Mingchu Li

Mingchu Li
Dalian University of Technology | DUT · School of Software

About

232
Publications
21,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,735
Citations

Publications

Publications (232)
Article
Full-text available
In this work, bilinear residual network 1 method is proposed to solve nonlinear evolution equa-2 tions. The activation function in final layer of deep 3 neural network cannot interact with the neuron inside 4 the deep neural network, but the residual network can 5 transfer the input layer to the activation function in final 6 layer to realize the i...
Article
This paper studies an interdependent facility location and protection problem against multiple non-cooperative limited choice attackers. In a supply network, the defender and attackers have completely opposite objectives by optimizing their respective patterns. This interaction is represented with a game-theoretic bilevel framework. The defender as...
Article
This paper studies a capacitated facility location and protection problem against the boundedly rational attacker that merges probabilistic fortification and interdiction, and decision-dependent uncertainty in the post-interdiction capacity of the facilities. The defender decides the location and fortification of the facilities, whereas the attacke...
Article
Full-text available
A smart city will become an inevitable trend of social development. It includes many Cyber Physical Systems (CPSs) that can be endowed with different levels of intelligence. With the combination of CPS and cloud computing, smart sensor cloud system becomes popular in many areas where the physical nodes can be shared with multiple users, which can o...
Article
Full-text available
This paper investigates some novel exact analytical solutions, including lump-type wave, breather wave as well as BK-type wave solutions for a (3+1)-dimensional p¯-gKP equation. Firstly, the trilinear p¯-gKP equation is well established by the multivariate trilinear operators. Secondly, three types of wave solutions for the p¯-gKP equation are obta...
Article
Full-text available
Under investigation in this paper is the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like (CDGKS-like) equation. Based on bilinear neural network method, the generalized lump solution, classical lump solution and the novel analytical solution are constructed by giving some specific activation functions in the single hidden layer neural netw...
Article
Full-text available
In the present paper, we focus on the bright-dark solitons and interaction behavior associated with a dimensionally reduced p-gBKP equation. New test functions are constructed by using the Bilinear Neural Network Method (BNNM). These test functions are composed of arbitrary functions in '3-2-2-2' neural network model or specific activation function...
Article
It is well known that most classical test functions to solve nonlinear partial differential equations can be constructed via single hidden layer neural network model by using Bilinear Neural Network Method (BNNM). In this paper, the neural network model of test function for the (3+1)-dimensional Jimbo–Miwa equation is extended to the “4-2-3” model....
Article
Full-text available
This work presents applications of the Lie symmetry method to a boundary value problem (BVP) of the governing equations in fluid mechanics. The Wu differential characteristic set algorithm is used to obtain a group of multi-parameter symmetries for the BVP, and the Lie symmetry method is adopted to simplify the BVP into some initial value problems...
Article
Recently, locating emergency response facilities has been drawing increasing attention with the highly strategic nature of terrorist attacks. To this end, we present a game‐theoretic approach for the location of terror response facilities when both disruption risk and hidden information are taken into account. The game is described as a two‐stage g...
Article
Vehicular ad hoc networks (VANETs) has become an important part of modern intelligent transportation systems (ITS). However, under the influence of malicious mobile vehicles, offloading vehicle tasks to the cloud server is threatened by security attacks. Edge cloud offloading (ECCO) has considered a promising approach to enable latency-sensitive VA...
Article
This paper investigates infinite horizon repeated security games with one defender and multiple attacker types. The incomplete information brings uncertainty of attackers' behaviour for the defender. Under the uncertainty of attackers' behaviours, we take the worst-case analysis to minimise the defender's regret w.r.t. each attacker type. We wish t...
Article
To reduce the number of deaths and injuries due to drunk driving (also referred to as drink driving, driving while intoxicated, and driving under the influence of alcohol in the literature), many countries have deployed public safety resources to inspect traffic network. However, challenges remain in allocating limited public safety resources to th...
Article
Full-text available
To penetrate sensitive communication systems, attackers can attack the channel using an active time-varying (ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal...
Article
In some security domains, the defender holds more private information than the attacker, such as the authenticity of resources. A mock camera can be adopted by the defender to deter potential attackers while the attacker may see it as a real one. This provides an opportunity for a defender with fake resources to bluff, as if all resources she owns...
Article
Full-text available
With the development of the Internet of Things (IoT) technology, many end-users participate in the smart city through their own intelligent mobile devices (such as personal wearable devices, smartphones.) or sensors. The main challenge of the device sensing layer in the edge computing system of the IoT in the smart city is to select the trusted par...
Chapter
Stackelberg security game (SSG) has been widely used in counter-terrorism, but SSG is not suitable for modeling opportunistic crime because the criminals in opportunistic crime focus on real-time information. Hence, the opportunistic security game (OSG) model is proposed and applied in crime diffusion in recent years. However, previous OSG models d...
Article
The significant volume, variety, velocity of data received from the many Industrial Internet of Things (IIoT) devices and other systems in a cloud-based or fog-based environment can complicate an organization’s effort in ensuring high quality of experience for data users. For example, how do we efficiently and fairly allocate resource among cloud c...
Article
Full-text available
As an emerging sampling technique, Compressed Sensing provides a quite masterly approach to data acquisition. Compared with the traditional method, how to conquer the Shannon/Nyquist sampling theorem has been fundamentally resolved. In this paper, first, we provide deterministic constructions of sensing matrices based on vector spaces over finite f...
Article
Full-text available
The proliferation of smart devices and computer networks has led to a huge rise in internet traffic and network attacks that necessitate efficient network traffic monitoring. There have been many attempts to address these issues; however, agile detecting solutions are needed. This research work deals with the problem of malware infections or detect...
Article
A successful man-in-the-middle (MITM) attack can result in significant financial loss and affect the cyber security of an organization. In this paper, we use a defender vs. multi-attacker Stackelberg game to model MITM attacks. We then propose an effective approach to compute the optimal defender strategy, based on a multi-double oracle algorithm....
Article
Full-text available
To improve the quality of service (QoS) for mobile users (MUs) and the quality of experience (QoE) of mobile devices (MDs), mobile edge computing (MEC) is a promising approach that offloads a part of the computing task from MDs to nearby MUs. In this paper, we study computation offloading involving multiple users and multiple base stations (BSs), w...
Article
Full-text available
Computer networks are facing threats of ever-increasing frequency and sophistication. Encryption is becoming the norm in both legitimate and malicious network traffic. Therefore, intrusion detection systems (IDSs) are now required to work efficiently regardless of the encryption. In this study, we propose two new methods to improve the efficacy of...
Chapter
With the development of Internet technology and the pervasive use of internet service providers (ISPs), internet users have reached an unprecedented volume. However, the existence of some malicious users seriously undermine the environment of the network by distributing a large amount of unwanted traffic, such as spam, pop-up, and malwares, which c...
Article
Full-text available
Mobile crowd sensing has attracted the attention of many researchers with the development of mobile phones. Many studies focus on the optimization of single-task oriented allocation, and most of them optimize only one objective. We consider multi-objective optimization for multi-task allocation in mobile crowd sensing with a limited participants po...
Article
Full-text available
To cope with the huge expenditure associated with the fast growing sampling rate, compressed sensing (CS) is proposed as an effective technique of signal processing. In this paper, first, we construct a type of CS matrix to process signals based on singular linear spaces over finite fields. Second, we analyze two kinds of attributes of sensing matr...
Article
In peer-to-peer service networks, autonomous agents gain utilities through getting services from others. However, providing services is so costly that rational agents may prefer to defect rather than to cooperate. In order to provide scalable and robust services in such networks, incentive mechanisms need to be introduced. In this paper, we propose...
Article
Full-text available
In the traditional secret image sharing schemes, a dealer shares a secret image among a group of participants and an authorized subset of the participants with their shadow images can cooperate to retrieve the secret image. However, for a long live secret image, the intruders may have adequate time to gain enough amounts of the shadow images. In th...
Article
Full-text available
Trust violation during cooperation of autonomous agents in multiagent systems is usually unavoidable and can arise due to a wide number of reasons. From a psychological point of view, the violation of an agent’s trust is a result of one agent (which is a transgressor) expressing a very low weight on the welfare of another agent (which is a victim)...
Chapter
Master-worker computing is a parallel computing scheme, which makes master and worker collaborate. Due to its high reliability availability and serviceability, it is widely used in scientific computing fields. However, lack of cooperation and malicious attack in Master-worker computing can greatly reduce the efficiency of parallel computing. In thi...
Chapter
In the streets of Chinese cities, we often see that illegal pedlars sell some fake and inferior products such as outdated food and inferior household goods to people who do not know about this, which may cause serious health problem. Besides, pedlars often cause people to gather and so may lead to traffic accidents. Thus, there are great requiremen...
Article
Full-text available
To penetrate sensitive communication systems, attackers can attack the channel using an Active Time-Varying(ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal...
Article
Infectious diseases have proven to be remarkably resilient foes of human health and so the prevention and control of infectious diseases have been attracting the attention of all countries over the world. Vaccination is an effective way to prevent the spread of infectious diseases. However, vaccination is a long-standing social dilemmas due to the...
Article
Urban infrastructure safety information collection and investigation from public participants has become a trend in the era of big data. Mobile crowdsensing has facilitated ubiquitous mobile sensing applications between humans and the surrounding physical world as a convenient and economical sensing technology. This study presents an urban infrastr...
Article
Full-text available
Secret image sharing has been researched intensively, and it has emerged as an alternative to data hiding for protecting the security and privacy of important data. In the traditional (t, n) threshold secret image sharing schemes, any t or more shadow images can reconstruct the shared secret image. However, in real applications, (t, n) threshold ac...
Article
Full-text available
Many incentive mechanisms have been proposed to encourage cooperation among agents in autonomous networks, but the altruism attribute of agents is considered very few in such mechanisms. In this paper, we introduce other-regarding preference (ORP) and fitness factor 𝜃 into incentive mechanism to more realistically characterize the altruism of agent...
Article
Full-text available
The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Trust recovery requires a more complex mechanism to explore different factors that cause the decline of...
Article
Full-text available
The vertical displacement of a cross section of a bridge has a close correlation with the carrying capacity and the ability to resist dynamic loads. Therefore it has been one of the most important parameters for structural health monitoring and safety assessment. Moreover, when a natural disaster such as a hurricane or an earthquake occurs, a large...
Article
Reputation plays a key role in online marketplace communities improving trust among community members. Reputation works as a decision-making tool for understanding the behavior of the business partners. Success of any online business depends on the trust the business agents share with each other. However, untrustworthy agents have anno place in onl...
Article
Full-text available
The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring...
Article
Full-text available
Reputation systems have been proposed to distinguish malicious peers and ensure the quality of services in P2P networks. How-ever, only relying on global reputation scores to assess the reliability of file providers can weaken the subjective opinions of file requesters, which is vulnerable to some malicious attacks, e.g., camouflage attack. To addr...
Article
Full-text available
In peer-to-peer (P2P) file sharing networks, it is common practice to manage each peer using reputation systems. A reputation system systematically tracks the reputation of each peer and punishes peers for malicious behaviors (like uploading bad file, or virus, etc). However, current reputation systems could hurt the normal peers, since they might...
Article
With the development of wireless sensing technologies, numerous sensing applications from the Internet of Things (IoT) are widely used in life and industry. Mobile Peer-to-peer (MP2P) system is one of the typical IoT applications, in which peers share their sensing information. Reciprocity-based incentive mechanisms are widely used to encourage coo...
Article
Vibration testing is an effective approach to obtaining the dynamic parameters of a bridge and evaluating its state of health. It is carried out mainly on the basis of wired or wireless sensor networks, which consist of expensive sensors and data-acquisition and -transmission systems, and professional installation is required. Integrated with netwo...
Article
Full-text available
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shad...
Article
Full-text available
In the recent years, with the development and popularization of smartphone, the utilization of smartphone in the Structural Health Monitoring (SHM) has attracted increasing attention owing to its unique feature. Since bridges are of great importance to society and economy, bridge health monitoring has very practical significance during its service...
Article
As advanced computing and communication technologies penetrate every aspect of our life, we have witnessed the persistent growth of open systems where entities interact with one another without prior knowledge or experiences. Trust becomes an important metric in such open systems. This paper presents a dependable trust management scheme - GroupTrus...
Article
Reward-based incentive mechanisms are used most commonly to promote cooperation in peer-to-peer (P2P) systems. Specifically, contributing agents are rewarded by the system. For a centralized P2P system, the central server is responsible for implementing the mechanism and rewarding those cooperative agents. Thus, providing incentives could be costly...
Conference Paper
P2P streaming systems are popular applications on internet. However, due to the open nature, P2P streaming systems are vulnerable to malicious attacks, especially data pollution attacks. Reputation-based mechanisms are most effective mechanisms to defend data pollution attacks in P2P streaming systems. In this paper, we propose a dynamic reputation...
Conference Paper
P2P systems provide peers a dynamic and distributed environment to share resource. Only if peers are voluntarily share with each other can system stably exist. However, peers in such systems are selfish and never want to share even with tiny cost. This can lead to serious free-riding problems. Incentive mechanisms based on evolutionary game aim at...
Article
Asymmetric group key agreement is a cryptographic primitive allowing a group of users to negotiate a common public encryption key while each of them holds a different secret private decryption key. Anyone (including outsiders) with the public encryption key can send encrypted messages to the group members, and then the group members can decrypt the...
Article
Full-text available
The communications in the quake-hit area are always cut off from the outside after the earthquake, and the traditional seismic field investigation method calls for immense time to accomplish house-to-house investigation, which goes against timeliness of the emergency rescue. In this paper, an emergency communication and quick seismic damage investi...
Article
Full-text available
In secret image sharing schemes, the threshold may have to be adjusted in case of changes in the security policy and the adversary structure before recovering the secret image. For example, if participants leave the group, their stego images are useless to them and may not be kept safely. As a result, these images can be easily stolen and utilized...
Article
Full-text available
Offshore design and construction is much more difficult than land-based design and construction, particularly due to hoisting operations. Real-time monitoring of the orientation and movement of a hoisted structure is thus required for operators' safety. In recent years, rapid development of the smart-phone commercial market has offered the possibil...
Article
Full-text available
Many reputation systems have been proposed to distinguish malicious peers and to ensure the quality of the service in P2P file sharing systems. Most of those reputation systems implicitly assumed that normal peers are always altruistic and provide their resources unconditionally when requested. However, as independent decision makers in real networ...