Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lin Fuhong is active.

Publication


Featured researches published by Lin Fuhong.


China Communications | 2014

Big Data security and privacy: A review

Bardi Matturdi; Zhou Xianwei; Li Shuai; Lin Fuhong

While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy.


China Communications | 2014

Cooperative differential game for model energy-bandwidth efficiency tradeoff in the Internet of Things

Lin Fuhong; Liu Qian; Zhou Xianwei; Chen Yueyun; Huang Daochao

Internet of Things (IoT) refers to an infrastructure which enables the forms of communication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy consumption in the IoT in this paper. A service providing model is built to find the relationship between bandwidth and energy consumption using a cooperative differential game model. The game solution is gotten in the condition of grand coalition, feedback Nash equilibrium and intermediate coalitions and an allocation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the performance of IoT decreases with the increasing of bandwidth cost or with the decreasing of energy cost; secondly, all the nodes in the IoT composing a grand coalition can save bandwidth and energy consumption; thirdly, when the factors of bandwidth cost and energy cost are equal, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.


China Communications | 2013

User behaviors analysis in website identification registration

Gan Tong; Lin Fuhong; Chen Changjia; Guo Yuchun; Zheng Yi

Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.


Archive | 2015

Cloud system safe access method, device and system

Lin Fuhong; Liu Qian; Zhou Xianwei; Song Xiaokun; Zhang Yu; Song Ningning; Xu Haitao


Archive | 2015

Intelligent mobile terminal environment monitoring system based on Android

Liu Qian; Lin Fuhong; Zhou Xianwei; Pan Wenbo; Xu Haitao; Song Ningning; Zhang Yu


Archive | 2013

Switching backup method of satellite network selected based on active neighbour

Lin Fuhong; Zhou Xianwei; Chen Yueyun; Wang Jianping; Gao Junchao; An Jianwei


Archive | 2017

Encrypt data searching method based on 5g communication standard

Lin Fuhong; Zhou Xianwei; Long Keshu; An Jianwei; Xu Haitao; Ma Xingmin


Archive | 2017

5G (5th-generation) network security risk assessment method

Lin Fuhong; Zhou Xianwei; Sun Yuxia; Yao Lin; An Jianwei; Xu Haitao; Lin Jiuzhi


Archive | 2017

Distributed privacy protection machine learning method under 5g communication standard

Lin Fuhong; Zhou Xianwei; Zhang Dan; An Jianwei; Xu Haitao; Ma Xingmin; Li Zhi


Archive | 2017

Encryption and decryption method of fixed-length cryptograph and secret key based on attribute

Lin Fuhong; Zhou Xianwei; Han Lu; An Jianwei; Xu Haitao; Ma Xingmin; An Fengping

Collaboration


Dive into the Lin Fuhong's collaboration.

Top Co-Authors

Avatar

Zhou Xianwei

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

An Jianwei

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Liu Qian

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Song Ningning

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Chen Yueyun

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Chen Changjia

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Gan Tong

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Guo Yuchun

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Li Shuai

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Wang Jianping

University of Science and Technology Beijing

View shared research outputs
Researchain Logo
Decentralizing Knowledge