
Mingchu Li- Dalian University of Technology
Mingchu Li
- Dalian University of Technology
About
309
Publications
35,495
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,346
Citations
Introduction
Current institution
Publications
Publications (309)
Nonlinear partial differential equations (PDEs) form the mathematical backbone for modeling phenomena across diverse fields such as physics, biology, engineering, and finance. Traditional numerical methods have limitations, particularly for high- dimensional or parameterized problems, due to the "curse of dimensionality" and computational expense....
Anomaly detection for cyber-physical systems (ADCPS) is crucial in identifying faults and potential attacks by analyzing the time series of sensor measurements and actuator states. However, current methods lack adaptation to data distribution shifts in both temporal and spatial dimensions as cyber-physical systems evolve. To tackle this issue, we p...
Since the field of autonomous vehicles is developing quickly, it is becoming increasingly crucial for them to safely and effectively navigate their surroundings to avoid collisions. The primary collision avoidance algorithms currently employed by self-driving cars are examined in this thorough survey. It looks into several methods, such as sensor-b...
Log anomaly detection (LAD) is essential to ensure the safe and stable operation of Cyeber-physical systems. Although current LAD methods exhibit significant potential in addressing challenges posed by unstable log events and temporal sequence patterns, their limitations in detection efficiency and generalization ability present a formidable challe...
For intelligent unmanned aerial vehicles working in complex environments, it is necessary to have a certain autonomous flight control decision-making ability to adapt to complex and changeable environments. In order to realize the rapid path planning of intelligent unmanned aerial vehicle in complex flight environment and ensure its accurate positi...
Log anomaly detection (LAD) is essential to ensure safe and stable operation of software systems. Although current LAD methods exhibit significant potential in addressing challenges posed by unstable log events and temporal sequence patterns, their limitations in detection efficiency and generalization ability present a formidable challenge when de...
This paper studies a class of attack behavior in which adversaries assume the role of initiators, orchestrating and implementing attacks by hiring executors. We examine the dynamics of strategic attacks, modeling the initiator as an attack planner and constructing the interaction with the defender within a defender–attack planner framework. The ind...
The edge computing paradigm is evolving to provide time-sensitive computing services for energy-constrained mobile IoT devices, with the purpose of decreasing latency. In this paper, we investigate a sustainable edge offloading system that is composed of one green mobile IoT device and multiple access points (APs), which considers minimizing the ex...
Due to the growing demand for time-intensive tasks, several tasks coexist, some of which last for a longtime or only occur once in a while, such as emergencies. Emergencies such as natural disasters, accidents ormedical emergencies require immediate attention and often demand real-time execution. Such tasks are themost difficult to plan for and for...
The implementation of mobile edge computing (MEC) and software-defined networking (SDN) over sixth-generation networks is a driving force in the future of cloud computing. It holds significant promise in addressing smart device (SD) resources and battery life limitations. To deal with the variety and resource constraints of SDs while making better...
This paper proposes a partial differential equation model based on the model introduced by V. A. Kuznetsov and M. A. Taylor, which explains the dynamics of a tumor–immune interaction system, where the immune reactions are described by a Michaelis–Menten function. In this work, time delay and diffusion process are considered in order to make the stu...
This paper presents a risk-averse tri-level stochastic game-theoretic model between the defender and the attacker in application to the supply networks. A real supposition is that the facility capacity and attack effect are uncertain, which is interpreted in stochastic programming. In the presence of uncertainties, the Conditional-Value-at-Risk (CV...
More and more 5G and AI applications demand flexible and low-cost processing of their traffic through diverse virtualized network functions (VNFs) to meet their security and privacy requirements. As such, the Network Function Virtualization (NFV) market has been emerged as a major service market that allows network service providers to trade their...
Unmanned Aerial Vehicles (UAV) supported by 5G networks can play an important role in providing aerial-aerial/aerial-ground computing services to remote and isolated areas at a low cost. In this paper, we present an aerial-aerial-ground network (AAGN) computing architecture using High Altitude Unmanned Aerial Vehicle (HAU) and Mini-Drones (MDs) bas...
Big Data-Driven Fabric Future Systems (BDD-FFS) are currently attracting widespread attention in the healthcare research community. Medical devices rely primarily on the intelligent Internet to gather important health-related information. According to this, we provide patients with deeply supportive data to help them through their recovery. However...
Security represents one of the main critical issues in the Internet of Things (IoT), especially the routing attacks in the core network where the loss of information becomes very harmful. This paper proposes a novel scheme called deep learning-based early stage detection (DL-ESD) using IoT routing attack dataset (IRAD), including hello flood (HF),...
This paper proposes a joint resource offloading strategy based on NOMA communication technology. In the scene, cellular network communication and D2D communication network communication coverage coexist. Cellular network users have social attributes. They can share computing resources between user devices through the trust index between users. The...
The development of 5G technology provides great convenience for edge computing. But it also means that the computing tasks generated by user equipment are more and more complex. These tasks are no longer simply to complete one target, but are often composed of multiple subtasks. In order to solve the edge computing problem of multiple subtasks, we...
With the increasing popularity of 5G communications, smart cities have become one of the inevitable trends in the development of modern cities, and smart city services are the foundation of 5G smart cities. Sparse mobile crowdsensing (SparseMCS), as a new and informative urban service model, has attracted the attention of many researchers. Generall...
This paper proposes a method to enable a risk-averse and resource-constrained network defender to deploy security countermeasures in an optimal way to prevent multiple potential attackers with uncertain budgets. To solve the problem of information asymmetry between the attacker and the defender, a fake countermeasure (FC) is placed on the arc, and...
The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD’s task, which greatly reduces the energy consumption of the MD and improves th...
In this work, bilinear residual network 1 method is proposed to solve nonlinear evolution equa-2 tions. The activation function in final layer of deep 3 neural network cannot interact with the neuron inside 4 the deep neural network, but the residual network can 5 transfer the input layer to the activation function in final 6 layer to realize the i...
This paper studies an interdependent facility location and protection problem against multiple non-cooperative limited choice attackers. In a supply network, the defender and attackers have completely opposite objectives by optimizing their respective patterns. This interaction is represented with a game-theoretic bilevel framework. The defender as...
This research explores a delay differential model to describe the dynamics of tumour-immune interactions in presence of immuno-chemotherapy. The model includes a constant delay in the recruitment term of the immune cells to illustrate the time lag between the stimulated accumulations of immune cells in the vicinity of cancer cells. The efficiency o...
Federated learning (FL) is a distributed machine learning technique that enables model development on user equipments (UEs) locally, without violating their data privacy requirements. Conventional FL adopts a single parameter server to aggregate local models from UEs, and can suffer from efficiency and reliability issues – especially when multiple...
Academic social networks (ASNs) have attracted significant attention in recent years as researchers try to understand and improve how research is conducted. Several approaches have been investigated to identify, predict, and recommend scientific collaborators but few have considered to explore a strategy using the game theory. This article investig...
In this research, protecting facilities from intentional attacks under operational and disruption risks is modeled as a discrete scenario-based simultaneous game between a defender and an attacker, in which the information of their resource allocation is kept secret. In the presence of stochastic disruptions, a risk measure is incorporated into the...
This paper studies a capacitated facility location and protection problem against the boundedly rational attacker that merges probabilistic fortification and interdiction, and decision-dependent uncertainty in the post-interdiction capacity of the facilities. The defender decides the location and fortification of the facilities, whereas the attacke...
This paper investigates some novel exact analytical solutions, including lump-type wave, breather wave as well as BK-type wave solutions for a (3+1)-dimensional p¯-gKP equation. Firstly, the trilinear p¯-gKP equation is well established by the multivariate trilinear operators. Secondly, three types of wave solutions for the p¯-gKP equation are obta...
Under investigation in this paper is the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like (CDGKS-like) equation. Based on bilinear neural network method, the generalized lump solution, classical lump solution and the novel analytical solution are constructed by giving some specific activation functions in the single hidden layer neural netw...
Activity selection is critical for the smart environment and Cyber-Physical Systems (CPSs) that can provide timely and intelligent services, especially as the number of connected devices is increasing at an unprecedented speed. As it is important to collect labels by various agents in the CPSs, crowdsourcing inference algorithms are designed to hel...
In the present paper, we focus on the bright-dark solitons and interaction behavior associated with a dimensionally reduced p-gBKP equation. New test functions are constructed by using the Bilinear Neural Network Method (BNNM). These test functions are composed of arbitrary functions in '3-2-2-2' neural network model or specific activation function...
There exist two severe challenges in cloud file-sharing networks: cooperation dilemma and trust dilemma. The mechanism designed to promote cooperation could suffer from malicious users, while the trust management that only considers the trust dilemma is subjected to denial-of-service attacks. To address these two dilemmas simultaneously, we present...
It is well known that most classical test functions to solve nonlinear partial differential equations can be constructed via single hidden layer neural network model by using Bilinear Neural Network Method (BNNM). In this paper, the neural network model of test function for the (3+1)-dimensional Jimbo–Miwa equation is extended to the “4-2-3” model....
This work presents applications of the Lie symmetry method to a boundary value problem (BVP) of the governing equations in fluid mechanics. The Wu differential characteristic set algorithm is used to obtain a group of multi-parameter symmetries for the BVP, and the Lie symmetry method is adopted to simplify the BVP into some initial value problems...
Recently, locating emergency response facilities has been drawing increasing attention with the highly strategic nature of terrorist attacks. To this end, we present a game‐theoretic approach for the location of terror response facilities when both disruption risk and hidden information are taken into account. The game is described as a two‐stage g...
With the rapid development of wireless sensor networks (WSNs) technology, a growing number of applications and services need to acquire the states of channels or sensors, especially in order to use these states for monitoring, object tracking, motion detection, etc. A critical issue in WSNs is the ability to estimate the source parameters from the...
Vehicular ad hoc networks (VANETs) has become an important part of modern intelligent transportation systems (ITS). However, under the influence of malicious mobile vehicles, offloading vehicle tasks to the cloud server is threatened by security attacks. Edge cloud offloading (ECCO) has considered a promising approach to enable latency-sensitive VA...
This paper investigates infinite horizon repeated security games with one defender and multiple attacker types. The incomplete information brings uncertainty of attackers' behaviour for the defender. Under the uncertainty of attackers' behaviours, we take the worst-case analysis to minimise the defender's regret w.r.t. each attacker type. We wish t...
To reduce the number of deaths and injuries due to drunk driving (also referred to as drink driving, driving while intoxicated, and driving under the influence of alcohol in the literature), many countries have deployed public safety resources to inspect traffic network. However, challenges remain in allocating limited public safety resources to th...
To penetrate sensitive communication systems, attackers can attack the channel using an active time-varying (ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal...
In some security domains, the defender holds more private information than the attacker, such as the authenticity of resources. A mock camera can be adopted by the defender to deter potential attackers while the attacker may see it as a real one. This provides an opportunity for a defender with fake resources to bluff, as if all resources she owns...
A smart city will become an inevitable trend of social development. It includes many Cyber Physical Systems (CPSs) that can be endowed with different levels of intelligence. With the combination of CPS and cloud computing, smart sensor cloud system becomes popular in many areas where the physical nodes can be shared with multiple users, which can o...
In this paper, the multivariate trilinear operators in the (\(3+1\))-dimensional space are applied to a (\(3+1\))-dimensional GBK equation. The resulting trilinear form is used to study its wave dynamics. Particularly, we generate a type of new interaction solutions between breather lump-type solitons and other multi-kink solitons, thereby formulat...
With the development of the Internet of Things (IoT) technology, many end-users participate in the smart city through their own intelligent mobile devices (such as personal wearable devices, smartphones.) or sensors. The main challenge of the device sensing layer in the edge computing system of the IoT in the smart city is to select the trusted par...
Schedulability analysis is a very important part in real-time system research. Because the scenarios faced by real-time systems are very complicated, the functional characteristics must be combined with the predictability of response time. It is necessary to ensure the correctness of the calculation results and meet the real-time requirements. To s...
Stackelberg security game (SSG) has been widely used in counter-terrorism, but SSG is not suitable for modeling opportunistic crime because the criminals in opportunistic crime focus on real-time information. Hence, the opportunistic security game (OSG) model is proposed and applied in crime diffusion in recent years. However, previous OSG models d...
The significant volume, variety, velocity of data received from the many Industrial Internet of Things (IIoT) devices and other systems in a cloud-based or fog-based environment can complicate an organization’s effort in ensuring high quality of experience for data users. For example, how do we efficiently and fairly allocate resource among cloud c...
As an emerging sampling technique, Compressed Sensing provides a quite masterly approach to data acquisition. Compared with the traditional method, how to conquer the Shannon/Nyquist sampling theorem has been fundamentally resolved. In this paper, first, we provide deterministic constructions of sensing matrices based on vector spaces over finite f...
The wide application use of network systems extends people’s ability to access information, but its inherent network characteristics make it more vulnerable to DDoS attacks. Existing intrusion detection in network systems is usually only targeted at specific attacks, but will fail when dealing with strategic attacks. Therefore, based on game theory...
Autonomous electric vehicles (AEVs) can not only reduce urban traffic congestion and air pollution, but also solve the problem of passengers’ last kilometer through its flexible route design. For autonomous electric vehicles (AEVs) system, the main challenges include two parts. First, Developing an effective transport strategy that enables vehicles...
Software configurable radio with dynamic spectrum support is the inherent property of Cognitive radio. Interoperability of Cognitive radio with wireless sensor network would enable the sensor nodes to access and transmit the application data in licensed PU free channels. Since wireless sensor nodes operate in heavily crowded ISM bands (902 MHz/2.4...
With the development of the Internet of Things and the pervasive use of internet service providers (ISPs), internet users and data have reached an unprecedented volume. However, the existence of malicious users seriously undermine user privacy and network security by distributing a large amount of unwanted traffic, such as spam, pop-up, and malware...
The proliferation of smart devices and computer networks has led to a huge rise in internet traffic and network attacks that necessitate efficient network traffic monitoring. There have been many attempts to address these issues; however, agile detecting solutions are needed. This research work deals with the problem of malware infections or detect...
A successful man-in-the-middle (MITM) attack can result in significant financial loss and affect the cyber security of an organization. In this paper, we use a defender vs. multi-attacker Stackelberg game to model MITM attacks. We then propose an effective approach to compute the optimal defender strategy, based on a multi-double oracle algorithm....
To improve the quality of service (QoS) for mobile users (MUs) and the quality of experience (QoE) of mobile devices (MDs), mobile edge computing (MEC) is a promising approach that offloads a part of the computing task from MDs to nearby MUs. In this paper, we study computation offloading involving multiple users and multiple base stations (BSs), w...
Crowdsourcing has emerged as a popular Internet-based collaboration paradigm, in which tasks published by requesters can be economically and efficiently accomplished by crowd workers. To ensure the quality of service (QoS) provided by crowd workers, requesters are more likely to assign tasks to trustworthy workers, therefore, trust have played an i...
Computer networks are facing threats of ever-increasing frequency and sophistication. Encryption is becoming the norm in both legitimate and malicious network traffic. Therefore, intrusion detection systems (IDSs) are now required to work efficiently regardless of the encryption. In this study, we propose two new methods to improve the efficacy of...
With the development of Internet technology and the pervasive use of internet service providers (ISPs), internet users have reached an unprecedented volume. However, the existence of some malicious users seriously undermine the environment of the network by distributing a large amount of unwanted traffic, such as spam, pop-up, and malwares, which c...
Mobile crowd sensing has attracted the attention of many researchers with the development of mobile phones. Many studies focus on the optimization of single-task oriented allocation, and most of them optimize only one objective. We consider multi-objective optimization for multi-task allocation in mobile crowd sensing with a limited participants po...
To cope with the huge expenditure associated with the fast growing sampling rate, compressed sensing (CS) is proposed as an effective technique of signal processing. In this paper, first, we construct a type of CS matrix to process signals based on singular linear spaces over finite fields. Second, we analyze two kinds of attributes of sensing matr...
In peer-to-peer service networks, autonomous agents gain utilities through getting services from others. However, providing services is so costly that rational agents may prefer to defect rather than to cooperate. In order to provide scalable and robust services in such networks, incentive mechanisms need to be introduced. In this paper, we propose...
Mobile crowdsensing has become an efficient paradigm in which crowd workers are recruited to collect data by using their mobile smart phones. However, different workers may provide data with varied degrees of quality. Therefore, it is imperative to develop a reliable crowdsensing system that guarantees the quality of service (QoS) for each task. In...
To fight against denial of services (DoS) attacks on vehicular ad hoc networks (VANETs), which can cause congestion over networks and degrading the user’s experience, a lot of detective techniques and schemes have been proposed. However, the complex ones cannot keep pace with the growth of vehicle networks. In this paper, we propose a simple but ef...
In the traditional secret image sharing schemes, a dealer shares a secret image among a group of participants and an authorized subset of the participants with their shadow images can cooperate to retrieve the secret image. However, for a long live secret image, the intruders may have adequate time to gain enough amounts of the shadow images. In th...
Trust violation during cooperation of autonomous agents in multiagent systems is usually unavoidable and can arise due to a wide number of reasons. From a psychological point of view, the violation of an agent’s trust is a result of one agent (which is a transgressor) expressing a very low weight on the welfare of another agent (which is a victim)...
Master-worker computing is a parallel computing scheme, which makes master and worker collaborate. Due to its high reliability availability and serviceability, it is widely used in scientific computing fields. However, lack of cooperation and malicious attack in Master-worker computing can greatly reduce the efficiency of parallel computing. In thi...
In the streets of Chinese cities, we often see that illegal pedlars sell some fake and inferior products such as outdated food and inferior household goods to people who do not know about this, which may cause serious health problem. Besides, pedlars often cause people to gather and so may lead to traffic accidents. Thus, there are great requiremen...
To penetrate sensitive communication systems, attackers can attack the channel using an Active Time-Varying(ATV) way, which will lead to a great information loss. The conventional approach is to encrypt the original signal making it difficult for attackers to get information. However, this technology is constrained by the limited wireless terminal...
Election control has always been an important issue of democratic institutions concerned. Considering that a voting rule is indeed susceptible to control by an external agent, it is natural to seek ways to protect elections. Much of prior work has focused on complete voter preferences and approached the problem from the perspective of the computati...
In this paper, we investigate the Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control in cognitive radio (CR) systems. In CR systems, nodes can switch to heterogeneous non-overlapping channels opportunistically which offer higher achievable throughput. However, the random channel selection policy in existing CR-MAC protocol...
The progressive development in smart environments such as smart cities, homes, smart e-health, etc. requires sophisticated communication and transmission protocols for hug amount of data producing on daily basis. Therefore, the cognitive radio technology is adopted by many researchers to full-fill the requirements of efficient channel use. Similarl...
Qiu Li Mingchu Li Lin Lv- [...]
Kun lu
Infectious diseases have proven to be remarkably resilient foes of human health and so the prevention and control of infectious diseases have been attracting the attention of all countries over the world. Vaccination is an effective way to prevent the spread of infectious diseases. However, vaccination is a long-standing social dilemmas due to the...
Urban infrastructure safety information collection and investigation from public participants has become a trend in the era of big data. Mobile crowdsensing has facilitated ubiquitous mobile sensing applications between humans and the surrounding physical world as a convenient and economical sensing technology. This study presents an urban infrastr...