust opportunistic forwarding model in...
Conference Paper
Full-text available
Anomaly based Intrusion Detection System, in the recent years, has become more dependent on learning methods - specially on classifications schemes. To make the classification more accurate and effective, hybrid approaches of combining with clustering techniques are often introduced. In this paper, a better combination is proposed to address proble...
Conference Paper
Full-text available
VANET is an emerging paradigm in the domain of wireless network, and a reliable and efficient routing protocol is in urgent need among vehicles connections. As a possible solution, opportunistic routing (OR) has received much attention recently. This research focuses on the aspect of soft security by building a trust opportunistic forwarding model...
Conference Paper
Full-text available
The role of Intrusion Detection System (IDS) has been inevitable in the area of Information and Network Security - specially for building a good network defense infrastructure. Anomaly based intrusion detection technique is one of the building blocks of such a foundation. In this paper, the attempt has been made to apply hybrid learning approach by...
Conference Paper
The integration of various networks which adopt different wireless access technology can improve wireless transmission performance and provide mobile users with always best connection. Vertical handoff is the foundation of the integration of the heterogeneous wireless network. In the process of vertical handoff, handoff algorithm is an important pa...
Article
Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in mobile ad hoc networks, likewise, network coding popularly investigated by many institutes is another approach for improving the throughput in wireless networks. How to combine both the techniques is an interesting res...
Article
Recently, opportunistic routing has received much attention as a new design direction. It can exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to substantially increase the throughput of network. Due to dynamic topology, distributed collaboration, limited bandwidth and computing ability, the absence of enough...
Conference Paper
This paper proposes an effective dynamic data placement strategy in MMDB cluster system that combines the dynamic reallocation and replication into a unified process. The objective of this placement strategy is to locate the data fragments at different sites so as to minimize the total data transfer cost and the response time incurred in executing...
Conference Paper
3D movies and 3D TV have become more and more popular, but they may be hampered by the lack of 3D contents. One possible solution of this problem is to convert the existing monocular videos into 3D versions. This paper presents a semi-automatic technique for 2D to 3D video conversion. Our method segments key frames first through interactive watersh...
Conference Paper
Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in wireless mesh networks, likewise, network coding popularly investigated by many institutes is another approach of enhancing the throughput in wireless networks. How to combine the both techniques is an interesting rese...
Conference Paper
Due to the self-organized, unstable features of MANET, how to ensure the survivability of it becomes more and more important. This paper proposes a survivability evaluation model for MANETs. A Monte Carlo simulation algorithm and an Artificial Neural network computing model are also proposed to calculate the survivability of MANET based on the surv...
Conference Paper
Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in mobile ad hoc networks, likewise, network coding popularly investigated by many institutes is another approach of improving the throughput in wireless networks. How to combine the both techniques is an interesting rese...
Conference Paper
The opportunistic routing paradigm is a new avenue for designing routing protocols in multi-hop wireless networks. Unlike traditional wireless routing protocols which use a single predetermining path, opportunistic routing explicitly takes advantage of the broadcast nature of wireless communications by using a set of relay nodes to opportunisticall...
Article
The survivability evaluation of MANET includes many metrics. Among them, path reliability is the fundamental one. However, most existing work on it has focused either on connectivity or the link duration time solely. Due to the special features of MANET, the radio coverage and node energy also have high effluence on the reliability of the path. Usu...
Conference Paper
Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in mobile ad hoc networks, likewise, network coding popularly investigated by many institutes is another approach of enhancing the throughput in wireless networks. How to combine the both techniques is an interesting rese...
Article
The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network t...
Conference Paper
Ad hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium. These devices are battery operated and therefore need to be energy conserving so that the battery life of each individual node can be prolonged. To maximize the lifetime of an ad hoc network, it is essential to prolong each indivi...
Article
Real-time applications such as multimedia applications have high requirements on bandwidth, delay, jitter etc, which requires WMN (Wireless Mesh Networks) to support QoS. QoS routing is crucial to provide QoS. This paper focuses on QoS routing with bandwidth constraint in multi-radio multi-channel WMN, and proposes a new multi-metric and a QoS rout...
Article
In order to solve the problem of mining biomedical knowledge, a biomedical semantic-based knowledge discovery method (Bio-SKDM) is proposed. Using the semantic types and semantic relations of the biomedical concepts, Bio-SKDM can identify the relevant concepts collected from Medline and generate the novel hypothesis between these concepts. The expe...
Article
In multihop wireless networks each node is equipped with multiple radio interfaces, and multiple channels are available for communication. One of the major problems in such networks is the capacity reduction due to the interference among multiple simultaneous transmissions. In order to effectively minimize interference, this paper proposes a QoS ro...
Article
Full-text available
This article proposes an intersection-aware channel assignment and routing protocol for wireless ad hoc networks with a single transceiver. This protocol increases the network capacity of an IEEE 802.11 network by exploiting frequency diversity. Using the proposed protocol, multiple communications can simultaneously take place in a region without i...
Conference Paper
Wireless interference can make a significant impact on the performance of a wireless network. The paper studies TDMA-based timeslot allocation to schedule links efficiently under RTS/CTS interference model of wireless networks, and presents an efficient centralized timeslot assignment algorithm. In addition, the paper presents an effective heuristi...
Conference Paper
In wireless mesh network, allowing multiple non-overlapping frequency channels to be used simultaneously can improve the network throughput. However, how to reduce inference is still a challenge. In order to solve interference problem, the paper presents k-connected network topology with minimum interference and smart channel assignment algorithm....