Hongyu Jin

Learn More
Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming Vehicular Communication (VC) systems. There is a growing consensus towards deploying a Vehicular Public-Key Infrastructure (VPKI) enables pseudonymous authentication, with standardization efforts in that(More)
Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming Vehicular Communication (VC) systems. There is a growing consensus towards deploying a Vehicular Public-Key Infrastructure (VPKI) enables pseudonymous authentication, with standardization efforts in that(More)
VANET security introduces significant processing overhead for resource-constrained On-Board Units (OBUs). Here, we propose a novel scheme that allows secure Vehicular Communication (VC) systems to scale well beyond network densities for which existing optimization approaches could be workable, without compromising security (and privacy).
The development tendency of manufacturing will be dominated by advanced machine tools which integrate intelligent machining technology. In this paper, the function of signal processing and intelligent control in smart CNC is proposed with the aim of on-line chatter recognition and suppression. To effectively recognize chatter, the algorithm of Estimation of(More)
Security and privacy in Vehicular Ad-hoc Networks (VANETs) mandates use of short-lived credentials (pseudonyms) and cryptographic key pairs. This implies significant computational overhead for vehicles, needing to validate often numerous such pseudonyms within a short period. To alleviate such a bottleneck that could even place vehicle safety at risk, we(More)
Determination of the cutting force during metal machining process is of particular importance because of its controlling influence to cutting deformation, tool wear, tool life, as well as the quality of machined part. Numerous attempts have been made to approach this problem with different methods, such as analytical, empirical, numerical, hybrid models.(More)
It is fascinating, and yet often neglected, that a user's privacy can be invaded not only by the absence of security measures and mechanisms, but also by improper or inadequate usage of security services and mechanisms. When designing secure systems, we must consider what services are needed and what is not. The work in this thesis revolves around(More)
  • 1