Siya Xu

ORCID: 0000-0001-6124-0030
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Blockchain Technology Applications and Security
  • Advanced Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Privacy-Preserving Technologies in Data
  • Caching and Content Delivery
  • Optical Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Data and IoT Technologies
  • Smart Grid Security and Resilience
  • Mobile Ad Hoc Networks
  • Advanced Computing and Algorithms
  • IoT Networks and Protocols
  • Cryptography and Data Security
  • Network Traffic and Congestion Control
  • Software System Performance and Reliability
  • Smart Grid Energy Management
  • Molecular Communication and Nanonetworks
  • Biometric Identification and Security
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Wireless Network Optimization

Beijing University of Posts and Telecommunications
2016-2024

State Key Laboratory of Networking and Switching Technology
2019-2024

Switch
2019

China Guodian Corporation (China)
2017

State Grid Corporation of China (China)
2016

Private and public networks sharing resources for Internet of Things (IoT) network through function virtualization (NFV) software-defined networking (SDN) forms a heterogeneous cloud-edge environment. However, the faces trust adaptation issues in resource allocation. To address these two problems, we introduce consortium blockchain deep reinforcement learning (DRL) to construct trusted auto-adjust service chain (SFC) orchestration architecture. In architecture, this article integrates into...

10.1109/jiot.2019.2951593 article EN IEEE Internet of Things Journal 2019-11-05

Network slicing has been proposed as an innovative concept to partition a physical network into different configurable slices, thereby allowing the meet diverse requirements of expected services in 5G era. Existing network-slicing schemes focus almost exclusively on partitioning core or radio access network. However, achieve greater flexibility and better resource utilization service provisioning, potential optical mobile fronthaul (MFH) should be jointly exploited. To address this...

10.1364/jocn.11.000b60 article EN Journal of Optical Communications and Networking 2019-03-22

The industrial Internet of Things (IIoT) and 5G have been served as the key elements to support reliable efficient operation Industry 4.0. By integrating burgeoning network function virtualization (NFV) technology with cloud computing mobile edge computing, an NFV-enabled cloud–edge collaborative IIoT architecture can efficiently provide flexible service for massive traffic in form a chain (SFC). However, collaboration, reasonable comprehensive resource consumption, different quality...

10.1109/tii.2021.3113875 article EN IEEE Transactions on Industrial Informatics 2021-09-20

With the fast development of smart cities and 5G, amount mobile data is growing exponentially. The centralized cloud computing mode hard to support continuous exchanging processing information generated by millions Internet-of-Things (IoT) devices. Therefore, mobile-edge (MEC) software-defined networking (SDN) are introduced form a cloud-edge-terminal collaboration network (CETCN) architecture jointly utilize communicational computational resources. Although CETCN brings many benefits, there...

10.1109/jiot.2020.3002427 article EN IEEE Internet of Things Journal 2020-06-15

With the rapid development of smart city and 5G, user demand for Internet services has increased exponentially. Through collaborative content sharing, storage limitation a single edge server (ES) can be broken. However, when mobile users need to download whole through multiple regions, independently deciding caching ESs in different regions may result redundant caching. Furthermore, frequent switching communication connection during movement also causes retransmission delay. As revolutionary...

10.1109/mnet.011.2000663 article EN IEEE Network 2021-07-01

The Internet of Things (IoT) is evolving from a stovepipe architecture to collaborative and shared converged architecture. In the future, it will become network development trend construct network-based virtual operating platform by virtualizing IoT infrastructure support different services. trust issues encountered during resource aggregation in heterogeneous networks state measurements limit applicability platform. this article, we propose framework for an endogenous trusted operation,...

10.1109/mnet.011.2000028 article EN IEEE Network 2020-09-01

In power communication networks, it is a challenge to decrease the risk of different services efficiently improve operation reliability. One important factor in reflecting service route distribution. However, existing routing algorithms do not take into account degree importance services, thereby leading load unbalancing and increasing risks networks. A optimization mechanism based on balancing for networks proposed address abovementioned problems. First, constructs an evaluation model...

10.1109/cc.2016.7563719 article EN China Communications 2016-08-01

With the rapid development of 5G and 6G technology, it has become an inevitable trend to share cross-domain scattered data enhance value transmission. As a new data-sharing technology with intelligence privacy computing, federated learning (FL) receives wide attention. It can realize delivery protection at same time, however, lacks supervision in application process, reliability calculation process result transmission cannot be guaranteed. distributed ledger blockchain trust property but...

10.1109/jiot.2021.3130116 article EN IEEE Internet of Things Journal 2021-11-23

Real-time network resource allocation based on virtualization technology is an important method to solve the solidification problem of Fiber-wireless (Fi-Wi) access networks.To increase utilization and meet specific QoS requirements smart gird communication services, a Load-balancing dynamic (LbQ-DR) proposed with three sub-mechanisms.A time-window substrate update mechanism designed describe realtime consumption networks, which can balance accuracy status complexity algorithm.A QoS-based...

10.1049/cje.2019.08.007 article EN Chinese Journal of Electronics 2019-11-01

In the upcoming B5G/6G era, devices will generate a amount of heterogeneous data at network edge. As paradigm for implementing distributed and privacy-preserving machine learning (ML), Federated Learning (FL) has drawn great attention to secure sharing in edge networks. However, FL takes too much time communication resources train transmit model parameters, which is unaffordable with limited capabilities. To achieve trade-off between resource efficiency, it crucial select appropriate...

10.1109/noms56928.2023.10154458 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2023-05-08

Network virtualization is becoming one of the most promising ways to solve resource solidification problem fiber-wireless access networks. To fully utilize substrate resources, a virtual embedding method including three sub-mechanisms presented in this paper. The first priority-based network request (VNR) selecting mechanism, which sorts VNRs and preferentially selects higher priority for embedding. Then dynamic mechanism based on load balancing increase acceptance rate VNRs. Second, when...

10.1109/access.2018.2848919 article EN cc-by-nc-nd IEEE Access 2018-01-01

Network Function Virtualization (NFV) technology decouples network functions from the proprietary hardware by using generalized equipment and software, which lowers cost of operator. However, existing mapping mechanisms in NFV environment can't optimize deployment improve rationality resource allocation while ensuring basic service quality requirements users. To solve problem, a mathematical model looks on assurance optimization is established this article. The aims at maximizing total...

10.1109/noms47738.2020.9110356 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2020-04-01

With the rapid development of Internet Things (IoT) technology, Network Function Virtualization (NFV) is introduced in edge network to provide flexible and personalized service. However, there still exist some problems be solved, such as high cost, unbalanced load, low availability. Therefore, a reliability-and-energy-balanced Service Chain (SFC) mapping migration method presented for IoT applications. First, aiming at improving performance reducing expenditure, an SFC algorithm based on...

10.1109/access.2020.3023502 article EN cc-by IEEE Access 2020-01-01

The demand for information security is growing with the changes of times, and authentication system an important gateway to ensure security. Password most commonly used method in modern network. However, because password easy be cracked, we need pay more attention methods. In many authentications, advantage keystrokes mouse are obvious; however, when researchers use dynamics authenticate, classifier training always require a large amount data, data less, there may inaccurate results. this...

10.1109/iwcmc48107.2020.9148499 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2020-06-01

Industrial Internet of things (IIoT) deploys a large number smart devices to obtain industrial data, which will be transmitted cloud for analysis improve productivity. The management large-scale is complicated, and it's also challenge choose high-quality service data as the with similar functions increases. To address these issues, we propose reliable fog-cloud solution blockchain-based architecture. In fog layer, build blockchain between servers design method devices; construct providers...

10.1049/cje.2021.02.009 article EN Chinese Journal of Electronics 2021-03-01

Web3 has received a lot of attention since its emergence. It aims to provide users with more diverse and vivid web services as well the complete control over their own data. To support development Web3, privacy-preserving decentralized data computing schemes need be studied. In earlier works, blockchain was used for trusted sharing. However, due lack attribute, is not capable enough ensure trustworthiness distributed process. Besides, method requires large amount transmission current privacy...

10.1109/mcom.001.2200408 article EN IEEE Communications Magazine 2023-08-01

With the development of internet vehicles, traditional centralized content caching mode transmits through core network, which causes a large delay and cannot meet demands for delay-sensitive services. To solve these problems, on basis vehicle we propose an edge collaborative scheme. Road side unit (RSU) mobile computing (MEC) are used to collect information, predict cache popular content, thereby provide low-latency delivery However, storage capacity single RSU severely limits performance...

10.32604/csse.2022.022103 article EN cc-by Computer Systems Science and Engineering 2021-12-02

Network Function Virtualization (NFV) promises a significant advantage for IoT operators to steer substantial customizable service through sequence of virtual network function (VNF). Service Chain (SFC) mapping is key problem in resource allocation. There are two challenges allocation include: (1) how map SFC requests appropriate devices the right sequence; (2) assure QoS requirements requests. Therefore, meet sharp increase traffic amounts and diversification requirements, multi-objective...

10.1109/iwcmc.2019.8766548 article EN 2019-06-01

Sixth generation (6G) is committed to providing a fully connected world. The deployment and application of the 6G technology in Internet Things (IoT) can efficiently collaborate IoT resources realize resource sharing, which mainly encourages development. However, due lack trust between resources, security privacy become main challenges. As an emerging technology, blockchain solve trust-absence issues provide more benefits, but introduction also brings problems for collaboration sharing. This...

10.1109/jiot.2021.3123333 article EN IEEE Internet of Things Journal 2021-10-27

With the development of smart traffic and assisted driving, mobile edge computing artificial intelligence technologies are seen as key solutions in internet vehicles. However, limited network resources leakage vehicle private data driving process still problems to be solved. Therefore, we design a federated learning (FL) empowered collaborative content caching mechanism provide low latency high reliable services for First, build an cache domain allow multiple nodes jointly share service...

10.1109/noms54207.2022.9789836 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2022-04-25

With the development of 5G and Internet Things technologies, some studies consider combining fog computing with mobile ad hoc networks (MANETs) to form a cloud-assisted network. But it faces many challenges, such as terminal mobility, dynamic topology, multi-hop nature in transmission, limited bandwidth battery. So, better utilize resource, clustering algorithm based on communication overhead link stability is proposed two sub-stages. First, stage, we design method multiparameter-limited...

10.1109/iwcmc.2019.8766547 article EN 2019-06-01

The mobile edge computing (MEC) technology is introduced into the traditional cloud (MCC) mode to form a cloud-edge-terminal collaborative network architecture (CETCN) jointly process massive data and improve operating efficiency. However, there are still some problems such as high energy consumption of nodes limited terminal in this architecture. In order solve above problems, paper proposes computation offloading algorithm based on sleep mechanism. Firstly, time delay models layer, layer...

10.1109/iwcmc51323.2021.9498741 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2021-06-28

Anomaly diagnosis for distributed service plays an important role in communication network information system. Log analysis is the main method to undertake anomaly detection. In order reduce manual detection, we propose detection based on time-weighted control flaw graph model. The border split by a discrete degree strategy analyzing time interval distribution and weight selected be k-means. Experiments show that our algorithm has good precision recall diagnosis. real-world scenarios, it of...

10.1109/ispa/iucc.2017.00144 article EN 2017-12-01
Coming Soon ...