- Indoor and Outdoor Localization Technologies
- RFID technology advancements
- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Underwater Vehicles and Communication Systems
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Adversarial Robustness in Machine Learning
- Anomaly Detection Techniques and Applications
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Mobile Ad Hoc Networks
- Software-Defined Networks and 5G
- Wireless Networks and Protocols
- IPv6, Mobility, Handover, Networks, Security
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Reinforcement Learning in Robotics
- Software Testing and Debugging Techniques
- Advanced MIMO Systems Optimization
- Antenna Design and Analysis
- Hand Gesture Recognition Systems
- Biometric Identification and Security
Central South University
2016-2025
Hebei University of Technology
2024
Chinese Academy of Sciences
2019-2023
Institute of Information Engineering
2019-2023
Nanjing University
2007-2020
Zhejiang University of Science and Technology
2014
Hong Kong Polytechnic University
2008-2009
In recent years, there has been a paradigm shift in Internet of Things (IoT) from centralized cloud computing to edge (or fog computing). Developments ICT have resulted the significant increment communication and computation capabilities embedded devices this will continue increase coming years. However, existing paradigms do not utilize low-level for any decision-making process. fact, gateway are also utilized mostly interoperability some processing. paper, we proposed new paradigm, named...
Coverage of interest points and network connectivity are two main challenging practically important issues Wireless Sensor Networks (WSNs). Although many studies have exploited the mobility sensors to improve quality coverage connectivity, little attention has been paid minimization sensors' movement, which often consumes majority limited energy thus shortens lifetime significantly. To fill in this gap, paper addresses challenges Mobile Deployment (MSD) problem investigates how deploy mobile...
Billions of devices are connected to the Internet Things (IoT). These generate a large volume data, which poses an enormous burden on conventional networking infrastructures. As effective computing model, edge is collaborative with cloud by moving part intensive computation and storage resources devices, thus optimizing network latency energy consumption. Meanwhile, software-defined networks (SDNs) technology promising in improving quality service (QoS) for complex IoT-driven applications....
Existing localization algorithms for mobile sensor networks are usually based on the Sequential Monte Carlo (SMC) method. They either suffer from low sampling efficiency or require high beacon density to achieve accuracy. Although papers can be found solving above problems separately, there is no solution which addresses both issues. In this paper, we propose an energy efficient algorithm, called WMCL, and accuracy in various scenarios. existing algorithms, a technique bounding-box used...
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently, can carry out many internal Previous solutions on detecting attacks have several drawbacks. First, some them require central control, which introduces inherent limits. Second, deterministic simple witness compromising Third, easily learn critical nodes...
Through well-designed counterfeit websites, phishing induces online users to visit forged web pages obtain their private sensitive information, e.g., account number and password. Existing antiphishing approaches are mostly based on page-related features, which require crawl content of as well accessing third-party search engines or DNS services. This not only leads low efficiency in detecting but also makes them rely network environment services heavily. In this paper, we propose a fast...
Localization plays a pivotal role in wireless sensor networks. Many range-based localization algorithms have been proposed for 2-D networks or densely deployed 3-D However, sparse is still challenging problem, because the sparseness of network makes it difficult to obtain proper order nodes be sequentially localized. The patch-and-stitching strategy can conquer problem networks, but unknown how uniquely merge two patches when there are not enough common nodes. In this paper, we solve by...
Radio-Frequency Identification (RFID) technology brings revolutionary changes to many fields like retail industry. One important research issue in large RFID systems is the identification of unknown tags, i.e., tags that just entered system but have not been interrogated by reader(s) covering them yet. Unknown tag plays a critical role automatic inventory management and misplaced discovery, it far from thoroughly investigated. Existing solutions either trivially interrogate all thus are...
Position information plays a pivotal role in wireless sensor network (WSN) applications and protocol/algorithm design. In recent years, range-free localization algorithms have drawn much research attention due to their low cost applicability large-scale WSNs. However, the application of is restricted because dramatic accuracy degradation practical anisotropic WSNs, which mainly caused by large error distance estimation. Distance estimation existing usually relies on unified per hop length...
Deep neural networks (DNNs) have been widely used in many intelligent applications such as object recognition and automatic driving due to their superior performance conducting inference tasks. However, DNN models are usually heavyweight computation, hindering utilization on the resource-constraint Internet of Things (IoT) end devices. To this end, cooperative deep is proposed, which a model adaptively partitioned into two parts different executed devices (cloud or edge devices) minimize...
Vital signs (e.g., respiration rate or heartbeat rate) sensing is of great importance to implement pervasive in-home healthcare. Traditional vital monitoring approaches usually require users wear some dedicated sensors. These are intrusive and inconvenient use, especially for elderly people. Some non-intrusive based on wireless have been proposed in recent years. However, these the target user be situ during process, which greatly limits their utilization practical scenarios where move...
Internet of Things (IoT) have been widely used in many fields including smart city, industry and automatic driving. Because IoT end devices usually only limited capability computation power supply, they are not suitable to execute energy-consuming computational tasks. In cases, we need offload tasks from edge servers order save energy consumption on the devices. This process is termed as computing offloading. this paper, study offloading radio frequency identification (RFID) systems built...
Tag scanning is an important issue to dynamically manage tag IDs in radio frequency identification (RFID) systems. Different from that collects of all the tags, first verifies whether or not a responding has already been identified and retrieves its ID when answer yes, tag's only it unidentified. In this paper, we present study on spot with handheld reader, which aims scan tags reader's interrogation range at arbitrarily specified position system. Existing studies mainly focus continuous...
Vital signs monitoring plays an important role in health assessing, especially for elderly healthcare. Traditional vital systems are intrusive. They require the users to wear or attach dedicated sensors and thus inconvenient use. Although recently developed contactless approaches (e.g., those based on WiFi sensing) become friendly, they cannot differentiate multiple target users. This article envisions opportunity of utilizing radio frequency identification (RFID) technology perform accurate...
Cloning attacks seriously impede the security of radio-frequency identification (RFID) applications. This paper tackles deterministic clone detection for anonymous RFID systems without tag identifiers (IDs) as a priori. Existing protocols either cannot apply to due necessitating knowledge IDs or achieve only probabilistic with few clones tolerated. proposes three protocols—BASE, DeClone, and DeClone+—toward fast large systems. BASE leverages observation that tags make cardinality exceed ID...
By integrating the micro-sensor on RFID tags to obtain environment information, sensor-augmented system greatly supports applications that are sensitive environment. To quickly collect information from all tags, many researchers dedicate well arranging tag replying orders avoid signal collisions. Compared collecting a part of (i.e., target tags) is more challenging because process interfered by useless non-target tags. The existing works collection designed for single reader systems....
Air pollution is a serious global issue impacting public health and social economy. In particular, exposure to small particulate matter of 2.5 microns or less in diameter (PM2.5) can cause cardiovascular respiratory diseases, cancer. Fine-grained urban air quality monitoring crucial yet difficult achieve. this paper, we present the design, implementation, evaluation an ambient environment aware system, namely UbiAir, which support fine-grained through mobile crowdsensing on bike-sharing...