Jiguo Yu

Jiguo Yu
Qilu University of Technology · School of Computer Science and Technology

Professor, Ph.D.

About

453
Publications
51,174
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,350
Citations
Education
September 2001 - June 2004
Shandong University
Field of study
  • Mathematics (Operational Research and Control Theory)
September 1995 - June 1997
Qufu Normal University
Field of study
  • Mathematics (Graph Theory)
September 1993 - June 1995
Qufu Normal University
Field of study
  • Mathematics

Publications

Publications (453)
Article
Data aggregation (DA) plays an important role in the context of Internet of Things (IoT). Although some favorable solutions have been proposed to improve the performances of DA, the complex collusion attacks are often ignored and may produce more serious negative impact on aggregation accuracy. In this article, we design a novel dynamic robust iter...
Article
Social recommendation improved the quality and efficiency of recommendation but increased the risk of privacy leakage, especially with the introduction of social networks. Consequently, the social recommendation considering user privacy has drawn tremendous attention from academia to industry. Nevertheless, most of the existing work regards the rec...
Article
Topology design is vital to the high performance data center networks. Due to the limited scalability, many traditional server-centric data center networks are confronting the updating and upgrading hurdles. To address the issue, this paper proposes a highly scalable DCell-based server-centric data center network topology, called HS-DCell, which ca...
Article
Combing unmanned aerial vehicles (UAVs) with nonorthogonal multiple access (NOMA) in ultra-reliable and low latency communication (uRLLC) is deemed as a new service category of 5 G wireless networks. The openness nature of wireless environment makes security of information transmission unprecedentedly importance. Traditional cryptography methods ca...
Article
Mobile edge computing (MEC) is considered a promising technology to provide low-latency services by keeping computing and other resources physically close to where they are needed. The functions implemented through network function virtualization (NFV) technology in MEC are called virtual network function (VNF) instances, and the deployment and sch...
Article
This paper addresses the problem of reliable communications for cooperative learning on Internet-of-Vehicles, where a large amount of data from users and services needs to be processed. Previous works have proposed various cooperative learning schemes, but they often assume that the communications between vehicles are reliable, without considering...
Article
In the current hypergrowth phase of the Internet of Things, cross-domain data access becomes more and more frequently. Whereas, the lack of trust between domains makes cross-domain data access extremely hard. Traditional schemes typically depend on a third party to establish trust between data accessing entities, which can easily result in single p...
Article
The rapid evolution of the smart grid has made the security and reliability of communication within the power system an urgent and critically important issue. To address this challenge, authentication and key agreement (AKA) protocols have gained significant attention and are regarded as indispensable tools for ensuring the secure operation of the...
Article
With the development of big data technology, the power industry has also entered the data-driven intelligence era. Cloud computing-based smart grids give the power industry stronger capabilities in data analytics. Electricity load forecasting in the cloud helps smart grids allocate resources appropriately. However, the users' privacy is easily comp...
Article
Full-text available
This study investigates the integrated application of cloud computing and big data in the field of education and its impact on curriculum teaching. Through a comprehensive review of the fundamental principles, current applications, and relevant literature, the study reveals the advantages and challenges of cloud computing and big data in aspects su...
Conference Paper
Due to the growing prevalence of Internet of Things (IoT) services, there is an opportunity to leverage the data generated by IoT devices to create greater value. However, how individuals can ensure user privacy and data security when sharing their private data remains a major challenge. To address the above problems, we propose a trackable and fin...
Article
Amidst the rapid advancements in metaverse and consumer electronics technology, individuals now have the opportunity to engage in immersive interactive experiences. However, the intimate connection between user data within the metaverse and their real-world identities necessitates the implementation of methods to safeguard the security of user data...
Chapter
Constructing panoramic images from a dual-fisheye lens has been increasingly used along with the recent booming of new computer vision applications, such as virtual reality (VR) and augmented reality(AR). The recent development of deep learning (DL) techniques has shed new light on the field of image stitching, but little research has been conducte...
Chapter
Edge computing is proving to be a promising model, offering low-latency and high-bandwidth services to the end-users. However, due to the dynamic nature of the network and the heterogeneous computing resources, task scheduling in edge clouds remains a challenging problem. In order to solve this problem, we propose a novel task scheduling algorithm...
Article
Data privacy breaches have prompted growing concerns regarding privacy issues on social networks. Preserving the privacy of links in the directed social graph, where edges signify the information flow or data contributions, poses a formidable challenge. However, existing methods for uncertain graphs primarily target undirected graphs and lack rigor...
Article
The pursuit of refined data analysis and the preservation of privacy in Big Data pose significant concerns. Among the paramount paradigms for addressing these challenges, differential privacy stands out as a vital area of research. However, traditional differential privacy tends to be excessively restrictive when it comes to individuals' control ov...
Article
The sparrow search algorithm (SSA) represents a novel approach within swarm intelligence optimization, introduced in recent years. Renowned for its minimal control parameters and straightforward implementation, the SSA algorithm has swiftly emerged as one of the most proficient and attractive optimization methodologies. Despite its significant accu...
Article
This paper investigates the joint active transceiver and passive beamforming design to maximize the weighted sum-rate (WSR) of an IRS-aided multi-streams multiuser multiple-input multiple-output broadcast channel (MIMO-BC) downlink transmission system. Due to the coupling of the transceiver parameters, the considered WSR optimization problem is hig...
Article
Airborne tactical networks (ATN) play a pivotal role in enabling information sharing between manned and unmanned military aircrafts. The design of effective ATNs faces two significant challenges: the network ossification problem and the complexity associated with managing heterogeneous resources. Wireless network virtualization provides a practical...
Chapter
Fine-grained image classification of wildlife species is a task of practical value and has an important role to play in the fields of endangered animal conservation, environmental protection and ecological conservation. However, the small differences between different subclasses of wildlife and the large differences within the same subclasses pose...
Chapter
Full-text available
Smart cities are enabled by cyber-physical systems (CPS) which leverage the Internet of Things (IoT) to connect the physical world and information systems. Due to lack of security protection, IoT systems are vulnerable to various cyber attacks. In this paper, we investigate the network intrusion detection method for the security protection of loT e...
Article
Internet of Medical Things (IoMT) technologies significantly improve the quality of health care, especially at the time when COVID-19 is becoming a worldwide pandemic. Due to the complexity of devices and user nodes in the IoMT system, there should be some ways to ensure the security and quality of the service or information. Decentralized trust ma...
Article
A large amount of high-dimensional and heterogeneous data appear in practical applications, which are often published to third parties for data analysis, recommendations, targeted advertising, and reliable predictions. However, publishing these data may disclose personal sensitive information, resulting in an increasing concern on privacy violation...
Article
Large-scale graphs usually exhibit global sparsity with local cohesiveness, and mining the representative cohesive subgraphs is a fundamental problem in graph analysis. The $k$ -truss is one of the most commonly studied cohesive subgraphs, in which each edge is formed in at least $k-2$ triangles. A critical issue in mining a $k$ -truss lies i...
Article
In this paper, we study a distributed privacy-preserving learning problem in social networks with general topology. The agents can communicate with each other over the network, which may result in privacy disclosure, since the trustworthiness of the agents cannot be guaranteed. Given a set of options which yield unknown stochastic rewards, each age...
Article
Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio model. They allocate different transmission slots to conflicting packets and overcome the challenges caused by the fact that the channel state changes quickly and is uncontrollable. The first algorithm proposes a prior...
Article
Deep learning is a thriving field currently stuffed with many practical applications and active research topics. It allows computers to learn from experience and to understand the world in terms of a hierarchy of concepts, with each being defined through its relations to simpler concepts. Relying on the strong capabilities of deep learning, we prop...
Article
The significance of RFID-based information collection is becoming increasingly visible as more and more sensor-augmented RFID systems are deployed. Tag information collection aims at efficiently and accurately collecting valuable information from target objects attached with RFID tags. Polling-based information collection can effectively avoid resp...
Article
Link scheduling plays a pivotal role in accommodating stringent reliability and latency requirements. In this paper, we focus on the availability and effectiveness of applying protocol interference model (PIM) under Rayleigh fading model to solve the problem. The motivation is that PIM caters to distributed link scheduling algorithm design, but usu...
Article
Most data center services are finished by the cooperation among the connected servers. However, the malicious attackers always try to divide the network into disconnected components to start some attacks, such as the address resolution protocol (ARP) attack, the denial of service (DoS) attack, the botnet attack, and so on. The connectivity is an ex...
Article
Sharing the big data generated by IoT via cloud is slow and expensive. Besides, transmitting and sharing data among IoT devices via cloud may be insecure. To address these issues, a novel efficient and secure data sharing scheme termed EB-SDSS (Edge Blockchain Secure Data Sharing Scheme) is proposed in this paper for edge-enabled IoT applications....
Article
The growing prevalence of graphs representations in our society has led to a corresponding rise in the publishing of graphs by researchers and organizations. To protect the privacy, it is important to ensure that graphs including sensitive data are not disclosed. Since the weight of edges could be utilized to infer confidential information, the gra...
Article
In many industrial Internet of Things application schemes, participants, such as IoT devices, often share information with each others for analysis and categorization purpose. Through the analysis and statistical processing of the information, some necessary information is exchanged, e.g., the attributes in manufacturing IoT devices' gathered data....
Article
The massive amount of data on the Internet of Things (IoT) drives recommendation systems (RS) based on graph neural network (GNN) to fully play a role in improving user experience. However, data sharing and centralized storage can pose serious security threats. Even though federated learning (FL) can render data “available but not visible," the het...
Article
Device-to-Device (D2D) communication and edge caching are two promising approaches to relieve stress on core networks, and the dynamic topology and complex device types of D2D networks bring more challenges to the design of caching strategies. However, most of the existing research works on D2D caching focus on predictable user mobility without con...
Article
Blockchain technologies can enable secure computing environments among mistrusting parties. Permissioned blockchains are particularly enlightened by companies, enterprises, and government agencies due to their efficiency, customizability, and governance-friendly features. Obviously, seamlessly fusing blockchain and cloud computing can significantly...
Article
Full-text available
Blockchain creates a secure environment on top of strict cryptographic assumptions and rigorous security proofs. It permits on-chain interactions to achieve trustworthy properties such as traceability, transparency, and accountability. However, current blockchain trustworthiness is only confined to on-chain, creating a “trust gap” to the physical,...
Article
Low-rate Distributed Denial of Service (LDDoS) attacks are complex and common security issues, which disrupt the essential services of the varied and emerging networks. However, the traditional detection models are normally in a dilemma condition since LDDoS attacks have the characteristics of concealment and persistence in space and time dimension...
Chapter
Blockchain, as an emerging technology, has vulnerabilities that make the blockchain ecosystem rife with many criminal activities. However, existing technologies of phishing fraud detection heavily rely on shallow machine learning, leading to low detection precision. To solve this problem, in this paper, we construct a graph classification network m...
Chapter
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in access control to achieve secure data sharing over different cloud platforms. However, most of the existing CP-ABE data sharing schemes perform one-time encryption on the shared data, which cannot satisfy the need for data sharing in the public cloud with complex users. In orde...
Chapter
Full-text available
Hybrid beamforming (HBF) is a promising approach for balancing the hardware cost, training overhead and system performance in massive MIMO systems. Optimizing the HBF through deep learning (DL) has gained considerable attention in recent years due to its potential in dealing with the nonconvex problems. However, existing DL-based HBF methods requir...
Chapter
Intelligent traffic is one of the most important applications for improving urban traffic pressure. However, intersections are an important element of urban road network, which makes the complex traffic data face the challenges of security and efficiency in the process of transmission. In this paper, we propose a smart contract-based intelligent tr...
Article
This article studies decentralized federated learning algorithms in wireless IoT networks. The traditional parameter server architecture for federated learning faces some problems such as low fault tolerance, large communication overhead and inaccessibility of private data. To solve these problems, we propose a decentralized wireless federated lear...
Article
This paper studies joint beamforming problems for an intelligent reflecting surface (IRS)-aided multi-cell multiple-input single-output (MISO) system, and the goal is to maximize the sum rate by jointly optimizing the transmit beamforming vectors at BSs and the reflective beamforming vector at the IRS, subject to the individual maximum transmit pow...
Chapter
Ethereum has many transaction security issues such as Ponzi schemes, which are hidden in a large number of smart contracts. And they are difficult to be detected. Therefore, we propose a novel multi-granularity multi-scale convolutional neural network model (MM-CNN) to detect Ponzi schemes in smart contracts. A multi-granularity method is used to c...
Preprint
A large amount of high-dimensional and heterogeneous data appear in practical applications, which are often published to third parties for data analysis, recommendations, targeted advertising, and reliable predictions. However, publishing these data may disclose personal sensitive information, resulting in an increasing concern on privacy violation...
Article
As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data. Though cloud computing brings great advantages, new issues emerge, such as data security breach and privacy disclosure. In this paper, we introduce a novel secure an...
Article
Full-text available
In this information age, with the emergence of organizations, the number of various resources on the Internet of Things is also increasing. Generally, different users have different access permissions to different resources and most of the existing schemes have realized access control. But most of them are rough and not feasible in many organizatio...
Article
Wireless Sensor Networks (WSNs), as the fundamental infrastructure, are indispensable for the Industrial Internet of Things (IIoT). In particular, the security and effectiveness of WSNs in IIoT are universal and inevitable issues. In this paper, a WSN-based IIoT Model (WIM) is designed characterized by a single mobile sink. Based on WIM, a high rob...
Preprint
In this paper, from the perspective of physical layer security (PLS), we investigate the secrecy performance of two-way untrusted relaying networks (TWURNs), where two multiple antenna base stations (BSs) exchange their secret messages with the assistance of untrusted relays with a single antenna. For the inefficiency of current single untrusted re...
Article
Full-text available
Hybrid beamforming (HBF) is a promising approach to obtain a better balance between hardware complexity and system performance in massive MIMO communication systems. However, the HBF optimization problem is a challenging task due to its nonconvex property in terms of design complexity and spectral efficiency (SE) performance. In this work, a low-co...
Article
Balancing the security and efficiency of the internet of things (IoT) is difficult due to its numerous heterogeneous devices, different trust levels of stakeholders, and asymmetric resource distribution among layers. Identity-based broadcast encryption (IBBE) is a promising technique to ensure data confidentiality, simplify the certification manage...
Article
As a traditional research topic, consensus is one of the foundational building blocks in distributed systems and networks, by which all agents can reach an agreement in the judgments, opinions, and actions for some events. In this article, we study the fault-tolerant consensus problem in mobile networks, considering that the faults and mobility of...
Article
Full-text available
Remote sensing scene classification aims to automatically assign a specific semantic label to each image. It is challenging to classify remote sensing scene images due to the images' diversity and rich spatial information. Recently, convolutional neural networks have been widely used to overcome these difficulties, such as the famous Visual Geometr...
Article
Secure and scalable dynamic data interaction is significant to improve the level of medical collaboration and facilitate patients’ medical treatment. The consortium blockchain provides integrity and traceability management for medical data through preset authorized access and consensus mechanisms. However, how to realize the secure sharing of data...
Article
Full-text available
Ultra-reliable low-latency communication (uRLLC) emerges as one of the three service categories in fifth-generation (5G) wireless networks, with a potential to support multiple advanced services for latency-sensitive communications. The inherent openness of the wireless environment makes security in 5G unprecedentedly urgent to be addressed. Accord...
Article
Full-text available
In the medical image analysis domain, medical image segmentation has a significant impact on the quantitative analysis of organ or tissue function, as the first and critical component of diagnosis and treatment pipeline. In this paper, a dense R‐CNN segmentation model based on dual‐attention are proposed for medical images multi‐target instance seg...
Article
The Internet of Vehicles (IoV) provides an important platform for various applications in diverse vehicular sectors such as the safety, energy-saving, decision-making, routing, and entertainment, which makes vehicular transportation safer, greener, and easier. While providing convenient and efficient communications between vehicles, the wireless ch...
Article
Full-text available
Aiming at the medical images segmentation with low-recognition and high background noise, a deep convolution neural network image segmentation model based on fuzzy attention mechanism is proposed, which is called FA-SegNet. It takes SegNet as the basic framework. In the down-sampling module for image feature extraction, a fuzzy channel-attention mo...
Article
Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifth-generation (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G) networks as well. Due to the open nature of the wireless environment, the security and confidentiality of uRLLC are critical. Since traditional cryptography metho...
Article
Full-text available
In the big data background, data privacy becomes more and more important when data leakage and other security events occur more frequently. As one of the key means of privacy protection, anonymous communication attracts large attention. Aiming at the problems such as low efficiency of message forwarding, high communication delay and abusing of anon...
Article
Social relationships among wireless nodes play a key role of wireless networks to establish trusted services applications. Owing to inherent randomness of wireless environment, the security and confidentiality of wireless information transmission urgently needs to be addressed. Physical layer security (PLS) technique has been proposed as an effecti...
Article
Multi-user multiple-input multiple-output (MIMO) is a key technique to increase both the channel capacity and the number of users that can be served simultaneously. One of the main challenges related to the deployment of such systems is the complexity of the transceiver processing. Although the conventional optimization algorithms are able to provi...
Article
Full-text available
Social networks are becoming important dissemination platforms, and a large body of works have been performed on viral marketing, but most are to maximize the benefits associated with the number of active nodes. In this paper, we study the benefits related to interactions among activated nodes. Furthermore, since the stochasticity caused by the dyn...