Zulong Diao

ORCID: 0000-0001-6581-7511
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Software System Performance and Reliability
  • Internet Traffic Analysis and Secure E-voting
  • Traffic Prediction and Management Techniques
  • Transportation Planning and Optimization
  • Mobile Crowdsensing and Crowdsourcing
  • Human Mobility and Location-Based Analysis
  • Advanced Malware Detection Techniques
  • Indoor and Outdoor Localization Technologies
  • Caching and Content Delivery
  • Data Visualization and Analytics
  • Privacy-Preserving Technologies in Data
  • Cloud Computing and Resource Management
  • Complex Network Analysis Techniques
  • Blockchain Technology Applications and Security
  • Power System Reliability and Maintenance
  • Time Series Analysis and Forecasting
  • Cryptography and Data Security
  • Computational Physics and Python Applications
  • Software-Defined Networks and 5G
  • Sparse and Compressive Sensing Techniques
  • Age of Information Optimization
  • Software Engineering Research
  • Big Data and Digital Economy

Computer Network Information Center
2024

Chinese Academy of Sciences
2020-2024

Institute of Computing Technology
2020-2024

Purple Mountain Laboratories
2020-2023

University of Chinese Academy of Sciences
2021

Hunan University
2018-2019

State University of New York
2019

Graph convolutional neural networks (GCNN) have become an increasingly active field of research. It models the spatial dependencies nodes in a graph with pre-defined Laplacian matrix based on node distances. However, many application scenarios, change over time, and use fixed cannot capture change. To track among traffic data, we propose dynamic spatio-temporal GCNN for accurate forecasting. The core our deep learning framework is finding estimator. enable timely low complexity, creatively...

10.1609/aaai.v33i01.3301890 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

The prediction of short-term volatile traffic becomes increasingly critical for efficient engineering in intelligent transportation systems. Accurate forecast results can assist management and pedestrian route selection, which will help alleviate the huge congestion problem system. This paper presents a novel hybrid DTMGP model to accurately volume passenger flows multi-step ahead with comprehensive consideration factors from temporal, origin-destination spatial, frequency self-similarity...

10.1109/tits.2018.2841800 article EN IEEE Transactions on Intelligent Transportation Systems 2018-06-19

The attacks, faults, and severe communication/system conditions in Mobile Crowd Sensing (MCS) make false data detection a critical problem. Observing the intrinsic low dimensionality of general monitoring sparsity data, can be performed based on separation normal anomalies. Although existing algorithm Direct Robust Matrix Factorization (DRMF) is proven to effective, requiring iteratively performing Singular Value Decomposition (SVD) for low-rank matrix approximation would result...

10.1109/tnet.2020.2982685 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2020-04-16

Traffic sensor networks are widely applied in smart cities to monitor traffic real-time and record huge volumes of data. Exploiting such data forecast future conditions have the potential enhance decision-making capabilities intelligent transportation systems, which attracts widespread attention from both industries academia. Among them, network-wide prediction based on graph convolutional neural networks(GCN) has become mainstream. It models spatial dependencies sensors a with pre-defined...

10.1109/tmc.2023.3328038 article EN IEEE Transactions on Mobile Computing 2023-10-30

With the proliferation of smartphones, a novel sensing paradigm called Mobile Crowd Sensing (MCS) has emerged very recently. However, attacks and faults in MCS cause serious false data problem. Observing intrinsic low dimensionality general monitoring sparsity data, detection can be performed based on separation normal anomalies. Although existing algorithm Direct Robust Matrix Factorization (DRMF) is proven to effective, requiring iteratively performing Singular Value Decomposition (SVD)...

10.1109/infocom.2019.8737644 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Massive key performance indicators (KPIs) are monitored as multivariate time series data (MTS) to ensure the reliability of software applications and service system. Accurately detecting abnormality MTS is very critical for subsequent fault elimination. The scarcity anomalies manual labeling has led development various self-supervised anomaly detection (AD) methods, which optimize an overall objective/loss encompassing all metrics' regression objectives/losses. However, our empirical study...

10.1145/3611643.3613896 article EN cc-by 2023-11-30

A large volume of logs provides a reliable data source for online services. For instance, 5G, Big 5G or Beyong cloud core network and its User Plane Functions require analysis built on massive log storage. The storage cost remains problem the industry. Compressing before archives most popular way to reduce it. However, structured logs, which usually present in tabular format, unstructured build variable templates, have use different compression strategies. Using parsers can eliminate this...

10.1109/icc45855.2022.9838258 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

Power system is becoming larger and more connectible, closely relating to human life social development. However, with the increasing data volume complexity, danger of frequency collapse has always exist. To tackle this challenge, paper proposes a parallel maximum flow based complex network approach identify critical lines. First, power modeled as graph edges (transmission lines, transformers, etc.) nodes (buses, substations, etc.)based on theory. Then an improved proposed for topology...

10.1109/icbda.2018.8367715 article EN 2018-03-01

Similarity (distance) measurement among network features (e.g. IP address, MAC port number, and protocol, etc.) based on logs is a critical step for data mining in intrusion detection, anomaly prediction, log analysis. A practical approach necessarily accurate, fast, incremental due to the dynamic environment. However, existing solutions fail satisfy these demands simultaneously. Therefore, we propose novel unsupervised feature embedding approach: Network Vector (NeVe). It learns similarity...

10.1109/iscc53001.2021.9631421 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2021-09-05

By deploying virtualized network elements (hosts, switches, routers, links, etc.) on clusters of commodity machines, distributed emulations (DNE) closely mimic the behaviors systems and provide real-time interactions analysis for service management. However, DNE encounters scalability challenges when faced with large topologies. These can be boiled down to assignment problem: which physical machine each element should assigned so that largest possible topology emulated? In this paper, we...

10.1109/tnsm.2023.3287030 article EN IEEE Transactions on Network and Service Management 2023-06-16

Massive key performance indicators (KPIs) are monitored as multivariate time series data (MTS) to ensure the reliability of software applications and service system. Accurately detecting abnormality MTS is very critical for subsequent fault elimination. The scarcity anomalies manual labeling has led development various self-supervised anomaly detection (AD) methods, which optimize an overall objective/loss encompassing all metrics' regression objectives/losses. However, our empirical study...

10.48550/arxiv.2308.08915 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Time series analysis can explore the internal relations among data, so as to further realize prediction, pattern discovery and anomaly detection. However, these analyses largely rely on labeled which needs identify particular patterns from entire time data. Because labeling is costly domain specific, how automatically label raw data with predefined becomes a valuable problem. In this paper, we first discuss particularities that learned practical applications of task in terms inconsistent...

10.1109/ijcnn52387.2021.9533633 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18
Coming Soon ...