Xiaojiang Du

Xiaojiang Du
Temple University | TU · Department of Computer and Information Science

PhD

About

584
Publications
96,248
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,390
Citations

Publications

Publications (584)
Article
Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low‐complexity and high‐reliability communication service, especially for driverless engineering vehicles. However, it is combined and nonconvex to find the optimal asso...
Preprint
Full-text available
Federated learning (FL) represents a promising distributed machine learning paradigm that allows smart devices to collaboratively train a shared model via providing local data sets. However, problems considering multiple co-existing FL services and different types of service providers are rarely studied. In this paper, we investigate a multiple FL...
Preprint
Full-text available
The ever-growing data privacy concerns have transformed machine learning (ML) architectures from centralized to distributed, leading to federated learning (FL) and split learning (SL) as the two most popular privacy-preserving ML paradigms. However, implementing either conventional FL or SL alone with diverse network conditions (e.g., device-to-dev...
Article
Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and multi-connectivity can be adopted to further harness the potentials of UAVs in improving communication capacity, in such situations such that the interf...
Article
Edge networks are expected to play an important role in 6G where machine learning-based methods are widely applied, which promote the concept of Edge Intelligence. Meanwhile, Unmanned Aerial Vehicle (UAV)-enabled aerial network is significant in 6G networks to achieve seamless coverage and super-connectivity. To this end, a joint task and energy of...
Article
Network attack behavior is always mixed with a large number of normal communications, which makes the attack characteristics only account for a very small fraction in the log data. From the perspective of simulation and modeling, the data for attack detection is extremely unbalanced if we regard the attack behavior as the positive label. Network in...
Article
B5G aims to meet the demands of today's growing mobile traffic and expand the communication space. Considering that the intelligent application to B5G wireless communications will involve the security issues of user data and operational data, in this paper, the maximum capacity problem of the multi-watermarking method in multimedia signal hiding is...
Article
The application of artificial intelligence technology in Internet of Vehicles (IoV) has attracted great research interests with the goal of enabling smart transportation and traffic management. Meanwhile, concerns have been raised over the security and privacy of the tons of traffic and vehicle data. In this regard, Federated Learning (FL) with pri...
Preprint
The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without compromising the privacy. However, limited by the capacity of wireless data transmission, the employment of federated learning...
Article
Full-text available
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive cloud forensic systems and tools having been proposed over the years, we identify one challenge that is not adequately addressed...
Article
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the security of IoT devices. The traditional malware classification methods mainly rely on feature engineering. To improve accuracy, a la...
Article
Multipath parallel transmission has become an important research direction to improve big data transmission efficiency of connected vehicles. However, due to the heterogeneity and time-varying characteristics of parallel transmission paths, packets transmitted in parallel are usually out-of-order delivered to the destination, which greatly limits t...
Article
Full-text available
Federated learning (FL) represents a promising distributed machine learning paradigm that allows smart devices to collaboratively train a shared model via providing local data sets. However, problems considering multiple co-existing FL services and different types of service providers are rarely studied. In this paper, we investigate a multiple FL...
Article
Full-text available
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise network face greater security threats. To protect the security of core business, the network infrastructure must be able to reco...
Article
In recent years, the number of vehicles in the city is increasing. However, the increase in the number of cars caused a series of traffic problems, such as road congestion, traffic accidents, environmental pollution, and so on. To handle the problems, Internet of Vehicles (IoV) is emerging. As we know, deep learning has acquired significant success...
Article
Wireless sensor networks have been widely adopted in various areas. However, large-scale sensor networks face four critical problems. Information transmissions through the network would cause the energy hole problem; deploying sensors in a distributed manner might cause the isolated problem; simultaneous transmissions lead to the communication coll...
Article
One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, scholars attempt to use heterogeneous wireless networks around a vehicle to improve the reliability of 6G network transmission th...
Article
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources such as computing, storage, and communication. In this article, an energy constrained unmanned aerial vehicle (UAV)-aided mobile...
Article
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users and enterprises. In this study, a method is proposed for detecting malicious mining code in the cloud platforms, which constructs...
Article
The new security scenario of distributed computing and mobile communication-Android smart phones and the rapid growth of rich applications (Apps) have prompted many enhanced vendors to use different methods to effectively protect important Android files on the distributed system/server. But this also brings some serious distributed security problem...
Article
In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored the potential of network devices. In-network computing is a new type of computing model that delegates application-layer processin...
Article
Internet-of-things connects massive physical devices to capture and collect useful data, which are used to make accurate decisions by taking advantage of the machine learning techniques. However, the collected data may contain users’ sensitive information. When guaranteeing the utility of data, we need to consider privacy of users’ data. To balance...
Article
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
Article
Full-text available
In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the catenary image has the potential risk to be a defect to impact the train operation. To improve the detection performance for the f...
Article
Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their limited resources. In order to make the UAVs operate efficiently, it is necessary to schedule UAVs with charging requirements. In...
Article
Full-text available
The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing data processing. To solve this problem, edge computing technology came into being. Because the edge is closer to the user, processing part of the data at the edge can also bring a faster response to the user and improve the...
Article
HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant information for retrieving a small file content from the big archive file. However, existing archive-based solutions require signific...
Article
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to the centralized name management structure of the existing IoT name resolving systems, it is hard to secure the name resolving proc...
Article
With the development of data processing technologies, efficiency of information processing in the Industrial Internet of Things (IIoT) is greatly improved. In this situation solving the following security problems of the IIoT is the top priority. In IIoT based smart grid, through Natural Language Processing (NLP) technology various types of text da...
Article
Full-text available
The valet parking provides convenience for users and thus is becoming increasingly popular nowadays. However, this valet parking service incurs the risks of location information leakage and vehicle theft. To address these issues, in this paper, we propose a blockchain‐based privacy‐preserving valet parking protocol (B‐park) for self‐driving vehicle...
Article
Artificial intelligence (AI) has been widely adopted in various applications such as face detection, speech recognition, machine learning, etc. Due to the lack of theoretical explanation, recent works show that AI is vulnerable to adversarial attacks, especially deep neural networks could be easily fooled by adversarial examples that are in the for...
Article
The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
Article
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. For purpose of improving the detection capability for the faulted current-carrying ring and maintaining the efficiency of th...
Article
In recent years, unmanned aerial vehicle (UAV) technology has developed rapidly and has been widely used in military operations, medical rescue, environmental monitoring, and so on. UAV networks are an important foundation for large-scale UAV collaborative work. Traditional mobile self-or-ganizing network technology is too complicated to be quickly...
Article
In developing smart city, the growing popularity of machine learning (ML) that appreciates high-quality training data sets generated from diverse Internet-of-Things (IoT) devices raises natural questions about the privacy guarantees that can be provided in such settings. Privacy-preserving ML training in an aggregation scenario enables a model dema...
Article
The COVID-19 pandemic has caused serious consequences in the last few months and fighting against the epidemic has been the most important and crucial thing. With effective prevention and control methods, the epidemic has been gradually under control in some countries and it is essential to ensure safe work resumption currently. Although some appro...
Article
With the increasing demand to deploy convolutional neural networks (CNNs) on 5G mobile platforms, architecture designs with efficient sparse kernels (SKs) were proposed, which can save more parameters than the standard convolution while maintaining the high accuracy. Despite the great potential, neural network designs with SKs still require a lot o...
Article
Full-text available
With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing increasing demand and more severe challenges. With the ubiquity of Internet of vehicles (IoVs), inter-vehicle communication ca...
Article
Cloud storage is a cost-effective platform to accommodate massive data at low cost. However, advances of cloud services propel data generation, which pushes storage servers to its limit. Deduplication is a popular technique enjoyed by most current cloud servers, which detects and deletes redundant data to save storage and bandwidth. For security co...
Preprint
Internet of Things (IoT) platforms enable users to deploy home automation applications. Meanwhile, privacy issues arise as large amounts of sensitive device data flow out to IoT platforms. Most of the data flowing out to a platform actually do not trigger automation actions, while homeowners currently have no control once devices are bound to the p...
Article
Decentralized Applications (DApps) are increasingly developed and deployed on decentralized blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive information about the users such as their real identities, financial conditions, and...
Article
The Internet of Vehicles (IoV) is one important application scenarios for the development of the Internet of things. The software-defined network (SDN) and fog computing could effectively improve the IoV network dynamics, which enables the application to achieve better performance by offloading some tasks to fog node or cloud center. Current comput...
Article
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can efficiently control and manage the distributed energy resources (DERs). In smart grid, IoT devices generate huge amounts of data, which are collected and shared among DERs, microgrids, and the main grid. To protect the shared data, it is necessary t...
Article
Encrypted web traffic can reveal sensitive information of users, such as their browsing behaviors. Existing studies on encrypted traffic analysis focus on website fingerprinting. We claim that fine-grained webpage fingerprinting, which speculates specific webpages on a same website visited by a victim, allows exploiting more user private informatio...
Article
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: the simple feature is easily simulated which causes inaccurate results, while the advanced feature relies on high interactions whi...
Article
Full-text available
Software-defined networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The controller in the control plane is the fundamental element used to manage all operations of the data plane. Hence, the performance and capabilities of the controller itsel...
Article
In recent years, e-sports has rapidly developed, and the industry has produced large amounts of data with specifications, and these data are easily to be obtained. Due to the above characteristics, data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games. As one of the world's most famous e-...
Preprint
Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems. Recent studies, however, show that DNNs are vulnerable to adversarial examples, which can potentially mislead the FR systems using DNNs in the physical world. Existing attacks on these systems either generate perturbations working merely in the digital world,...
Article
Full-text available
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact duration) the offloading method could not ensure the data to be successfully offloaded to Wi-Fi Access Points (APs) within a time...
Article
Cellular vehicular networks constitute an important part of future vehicular communication systems. However, they pose challenges to fulfill vehicles with demands for the transmission rates of various network services while achieving satisfactory costs and energy consumption. The cloud radio access network architecture is considered as a green wire...
Article
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to distribute data, bring back the risk of single-point failure again. In this paper, we propose a blockchain-based storage system w...
Article
Full-text available
To meet the increasing traffic demands characterized by large bandwidth and high burstiness, more traffic has been moving to inter-datacenter elastic optical networks (inter-DC EONs) for processing. The integration of two emerging paradigms, network function virtualization (NFV) and software-defined networking (SDN), enables Internet service provid...
Article
Full-text available
With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has been recognized as a promising paradigm for improving vehicular wireless network throughput by reducing packet loss in transmis...
Article
An ORH service creates a typical supply-and-demand two-sided market, which enables riders and drivers to establish optimized rides conveniently via mobile applications. Group ridesharing is a novel form of ridesharing, which allows a group of riders to share a vehicle that holds the minimum aggregate distance to the whole group. Accompanied by the...
Article
Advanced Persistent Threat (APT) with intensepenetration, long-duration, and high-customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet of Things (IoT) devices often do not focus on security, leading APT to extend to IoT, such as the Internet of emerging unmanned aerial vehi...
Article
Vehicular Ad hoc Network (VANET) is an enabling technology to provide a variety of convenient services in intelligent transportation systems, and yet vulnerable to various intrusion attacks. Intrusion detection systems (IDSs) can mitigate the security threats by detecting abnormal network behaviours. However, existing IDS solutions are limited to d...
Article
Smart city, as a new mode, is introduced to improve the level of city management for modern cities. In smart cities, a kernel field is health management for urban residents. Hospital management, as one of the most important components in health management, is concerned. To provide high-quality medical service for sick residents, accurate patient he...
Article
Federated learning (FL) serves as an enabling technology for intelligent edge computing, where high-quality machine learning (ML) models are collaboratively trained over large amounts of data generated by various IoT devices while preserving data privacy. To further provide data confidentiality, computation auditability and participant incentives,...