Lin Fuhong
University of Science and Technology Beijing
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Lin Fuhong.
China Communications | 2014
Bardi Matturdi; Zhou Xianwei; Li Shuai; Lin Fuhong
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy.
China Communications | 2014
Lin Fuhong; Liu Qian; Zhou Xianwei; Chen Yueyun; Huang Daochao
Internet of Things (IoT) refers to an infrastructure which enables the forms of communication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy consumption in the IoT in this paper. A service providing model is built to find the relationship between bandwidth and energy consumption using a cooperative differential game model. The game solution is gotten in the condition of grand coalition, feedback Nash equilibrium and intermediate coalitions and an allocation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the performance of IoT decreases with the increasing of bandwidth cost or with the decreasing of energy cost; secondly, all the nodes in the IoT composing a grand coalition can save bandwidth and energy consumption; thirdly, when the factors of bandwidth cost and energy cost are equal, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.
China Communications | 2013
Gan Tong; Lin Fuhong; Chen Changjia; Guo Yuchun; Zheng Yi
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
Archive | 2015
Lin Fuhong; Liu Qian; Zhou Xianwei; Song Xiaokun; Zhang Yu; Song Ningning; Xu Haitao
Archive | 2015
Liu Qian; Lin Fuhong; Zhou Xianwei; Pan Wenbo; Xu Haitao; Song Ningning; Zhang Yu
Archive | 2013
Lin Fuhong; Zhou Xianwei; Chen Yueyun; Wang Jianping; Gao Junchao; An Jianwei
Archive | 2017
Lin Fuhong; Zhou Xianwei; Long Keshu; An Jianwei; Xu Haitao; Ma Xingmin
Archive | 2017
Lin Fuhong; Zhou Xianwei; Sun Yuxia; Yao Lin; An Jianwei; Xu Haitao; Lin Jiuzhi
Archive | 2017
Lin Fuhong; Zhou Xianwei; Zhang Dan; An Jianwei; Xu Haitao; Ma Xingmin; Li Zhi
Archive | 2017
Lin Fuhong; Zhou Xianwei; Han Lu; An Jianwei; Xu Haitao; Ma Xingmin; An Fengping