- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Caching and Content Delivery
- Privacy, Security, and Data Protection
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Ferroelectric and Negative Capacitance Devices
- Molecular Communication and Nanonetworks
- Optical Network Technologies
- Error Correcting Code Techniques
- Advanced MIMO Systems Optimization
- Advanced Photonic Communication Systems
- Security and Verification in Computing
- Software Testing and Debugging Techniques
- Gut microbiota and health
- User Authentication and Security Systems
- Constraint Satisfaction and Optimization
- Covalent Organic Framework Applications
- Software-Defined Networks and 5G
- Neural Networks Stability and Synchronization
- Stability and Control of Uncertain Systems
- Peer-to-Peer Network Technologies
- Image and Signal Denoising Methods
- Network Traffic and Congestion Control
Shanghai Electric (China)
2024
Nanjing University of Chinese Medicine
2024
Chongqing University of Posts and Telecommunications
2018-2023
China Academy of Information and Communications Technology
2021-2022
Chongqing Science and Technology Commission
2022
Ministry of Industry and Information Technology
2022
National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2021
Southeast University
2018
Fujitsu (United States)
2017
Generalization is the core objective when training optimizers from data. However, limited instances often constrain generalization capability of trained optimizers. Co-evolutionary approaches address this challenge by simultaneously evolving a parallel algorithm portfolio (PAP) and an instance population to eventually obtain PAPs with good generalization. Yet, applied specific problem class, these have major limitation. They require practitioners provide generators specially tailored which...
In this paper, we present ICN-FC, which is an Information-Centric Networking (ICN) based framework for efficient functional chaining (FC). The key enabling techniques ICN-FC includes naming semantics, Interest & Data processing and FC forwarding strategy. By using the proposed solutions, a request, consists of name raw data ordered set functions, can be executed seamlessly, dynamically flexibly in network. addition, novel strategy used to improve efficiency requests. overall feasibility...
With the intelligence of user equipment and popularization emerging applications such as unmanned driving face recognition, more computationally intensive delay-sensitive tasks have been generated. As a new network paradigm, ultra-dense networks can greatly improve access capabilities by deploying dense base stations (BSs). Edge computing effectively guarantee low-latency requirements users in networks. However, heterogeneity servers, distributed resources, dynamic energy consumption mobile...
Device-to-device (D2D) cooperative communication is regarded as a technology which can significantly improve the spectrum efficiency and network capacity. However, high dependence of on user participation makes design incentive mechanism become an issue great concern. In this paper, contract-based benefit allocation firstly proposed to optimize benefits sending users users. such mechanism, contract principal agent, by formulating utility function both parties, maximum between them be...
Blur kernel (BK) estimation is the crucial technique to guarantee success of blind image deblurring. In this paper, we propose a multi-regularization-constrained method estimate an accurate BK from single motion-blurred image. First, in order generate sharp and reliable intermediate latent results, model which combines spatial scale, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${L} _{0}$...
Cooperative multipoint transmission (CoMP) is one of the most promising paradigms for mitigating interference in cloud radio access networks (C-RAN). It allows multiple remote units (RRUs) to transmit same data flow a user further improve signal quality. However, CoMP may incur redundant over fronthaul network C-RAN. In C-RAN employing CoMP, key problem how coordinate heterogeneous resource allocation maximize cooperation gain while reducing load. this paper, based on multi-dimensional...
Nowadays, with the rapid developments of Internet Things, information on physical entities has shown explosive growth. The emergence Things search technology facilitated storage, organization, and management massive entity information. Aiming at issues security privacy target to obtain optimal perceiving results by selecting participants ensure quality service IoT platform, this paper proposes a participant selection strategy protection for (PSSPP). Firstly, task requester contents are...
This paper is concerned with unmanned aerial vehicle (UAV) video coding and transmission in scenarios such as emergency rescue environmental monitoring. Unlike existing methods of modeling UAV source channel separately, we investigate the joint source-channel optimization issue for transmission. Particularly, design eight-dimensional delay-power-rate-distortion models terms characterize correlation between transmission, which a problem formulated. Its objective to minimize end-to-end...
The current conventional oscillatory search algorithm for relay protection logic diagram is prone to fall into local optimum due the late population diversity reduction, which leads poor results. In this regard, a sequential traversal-based oscillation method diagrams proposed. optimized by finding second-order factor, optimizing topology of algorithm, and constructing model obtain library graph elements. experimental results show that proposed converges faster has more desirable effect.
6G will be the next horizon from connected people and things to intelligence-of-everything. Machine learning (ML) combines artificial intelligence with vehicular edge computing (VEC), further releasing potential of data. Federated (FL) is used manage collaborative training clients road side unit (RSU), which can efficiently complete distributed data processing. However, upload a large number model parameters occupy regular communication resources, stability link cannot guaranteed due...
In Industrial Internet application scenarios, due to the ubiquitous connection requirements of massive Things (IoT) devices in edge layer. The data transmission rate is reduced, and delay increases, increasing energy consumption per bit. So a low-energy strategy based on real-time layer traffic sensing proposed. First, mixed-integer modeling method for IoT This aims optimize overall system. task modeled as linear programming problem. Second, prediction estimation number access packets...
In 6G Internet of Vehicles (IoV) system, Federated Learning (FL) is usually used to structure the joint training model between vehicles and RSU. However, due mobility vehicles, link unstable parameters trained by FL are exchanged frequently, which may increase communication overheads. Therefore, we propose a communication-efficient Double Distillation (FedDD) framework in this paper. particular, cluster-heads dynamically selected as distributed learning clients combined with...
The integration of social networking concepts into the Internet Things has led to Social (SIoT) paradigm, and trust evaluation is essential secure interaction in SIoT. In SIoT, when resource-constrained nodes respond unexpected malicious services recommendations, assessment prone be inaccurate, existing architecture risk privacy leakage. An edge-cloud collaborative SIoT proposed this paper. Utilize resource advantages cloud edge complete task collaboratively. algorithm relationship closeness...
可信网络体系结构 [4] 等, 试图以 "重构" 的方式解决网络安全与规模问题 [5] , 但由于全网部署代价过 于昂贵
This study investigates the problem of guaranteed cost control for event-triggered semi-Markov jump systems with redundant channels. The dynamic methodology is applied to solve network communication. Based on delay system and free-weighting matrices, collaborative design controllers strategy can be generated under reasonable linear matrix inequalities. Redundant channels have been utilized increase success rate release date, meanwhile, they also followed by two unrelated Bernoulli...