scispace - formally typeset
Search or ask a question
Author

Tao Wang

Other affiliations: Central China Normal University
Bio: Tao Wang is an academic researcher from Wuhan University. The author has contributed to research in topics: Differential privacy & Compressed sensing. The author has an hindex of 10, co-authored 27 publications receiving 393 citations. Previous affiliations of Tao Wang include Central China Normal University.

Papers
More filters
Journal ArticleDOI
TL;DR: The proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP) have the potential to provide an intelligent and highly autonomous communication solution for FANETs.
Abstract: The flying ad hoc network (FANET) is a new paradigm of wireless communication that governs the autonomous movement of UAVs and supports UAV-to-UAV communication. A FANET can provide an effective real-time communication solution for the multiple UAV systems considering each flying UAV as a router. However, existing mobile ad hoc protocols cannot meet the needs of FANETs due to high-speed mobility and frequent topology change. In addition, the complicated flight environment and varied flight tasks lead to the traditional built-in-rules protocols no longer meeting the demands of autonomy. Hence, we have proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP). The performance results show that the proposed PPMAC overcomes the directional deafness problem with directional antennas, and RLSRP provides an automatically evolving and more effective routing scheme. Our proposed hybrid adaptive communication protocols have the potential to provide an intelligent and highly autonomous communication solution for FANETs, and indicate the main research orientation of FANET protocols.

166 citations

Journal ArticleDOI
TL;DR: This work presents a comprehensive survey of privacy preservation in big data from the communication perspective and surveys the fundamental privacy-preserving framework and privacy- Preserving technologies, particularly differential privacy.
Abstract: The advancement of data communication technologies promotes widespread data collection and transmission in various application domains, thereby expanding big data significantly. Sensitive information about individuals, which is typically evident or hidden in data, is prone to various privacy attacks and serious risks of privacy disclosure. Corresponding approaches to data privacy preservation have been proposed to provide mechanisms for preserving data privacy while pubilishing useful information or mining valuable information from sanitized data. In this work, we present a comprehensive survey of privacy preservation in big data from the communication perspective. Specifically, we cover the fundamental privacy-preserving framework and privacy-preserving technologies, particularly differential privacy. We also survey the adaptations and variants of differential privacy for different emerging applications and the challenges to differential privacy. In addition, we provide future research directions about privacy preservation in communication field.

80 citations

Journal ArticleDOI
TL;DR: The proposed coarse-to-fine detection strategy based on optical flow and stable parameters is effective and efficient in detecting both unsmooth manipulation and common smooth forgery and also with high robustness to regular attacks, including additive noise, filtering, and compression.
Abstract: Video copy-move forgery detection is one of the hot topics in multimedia forensics to protect digital videos from malicious use. Several approaches have been presented through analyzing the side effect caused by copy–move operation. However, based on multiple similarity calculations or unstable image features, a few can well balance the detection efficiency, robustness, and applicability. In this paper, we propose a novel approach to detect frame copy–move forgeries in consideration of the three requirements. A coarse-to-fine detection strategy based on optical flow (OF) and stable parameters is designed. Specifically, coarse detection analyzes OF sum consistency to find suspected tampered points. Fine detection is then conducted for precise location of forgery, including duplicated frame pairs matching based on OF correlation and validation checks to further reduce the false detections. Experimental evaluation on three public video data sets shows that the proposed approach is effective and efficient in detecting both unsmooth manipulation and common smooth forgery and also with high robustness to regular attacks, including additive noise, filtering, and compression.

49 citations

Journal ArticleDOI
TL;DR: Experimental results show that the description ability of the new combination features is improved on the basis of the single feature and HOG–LSS combined feature has the strongest description ability.

46 citations

Journal ArticleDOI
TL;DR: The experimental results show that genetic algorithm can effectively work out the approximate optimal data placement, and minimize data scheduling between data centers.
Abstract: With the development of Computerized Business Application, the amount of data is increasing exponentially. Cloud computing provides high performance computing resources and mass storage resources for massive data processing. In distributed cloud computing systems, data intensive computing can lead to data scheduling between data centers. Reasonable data placement can reduce data scheduling between the data centers effectively, and improve the data acquisition efficiency of users. In this paper, the mathematical model of data scheduling between data centers is built. By means of the global optimization ability of the genetic algorithm, generational evolution produces better approximate solution, and gets the best approximation of the data placement at last. The experimental results show that genetic algorithm can effectively work out the approximate optimal data placement, and minimize data scheduling between data centers.

32 citations


Cited by
More filters
01 Jan 2013
TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Abstract: A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid. In this paper, we present the background and motivation of communication infrastructures in smart grid systems. We also summarize major requirements that smart grid communications must meet. From the experience of several industrial trials on smart grid with communication infrastructures, we expect that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission. The consumers can minimize their expense on energy by adjusting their intelligent home appliance operations to avoid the peak hours and utilize the renewable energy instead. We further explore the challenges for a communication infrastructure as the part of a complex smart grid system. Since a smart grid system might have over millions of consumers and devices, the demand of its reliability and security is extremely critical. Through a communication infrastructure, a smart grid can improve power reliability and quality to eliminate electricity blackout. Security is a challenging issue since the on-going smart grid systems facing increasing vulnerabilities as more and more automation, remote monitoring/controlling and supervision entities are interconnected.

1,036 citations

Journal ArticleDOI
TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.

359 citations

Journal ArticleDOI
TL;DR: This paper surveys the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT).
Abstract: Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy techniques for CPSs. In particular, we survey the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT). Furthermore, we present open issues, challenges, and future research direction for differential privacy techniques for CPSs. This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.

357 citations

Journal ArticleDOI
TL;DR: In this survey paper, vision-based pedestrian detection systems are analysed based on their field of application, acquisition technology, computer vision techniques and classification strategies, and the reported results highlight the importance of testing pedestrians detection systems on different datasets to evaluate the robustness of the computed groups of features used as input to classifiers.

349 citations

Journal ArticleDOI
TL;DR: This survey presents a detailed survey on wireless evolution towards 6G networks, characterized by ubiquitous 3D coverage, introduction of pervasive AI and enhanced network protocol stack, and related potential technologies that are helpful in forming sustainable and socially seamless networks.
Abstract: While 5G is being commercialized worldwide, research institutions around the world have started to look beyond 5G and 6G is expected to evolve into green networks, which deliver high Quality of Service and energy efficiency. To meet the demands of future applications, significant improvements need to be made in mobile network architecture. We envision 6G undergoing unprecedented breakthrough and integrating traditional terrestrial mobile networks with emerging space, aerial and underwater networks to provide anytime anywhere network access. This paper presents a detailed survey on wireless evolution towards 6G networks. In this survey, the prime focus is on the new architectural changes associated with 6G networks, characterized by ubiquitous 3D coverage, introduction of pervasive AI and enhanced network protocol stack. Along with this, we discuss related potential technologies that are helpful in forming sustainable and socially seamless networks, encompassing terahertz and visible light communication, new communication paradigm, blockchain and symbiotic radio. Our work aims to provide enlightening guidance for subsequent research of green 6G.

324 citations