Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiang Xinghao is active.

Publication


Featured researches published by Jiang Xinghao.


Journal of Systems Engineering and Electronics | 2008

Distributed intrusion detection for mobile ad hoc networks

Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

Abstract Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.


Journal of Systems Engineering and Electronics | 2007

Multi-agent cooperative intrusion response in mobile adhoc networks

Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua

The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.


Information Security and Communications Privacy | 2008

An Improved Secure Routing Protocol For Ad hoc Network

Jiang Xinghao


Archive | 2016

Group anomaly detection method based on a dense optical flow histogram

Sun Yanfeng; Jiang Xinghao; Shen Maying; Zheng Hui; Zhou Pei


Archive | 2016

Layered stack based violent group behavior detection method

Sun Yanfeng; Jiang Xinghao; Mi Yang; Zhou Pei; Jiang Hua


Archive | 2015

Multi-key image-based image content retrieval method

Sun Yanfeng; Jiang Xinghao; Cao Jinqi; Yu Hao; He Peisong


Journal of Shanghai Jiaotong University | 2010

A Robust Adaptive Differential Energy Video Watermarking Algorithm

Shi Shu-sen; Jiang Xinghao


Archive | 2017

Method for intelligently implanting video contents based on Faster R-CNN model

Sun Tan-feng; Jiang Xinghao; Xu Ke


Archive | 2017

Video human body interaction motion identification method based on optical flow graph depth learning model

Jiang Xinghao; Sun Tan-feng; Zhao Yang


Archive | 2017

Double-compression detection method by using quantification factor same as H.264 video

Jiang Xinghao; Sun Tan-feng; Xie Feng

Collaboration


Dive into the Jiang Xinghao's collaboration.

Top Co-Authors

Avatar

Sun Tan-feng

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Yi Ping

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Li Jianhua

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Liu Ning

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Wu Yue

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Zou Futai

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge