Filters








193 Hits in 1.7 sec

Recent Advances in Transducers for Intravascular Ultrasound (IVUS) Imaging

Chang Peng, Huaiyu Wu, Seungsoo Kim, Xuming Dai, Xiaoning Jiang
2021 Sensors  
Peng et al. [103] developed a three-phased synchronous electromagnetic micromotor, which had a dimension of 1.2 mm × 3.7 mm and a maximum rotating speed of 16,500 rpm.  ... 
doi:10.3390/s21103540 pmid:34069613 pmcid:PMC8160965 fatcat:xoohobhhvnfcdjewxg3qfpse7q

Is link signature dependable for wireless security?

Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning
2013 2013 Proceedings IEEE INFOCOM  
Link signature, which refers to the unique and reciprocal wireless channel between a pair of transceivers, has gained significant attentions recently due to its effectiveness in signal authentication and shared secret construction for various wireless applications. A fundamental assumption of this technique is that the wireless signals received at two locations separated by more than half a wavelength are essentially uncorrelated. However, it has been shown in literatures that in certain
more » ... tances, e.g., when there is poor scattering and/or a strong line-of-sight (LOS) component, this assumption is invalid. In this paper, a Correlation ATtack (CAT) is proposed to demonstrate the potential vulnerability of the link signature based security mechanisms in such circumstances. Based on statistical inference, CAT explicitly exploits the spatial correlations to recover the legitimate link signature from the observations of multiple adversary receivers deployed in vicinity. The effectiveness of CAT is verified both through theoretical analysis and well-known channel correlation modeling. Our findings are corroborated by experiments on USRP platforms and GNURadio.
doi:10.1109/infcom.2013.6566763 dblp:conf/infocom/HeDSN13 fatcat:uflfp7fepfdlffyyuyontdruey

MAC Design of Uncoordinated FH-Based Collaborative Broadcast

Liang Xiao, Huaiyu Dai, Peng Ning
2012 IEEE Wireless Communications Letters  
Ning are with NC State University, Raleigh, NC 27695 (email: {huaiyu dai, pning}@ncsu.edu). The work by L.  ... 
doi:10.1109/wcl.2012.041012.120162 fatcat:qlhxtxh76baqtmkul7xxb3frla

Dynamic Adaptive Anti-Jamming via Controlled Mobility

Xiaofan He, Huaiyu Dai, Peng Ning
2014 IEEE Transactions on Wireless Communications  
In this work, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer's action is crucial. In our study, antijamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of one intelligent mobile jammer which can respond to the evasion of legitimate nodes as well. Based on spectral graph theory, two new spectral
more » ... quantities, single-and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. Both analytical and simulation results are presented to justify the effectiveness of the proposed approach.
doi:10.1109/twc.2014.2320973 fatcat:mrmoytqkinb6bjpumdlvw5gqta

Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication

Yao Liu, Peng Ning, Huaiyu Dai, An Liu
2010 2010 Proceedings IEEE INFOCOM  
Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional antijamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming
more » ... oadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit "0" is encoded using two different spreading codes, which have low correlation with each other, while bit "1" is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.
doi:10.1109/infcom.2010.5462156 dblp:conf/infocom/LiuNDL10 fatcat:pxe4f7gfejggjezfrjkcksruqq

A Byzantine attack defender: The Conditional Frequency Check

Xiaofan He, Huaiyu Dai, Peng Ning
2012 2012 IEEE International Symposium on Information Theory Proceedings  
Collaborative spectrum sensing is vulnerable to the Byzantine attack. Existing reputation based countermeasures will become incapable when malicious users dominate the network. Also, there is a scarcity of methods that fully explore the Markov property of the spectrum states to restrain sensors' statistical misbehaviors. In this paper, a new malicious user detection method based on two proposed Conditional Frequency Check (CFC) statistics is developed with a Markovian spectrum model. With the
more » ... sistance of one trusted sensor, the proposed method can achieve high malicious user detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance.
doi:10.1109/isit.2012.6284709 dblp:conf/isit/HeDN12 fatcat:enuupn2efjdh7lw4x5anmh3hye

Dynamic adaptive anti-jamming via controlled mobility

Xiaofan He, Huaiyu Dai, Peng Ning
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
In this work, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer's action is crucial. In our study, antijamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of one intelligent mobile jammer which can respond to the evasion of legitimate nodes as well. Based on spectral graph theory, two new spectral
more » ... quantities, single-and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. Both analytical and simulation results are presented to justify the effectiveness of the proposed approach.
doi:10.1109/cns.2013.6682686 dblp:conf/cns/HeDN13 fatcat:frzcyo2cwrg7zhvzbe24kbclke

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta
2014 2015 IEEE Global Communications Conference (GLOBECOM)  
Intrusion detection systems (IDSs) assume increasingly importance in past decades as information systems become ubiquitous. Despite the abundance of intrusion detection algorithms developed so far, there is still no single detection algorithm or procedure that can catch all possible intrusions; also, simultaneously running all these algorithms may not be feasible for practical IDSs due to resource limitation. For these reasons, effective IDS configuration becomes crucial for real-time intrusion
more » ... detection. However, the uncertainty in the intruder's type and the (often unknown) dynamics involved with the target system pose challenges to IDS configuration. Considering these challenges, the IDS configuration problem is formulated as an incomplete information stochastic game in this work, and a new algorithm, Bayesian Nash-Q learning, that combines conventional reinforcement learning with a Bayesian type identification procedure is proposed. Numerical results show that the proposed algorithm can identify the intruder's type with high fidelity and provide effective configuration.
doi:10.1109/glocom.2014.7417158 dblp:conf/globecom/HeDND15 fatcat:3zlfniwxqjcwnnytuwqgtu6aqe

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta
2015 2015 IEEE Global Communications Conference (GLOBECOM)  
Intrusion detection systems (IDSs) assume increasingly importance in past decades as information systems become ubiquitous. Despite the abundance of intrusion detection algorithms developed so far, there is still no single detection algorithm or procedure that can catch all possible intrusions; also, simultaneously running all these algorithms may not be feasible for practical IDSs due to resource limitation. For these reasons, effective IDS configuration becomes crucial for real-time intrusion
more » ... detection. However, the uncertainty in the intruder's type and the (often unknown) dynamics involved with the target system pose challenges to IDS configuration. Considering these challenges, the IDS configuration problem is formulated as an incomplete information stochastic game in this work, and a new algorithm, Bayesian Nash-Q learning, that combines conventional reinforcement learning with a Bayesian type identification procedure is proposed. Numerical results show that the proposed algorithm can identify the intruder's type with high fidelity and provide effective configuration.
doi:10.1109/glocom.2015.7417158 fatcat:cp2fc4naobg43ew3f56gjpogfe

A Mimo Receiver SOC for CDMA Applications

Tongtong Chen, Zhengtao Yu, Yuantao Peng, Yanbin Zhang, Huaiyu Dai, Xun Liu
2006 2006 IEEE International SOC Conference  
In this paper, we present a Systems-on-Chip (SoC) design for the 3G Code Division Multiple Access (CDMA) receiver using the multiple-input multiple-output (MIMO) technique. Our chip integrates the entire digital signal processing part of the receiver. Furthermore, the proposed design can be reconfigured in real-time to handle different modulation schemes based on the signal-to-noise ratio, resulting in the highly efficient use of spectrum and energy. Designed using a 0.18 m standard cell
more » ... , our chip has a core area of 20 mm ¾ and achieves a maximal throughput of 5 Mbps in simulation with 610 mW power dissipation.
doi:10.1109/socc.2006.283897 dblp:conf/socc/ChenYPZDL06 fatcat:lo5ajm3ugfaktixwgnbih4stia

Research of Interindividual Differences in Physiological Response under Hot-Dry and Warm-Wet Climates

Shilei Lu, Linwei Sun, Huaiyu Peng, Liran Ji
2016 Sustainability  
Author Contributions: Shilei Lu conceived the research and designed the experiments; Linwei Sun wrote and improved the paper; Huaiyu Peng and Liran Ji performed the experiments; Huaiyu Peng and Linwei  ... 
doi:10.3390/su8090850 fatcat:noxdxfavenglvjfubanxhcnplu

Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks

Liang Xiao, Huaiyu Dai, Peng Ning
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
We propose in [1] a collaborative broadcast scheme for wireless networks, which applies the Uncoordinated Frequency Hopping (UFH) technique to counteract jamming and exploits node cooperation to enhance broadcast efficiency. In this scheme, some nodes that already obtain the broadcast message are selected to relay the message to other nodes. In this paper, we extend the study to the generalized multihop network scenarios, and provide solutions for important related issues, such as the relay
more » ... selection, multiple access control, relay channel selection and packet scheduling. We also study the spatial and frequency (channel) diversity provided by the collaborative broadcast. Simulation results show that the collaborative broadcast achieves low broadcast delay, with low energy consumption and small computational overhead in multihop networks.
doi:10.1109/glocom.2011.6133541 dblp:conf/globecom/XiaoDN11 fatcat:amlbwbntffh3tbrqii44agix7i

Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping

Liang Xiao, Huaiyu Dai, Peng Ning
2012 IEEE Transactions on Information Forensics and Security  
Email: {huaiyu dai,pning}@ncsu.edu.  ... 
doi:10.1109/tifs.2011.2165948 fatcat:7hl7ligsy5g2pl7chwrkvuf5c4

Occipital condyle-c1 complex screw for fixation of basilar invagination patients with atlas assimilation

Huaiyu Tong, Lianfeng Li, Xin-guang Yu, Yuanzheng Zhang, Wang Peng
2015 Turkish Neurosurgery  
Early OC fixation techniques using cable fixation had a high rate of failure. For this reason, they were supplanted with rigid posterior fixation systems involving plates and screws or rods and screws because these have higher rates of fusion and provide better biomechanical stability (1,4,6, 8, 13, 19, 20) . However, there is still no currently available system that is totally satisfactory. For the OC fixation systems, most of the limitations involve the cephalad part of the construct (24),
more » ... ause instrumentation can often not be easily attached to the occiput. To date, various plate constructs have been developed that use multiple fixation points to adjust for differences in the thickness of the lateral occipital bone and of AIm: To investigate whether C1-occipital condyle complex (CC complex) screws can be safely and rapidly placed without guidance in basilar invagination patients with atlas assimilation. mATERIAl and mEThODS: The occipital-cervical (OC) junction was fixed posteriorly in 8 basilar invagination patients with atlas assimilation using polyaxial titanium screws inserted unicortically into the CC complex and C2 pedicles and subsequent fixation to a 3-mm rod. Anatomic landmarks were used during the drilling. The screw angles and lengths of the CC complex were analyzed. RESUlTS: The width, length, and height values of the left-side CC complex were 7.96±2.23, 16.06±2.73, and 13.76±2.06 mm; those of the right-side CC complex were 7.84±1.38, 16.66±2.58, and 12.81±2.62 mm. The CC complex entry point was at the central point of posterior surface of the CC complex. The angle used for medialization was 10-15°, which was also the maximal superior screw angulation in the sagittal plane. The screw length required for unicortical purchase was 16-22 mm. The screw was not misplaced or poorly positioned, and no neurovascular complications associated with screw insertion were detected. CONClUSION: In patients with atlas assimilation, CC complex screws can be placed safely. The CC complex screws can be safely inserted assisted by microscope without image guidance.
doi:10.5137/1019-5149.jtn.10551-14.5 pmid:27438621 fatcat:xnkswnuc3naz3e6smvtm3dtgma

Improving learning and adaptation in security games by exploiting information asymmetry

Xiaofan He, Huaiyu Dai, Peng Ning
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
With the advancement of modern technologies, the security battle between a legitimate system (LS) and an adversary is becoming increasingly sophisticated, involving complex interactions in unknown dynamic environments. Stochastic game (SG), together with multi-agent reinforcement learning (MARL), offers a systematic framework for the study of information warfare in current and emerging cyber-physical systems. In practical security games, each player usually has only incomplete information about
more » ... the opponent, which induces information asymmetry. This work exploits information asymmetry from a new angle, considering how to exploit local information unknown to the opponent to the player's advantage. Two new MARL algorithms, termed minimax-PDS and WoLF-PDS, are proposed, which enable the LS to learn and adapt faster in dynamic environments by exploiting its private local information. The proposed algorithms are provably convergent and rational, respectively. Also, numerical results are presented to show their effectiveness through two concrete anti-jamming examples.
doi:10.1109/infocom.2015.7218560 dblp:conf/infocom/HeDN15 fatcat:wgu4e4jgvjaq7dtp3nye64nbmq
« Previous Showing results 1 — 15 out of 193 results