Guojun Wang's research while affiliated with Guangzhou University and other places

Publications (519)

Article
Full-text available
As the world is now fighting against rampant virus COVID‐19, the development of vaccines on a large scale and making it reach millions of people to be immunised has become quintessential. So far 40.9% of the world got vaccinated. Still, there are more to get vaccinated. Those who got vaccinated have the chance of getting the vaccine certificate as...
Article
In vehicular edge computing, both edge and cloud can provide computing services (i.e., tasks). The edge can reduce vehicular task delay by processing data nearby, but is resource‐constrained and cannot handle too many tasks simultaneously. The resource‐rich cloud can handle massive tasks, but is far from users and has low quality of service and ene...
Article
There is a considerable rise in cardiovascular diseases in the world. It is pertinently essential to make cardiovascular prediction accurate to the maximum. A forecast based on machine learning techniques can be beneficial in detecting cardiovascular disease (CVD) with maximum precision and accuracy. The disease's effective prediction helps in earl...
Article
Full-text available
Parkinson’s disease (PD) is a progressive disorder of the nervous system that affects movement. Early prediction of PD can increase the chances of earlier intervention and delay the onset of the disease. Vocal impairment is one of the most important signs in the early stages of PD. Therefore, PD detection based on speech analysis and vocal patterns...
Article
Full-text available
Edge computing is becoming increasingly commonplace, as consumer devices become more computationally capable and network connectivity improves (e.g., due to 5G). With the rapid development of edge computing and Internet of Things (IoT), the use of edge-cloud collaborative computing to provide service-oriented network application (i.e., task) in edg...
Article
With the increasing awareness of data security in emerging applications, Artificial Intelligence (AI)-enabled security mechanism has begun to receive growing attention. This special issue assembles a set of 14 papers, which provide in-depth research results to report the advance of security and privacy in AI and AI-enabled secure emerging applicati...
Article
Predicting the popularity of web contents in online social networks is essential for many applications. However, existing works are usually under non-incremental settings. In other words, they have to rebuild models from scratch when new data occurs, which are inefficient in big data environments. It leads to an urgent need for incremental predicti...
Article
Full-text available
Network simulation and capabilities in the form of a logical network has increased the development of virtual networks rapidly. It is one of the best ways to increase productivity and optimize hardware equipment. Network-Virtualization plays a very important role in the development of networks as the size of the networks increases vastly. This pape...
Article
Full-text available
In healthcare, the human body is a controlled input-output system, which generates different observations with the variations of external interventions. The intervention acts as the input, and the output is the phenotype observation that reflects the latent health state of the body system. The objective of healthcare is to determine effective inter...
Article
Today, in the field of malware detection, the expanding limitations of traditional detection methods and the increasing accuracy of detection methods designed on the basis of artificial intelligence algorithms are driving research findings in this area in favour of the latter. Therefore, we propose a novel malware detection model in this paper. Thi...
Article
Full-text available
The ranking algorithm in the recommender system aims at optimizing accuracy during training so that it pays too much attention to the relevance of the individual and ignores the mutual influence between the items in the list. In response to this problem, we propose dither, a re-ranking model for the recommender system. We deploy the re-ranking algo...
Article
Full-text available
Today, the use of large networks under the cloud and big data has become very common, as well as learning methods and artificial intelligence have been designed for them. One of the main issues in the banking and Big Data industry is granting bank facilities to people. The main challenge in evaluating the customers’ credit in the banking industry i...
Article
Recommender systems can help correlate information and recommend personalised services to users as a general information filtering tool. However, contextual factors significantly affect user behaviour, especially in the Internet of Things (IoT), which brings difficulties to modelling user preferences. In this paper, we propose a personalised contex...
Article
Deep Learning shows a broad prospect in providing intelligence microservices to Industrial Internet of Things (IIoT). However, the existence of potential secure vulnerabilities limits the application of deep learning in IIoT. Therefore, how to provide secure deep learning services in IIoT applications becomes an important research topic. Among vari...
Article
With the popularity and development of sensors-containing intelligent terminals, mobile crowdsensing system (MCS) based on the Internet of Things (IoT) has become a new paradigm of application. By the MCS, the pervasive smart device users are enabled to collect large-scale data cost-effectively, for crowd intelligent extraction and human-centric se...
Article
Sensor-cloud has gained increasingly popularity since it bridges the physical world and the cyber world through pervasive computation. This paper focuses on secure and verifiable k nearest neighbor (kNN) queries over large-scale outsourced datasets in sensor-cloud systems. Existing work in this line often incurred high computational and communicati...
Article
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this article, we study “how to gener...
Article
Full-text available
Cognitive computing has been commonly used to address different forms of optimization issues. Swarm intelligence (SI) and evolutionary computing (EC) are population-based intelligent stochastic search techniques promoted to search for their food from the intrinsic way of bee swarming and human evolution. Initialization of populations is a critical...
Article
Full-text available
Sensors in Cyber-Physical Systems (CPS) are typically used to collect various aspects of the region of interest and transmit the data towards upstream nodes for further processing. However, data collection in CPS is often unreliable due to severe resource constraints (e.g., bandwidth and energy), environmental impacts (e.g., equipment faults and no...
Article
Event-based social networks (EBSNs) connect online and offline lives. They allow online users with similar interests to get together in real life. Attendance prediction for activities in EBSNs has attracted a lot of attention and several factors have been studied. However, the prediction accuracy is not very good for some special activities, such a...
Article
Cloud storage services allow a data owner to share her/his outsourced data with other users, and enable the users to search target data by keywords. To ensure the data confidentiality, data owner always encrypt data using traditional encryption schemes before outsourcing. Whereas, it makes efficiently searching impossible. Symmetric searchable encr...
Article
Full-text available
During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assisted approaches (e.g., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as rootkits. However, these approaches either require a large Trusted Computing Base (TCB) or they must share CPU time with the operating system...
Article
The Internet of Things (IoT), including wireless sensors, is one of the highly anticipated contributors to big data; therefore, avoiding misleading or forged data gathering in cases of sensitive and critical data through secure communication is vital. However, due to the relatively long distance between remote cloud and end nodes, cloud computing c...
Article
IoT devices generate data over time, which is going to be shared with other parties to provide high-level services. Smart City is one of its applications which aims to manage cities automatically. Because of the large number of devices, three critical challenges come up: heterogeneity, privacy-preserving of generated data, and providing high-level...
Article
Online reviews and ratings play an important role in shaping the purchase decisions of customers in e-commerce. Many researches have been done to make proper recommendations for users, by exploiting reviews, ratings, user profiles, or behaviors. However, the dynamic evolution of user preferences and item properties haven’t been fully exploited. Mor...
Article
Ultra-reliable low-latency communication supports powerful mission-critical applications such as artificial intelligence-enabled mobile cloud applications designed to deliver the quality of service and quality of experience to their users. However, whether existing security mechanisms are ready to address the risks emerging from these applications...
Chapter
Many app recommendation models have been proposed to provide mobile users with the apps that meet their individual needs. However, three main drawbacks limit their performance: (1) Neglect the dynamic change of user preferences in a short time; (2) Singly use either the machining learning or the deep learning method, which cannot learn discrete fea...
Chapter
Machine learning has obtained remarkable achievement in longstanding tasks in various domains of artificial intelligence. However, machine learning certainly has some security threats, such as adversarial examples that hamper the machine learning models from correctly classifying the data. The adversarial examples are minor perturbations in the act...
Chapter
In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be perceived and followed by listening in its inquiries (e.g., reference points) by an enemy, since these quires contain individual data and information, for example, the questions and area of the vehicle. This attack prompts dangers on the vehicles area protection. Th...
Chapter
Growth towards Industry 4.0 has a significant impact on the textile manufacturing industry. In this emerging technology the business and engineering processes are interconnected. The product traceability system is playing a vital role in each sector. Unfortunately, the traditional systems in textile manufacturing industries faced a lot of challenge...
Article
Online social networks provide convenience for users to propagate ideas, products, opinions, and many other items that compete with different items for influence spread. How to accurately model the spread of competitive influence is still a challenging problem. Almost all reported methods ignore the effect of trust relationships in the spread of co...
Article
Artificial Intelligence and Machine Learning based Ambient Assisted Living systems play an important role in smart cities by improving the quality of life of the elderly population. Many Ambient Assisted Living systems are coupled with Android Apps for command-and-control purposes. Consequently, the privacy and security of Ambient Assisted Living s...
Chapter
Full-text available
Cancer is a leading cause of death and majority of cancer patients are diagnosed in the late stages of cancer by using conventional methods. The gene expression microarray technology is applied to detect and diagnose most types of cancers in their early stages. Furthermore, it allows researchers to analyze thousands of genes simultaneously. To acqu...
Chapter
The recent innovation in Information and Communication Technologies (ICT) can help and assist the visually-impaired people. A simple and effective way for these people to move is to use “smart” footwear equipped with sensors for measuring distance, temperature, position, in order to inform the person about possible dangers. This paper presents “sma...
Chapter
Pulse oximetry is a non-invasive method of measuring the level of oxygen saturation in the body, or the level of oxygen in the blood. It can detect even the smallest changes in the efficiency of transporting oxygen from the heart to the extremities, including hands and feet. Pulse oximetry uses a pulse oximeter for measurement and it is often used...
Conference Paper
Different risk evaluation approaches exist to protect users from potentially malicious apps. However, while assessing risks, the existing approaches ignore users’ functional needs, and that app functions help their developers compete in the marketplace. In this paper, we propose a function-centric risk assessment approach for Android apps. The prop...
Article
With the ever-increasing amount of data resided in a cloud, how to provide users with secure and practical query services has become the key to improve the quality of cloud services. Fuzzy searchable encryption (FSE) is identified as one of the most promising approaches for enabling secure query services, since it allows searching encrypted data by...
Article
Full-text available
Increasing interest in the field of Cloud Manufacturing (CMfg) has been witnessed over the last few years. This study aims to identify current and state-of-the-art techniques and to synthesize quality attributes, objectives, and evaluation methodologies for service composition and optimal selection (SCOS) in the field of CMfg. We used a systematic...
Article
Full-text available
Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous objects in a form of interaction among physical and virtual entities. Large scale of data centers, heterogeneity issues and their interconnections have made the resource management a hard problem specially when there are different actors in cloud system with different n...
Article
With the rapid development of mobile social networks (MSNs) and smart mobile devices, mobile users can easily make new social interactions with others via their smartphones. Unfortunately, users enjoy these conveniences at the cost of revealing their personal data. The inevitable release of information conflicts with increasing privacy concerns. To...
Conference Paper
Full-text available
Abstract: Due to environmental influence and technology limitation, a wireless sensor/sensors module can neither store or process all raw data locally nor reliably forward it to a destination in heterogeneous IoT environment. As a result, the data collected by the IoT's sensors are inherently noisy, unreliable, and may trigger many false alarms. Th...
Article
Product reviews play an important role in guiding users’ purchase decision-making in e-commerce platforms. However, it is challenging for users to find helpful reviews that meet their preferences and experiences among an overwhelming amount of reviews. Some works have been done to recommend helpful reviews to users, either from personalized or non-...
Article
In the Vehicular Ad-hoc Networks, an enormous number of Location-based Services could be given to clients as per their development characteristics. Then, protection might be split when clients distribute certain vehicular trajectories information to the servers. Location-based Services collect large amounts of the Vehicular Ad-hoc Networks trajecto...
Article
Full-text available
The popularity of the modern smart devices and mobile social networks (MSNs) brings mobile users better experiences and services by taking advantage of location-aware capabilities. Location sharing, as an important function of MSNs, has attracted attention with growing popularity. While the users get great benefits and conveniences from MSNs, they...
Preprint
Disentangled representation has been widely explored in many fields due to its maximal compactness, interpretability and versatility. Recommendation system also needs disentanglement to make representation more explainable and general for downstream tasks. However, some challenges slow its broader application -- the lack of fine-grained labels and...
Article
With the prevalence of cloud computing, a growing number of users are delegating clouds to host their sensitive data. To preserve user privacy, it is suggested that data is encrypted before outsourcing. However, data encryption makes keyword-based searches over ciphertexts extremely difficult. This is even challenging for fuzzy search that allows u...
Article
Full-text available
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users’ applications running on the service platform from malicious attacks. Because remote users have little control over the platform, a malicious platform manager or platform-sharing guest acting as an adversary can easily create an untrustwort...
Article
Full-text available
Straggler task detection is one of the main challenges in applying MapReduce for parallelizing and distributing large-scale data processing. It is defined as detecting running tasks on weak nodes. Considering two stages in the Map phase (copy, combine) and three stages of Reduce (shuffle, sort and reduce), the total execution time is the total sum...
Article
Since network storage services achieve widespread adoption, security and performance issues are becoming primary concerns, affecting the scalability of storage systems. Countermeasures like data auditing mechanisms and deduplication techniques are widely studied. However, the existing data auditing mechanism with deduplication cannot solve the prob...
Article
Full-text available
Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are utilized in intelligent transportation systems (ITS). VANETs have become one of the most reassuring, promising, and quickest developing subsets of the mobile ad-hoc networks (MANETs). They include smart vehicles, roadside units (RSUs), and on-board units (OBUs) whi...
Article
Full-text available
Investors who intend to execute large orders have to always a trade-off between price impact and opportunity cost in Big Data. In this study, reinforcement learning (Q-learning) is applied, due to its strength to support an agent, to make the best decision and take suitable action in a dynamic environment to achieve an optimal way to execute a larg...