Search Results for author: Ronghua Xu

Found 7 papers, 0 papers with code

DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication

no code implementations22 Jul 2022 Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved

The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools.

DeepFake Detection Face Swapping

Microchain: a Light Hierarchical Consensus Protocol for IoT System

no code implementations21 Dec 2019 Ronghua Xu, Yu Chen

While the large-scale Internet of Things (IoT) makes many new applications feasible, like Smart Cities, IoT also brings new concerns on data reliability, security, and privacy.

Distributed, Parallel, and Cluster Computing

Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT

no code implementations24 Sep 2019 Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

In this paper, Microchain, based on a hybrid Proof-of-Credit (PoC)-Voting-based Chain Finality (VCF) consensus protocol, is proposed to provide a secure, scalable and lightweight distributed ledger for IoT systems.

Distributed, Parallel, and Cluster Computing

A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

no code implementations1 May 2018 Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

Networking and Internet Architecture

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

no code implementations24 Apr 2018 Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

The BlendCAC aims at an effective access control processes to devices, services and information in large scale IoT systems.

Networking and Internet Architecture Cryptography and Security Distributed, Parallel, and Cluster Computing

Cannot find the paper you are looking for? You can Submit a new open access paper.