Miao Du

Orcid: 0000-0002-7303-8726

According to our database1, Miao Du authored at least 43 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MDBES-Net: Building Extraction From Remote Sensing Images Based on Multiscale Decoupled Body and Edge Supervision Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2023
HPCchain: A Consortium Blockchain System Based on CPU-FPGA Hybrid-PUF for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

Strategic UAV-Assisted Game Model for Detection in Covert Communication.
IEEE Trans. Veh. Technol., June, 2023

2022
DMADRL: A Distributed Multi-agent Deep Reinforcement Learning Algorithm for Cognitive Offloading in Dynamic MEC Networks.
Neural Process. Lett., 2022

Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals.
Mob. Networks Appl., 2022

Anti-Collusion Multiparty Smart Contracts for Distributed Watchtowers in Payment Channel Networks.
IEEE J. Sel. Areas Commun., 2022

2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021

QoE-Based Task Offloading With Deep Reinforcement Learning in Edge-Enabled Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Scalar Quantization as Sparse Least Square Optimization.
IEEE Trans. Pattern Anal. Mach. Intell., 2021

An Adaptive Neural Architecture Search Design for Collaborative Edge-Cloud Computing.
IEEE Netw., 2021

Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021

2020
Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security.
IEEE Wirel. Commun., 2020

An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Differential Privacy Preserving of Training Model in Wireless Big Data with Edge Computing.
IEEE Trans. Big Data, 2020

Edge QoE: Computation Offloading With Deep Reinforcement Learning for Internet of Things.
IEEE Internet Things J., 2020

Tornado: Enabling Blockchain in Heterogeneous Internet of Things Through a Space-Structured Approach.
IEEE Internet Things J., 2020

2019
A Differential Privacy-Based Query Model for Sustainable Fog Data Centers.
IEEE Trans. Sustain. Comput., 2019

Fully Dense Neural Network for the Automatic Modulation Recognition.
CoRR, 2019

Multi-layer Attention Mechanism for Speech Keyword Recognition.
CoRR, 2019

An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things.
IEEE Commun. Mag., 2018

2017
Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid.
IEEE Trans. Smart Grid, 2017

Bayesian Game Based Pseudo Honeypot Model in Social Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.
ACM Trans. Embed. Comput. Syst., 2016

Attack Detection and Distributed Forensics in Machine-to-Machine Networks.
IEEE Netw., 2016

Opaque Response Generation Enabling Automatic Creation of Virtual Services for Service Virtualisation.
CoRR, 2016

Optimal active detection in machine-to-machine mobile networks: A repeated game approach.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Opaque service virtualisation: a practical tool for emulating endpoint systems.
Proceedings of the 38th International Conference on Software Engineering, 2016

Enhanced playback of automated service emulation models using entropy analysis.
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016

2015
Interaction Traces Mining for Efficient System Responses Generation.
ACM SIGSOFT Softw. Eng. Notes, 2015

Adaptive Automation: Leveraging Machine Learning to Support Uninterrupted Automated Testing of Software Applications.
CoRR, 2015

From Network Traces to System Responses: Opaquely Emulating Software Services.
CoRR, 2015

Study on the Accident-causing Model Based on Safety Region and Applications in China Railway Transportation System.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

2014
Isolation and handling of sensor faults in nonlinear systems.
Autom., 2014

2013
Generating service models by trace subsequence substitution.
Proceedings of the 9th international ACM SIGSOFT conference on Quality of Software Architectures, 2013

Actuator and sensor fault isolation of nonlinear systems.
Proceedings of the American Control Conference, 2013

2012
Active fault isolation of nonlinear systems.
Proceedings of the American Control Conference, 2012

2011
A safe-parking and safe-switching framework for fault-tolerant control of switched nonlinear systems.
Int. J. Control, 2011

Integrated fault diagnosis and robust safe-parking for fault-tolerant control of nonlinear systems.
Proceedings of the American Control Conference, 2011

Fault detection and isolation and safe-parking of networked systems.
Proceedings of the American Control Conference, 2011

2010
Uniting Safe-parking and reconfiguration-based approaches for fault-tolerant control of switched nonlinear systems.
Proceedings of the American Control Conference, 2010

2007
Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Optimal Control of Formation Flight Based on MLD Systems.
Proceedings of the IEEE International Conference on Control Applications, 2007


  Loading...