scispace - formally typeset
Search or ask a question
Author

Zhigao Zheng

Bio: Zhigao Zheng is an academic researcher from Huazhong University of Science and Technology. The author has contributed to research in topics: Computer science & Differential privacy. The author has an hindex of 13, co-authored 26 publications receiving 647 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP) have the potential to provide an intelligent and highly autonomous communication solution for FANETs.
Abstract: The flying ad hoc network (FANET) is a new paradigm of wireless communication that governs the autonomous movement of UAVs and supports UAV-to-UAV communication. A FANET can provide an effective real-time communication solution for the multiple UAV systems considering each flying UAV as a router. However, existing mobile ad hoc protocols cannot meet the needs of FANETs due to high-speed mobility and frequent topology change. In addition, the complicated flight environment and varied flight tasks lead to the traditional built-in-rules protocols no longer meeting the demands of autonomy. Hence, we have proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP). The performance results show that the proposed PPMAC overcomes the directional deafness problem with directional antennas, and RLSRP provides an automatically evolving and more effective routing scheme. Our proposed hybrid adaptive communication protocols have the potential to provide an intelligent and highly autonomous communication solution for FANETs, and indicate the main research orientation of FANET protocols.

166 citations

Journal ArticleDOI
TL;DR: A RF fingerprint identification method based on dimensional reduction and machine learning is proposed as a component of intrusion detection for resolving authentication security issues and improves security protection due to the introduction of RF fingerprinting.
Abstract: The access security of wireless devices is a serious challenge in present wireless network security. Radio frequency (RF) fingerprint recognition technology as an important non-password authentication technology attracts more and more attention, because of its full use of radio frequency characteristics that cannot be imitated to achieve certification. In this paper, a RF fingerprint identification method based on dimensional reduction and machine learning is proposed as a component of intrusion detection for resolving authentication security issues. We compare three kinds of dimensional reduction methods, which are the traditional PCA, RPCA and KPCA. And we take random forests, support vector machine, artificial neural network and grey correlation analysis into consideration to make decisions on the dimensional reduction data. Finally, we obtain the recognition system with the best performance. Using a combination of RPCA and random forests, we achieve 90% classification accuracy is achieved at SNR $$\ge $$ 10 dB when reduced dimension is 76. The proposed method improves wireless device authentication and improves security protection due to the introduction of RF fingerprinting.

159 citations

Journal ArticleDOI
TL;DR: Examining and classifying a number of related SDN- based research works on wireless networks specially VANETs and a review of current research initiatives to solve challenges of vehicular environment is presented.

84 citations

Journal ArticleDOI
TL;DR: It is proposed in this paper that a good street network is a key factor for carrying forward urban context of Hankou and a hierarchically synergetic planning strategy is proposed based on the analysis.
Abstract: Axial and visibility graph analysis models are combined with GIS and Space Syntax to study the corresponding relationship between street network and specific city life in Hankou, China, based on three scales - city, district, and community, so as to interpret the hidden structure out of complex urban form through the spatial logic of street network. In this paper, a quantitative analysis is made on selected parameters in Space Syntax, including Integration, Choice, density of road, and Ht index. The result indicates that there is certain correlation among these parameters. Moreover, these parameters also present certain changing patterns along with the increase of analysis radius. The results reveal that the street network of Hankou presents a multi-hierarchical structure and spatial wholeness from all these three scales. This characteristic creates vitality and diversity while maintaining the feature of wholeness for the urban space. Research has turned out that community-scale street network performs a positive role to keep neighborhoods alive. Therefore, it is an important strategy for maintaining the vitality of urban space and realizing coordination and unification between parts and the whole. It is proposed in this paper that a good street network is a key factor for carrying forward urban context of Hankou. Undoubtedly, it is worthy of reflecting on large-scale demolition of existing urban space, especially in historical areas. Afterwards, the paper proposes a hierarchically synergetic planning strategy based on the analysis. More attention should be paid to street network to preserve diversity, continuity, and integrity, and finally archive holistically sustainable development within a city.

81 citations

Journal ArticleDOI
TL;DR: This work presents a comprehensive survey of privacy preservation in big data from the communication perspective and surveys the fundamental privacy-preserving framework and privacy- Preserving technologies, particularly differential privacy.
Abstract: The advancement of data communication technologies promotes widespread data collection and transmission in various application domains, thereby expanding big data significantly. Sensitive information about individuals, which is typically evident or hidden in data, is prone to various privacy attacks and serious risks of privacy disclosure. Corresponding approaches to data privacy preservation have been proposed to provide mechanisms for preserving data privacy while pubilishing useful information or mining valuable information from sanitized data. In this work, we present a comprehensive survey of privacy preservation in big data from the communication perspective. Specifically, we cover the fundamental privacy-preserving framework and privacy-preserving technologies, particularly differential privacy. We also survey the adaptations and variants of differential privacy for different emerging applications and the challenges to differential privacy. In addition, we provide future research directions about privacy preservation in communication field.

80 citations


Cited by
More filters
01 Jan 2013
TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Abstract: A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid. In this paper, we present the background and motivation of communication infrastructures in smart grid systems. We also summarize major requirements that smart grid communications must meet. From the experience of several industrial trials on smart grid with communication infrastructures, we expect that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission. The consumers can minimize their expense on energy by adjusting their intelligent home appliance operations to avoid the peak hours and utilize the renewable energy instead. We further explore the challenges for a communication infrastructure as the part of a complex smart grid system. Since a smart grid system might have over millions of consumers and devices, the demand of its reliability and security is extremely critical. Through a communication infrastructure, a smart grid can improve power reliability and quality to eliminate electricity blackout. Security is a challenging issue since the on-going smart grid systems facing increasing vulnerabilities as more and more automation, remote monitoring/controlling and supervision entities are interconnected.

1,036 citations

Journal ArticleDOI
TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.

359 citations

Journal ArticleDOI
TL;DR: This paper surveys the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT).
Abstract: Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy techniques for CPSs. In particular, we survey the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT). Furthermore, we present open issues, challenges, and future research direction for differential privacy techniques for CPSs. This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.

357 citations

Journal ArticleDOI
TL;DR: This survey presents a detailed survey on wireless evolution towards 6G networks, characterized by ubiquitous 3D coverage, introduction of pervasive AI and enhanced network protocol stack, and related potential technologies that are helpful in forming sustainable and socially seamless networks.
Abstract: While 5G is being commercialized worldwide, research institutions around the world have started to look beyond 5G and 6G is expected to evolve into green networks, which deliver high Quality of Service and energy efficiency. To meet the demands of future applications, significant improvements need to be made in mobile network architecture. We envision 6G undergoing unprecedented breakthrough and integrating traditional terrestrial mobile networks with emerging space, aerial and underwater networks to provide anytime anywhere network access. This paper presents a detailed survey on wireless evolution towards 6G networks. In this survey, the prime focus is on the new architectural changes associated with 6G networks, characterized by ubiquitous 3D coverage, introduction of pervasive AI and enhanced network protocol stack. Along with this, we discuss related potential technologies that are helpful in forming sustainable and socially seamless networks, encompassing terahertz and visible light communication, new communication paradigm, blockchain and symbiotic radio. Our work aims to provide enlightening guidance for subsequent research of green 6G.

324 citations