scispace - formally typeset
Search or ask a question
Author

Jianhua Peng

Bio: Jianhua Peng is an academic researcher from PLA Information Engineering University. The author has contributed to research in topics: Deep learning & Network architecture. The author has an hindex of 1, co-authored 1 publications receiving 23 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a deep cascading network architecture (DCNA) is proposed to solve the SNR environment perception and modulation classification in sub-environments, which is composed of an SNR estimator network (SEN) and a modulation recognition cluster network (MRCN).

39 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper , a multi-stage grey wolf optimizer (MGWO) was proposed to improve the performance of the basic GWO by dividing the search process into three stages and using different population updating strategies.

65 citations

Journal ArticleDOI
TL;DR: In this paper, the authors provide a comprehensive review of the decision support systems (DSS) strategies for energy-efficient IoT applications in intelligent urban computing, and present a technical taxonomy to categorize existing energyefficient DSS models for industrial and smart environments in IoT ecosystems; recognizing significant research trends in the field of energy-aware DSS strategies for intelligent industrial IoT environments and presenting a technical and statistical analysis of reviewed studies and evaluation factors.

30 citations

Journal ArticleDOI
TL;DR: This work presents a comprehensive study of cloud computing security concerns and blockchain solutions to address these concerns, and examines cloud security in three categories: data integration, trust, and privacy.
Abstract: Cloud computing enables businesses to decrease the total costs by outsourcing their required services. Therefore, it provides a new challenge of data protection regarding reliability, integrity, and confidentiality because of outsourcing. As a result, cloud security is becoming a key differentiator and competitive edge between cloud providers. Nowadays, the use of blockchain in cloud computing is one of the most common innovations that can solve cloud computing security problems. Blockchain is a decentralized data management technology to provide security, anonymity, and data integrity without any third-party organization. This work presents a comprehensive study of cloud computing security concerns and blockchain solutions to address these concerns. Applying different filters and searching international databases, 21 articles from reputable journals are found and reviewed. We examine cloud security in three categories: data integration, trust, and privacy. The results show that blockchain provides a successful platform in this regard. However, security issues are one of the most important challenges that still need further study. The article also provides a roadmap framework for future research and action.

23 citations

Journal ArticleDOI
TL;DR: In this paper, a review of green energy harvesting strategies on the smart applications of sustainable and smart cities in edge-based intelligent urban computing is presented, where the existing energy harvesting schemes have been divided into five categories: smart home management, smart cities, smart grids, smart environmental systems, and smart transportation systems.

20 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed a systematic study on the discussion of privacy and security in the field of blockchain-based FL methodologies on the scientific databases to provide an objective road map of the status of this issue.
Abstract: Blockchain technology is an undeniable ledger technology that stores transactions in high-security chains of blocks. Blockchain can solve security and privacy issues in a variety of domains. With the rapid development of smart environments and complicated contracts between users and intelligent devices, federated learning (FL) is a new paradigm to improve accuracy and precision factors of data mining by supporting information privacy and security. Much sensitive information such as patient health records, safety industrial information, and banking personal information in various domains of the Internet of Things (IoT) including smart city, smart healthcare, and smart industry should be collected and gathered to train and test with high potential privacy and secured manner. Using blockchain technology to the adaption of intelligent learning can influence maintaining and sustaining information security and privacy. Finally, blockchain-based FL mechanisms are very hot topics and cut of scientific edge in data science and artificial intelligence. This research proposes a systematic study on the discussion of privacy and security in the field of blockchain-based FL methodologies on the scientific databases to provide an objective road map of the status of this issue. According to the analytical results of this research, blockchain-based FL has been grown significantly during these 5 years and blockchain technology has been used more to solve problems related to patient healthcare records, image retrieval, cancer datasets, industrial equipment, and economical information in the field of IoT applications and smart environments.

16 citations