
Yi Qian- Wuhan University
Yi Qian
- Wuhan University
About
268
Publications
47,931
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,371
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (268)
Additive manufacturing is a multi-billion dollar industry 21.58 billion in 2024), so its processes should be dependable and secure. Malicious actors can inject negative spaces, known as voids, in STL files, which can have a devastating impact on a final product's quality. Current ways of detecting voids use machine sensor or simulation data, and ph...
A vehicular network is susceptible to various security flaws and attacks. Cryptographic techniques are used in vehicular networks but these alone cannot provide proper security to the network. Identifying various types of attacks is necessary to secure vehicular communication networks. This work is focused on both binary and multi-class attack dete...
A vehicular communication network allows vehicles on the road to be connected by wireless links, providing road safety in vehicular environments. Vehicular communication network is vulnerable to various types of attacks. Cryptographic techniques are used to prevent attacks such as message modification or vehicle impersonation. However, cryptographi...
Federated learning (FL) has emerged as a distributed machine learning (ML) technique that can protect local data privacy for participating clients and improve system efficiency. Instead of sharing raw data, FL exchanges intermediate learning parameters, such as gradients, among clients. This article presents an efficient wireless communication appr...
Abstract This chapter presents three key modules of edge intelligence and its use in intrusion detection. The entire architecture includes edge cyberinfrastructure, edge AI engine, and threat intelligence. Edge cyberinfrastructure acts as the supporting foundation in edge intelligence. It lies in the bottom layer, and it serves for the exchange of...
Abstract Edge computing has been envisioned as an enabling technology to support data‐driven services and local IoT applications by pushing computing, storage, and networking resources from the cloud to the network edge. Edge computing does not replace cloud computing for remote data computation, storage, and processing but facilitates a new and sc...
Abstract The increasing attention on privacy has motivated the rapid design and implementation of multiple privacy‐preserving methods. This chapter first presents a few modern approaches for privacy preservation, including anonymization, differential privacy, federated learning, homomorphic encryption, and secure multi‐party computation. Then, a pr...
Abstract Efficient anomaly detection mechanisms are becoming an urgent and critical topic in the presence of big data applications. This chapter presents a study on an efficient pre‐processing scheme for anomaly detection. This proposed scheme incorporates a dimension reduction algorithm and presents a real‐time learning idea for big data applicati...
Abstract Advanced persistent threat (APT), cyber intrusions, and malware have been maliciously disturbing the networking systems and communication networks, causing the discontinuity of assured services and further destroying critical networking devices and cyberinfrastructure. Cyber threats refer to any possible forms of malicious attacks that see...
Abstract This chapter presents a proposed scheme of robust intrusion detection. First, the preliminaries of robust statistics are introduced. Robust statistics deal with identifying the presence of outliers. Two approaches of robust statistics, including median absolute deviation and Mahalanobis distance, are introduced. Then, the problem statement...
Abstract The rapid and successful advances of artificial intelligence (AI) and machine learning (ML) offer security researchers and practitioners new approaches and platforms to explore and investigate challenging issues emerging in many safety‐critical systems. Those AI/ML‐enabled solutions have boosted the efficiency and effectiveness of multiple...
Abstract Adversarial examples are the latest cyber threats endangering networking systems. An adversarial example is an input to a machine learning model whose goal is to cause a misclassification to occur after applying a small perturbation to the original input. This type of adversarial example has been impacting multiple intelligent domains, inc...
Distributed learning is proposed as a promising technique to reduce heavy data transmissions in centralized machine learning. By allowing the participants training the model locally, raw data is unnecessarily uploaded to the centralized cloud server, reducing the risks of privacy leakage as well. However, the existing studies have shown that an adv...
Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment. The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicles (IoV). Meanwhile, more and more location-based services (LBSs) are created to provide convenience for drivers. However, the frequ...
With the widespread prevalence of smart devices, mobile crowdsensing (MCS) becomes a new trend to encourage mobile nodes to participate in cooperative data collection in various Internet of Things (IoT) applications. In location-dependent MCS, location information of mobile nodes is collected and analyzed by service provider to assist in task alloc...
Vehicular networks are susceptible to various attacks from malicious nodes within a network. The collaborative misbehavior detection system can be used to detect these attacks. However, in a collaborative misbehavior detection system, an attacker may send false feedback which affects the detection accuracy. A trust model can be used to stimulate ve...
5G based vehicular communication networks support various traffic safety and infotainment use cases and rely on the periodic exchange of information. However, these messages are susceptible to several attacks which can be detected using misbehavior detection systems (MDS). MDS utilizes trust score, feedback score and other evaluation schemes to ide...
With the emergence of computation intensive vehicular applications, computation offloading based on mobile edge computing (MEC) has become a promising paradigm in resource constrained vehicular cloud networks (VCNs). However, when doing computation offloading in a VCN, malicious service providers can cause serious security concerns on the content o...
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) netwo...
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) netwo...
A wide variety of works have been conducted in vehicle-to-everything (V2X) communications to enable a variety of applications for road safety, traffic efficiency and passenger infotainment. Although dedicated short-range communications (DSRC) based V2X is already in the deployment phase, cellular based V2X is gaining more interest in academia and i...
Advanced persistent threat, network intrusions and anomalies, and invasions of location and data privacy are constantly violating edge networks, disturbing guaranteed services, and further destroying critical end devices and cyberinfrastructure. Edge gateway defense against malicious cyber threats and privacy leakage for a multitude of connected ph...
This paper proposes an on-line maximum torque per ampere (MTPA)/maximum torque per voltage (MTPV) trajectory tracking method in permanent magnet synchronous machines (PMSMs) with power management. The on-line MTPA/MTPV machine current trajectory tracking algorithm is developed from PMSM model. Maximum source current and machine current are regulate...
The ever growing demand of Internet of Things (IoT) imposes great challenges in the existing cellular systems and calls for novel approaches for wireless network design. In this paper, we develop a joint energy and computation optimization paradigm in an IoT network. The tasks collected at local IoT devices can be computed at hierarchical mobile ed...
In recent studies, vehicular networks have been considered as a promising solution to achieve better traffic management and to improve the driving experience of drivers. Dedicated Short Range Communications is specifically designed for V2X communications, and recently the cellular network has shown great potential to support V2X with better perform...
Vehicular networks are vulnerable to various attacks such as Sybil, denial-of-service (DoS) and false alert generation attacks. Cryptographic methods can provide some protection to vehicular networks from external attacks, but are found to be vulnerable to internal attacks. A misbehavior detection system (MDS) can be deployed to identify and preven...
Vehicular networks provide various applications for vehicles to improve road safety and traffic efficiency as well as infotainment. Security and privacy are of great important for the deployment of vehicular networks. However, how to efficiently secure vehicular networks with privacy-preserving remains a big challenge. Many solutions have been prop...
Energy-efficient design and secure communications are of crucial importance in the sixth generation wireless communication networks. However, the energy efficiency when using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single outpu...
5G wireless systems are the next generation of mobile wireless telecommunications beyond current 4G/International Mobile Telecommunications-Advanced systems. Not only enhanced mobile broadband (eMBB) communications but also ultrareliable low-latency communication (uRLLC) and massive machine-type communication (mMTC) are supported by 5G wireless net...
Fairness among different users and system robustness are key issues in the future communication network design. A robust max-min fairness energy efficiency (EE) maximization problem in a downlink non-orthogonal multiple access (NOMA)
heterogeneous network is studied when channel state information
and interference power are uncertain. A worst-case E...
Internet-of-Things (IoT) applications have been rapidly deployed into pervasive environment, where both challenges and opportunities abound. On the one hand, the large number of IoT devices and their rich functions contribute significant volumes of data, which has brought tremendous convenience to daily lives of end users. On the other hand, the he...
This paper proposes an enhanced control algorithm in permanent magnet synchronous machines (PMSMs) with machine current sensor fault detection and isolation (FDI) and current management for hardware protection. Different from existing work on machine current sensor FDI, the proposed method addresses the sensor FDI problem under co-existence of PMSM...
The advancement of networking platforms for assured online services requires robust and effective network intelligence systems against anomalous events and malicious threats. With the rapid development of modern communication technologies, artificial intelligence, and the revolution of computing devices, cloud computing empowered network intelligen...
Data-driven network intelligence will offer a robust, efficient, and effective computing system for anomaly detection in cyber security applications. In this article, we first summarize the current development and challenges of network intelligence for anomaly detection. Based on the current development, we propose a data-driven intelligence system...
A smart home network will support various smart devices and applications, e.g., home automation devices, E-health devices, regular computing devices, etc. Most devices in a smart home access the Internet through a home gateway (HGW). In this paper, we propose a software-defined-network (SDN)-HGW framework to better manage distributed smart home net...
Heterogeneous network (HetNet) is recognized as a promising technique to provide blanket wireless coverage and high throughput in 5G wireless networks. With the heterogeneous characteristics, HetNet achieves higher capacity, wider coverage and better performance in energy efficiency and spectrum efficiency. However, HetNet also brings complex inter...
In this article, we give an overview on the security requirements and standards for the fourth generation (4G) long term evolution (LTE) and the fifth generation (5G) wireless systems. Compared with the third generation (3G) universal mobile telecommunication system (UMTS), the LTE system not only improves the network capacity and coverage but also...
Maintaining a high overall network reliability remains one of the most critical requirements for
advanced metering infrastructures (AMIs) in smart grid. Ensuring reliable
networks not only determines the robust communications of an AMI, but also
guarantees assured information delivery in the access network. To prevent any
communication failures, in...
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and...
As wearable devices become more ingrained in our daily lives, traditional communication networks primarily designed for human being-oriented applications are facing tremendous challenges. The upcoming 5G wireless system aims to support unprecedented high capacity, low latency, and massive connectivity. In this article, we evaluate key challenges in...
As wearable devices become more ingrained in our daily lives, traditional communication networks primarily designed for human being-oriented applications are facing tremendous challenges. The upcoming 5G wireless system aims to support unprecedented high capacity, low latency, and massive connectivity. In this article, we evaluate key challenges in...
Due to proliferation of smart cities and other smart services, extensive data collection needs to be accomplished by mobile sensor networks (MSNs). However, sensing and data collection are voluntary tasks for many MSN users. For example, drivers are not required to report traffic condition although their vehicles with advanced sensors have easy acc...
In this paper two different non-orthogonal multiple access (NOMA) relay schemes are analyzed, namely NOMA cooperative scheme and NOMA TDMA scheme. Both schemes apply NOMA in the first stage by sending NOMA superimposed signals to relays. Relays then forward the messages to two users in the second stage. In the second stage of NOMA cooperative schem...
LTE communication systems feature advanced frequency reuse and interference coordination techniques providing faster and more secured mobile services. However, the network capacity in licensed spectrum is still behind market demands. Dynamic spectrum access, or spectrum sharing in other frequently vacant or unlicensed frequency bands is considered...
Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system h...
Smart grid is an intelligent cyber physical system (CPS). The CPS generates a massive amount of data for efficient grid operation. In this paper, a big data-driven, cloud-based information and communication technology (ICT) framework for smart grid CPS is proposed. The proposed ICT framework deploys hybrid cloud servers to enhance scalability and r...
The United States is deploying the broadband wireless network for public safety and emergency response. While this will provide a foundational network when disasters or other emergencies appear, the network capacity could still be insufficient when large scale emergency events, such as earthquakes or flooding, happen. On-demand broadcast is a possi...
The performance of vehicular ad hoc networks (VANETs) is subject to frequent changes due to node mobility, so that nonstationary/transient network behavior always exists. In addition, safety applications in VANETs are very sensitive to the real-time performance of delay and packet delivery ratio. Although there are extensive studies on the steady-s...
In multi-hop cognitive radio networks, it is a challenge to improve the energy efficiency of the radio nodes. To address this challenge, in this paper, we propose a two-level Stackelberg game model, where the primary users and the secondary users act as the leaders and the followers, respectively. Based on the game model, our proposed scheme not on...
In this article, we propose a new architecture for AC-MWN. Cognitive radio is a technique to adaptively use the spectrum so that the resource can be used more efficiently in a low-cost way. A multihop wireless network can be deployed quickly and flexibly without fixed infrastructure. In our proposed new architecture, we study backbone routing schem...
Cognitive radio (CR) is an emerging technique to improve the efficiency of spectrum resource utilization. In CR networks, the selfish behavior of secondary users (SUs) can considerably affect the performance of primary users (PUs). Accordingly, game theory, which considers the game players' selfish behavior, has been applied to the design of CR net...
Mobile ad-hoc network is a type of ad-hoc network where nodes change locations with time, configure themselves and get the information transmitted from source to destination without the help of any fixed router or base station. Hence, for efficient data transmission, it is critical to understand the type of routing algorithms that is being used by...
In 5G mobile communication systems, massive multiple-input multiple-output (MIMO) and heterogeneous networks (HetNets) play crucial roles to achieve expected coverage and capacity across venues. This paper correspondingly addresses software-defined network (SDN) as the central controller of radio resource management in massive MIMO HetNets. In part...
In this paper, we propose a new security protocol for a wireless sensor network, which is designed for monitoring long range power transmission lines in smart grid. Part of the monitoring network is composed of optical fiber composite over head ground wire (OPGW), thus it can be secured with conventional security protocol. However, the wireless sen...
In this work, we propose a dynamic distributed resource sharing scheme which jointly considers mode selection, resource allocation, and power control in a unified framework for general D2D communications. First, we model the joint issue of mode selection and resource allocation as a hedonic coalition formation game, while accounting for the tradeof...
In the smart grid, a neighborhood area network (NAN) is a part of the cyber-physical system that achieves two-way communications between smart meters and meter data management system (MDMS). In this paper, we study the energy efficiency issue for uplink transmissions from NAN gateways to the concentrator connecting the MDMS. Classical power control...
The special issue of Telecommunication Systems has published papers on research advance in wireless networks and mobile computing (WNMC). This special issue is devoted to deeper understanding the development direction of WNMC, including Internet of things, mobile ad hoc networks, wireless sensor networks, vehicular networks, underwater sensor netwo...
Delay issue is a challenge in multi-hop cognitive radio networking because of the dynamic change of channels available to the cognitive radio nodes. To address this challenge, we propose a channel allocation and rate allocation scheme with low complexity in this paper. Our scheme is flexible so that it can react to the dynamic change of channel ava...
In this paper, we study load scheduling schemes for plug-in hybrid electric vehicle (PHEV) battery exchange stations (BESs) in smart grid. Since each BES stores a relatively large amount of batteries, it can significantly contribute to the demand-side management (DSM) system in smart grid by selling back the electricity to the grid during peak hour...