Hong-Ning Dai

Hong-Ning Dai
Hong Kong Baptist University · Department of Computer Science

Ph.D.

About

214
Publications
548,161
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,283
Citations
Introduction
Hong-Ning Dai is an associate professor at Hong Kong Baptist University. He obtained a Ph.D. degree in CSE from the Chinese Univ. of Hong Kong. His research interests include big data analytics, IoT, and blockchain. He has published more than 180 peer-reviewed papers in refereed journals and conferences. He is also the holder of 1 U.S. patent. He won 1 IEEE outstanding paper award and 6 ESI highly-cited papers. He is a senior member of IEEE and a senior member of ACM.
Additional affiliations
August 2021 - June 2022
Lingnan University
Position
  • Professor (Associate)
July 2015 - June 2021
Macau University of Science and Technology
Position
  • Professor (Associate)
January 2010 - June 2015
Macau University of Science and Technology
Position
  • Professor (Assistant)
Education
August 2005 - August 2008
The Chinese University of Hong Kong
Field of study
  • Computer Science and Engineering
September 2003 - June 2012
Shanghai Jiao Tong University
Field of study
  • Computer Science and Engineering
September 2000 - July 2003
South China University of Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (214)
Article
Full-text available
In this paper, we propose a novel multi-channel network with infrastructure support, called an MC-IS network, which has not been studied in the literature. To the best of our knowledge, we are the first to study such an MC-IS network. Our proposed MC-IS network has a number of advantages over three existing conventional networks, namely a single-ch...
Article
Full-text available
Electricity theft can be harmful to power grid suppliers and cause economic losses. Integrating information flows with energy flows, smart grids can help to solve the problem of electricity theft owning to the availability of massive data generated from smart grids. The data analysis on the data of smart grids is helpful in detecting electricity th...
Article
Full-text available
Blockchain has numerous benefits such as decentralization, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, Internet of Things to public and social services. Although a number of studies focus on using the blockchain technology in various a...
Article
Full-text available
The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large scale wireless networks. Big data of large scale wireless networks has the key features of wide variety, high volume, real-time velocity and huge value leading to the unique research challenges that are diierent from...
Article
Full-text available
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges such as decentralization, poor interoperability, privacy and security vulnerabilities. Blockchain technology brings the opportunities in addressing the challeng...
Article
Motion deblurring methods based on convolutional neural networks (CNN) have recently demonstrated their advantages over conventional methods. However, repetitions of scaling or slicing operations of these methods on the input images inevitably lead to spatial information loss. Meanwhile, some recent methods based on complex models inevitably bring...
Article
Motion deblurring is a challenging task in vision and graphics. Recent researches aim to deblur by using multiple sub‐networks with multi‐scale or multi‐patch inputs. However, scaling or splitting operations on input images inevitably loses the spatial details of the images. Meanwhile, their models are usually complex and computationally expensive....
Preprint
As an important technology to ensure data security, consistency, traceability, etc., blockchain has been increasingly used in Internet of Things (IoT) applications. The integration of blockchain and edge computing can further improve the resource utilization in terms of network, computing, storage, and security. This paper aims to present a survey...
Preprint
Full-text available
The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can...
Article
It is crucial to predict the outputs of a thickening system, including the underflow concentration (UC) and mud pressure, for optimal control of the process. The proliferation of industrial sensors and the availability of thickening-system data make this possible. However, the unique properties of thickening systems, such as the non-linearities, lo...
Preprint
Full-text available
In this brief, we conduct a complex-network analysis of the Bitcoin transaction network. In particular, we design a new sampling method, namely random walk with flying-back (RWFB), to conduct effective data sampling. We then conduct a comprehensive analysis of the Bitcoin network in terms of the degree distribution, clustering coefficient, the shor...
Preprint
Full-text available
Being the largest Initial Coin Offering project, EOSIO has attracted great interest in cryptocurrency markets. Despite its popularity and prosperity (e.g., 26,311,585,008 token transactions occurred from June 8, 2018 to Aug. 5, 2020), there is almost no work investigating the EOSIO token ecosystem. To fill this gap, we are the first to conduct a sy...
Article
Full-text available
Today’s industry has gradually realized the importance of lifting efficiency and saving costs during the life-cycle of an application. In particular, we see that most of the cloud-based applications and services often consist of hundreds of micro-services; however, the traditional monolithic pattern is no longer suitable for today’s development lif...
Article
Full-text available
This paper studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may possibly receive imbalanced transactions or even bursty-TX injection attacks. An imba...
Article
Stock movement prediction is a critical issue in the field of financial investment. It is very challenging since a stock usually shows highly stochastic property in price and has complex relationships with other stocks. Most existing approaches cannot jointly take the above two issues into account and thus cannot yield satisfactory prediction resul...
Article
Graph auto-encoder is considered a framework for unsupervised learning on graph-structured data by representing graphs in a low dimensional space. It has been proved very powerful for graph analytics. In the real world, complex relationships in various entities can be represented by heterogeneous graphs that contain more abundant semantic informati...
Conference Paper
Full-text available
Non-terrestrial Networks (NTNs) refer to the networks, where either satellites or unmanned aerial vehicles (UAVs) are deployed to extend the current terrestrial networks for serving the growing mobile broadband and machine-type communications. With the advantages of UAVs' flexibility and satellites' global coverage, the solution of UAV-To-satellite...
Article
In this brief, we conduct a complex-network analysis of the Bitcoin transaction network. In particular, we design a new sampling method, namely random walk with flying-back (RWFB), to conduct effective data sampling. We then conduct a comprehensive analysis of the Bitcoin network in terms of the degree distribution, clustering coefficient, the shor...
Article
Massive physical devices are deployed in the industrial Internet of Things (IoT) to collect ambiance data while heavy storage and communication cost are imposed on these IoT devices. To overcome this constraint, cloud-assisted technologies are introduced to store and manage the collected data. In order to protect data quality and security, encrypti...
Article
Unmanned aerial vehicles (UAVs) can be leveraged in mobile crowdsensing (MCS) to conduct sensing tasks at remote or rural areas through computation offloading and data sensing. Nonetheless, both computation offloading and data sensing have been separately investigated in most existing studies. In this paper, we propose a novel cooperative data sens...
Preprint
Full-text available
The traditional production paradigm of large batch production does not offer flexibility towards satisfying the requirements of individual customers. A new generation of smart factories is expected to support new multi-variety and small-batch customized production modes. For that, Artificial Intelligence (AI) is enabling higher value-added manufact...
Preprint
Full-text available
We have witnessed an unprecedented public health crisis caused by the new coronavirus disease (COVID-19), which has severely affected medical institutions, our common lives, and social-economic activities. This crisis also reveals the brittleness of existing medical services, such as over-centralization of medical resources, the hysteresis of medic...
Article
As an underlying and backbone technology of Bitcoin, Blockchain attracted extensive attention worldwide in recent years due to its unique characteristics of decentralization, openness, immutability, anonymity, etc., which enables it to build a trust basis through recording the point-to-point decentralized transactions in an immutable way via the at...
Article
The Industrial Internet of Things (IIoT) plays an important role in digital transformation of traditional industries towards Industry 4.0. By connecting sensors, instruments and other industry devices to the Internet, IIoT facilitates the data collection, data analysis, and automated control, thereby improving the productivity and efficiency of the...
Article
The papers in this special section focus scalable computing for blockchain systems.
Article
Full-text available
In the past decades, due to the low design cost and easy maintenance, text-based CAPTCHAs have been extensively used in constructing security mechanisms for user authentications. With the recent advances in machine/deep learning in recognizing CAPTCHA images, growing attack methods are presented to break text-based CAPTCHAs. These machine learning/...
Article
The site selection of sports facilities is a pivotal link in the construction of city livable environment and the development of sports business in digital-twinning cities. Recent years have witnessed data mining and visualization technologies bringing the convenience as well as opportunities for intelligent site selection. However, the lack of eff...
Article
Federated learning can achieve the purpose of distributed machine learning without sharing privacy and sensitive data of end devices. However, high concurrent access to the server increases the transmission delay of model updates, and the local model may be an unnecessary model with the opposite gradient from the global model, thus incurring a larg...
Article
The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can...
Article
After the invention of Bitcoin as well as other blockchain-based peer-to-peer payment systems, the cryptocurrency market has rapidly gained popularity. Consequently, the volatility of the various cryptocurrency prices attracts substantial attention from both investors and researchers. It is a challenging task to forecast the prices of cryptocurrenc...
Article
We have witnessed an unprecedented public health crisis caused by the new coronavirus disease (COVID-19), which has severely affected medical institutions, our common lives, and social-economic activities. This crisis also reveals the brittleness of existing medical services, such as over-centralization of medical resources, the hysteresis of medic...
Article
Blockchain-based cryptocurrencies and applications have flourished in blockchain research community. Massive data generated from diverse blockchain systems bring not only huge business values but also technological challenges in data analytics of heterogeneous blockchain data. Different from Bitcoin and Ethereum, EOSIO has richer diversity and a hi...
Article
The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond communications. Current security countermeasures based on cryptographic algorithms have a stringent requirement on the centralized key management as well as computational capabilities of...
Article
The incumbent Internet of Things suffers from poor scalability and elasticity exhibiting in communication, computing, caching and control (4Cs) problems. The recent advances in deep reinforcement learning (DRL) algorithms can potentially address the above problems of IoT systems. In this context, this paper provides a comprehensive survey that over...
Article
Full-text available
Services computing can offer a high-level abstraction to support diverse applications via encapsulating various computing infrastructures. Though services computing has greatly boosted the productivity of developers, it is faced with three main challenges: privacy and security risks, information silo, and pricing mechanisms and incentives. The rece...
Preprint
Full-text available
Deep Neural Networks (DNNs) have shown great success in completing complex tasks. However, DNNs inevitably bring high computational cost and storage consumption due to the complexity of hierarchical structures, thereby hindering their wide deployment in Internet-of-Things (IoT) devices, which have limited computational capability and storage capaci...
Article
Full-text available
Deep Neural Networks (DNNs) have shown great success in completing complex tasks. However, DNNs inevitably bring high computational cost and storage consumption due to the complexity of hierarchical structures, thereby hindering their wide deployment in Internet-of-Things (IoT) devices, which have limited computational capability and storage capaci...
Article
Distributed peer-to-peer power energy markets are emerging quickly. Due to central governance and lack of effective information aggregation mechanisms, energy trading cannot be efficiently scheduled and tracked. We devise a new distributed energy transaction system over the energy Industrial Internet of Things based on predictive analytics, blockch...
Article
5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social/ physical distancing during pandemics such as COVID-19). Such applications generally involve the collection and dissemination of (massive) data from the drones t...
Article
Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
Chapter
Cloud computing offers elastic and ubiquitous computing services, thereby receiving extensive attention recently. However, cloud servers have also become the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external...
Chapter
After the introduction of blockchain intelligence in Chap. 1, in this chapter, we present an overview of blockchain data collection. We first review the data growth brought about by the rapid development of blockchain in recent years, then analyze the data processing and exploration challenges caused by this phenomenon, and finally propose our solu...
Chapter
Although blockchain intelligence has great potential to further improve existing blockchain systems, there are open research directions in this emerging area. In this chapter, we discuss the open issues of blockchain intelligence from aspects such as federated learning on blockchain, collective intelligence bestowing blockchain, and artificial inte...
Chapter
We have experienced the proliferation of diverse blockchain platforms, including cryptocurrencies as well as private blockchains. In this chapter, we present an overview of blockchain intelligence. We first briefly review blockchain and smart contract technologies. We then introduce blockchain intelligence, which is essentially an amalgamation of b...
Article
We are enjoying the benefits brought by the accelerated development of computing systems and the Internet. However, we are also facing a few security and privacy vulnerabilities caused by the increasing system complexity, heterogeneity, dynamicity, and decentralized nature. These security and privacy vulnerabilities may prevent the wide adoption of...
Book
This book focuses on using artificial intelligence (AI) to improve blockchain ecosystems. Gathering the latest advances resulting from AI in blockchain data analytics, it also presents big data research on blockchain systems. Despite blockchain's merits of decentralisation, immutability, non-repudiation and traceability, the development of blockch...
Book
This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.* The 38 full papers and the 12 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections:...
Chapter
Researchers have turned their focus on leveraging either dynamic or static features extracted from applications to train AI algorithms to identify malware precisely. However, the adversarial techniques have been continuously evolving and meanwhile, the code structure and application function have been designed in complex format. This makes Android...
Article
360-degree video streaming shows great potential to revolutionize the streaming market, by providing much better immersive experience than standard video streams. However, its wide adoption is hindered by the surging demand of network bandwidth due to multi-screen video transmission. To reduce the bandwidth cost, one promising approach is to predic...
Article
Full-text available
Due to the advanced capabilities of the Internet of Vehicles (IoV) components such as vehicles, Roadside Units (RSUs) and smart devices as well as the increasing amount of data generated, Federated Learning (FL) becomes a promising tool given that it enables privacy-preserving machine learning that can be implemented in the IoV. However, the perfor...
Preprint
Full-text available
Services computing can offer a high-level abstraction to support diverse applications via encapsulating various computing infrastructures. Though services computing has greatly boosted the productivity of developers, it is faced with three main challenges: privacy and security risks, information silo, and pricing mechanisms and incentives. The rece...
Article
The explosive generation of Internet of Things (IoT) data calls for cloud service providers (CSP) to further provide more secure and reliable transmission, storage, and management services. This requirement, however, goes against the honest and curious nature of CSP, to the extent that existing methods introduce the third-party audit (TPA) to check...
Article
5G heterogeneous networks have become a promising platform to connect a growing number of Internet-of-Things (IoT) devices and accommodate a wide variety of vertical services. IoT has not been limited to traditional sensing systems since the introduction of 5G, but also includes a range of autonomous moving platforms, e.g., autonomous flying vehicl...
Chapter
After the invention of Bitcoin and a peer to peer electronic cash system based on the blockchain, the market of cryptocurrencies increases rapidly and attracts substantial interest from investors and researchers. Cryptocurrencies price volatility prediction is a challenging task owing to the high stochasticity of the markets. Econometric, machine l...
Article
Most of existing mobile edge computing (MEC) studies consider the remote cloud server as a special edge server, the opportunity of edge-cloud collaboration has not been well exploited. We propose a dependency-aware offloading scheme in MEC with edge-cloud cooperation under task dependency constraints. Each mobile device has a limited budget and has...