Hui Li

ORCID: 0000-0001-5244-9473
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Advanced Data Storage Technologies
  • Cooperative Communication and Network Coding
  • Cellular Automata and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Cloud Computing and Resource Management
  • Distributed systems and fault tolerance
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • Cloud Data Security Solutions
  • IoT and Edge/Fog Computing
  • Full-Duplex Wireless Communications
  • Wireless Networks and Protocols
  • Network Packet Processing and Optimization
  • Network Traffic and Congestion Control
  • Advanced Operator Algebra Research
  • Service-Oriented Architecture and Web Services
  • Interconnection Networks and Systems
  • Advanced Wireless Communication Technologies
  • Mobile Ad Hoc Networks
  • Advanced Topics in Algebra
  • Distributed and Parallel Computing Systems
  • Cryptography and Data Security

Peking University
2016-2025

Peking University Shenzhen Hospital
2009-2024

Foshan University
2022-2024

Chongqing University
2020-2024

Peng Cheng Laboratory
2019-2024

China Southern Power Grid (China)
2022-2024

Xidian University
2014-2024

Ningxia University
2023

National University of Singapore
2023

Jiujiang University
2023

IPFS [1] is a peer-to-peer version controlled filesystem that synthesizes learnings from many previous successful systems. combines distributed Hash table, an incentivized block exchange, and self-certifying namespace [1]. hypermedia protocol to make the web faster, safer, more open. According characteristics of IPFS, we propose improved P2P file system scheme based on Blockchain. We address high-throughput problem for individual users in by introducing role content service providers....

10.1109/bigdata.2017.8258226 article EN 2021 IEEE International Conference on Big Data (Big Data) 2017-12-01

Efficient algorithmic solutions for multi-field packet classification have been a challenging problem many years. This is becoming even worse in the era of Software Defined Network (SDN), where flow tables with increasing complexities are playing central role forwarding plane SDN. In this paper, we first conduct an unprecedented in-depth reasoning on issues that led to unsuccess major quests scalable solutions. With insights obtained, propose practical framework called CutSplit, which can...

10.1109/infocom.2018.8485947 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

In distributed storage systems, regenerating codes can achieve the optimal tradeoff between capacity and repair bandwidth. However, a critical drawback of existing codes, in general, is high coding complexity, since processes involve expensive multiplication operations finite field. this paper, we present design framework which employ binary addition bitwise cyclic shift as elemental operations, named BASIC codes. The proposed be regarded concatenated code with outer being parity-check code,...

10.1109/tit.2016.2553670 article EN IEEE Transactions on Information Theory 2016-04-13

The past few decades have witnessed explosive development in drug delivery systems. However, vivo suffers from non-specific distribution non-targeted organs or tissues, which may cause undesired side effects and even genotoxicity. Here, a general strategy that enables tuning the tropism of polymersomes for liver- spleen-selective is reported. By using library screening approach, spleen-targeted polymersome PH9-Aln-8020 liver-targeted PA9-ZP3-5050 are identified accordingly. Meanwhile, second...

10.1002/adma.202301686 article EN Advanced Materials 2023-05-11

Array codes are used widely in data storage systems such as redundant array of independent disks. The row-diagonal parity (RDP) and EVENODD two popular double-parity codes. increasing capacity hard disks demands better fault tolerance by using with three or more Although many extensions RDP have been proposed, their main drawback is high decoding complexity. In this paper, we propose a unified form under which can be treated shortened Moreover, an efficient algorithm based on LU...

10.1109/tcomm.2018.2859956 article EN IEEE Transactions on Communications 2018-07-26

The blockchain has a great vogue in recent years, and its core consensus algorithms also become the focus of research. At present, most research on mechanisms are oriented to public based existing or sophisticated distributed algorithms. Various application scenarios have been developed consortium blockchain, while few researchers pay attention customize consistency Moreover, there is trade-off between security performance designing mechanisms. We propose novel algorithm called Proof Vote...

10.3389/fbloc.2020.00011 article EN cc-by Frontiers in Blockchain 2020-03-18

The metaverse gradually evolves into a virtual world containing series of interconnected sub-metaverses. Diverse digital resources, including identities, contents, services, and supporting data, are key components the sub-metaverse. Therefore, Domain Name System (DNS)-like system is necessary for efficient management resolution. However, legacy DNS was designed with security vulnerabilities trust risks due to centralized issues. Blockchain used mitigate these concerns its decentralized...

10.1145/3597641 article EN ACM Transactions on Multimedia Computing Communications and Applications 2023-05-26

Objectives: Amyotrophic lateral sclerosis (ALS) is a progressive and fatal disease characterized by the degeneration of spinal cord brain neurons. Proteomics combined with Mendelian randomization (MR) an effective method for finding treatment targets. Methods: We aimed to seek new therapeutic targets ALS. A large-scale GWAS on proteomics (4907 circulatory protein) 35,559 individuals was included as exposure data; 138,086 ALS patients used outcome we found that high level sex hormone-binding...

10.3390/biomedicines13030622 article EN cc-by Biomedicines 2025-03-04

10.1109/icassp49660.2025.10888362 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Let K be a positive integer and 1 ≤ k, where k is given integer. Consider 3-regular graph with 8 vertices denoted by Q3. In addition, KQ3 composed of disconnected graphs this paper, we first consider the number all m-independent sets kQ3 m 4k, Tm(kQ3). Then, k-1, Sm(KQ3).

10.20944/preprints202503.1129.v1 preprint EN 2025-03-17

To accelerate serious skin burn wound healing in a convenient manner, an interpenetrating network of hydrogel consisting gellan gum and polyacrylamide was synthesized by chemical crosslinking Mg 2+ ion immersion techniques. The prepared @PAM/GG characterized morphology, water vapor loss, swelling ratio, rheological properties, tensile mechanical, biocompatibility, flow cytometry study. results show that hydrogel’s mechanical strength could be enhanced the dual structure physical agent ions....

10.3389/fbioe.2021.709679 article EN cc-by Frontiers in Bioengineering and Biotechnology 2021-09-13

As a subset of distributed systems, blockchain technology is equally bound by the CAP trilemma. Specifically, no system can satisfy consistency, availability, and partition tolerance simultaneously. Informally, innovative trilemma has been theorized to include security, scalability, decentralization. While many software approaches on blockchains claim solve problem, almost all known have proven involve tradeoffs fail reach upper bounds, meaning they do not achieve theoretical limit value in...

10.1145/3615871 article EN Deleted Journal 2024-06-18

Domain name system is an essential component of the Internet, but facing numerous security threats. On other hand, blockchain has been widely used since Bitcoin. Theoretically, most decentralized can be rebuilt using blockchain. Namecoin and Blockstack have made attempts to combine domain service with blockchain, defects in performance. In this paper, we propose a new based on consortium chain network which contains query nodes miner nodes. To address storage challenge designed three-layer...

10.1109/hpcc-smartcity-dss.2017.83 article EN 2017-12-01

Due to the complexity and high randomness, most current researches on ad hoc networks are based simulation results empirical analysis, lacking theoretical understanding of their behavior. This paper presents a general network model derives statistical link path availability properties in network. Simulation given verify our theory. study could serve as groundwork for further including performance analysis routing algorithms design.

10.1109/ictel.2003.1191260 article EN 2003-12-22

We propose a model-based methodology to size and plan enterprise applications subject Service Level Agreements (SLAs). Our approach is illustrated using real-world Enterprise Resource Planning (ERP) application, namely SAP ERP. Firstly, we develop closed queueing network model with finite capacity regions describing the ERP application performance show that this effective robust in capturing measured response times utilizations. Secondly, an analytical cost jointly accounts for fixed...

10.1145/1712605.1712625 article EN 2010-01-28

With the development of multi-core processors, virtualisation, distributed storage, broadband internet and automatic management, a new type computing mode named cloud is produced. The has drastically altered everyone’s perception infrastructure architectures, software delivery models. Cloud adoption diffusion are threatened by unresolved security issues that affect both provider user. A secure data storage architecture based on presented in this paper to deal with systems applications. This...

10.1504/ijict.2013.054938 article EN International Journal of Information and Communication Technology 2013-01-01

Identity-based encryption is a key distribution system in which the public of user derived directly from his identity information. Compared with PKI, simplifies management issue, but it still suffers drawbacks inkey escrow and private delivering. Motivated by this, we propose an improved solution called BIBE integrating technique blockchain into identity-based encryption. Specifically, split nodes chain to complete authentication protection, respectively. Furthermore, two sides mutual...

10.1109/iscc.2018.8538446 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2018-06-01

We present a new family of maximal-distance separable (MDS) array codes which can tolerate five disk failures. The encoding is based on bit-wise exclusive OR (XOR) and cyclic shifts, hence amenable to practical implementation. Efficient repair method for correcting up two failures also given. proposed coding scheme provides larger spectrum parameters, with comparable repairing complexities in compare existing MDS codes, such as the row-diagonal parity (RDP) code EVENODD code.

10.1109/glocom.2014.7037162 article EN 2014-12-01

Binary maximum distance separable (MDS) array codes are a special class of erasure for distributed storage that not only provides fault tolerance with minimum redundancy but also achieves low computational complexity. They constructed by encoding k information columns into r parity columns, in which each element column is bit, such any out the + suffice to recover all bits. In addition providing tolerance, it critical improve repair performance practical applications. Specifically, if single...

10.1109/tit.2019.2923992 article EN IEEE Transactions on Information Theory 2019-06-20

IP protocol is the core of TCP/IP network layer. However, since address and its Domain Name are allocated managed by a single agency, there risks centralization. The semantic overload also reduces scalability mobility, which further hinders security. This paper proposes co-governing Multi-Identifier Network (MIN) architecture that constructs layer with parallel coexistence multiple identifiers, including identity, content, geographic information, address. On management plane, we develop an...

10.1109/access.2020.2974327 article EN cc-by IEEE Access 2020-01-01

In practical large-scale distributed storage systems, node failures are unavoidable. It is therefore desirable to quickly recreate the failed nodes in order maintain system integrity. this letter, we consider a family of erasure codes that provide uncoded repair, where regenerated by transfer data without extra arithmetic operations. We introduce flexible fractional repetition (FFR) code, which coding scheme concatenation an outer MDS code and inner code. Our proposed applicable...

10.1109/lcomm.2015.2415495 article EN IEEE Communications Letters 2015-03-24
Coming Soon ...