Matches in SemOpenAlex for { <https://semopenalex.org/work/W1851456423> ?p ?o ?g. }
Showing items 1 to 58 of
58
with 100 items per page.
- W1851456423 endingPage "2385" @default.
- W1851456423 startingPage "2383" @default.
- W1851456423 abstract "The phrase ‘Big Data’ refers to large, diverse, complex, longitudinal, and/or distributed data sets generated from instruments, sensors, Internet transactions, email, video, click streams, and/or all other digital sources available today and in the future, as defined by U.S. National Science Foundation in its recent solicitation. The research of Big Data will accelerate the progress of scientific discovery and innovation; lead to new fields of inquiry that would not otherwise be possible, encourage the development of new data analytic tools and algorithms; facilitate scalable, accessible, and sustainable data infrastructure; increase understanding of human and social processes and interactions; and promote economic growth and improved health and quality of life. The new knowledge, tools, practices, and infrastructures produced will enable breakthrough discoveries and innovation in science, engineering, medicine, commerce, education, and national security. Big Data presents critical requirements for security in data collection and transmission of selected data through a communication network. This special issue contains 11 papers selected from submissions to the open call for papers on Security in Big Data. These papers highlight some of the current research interests and achievements in the area of security in Big Data. The wide use of high-performance image acquisition devices and powerful image-processing software has made it easy to tamper images for malicious purposes. The paper by Zhang et al. proposes an effective framework for revealing image-splicing forgery. The experiment results show that the proposed method can perform better than some state-of-the-art methods in terms of the detection performance over the Columbia image-splicing detection evaluation data set. Network coding has emerged some exciting future because of its smart technology in wireless sensor networks. At the same time, it is facing security attacks, especially conspiracy attack. The paper by Du et al. proposes a weakly secure scheme from the perspective of topology. Considering the performance of this scheme, an advanced scheme is put forward later. Simulations show that the two strategies can prevent cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node, and the performance of advanced scheme is better. Traditionally, jamming to the wireless system is a fatal threat to the security of home area networks (HANs), which impedes the two-way data transmission between electric devices and the smart meter and thus deteriorates the reliability of the in-home communication of Smart Grid. The paper by Li et al. incorporates the power line system into the HAN and proposes a hybrid architecture of orthogonal frequency-division multiplexing-based wireless communication and power line communication for the Smart Grid security application. With this new solution, the channel diversity of the HAN is realized, and the communication reliability is still guaranteed even when the wireless channel suffers from jamming. Information of multi-cells is big data because of the enormous quantities of various cells as well as their parameters and status. To securely and efficiently integrate all the cells' information and trace multi-cells are challenging because of varying number of the multi-cells, as well as the complicacy of the multi-cells' movement. The paper by Yin and Sun proposes an automatic big data integration algorithm based on the optical transfer function. The experimental results show that the algorithm can securely and efficiently integrate all the cell information and simultaneously track a large quantity of cells. Real-time digital video presents great challenges on processing and storage and is a typical example in Big Data. How to secure and efficiently transmit digital video is critical. The paper by Zhang et al. uses the distributed compressed sensing to deal with video coding. To reduce the orthogonal matching pursuit algorithm computational complexity, quantum-behaved particle swarm optimization algorithm is used to reconstruct video signal. Simulation results demonstrate that it can obtain the better reconstructed video with low sample value and it can guarantee safety performance. Wireless image sensor network generates a large number of images from the distributed camera sensors. The image data need to be delivered securely and efficiently to the sink in many circumstances. The current node-disjoint multipath and dispersive routings cannot provide enough security and efficiency for the image data collection and transportation. The paper by Su and Hu proposes an ellipse batch dispersive routing algorithm to address the secure and efficient data collection issue in wireless image sensor network. The smart grid system is composed of the power infrastructure and communication infrastructure and thus is characterized by the flow of electric power and information, respectively. The 24/7 information collection and transmission in smart grid is a good example of Big Data. The transmission of Big Data in smart grid needs wireless network, which introduces additional vulnerabilities, given the scale of potential threats. Therefore, the physical layer security issue is of first priority in the study of smart grid and has already attracted substantial attention in the industry and academia. The paper by Wang et al. aims to present a general overview of the physical layer security in wireless smart grid and covers the effective countermeasures proposed in the literature of smart grid to date. Security is a very broad topic; particular attention has been paid in communications, networking on security issues. However, in practical applications, providing security services increases the computation and the occupation of system resources. This problem is particularly important when energy is a limited resource for mobile communication devices operating on battery. Thus, energy-efficient security devices are very necessary for the communication. The paper by Yuan and Liang designed a new low voltage, low power consumption comparator for successive approximation register analog to digital converter to improve the energy efficiency in the problem of secure communication. Big data presents critical requirements for security in data collection and transmission of selected data through a communication network. The paper by Chen et al. presents a new secure transmission for big data based on nested sparse sampling and coprime sampling. With nested sampling and coprime sampling, besides the advantage of higher spectrum efficiency, big data could also achieve higher power spectral density for binary frequency shift keying signal. It proves that both nested sampling and coprime sampling could be used in big data transmission to resist interference, while guaranteeing the transmission performance. With the rapid adoption of cloud storage services, a great deal of data is being stored at remote servers, so a new technology, client-side deduplication, which stores only a single copy of repeating data, is proposed to identify the client's deduplication and save the bandwidth of uploading copies of existing files to the server. It was recently found, however, that this promising technology is vulnerable to a new kind of attack in which by learning just a small piece of information about the file, namely, its hash value, an attacker is able to obtain the entire file from the server. The paper by Yang et al. proposes a cryptographically secure and efficient scheme for a client to prove to the server his ownership on the basis of actual possession of the entire original file instead of only partial information about it. The paper by Wang et al. presents the definitions of big data and anomaly detection. The theory of ultra-wideband radar and the through-wall detection of a human model based on ultra-wideband radar are briefly introduced. The target criterion with wavelet packet transform is deduced, and the procedure for the through-wall human detection with statistical process control is constructed. The radar echo signals are collected at stationary and moving statuses of a human being for three types of walls. The experimental results demonstrate the effective of through-wall target detection based on the proposed algorithm. We would like to thank all authors for contributing papers to the special issue. We appreciate the staff of Security and Communication Networks for their support in editing this special issue. Qilian Liang is a University Distinguished Scholar Professor in the Department of Electrical Engineering, University of Texas at Arlington. He received the BS degree from Wuhan University in 1993, MS degree from Beijing Uni- versity of Posts and Telecommunica- tions in 1996, and PhD degree from University of Southern California (USC) in May 2000, all in Electrical Engineering. Prior to joining UTA in August 2002, he was a Member of Technical Staff in Hughes Network Systems Inc. at San Diego, California. His research interests include wireless sensor networks, wireless communications, signal processing, information theory, radar systems, and wireless networks. Dr. Liang has published more than 270 journal and conference papers. He received 2002 IEEE Transactions on Fuzzy Systems Outstanding Paper Award, 2003 U.S. Office of Naval Research (ONR) Young Investigator Award, 2005 UTA College of Engineering Outstanding Young Faculty Award, 2007, 2009, 2010 U.S. Air Force Summer Faculty Fellowship Program Award, 2012 UTA College of Engineering Excellence in Research Award, 2013 UTA Outstanding Research Achievement or Creative Activity Award, and was inducted into UTA Academy of Distinguished Scholars in 2015. Jian Ren received the BS and MS degrees both in mathematics from Shaanxi Normal University and received the PhD degree in EE from Xidian University, China. He is an Associate Professor in the Department of ECE at Michigan State University. His current research interests include cryptography, network security, energy efficient sensor network security protocol design, privacy-preserving communications, secure and efficient cloud computing, and cognitive networks. He is a recipient of the US National Science Foundation Faculty Early Career Development (CAREER) award in 2009. Dr. Ren is a senior member of the IEEE. Jing Liang received the BS and MS degrees from Beijing University of Posts and Telecommunications, China in 2003 and 2006, respectively, and PhD degree from University of Texas at Arlington in August 2009, all in Electrical Engineering. She is currently a Professor in the Department of Electrical Engineering at University of Electronic Science and Technology of China. Her current research interests include radar sensor networks, collaborative and distributed signal processing, wireless communications, wireless networks, and fuzzy logic systems. Baoju Zhang is a Professor at the College of Physical and Electrical Information, Tianjin Normal Uni- versity. She received the BS degree from Tianjin Normal University in 1990, MS degree from Tianjin Nor- mal University in 1993, and PhD degree from Tianjin University in 2002. She was a Postdoctoral Fellow at Tianjin University from 2002 to 2004. Her research interests include radar sensor networks, digital audio and video technology, image compressing and coding, and compressive sensing. Yiming Pi was born in 1968 in China. He obtained PhD degree in Electronic Engineering from University of Electronic Science and Technology of China in 1993. Since 2002, he has been a Professor of Department of EE, University of Electronic Science and Technology of China. He is a councilor of Signal Processing Society in the Chinese Institute of Electronics and has served in organizing several international conferences in the field of Signal Processing and Radar Systems. He became IEEE Senior Member in 2011. He had been the leaders of some Natural Science Funding of China. He has more than 100 publications in the conferences and journals of IEEE/IET. His research interests are radar imaging, signal processing and terahertz technology, and so on. Chenglin Zhao received his BS degree in Tianjin University in 1986, MS degree and PhD degree in Beijing University of Posts and Telecommu- nications in 1993 and 1997, respec- tively. He is a Professor of the Key Lab of the ubiquitous wireless of Education Ministry, Information and Telecommunication engineering college, Beijing University of Post and Telecommunication. His main research areas include radar sensor networks, wireless broadband interconnection, wireless sensor network, and digital signal processing and its applications." @default.
- W1851456423 created "2016-06-24" @default.
- W1851456423 creator A5001325170 @default.
- W1851456423 creator A5034763948 @default.
- W1851456423 creator A5037378054 @default.
- W1851456423 creator A5052175115 @default.
- W1851456423 creator A5063481738 @default.
- W1851456423 creator A5076476995 @default.
- W1851456423 date "2015-08-17" @default.
- W1851456423 modified "2023-09-25" @default.
- W1851456423 title "Security in big data" @default.
- W1851456423 doi "https://doi.org/10.1002/sec.1332" @default.
- W1851456423 hasPublicationYear "2015" @default.
- W1851456423 type Work @default.
- W1851456423 sameAs 1851456423 @default.
- W1851456423 citedByCount "8" @default.
- W1851456423 countsByYear W18514564232016 @default.
- W1851456423 countsByYear W18514564232017 @default.
- W1851456423 countsByYear W18514564232018 @default.
- W1851456423 countsByYear W18514564232020 @default.
- W1851456423 countsByYear W18514564232022 @default.
- W1851456423 crossrefType "journal-article" @default.
- W1851456423 hasAuthorship W1851456423A5001325170 @default.
- W1851456423 hasAuthorship W1851456423A5034763948 @default.
- W1851456423 hasAuthorship W1851456423A5037378054 @default.
- W1851456423 hasAuthorship W1851456423A5052175115 @default.
- W1851456423 hasAuthorship W1851456423A5063481738 @default.
- W1851456423 hasAuthorship W1851456423A5076476995 @default.
- W1851456423 hasBestOaLocation W18514564231 @default.
- W1851456423 hasConcept C124101348 @default.
- W1851456423 hasConcept C38652104 @default.
- W1851456423 hasConcept C41008148 @default.
- W1851456423 hasConcept C75684735 @default.
- W1851456423 hasConceptScore W1851456423C124101348 @default.
- W1851456423 hasConceptScore W1851456423C38652104 @default.
- W1851456423 hasConceptScore W1851456423C41008148 @default.
- W1851456423 hasConceptScore W1851456423C75684735 @default.
- W1851456423 hasIssue "14" @default.
- W1851456423 hasLocation W18514564231 @default.
- W1851456423 hasOpenAccess W1851456423 @default.
- W1851456423 hasPrimaryLocation W18514564231 @default.
- W1851456423 hasRelatedWork W1604607099 @default.
- W1851456423 hasRelatedWork W2324773701 @default.
- W1851456423 hasRelatedWork W2748952813 @default.
- W1851456423 hasRelatedWork W2899084033 @default.
- W1851456423 hasRelatedWork W2960264696 @default.
- W1851456423 hasRelatedWork W2996718840 @default.
- W1851456423 hasRelatedWork W3119279547 @default.
- W1851456423 hasRelatedWork W4247566972 @default.
- W1851456423 hasRelatedWork W4311950624 @default.
- W1851456423 hasRelatedWork W3090563135 @default.
- W1851456423 hasVolume "8" @default.
- W1851456423 isParatext "false" @default.
- W1851456423 isRetracted "false" @default.
- W1851456423 magId "1851456423" @default.
- W1851456423 workType "article" @default.