Resource Type

Journal Article 1472

Conference Information 121

Conference Videos 97

Conference Topics 2

Year

2024 4

2023 143

2022 198

2021 185

2020 172

2019 145

2018 102

2017 85

2016 73

2015 44

2014 25

2013 41

2012 39

2011 37

2010 27

2009 29

2008 31

2007 49

2006 49

2005 44

open ︾

Keywords

food security 17

neural network 17

Deep learning 15

Artificial intelligence 13

Internet Plus 12

Machine learning 11

energy security 10

Safety 9

sustainable development 9

Neural network 8

Software-defined networking (SDN) 7

Additive manufacturing 6

Internet of Things 6

3D printing 5

Computer vision 5

Intelligent manufacturing 5

cyberspace 5

cyberspace security 5

genetic algorithm 5

open ︾

Search scope:

排序: Display mode:

Generation of noise-like pulses and soliton rains in a graphene mode-locked erbium-doped fiber ring laser Research

Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi,yangkangle@sgepri.sgcc.com.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 3,   Pages 287-436 doi: 10.1631/FITEE.1900636

Abstract: Ubiquitous power (IoT) is a smart service system oriented to all aspects of the power system, and has the characteristics of universal interconnection, human-computer interaction, comprehensive state perception, efficient information processing, and other convenient and flexible applications. It has become a hot topic in the field of IoT. We summarize some existing research work on the IoT and framework. Because it is difficult to meet the requirements of ubiquitous power IoT for in terms of real time, security, reliability, and business function adaptation using the general framework software, we propose a trusted framework, named “EdgeKeeper,” adapting to the ubiquitous power IoT. Several key technologies such as security and trust, quality of service guarantee, application management, and cloud-edge collaboration are desired to meet the needs of the framework. Experiments comprehensively evaluate EdgeKeeper from the aspects of function, performance, and security. Comparison results show that EdgeKeeper is the most suitable framework for the electricity IoT. Finally, future directions for research are proposed.

Keywords: 物联网;泛在电力物联网;边缘计算;可信计算;网络安全    

Edge Computing Technology: Development and Countermeasures

Hong Xuehai and Wang Yang

Strategic Study of CAE 2018, Volume 20, Issue 2,   Pages 20-26 doi: 10.15302/J-SSCAE-2018.02.004

Abstract:

Edge computing is an emerging technology that reduces transmission delays and bandwidth consumption by placing computing, storage, bandwidth, applications, and other resources on the edge of the network. Moreover, application developers and content providers can provide perceptible services based on real-time network information. Mobile terminals, Internet of things, and other devices provide the necessary front-end support for computing sensitive applications, such as image recognition and network games, to share the cloud work load with the processing capability of edge computing. This paper discusses the concept of edge computing, key problems that require solutions, main advances in edge computing, influence of edge computing developments, and opportunities and development countermeasures of edge calculation.

Keywords: cloud computing     edge computing     fog computing     mobile edge computing     internet of things     front-end intelligence    

MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things Article

Chengxiao Liu, Wei Feng, Xiaoming Tao, Ning Ge

Engineering 2022, Volume 8, Issue 1,   Pages 96-107 doi: 10.1016/j.eng.2021.11.002

Abstract:

In the upcoming sixth-generation (6G) era, the demand for constructing a wide-area time-sensitive Internet of Things (IoT) continues to increase. As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT, it is beneficial to use non-terrestrial infrastructures, including satellites and unmanned aerial vehicles (UAVs). Thus, we can build a non-terrestrial network (NTN) using a cell-free architecture. Driven by the time-sensitive requirements and uneven distribution of IoT devices, the NTN must be empowered using mobile edge computing (MEC) while providing oasisoriented on-demand coverage for devices. Nevertheless, communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN, which makes it difficult to coordinate the resources. In this study, we propose a process-oriented framework to design communication and MEC systems in a time-division manner. In this framework, large-scale channel state information (CSI) is used to characterize the complex propagation environment at an affordable cost, where a nonconvex latency minimization problem is formulated. Subsequently, the approximated problem is provided, and it can be decomposed into sub-problems. These sub-problems are then solved iteratively. The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms, implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources, and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT.

Keywords: Cell-free Mobile edge computing     Non-terrestrial networks     Sixth-generation     Wide-area time-sensitive IoT    

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract:

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity infrastructure    

Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace

Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 114-119 doi: 10.15302/J-SSCAE-2019.10.001

Abstract:

The cyberspace has expanded from traditional internet to ubiquitous cyberspace which interconnects human, machines,things, services, and applications. The computing paradigm is also shifting from centralized computing in the cloud to combined computing in the front end, middle layer, and cloud. Therefore, traditional computing paradigms such as cloud computing and edge computing can no longer satisfy the evolving computing needs of big data in ubiquitous cyberspace. This paper presents a computing architecture named Fogcloud Computing for big data in ubiquitous cyberspace. Collaborative computing by multiple knowledge actors in the fog, middle layer, and cloud is realized based on the collaborative computing language and models, thereby providing a solution for big data computing in ubiquitous cyberspace.

Keywords: fogcloud computing     ubiquitous cyberspace     big data     Internet of Things     cloud computing    

Flexible Resource Scheduling for Software-Defined Cloud Manufacturing with Edge Computing Article

Chen Yang,Fangyin Liao,Shulin Lan,Lihui Wang,Weiming Shen,George Q. Huang

Engineering 2023, Volume 22, Issue 3,   Pages 60-70 doi: 10.1016/j.eng.2021.08.022

Abstract:

This research focuses on the realization of rapid reconfiguration in a cloud manufacturing environment to enable flexible resource scheduling, fulfill the resource potential and respond to various changes. Therefore, this paper first proposes a new cloud and software-defined networking (SDN)-based manufacturing model named software-defined cloud manufacturing (SDCM), which transfers the control logic from automation hard resources to the software. This shift is of significance because the software can function as the “brain” of the manufacturing system and can be easily changed or updated to support fast system reconfiguration, operation, and evolution. Subsequently, edge computing is introduced to complement the cloud with computation and storage capabilities near the end things. Another key issue is to manage the critical network congestion caused by the transmission of a large amount of Internet of Things (IoT) data with different quality of service (QoS) values such as latency. Based on the virtualization and flexible networking ability of the SDCM, we formalize the time-sensitive data traffic control problem of a set of complex manufacturing tasks, considering subtask allocation and data routing path selection. To solve this optimization problem, an approach integrating the genetic algorithm (GA), Dijkstra’s shortest path algorithm, and a queuing algorithm is proposed. Results of experiments show that the proposed method can efficiently prevent network congestion and reduce the total communication latency in the SDCM.

Keywords: Cloud manufacturing     Edge computing     Software-defined networks     Industrial internet of things     Industry 4.0    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

Development and Prospect of Edge Intelligence for Industrial Internet

Ren Yaodanjun, Qi Zhengwei, Guan Haibing, Chen Lei

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 104-111 doi: 10.15302/J-SSCAE-2021.02.014

Abstract:

As the industrial Internet deeply integrated with manufacturing, the drive capability of industrial intelligence becomes prominent regarding the digitization and informatization of the manufacturing industry. Meanwhile, new applications propose higher requirements for service quality. Edge intelligence, a product of edge computing and artificial intelligence, completes intelligent tasks using computing resources near the data origin. It can alleviate bandwidth transmission pressure, shorten service response delay, and protect the security of private data. Hence, edge intelligence provides a possible approach to satisfy the performance requirements in industrial intelligence applications. This study reviews the research status of cooperative computing, resource isolation, privacy protection, and other key technologies in edge intelligence. Then the typical applications of edge intelligence in equipment management services, production process automation, and manufacturing assistance in the industrial Internet are analyzed in detail. Moreover, the development trend of edge intelligence for the industrial Internet is analyzed in terms of business driving mode, industrial ecology composition, alliance role, and business model. Furthermore, relevant policy suggestions are proposed. We suggest that superior resources should be integrated to establish industry standards; investment increased in basic common resources to deepen the application of the industrial Internet; a good industrial ecology created in the subdivided fields; and university–enterprise cooperation promoted to cultivate interdisciplinary personnel.

Keywords: industrial Internet,edge computing,edge intelligence,cooperative computing,resource isolation    

Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT Article

Qian Wang, Siguang Chen, Meng Wu

Engineering 2023, Volume 31, Issue 12,   Pages 127-138 doi: 10.1016/j.eng.2022.10.014

Abstract:

The rapid development of artificial intelligence has pushed the Internet of Things (IoT) into a new stage. Facing with the explosive growth of data and the higher quality of service required by users, edge computing and caching are regarded as promising solutions. However, the resources in edge nodes (ENs) are not inexhaustible. In this paper, we propose an incentive-aware blockchain-assisted intelligent edge caching and computation offloading scheme for IoT, which is dedicated to providing a secure and intelligent solution for collaborative ENs in resource optimization and controls. Specifically, we jointly optimize offloading and caching decisions as well as computing and communication resources allocation to minimize the total cost for tasks completion in the EN. Furthermore, a blockchain incentive and contribution co-aware federated deep reinforcement learning algorithm is designed to solve this optimization problem. In this algorithm, we construct an incentive-aware blockchain-assisted collaboration mechanism which operates during local training, with the aim to strengthen the willingness of ENs to participate in collaboration with security guarantee. Meanwhile, a contribution-based federated aggregation method is developed, in which the aggregation weights of EN gradients are based on their contributions, thereby improving the training effect. Finally, compared with other baseline schemes, the numerical results prove that our scheme has an efficient optimization utility of resources with significant advantages in total cost reduction and caching performance.

Keywords: Computation offloading     Caching     Incentive     Blockchain     Federated deep reinforcement learning    

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011

Abstract:

The new generation of information and communications technology is deeply integrated with the industrial system. The industrial Internet promotes the ubiquitous and deep interconnection and comprehensive perception of human, machines, and things. The industrial Internet equipment becomes increasingly networked, digital, and intelligent; therefore, the network security design, application management, and protection of these equipment become increasingly important. In this study, we clarify the connotation, protection scope, and requirements of the industrial Internet equipment, and summarize the development status of industrial Internet in China and abroad from the aspects of security control and security certification. Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection for the industrial internet equipment in China are discussed. Furthermore, several development suggestions are proposed. Specifically, the network security access mechanism of the industrial Internet equipment should be improved at the national level, a network security testing and certification system for the equipment should be established, research on the network security architecture and engineering application of the equipment should be promoted, and the network security risk monitoring and perception of the equipment should be strengthened.

Keywords: industrial Internet equipment     network security     management     protection     certification    

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006

Abstract:

Although cybersecurity legislation has made some progress since the 18th National Congress of the Communist Party of China, there is still a large gap between the law and development of cybersecurity and informatization and the requirements of the public. In addition, many problems exist in the fields of legislation, enforcement, administration, and legality. Some people, both at home and abroad, question China's efforts in the legislation of cybersecurity. Based on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurity legislation and improve the legal system, particularly in order to enact cybersecurity law, e-commercial law, administrative law for cyber information service, personal information protection law, e-government law, information and telecommunication network law, and administrative law for cyber society, supported by matched regulations and by laws. In this way, a perfected legal system for cybersecurity will be achieved.

Keywords: networks     Internet     cybersecurity     cybersecurity law     legal system    

中国联网大会

Conference Date: 30 Oct 2019

Conference Place: 中国/湖北/武汉

Administered by: 中国电子学会、中国通信学会

A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1354-1368 doi: 10.1631/FITEE.2100518

Abstract: Smart meters in the generate a large amount of power data. However, data privacy in the process of calculation, storage, and transmission is an urgent problem to be solved. Therefore, in this paper we propose a power resource dispatching framework (PRDF) with a privacy protection function, which uses a scheme based on . Using pseudonyms and aggregating users’ power data, PRDF not only protects users’ privacy, but also reduces the computing cost and communication overhead under traditional cloud computing. In addition, if the control center finds that a user has submitted abnormal data, it can send a request to the user management center to track the real identity of the user. Our scheme satisfies security requirements based on the , including confidentiality and unforgeability. Furthermore, we compare our scheme with other schemes by simulations. Simulation results show that compared with traditional methods, our method performs better in terms of the computation cost.

Keywords: Power Internet of Things     Cloud-fog cooperation     Elliptic curve     Random oracle model     Certificateless aggregate signcryption    

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Strategic Study of CAE 2004, Volume 6, Issue 1,   Pages 10-15

Abstract:

The content of computer network security is discussed in this article Firstly, the concept, system and structure and model of computer network security are given. Then the main content and correlative researching aspect are included. In the end, the main product is introduced.

Keywords: computer     network     system     security    

Development Strategy for Application of the Internet of Things in China’s Aquaculture Industry

Yang Ningsheng,Yuan Yongming and Sun Yingze

Strategic Study of CAE 2016, Volume 18, Issue 3,   Pages 57-61 doi: 10.15302/J-SSCAE-2016.03.009

Abstract:

Based on the analysis of the present situation and problems in application of Internet of Things(IoT) technology in Chinese aquaculture, this paper puts forward some key technical issues and policy suggestions for the development of the IoT. At the moment, IoT technology has been used in the aquaculture industry for water quality monitoring, breeding area monitoring and management, livestock germination monitoring, aquaculture product storage and transport, and supervision of processing procedures. During this early development stage, China is faced with a number of challenges in the application of this technology, including: Backward extensive aquaculture practice and poor infrastructures; lack of advanced equipment and unified standards; and the need of large sum investment and high costs. A number of key technological issues should be solved in order to improve IoT application in this industry, including: precise aquaculture sensor technology for precise breeding simulation technology, precise intelligent control technology for aquaculture equipment, precise aquaculture management technology, and precise integrated production technology for large-scale aquaculture. Finally, this paper makes suggestions to relevant government agencies on the formulation of an comprehensive development plan for China aquaculture IoT technology to enhance industrial informatization and optimize the application facilities for IoT, initiate a research and development program for precise aquaculture environmental sensor technology, advance the implementation of aquaculture IoT demonstration projects, and upgrade the government’s capacity for promoting the commercialization of aquaculture IoT.

Keywords: aquaculture     Internet of Things     development strategy    

Title Author Date Type Operation

Generation of noise-like pulses and soliton rains in a graphene mode-locked erbium-doped fiber ring laser

Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi,yangkangle@sgepri.sgcc.com.cn

Journal Article

Edge Computing Technology: Development and Countermeasures

Hong Xuehai and Wang Yang

Journal Article

MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things

Chengxiao Liu, Wei Feng, Xiaoming Tao, Ning Ge

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace

Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin

Journal Article

Flexible Resource Scheduling for Software-Defined Cloud Manufacturing with Edge Computing

Chen Yang,Fangyin Liao,Shulin Lan,Lihui Wang,Weiming Shen,George Q. Huang

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

Development and Prospect of Edge Intelligence for Industrial Internet

Ren Yaodanjun, Qi Zhengwei, Guan Haibing, Chen Lei

Journal Article

Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT

Qian Wang, Siguang Chen, Meng Wu

Journal Article

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Journal Article

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Journal Article

中国联网大会

30 Oct 2019

Conference Information

A power resource dispatching framework with a privacy protection function in the Power Internet of Things

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Journal Article

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Journal Article

Development Strategy for Application of the Internet of Things in China’s Aquaculture Industry

Yang Ningsheng,Yuan Yongming and Sun Yingze

Journal Article