Efficient reliability computation of a multi-state flow network with cost constraint

YF Niu, YF Song, XZ Xu, X Zhao - Reliability Engineering & System Safety, 2022 - Elsevier
The reliability and cost integrated performance measure R (d, b) of a multi-state flow
network, defined as the probability of sending a flow of d units from the source to the sink …

Unrepairable system with single production unit and n failure-prone identical parallel storage units

G Levitin, L Xing, Y Dai - Reliability Engineering & System Safety, 2022 - Elsevier
Despite the crucial role of product storage played in the operation of real-world systems,
only very few reliability studies have considered this component in the system reliability …

[HTML][HTML] Effective selfish mining defense strategies to improve bitcoin dependability

C Zhou, L Xing, Q Liu, H Wang - Applied Sciences, 2022 - mdpi.com
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an
emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining …

Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features

I Ullah, A Noor, S Nazir, F Ali, YY Ghadi… - The Journal of …, 2024 - Springer
The term" Internet of things (IoT)” refers to a network in which data from all connected
devices may be gathered, analyzed, and modified as per requirements to offer new services …

A trust-based reliable confident information coverage model of wireless sensor networks for intelligent transportation

Y Xia, X Deng, L Yi, S Liu, LT Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Wireless sensor nodes are vulnerable to interference or intrusion, especially in the tunnel
scenario of intelligent transportation, which leads to potential risks to network security and …

Allocation and activation of resource constrained shock-exposed components in heterogeneous 1-out-of-n standby system

G Levitin, L Xing, Y Dai - Reliability Engineering & System Safety, 2024 - Elsevier
In real-world mission-critical applications like unmanned aerial vehicles (UAVs), the standby
sparing design method is typically applied to enhance the mission success probability …

Joint Optimization of Multiuser Computation Offloading and Wireless-Caching Resource Allocation With Linearly Related Requests in Vehicular Edge Computing …

L Liu, Z Chen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Recently, vehicular edge computing (VEC) has become one of the hottest research fields in
Internet of Vehicles (IoV). It provides certain computing, storage, and caching resources at …

A more accurate and robust binary ring-LWE decryption scheme and its hardware implementation for IoT devices

D Xu, X Wang, Y Hao, Z Zhang, Q Hao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Learning with error (LWE) over the ring based on binary distribution (ring-BinLWE) has
become a potential Internet-of-Things (IoT) confidentiality solution with its anti-quantum …

Unrepairable system with consecutively used imperfect storage units

G Levitin, L Xing, Y Dai - Reliability Engineering & System Safety, 2022 - Elsevier
Product storage is a crucial component of some engineering or technological systems.
Considering storage in the system reliability analysis has recently attracted research …

Optimizing the maximum filling level of perfect storage in system with imperfect production unit

G Levitin, L Xing, Y Dai - Reliability Engineering & System Safety, 2022 - Elsevier
Reliability of production systems with storage has recently attracted lots of research
attentions. While the existing works have assumed certain maximum capacity of the storage …