Lei Li

ORCID: 0000-0001-7782-1876
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Service-Oriented Architecture and Web Services
  • IoT Networks and Protocols
  • Distributed and Parallel Computing Systems
  • Advanced Neural Network Applications
  • Energy Efficient Wireless Sensor Networks
  • Semantic Web and Ontologies
  • Advanced Image and Video Retrieval Techniques
  • Adversarial Robustness in Machine Learning
  • Interconnection Networks and Systems
  • Advanced Decision-Making Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Image Retrieval and Classification Techniques
  • Security and Verification in Computing
  • Parallel Computing and Optimization Techniques
  • Web Data Mining and Analysis
  • Advanced Technology in Applications
  • Advanced Software Engineering Methodologies
  • Hand Gesture Recognition Systems
  • Network Time Synchronization Technologies
  • Advanced Database Systems and Queries
  • Age of Information Optimization
  • Video Analysis and Summarization

South China University of Technology
2012-2025

Cleveland State University
2025

University of Chinese Academy of Sciences
2023

PLA 306 Hospital
2022

Shanghai Electric (China)
2022

China Mobile (China)
2021

Wuhan Institute of Technology
2020

Nanyang Technological University
2018

Air Force Engineering University
2016

Peking University
2014

An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardization ontologies, message content protocols will be necessary.In this paper we investigate how Services technologies can used support service advertisement discovery in e-commerce. In particular, describe design implementation a matchmaking prototype which uses DAML-S based ontology Description Logic reasoner compare descriptions. We also present...

10.1145/775152.775199 article EN 2003-01-01

Edge computing has recently emerged as an extension to cloud for quality of service (QoS) provisioning particularly delay guarantee delay-sensitive applications. By offloading the computationally intensive workloads edge servers, computation experience, e.g., network transmission and energy consumption, could be improved greatly. However, resource server is so scarce that it cannot respond quickly bursting requirements. Accordingly, queuing un-negligible in a environment, environment...

10.1109/access.2019.2922992 article EN cc-by-nc-nd IEEE Access 2019-01-01

Fog computing has become the primary infrastructure on Internet for improving quality of service. We consider a fog queueing system with limited resources to accommodate real-time tasks heterogeneities in task types and execution deadlines. Owing uncertain duration, such should jointly resource allocation offloading satisfy deadline requirements. To heterogeneity, parallel virtual queue model is applied buffer each type separate queue. Subsequently, we use framework, including three...

10.1109/access.2019.2891130 article EN cc-by-nc-nd IEEE Access 2019-01-01

A number of recent studies have reported the phenomenon "software aging", characterized by progressive performance degradation or a sudden hang/crash software system due to exhaustion operating resources, fragmentation and accumulation errors. To counteract this phenomenon, proactive technique called rejuvenation" has been proposed. This essentially involves stopping running software, cleaning its internal state then restarting it. Software rejuvenation, being preventive in nature, begs...

10.1109/isese.2002.1166929 article EN 2003-06-25

10.1109/icassp49660.2025.10888541 article ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Internet services are increasingly being deployed using cloud computing. However, the workload of an service is not constant; therefore, required computing resources need to be allocated elastically minimize associated costs. Thus, this study proposes a proactive resource scheduling framework. First, we propose new prediction method—named adaptive two-stage multi-neural network based on long short-term memory (LSTM)—which can adaptively route tasks corresponding LSTM sub-model according...

10.3390/app15052347 article EN cc-by Applied Sciences 2025-02-22

Cross-site scripting (XSS) is one of the main threats Web applications, which has great harm. How to effectively detect and defend against XSS attacks become more important. Due malicious obfuscation attack codes gradual increase in number, traditional detection methods have some defects such as poor recognition codes, inadequate feature extraction low efficiency. Therefore, we present a novel approach based on attention mechanism Long Short-Term Memory (LSTM) recurrent neural network. First...

10.1109/crc51253.2020.9253484 article EN 2020-10-16

Fog computing has recently emerged as an extension of cloud in providing high-performance services for delay-sensitive Internet Things (IoT) applications. By offloading tasks to a geographically proximal fog server instead remote cloud, the delay performance can be greatly improved. However, some IoT applications may still experience considerable delays, including queuing and computation when huge amounts instantaneously feed into resource-limited node. Accordingly, cooperation among close...

10.3390/s19183830 article EN cc-by Sensors 2019-09-04

Vision Transformers (ViTs) mark a revolutionary advance in neural networks with their token mixer's powerful global context capability. However, the pairwise affinity and complex matrix operations limit its deployment on resource-constrained scenarios real-time applications, such as mobile devices, although considerable efforts have been made previous works. In this paper, we introduce CAS-ViT: Convolutional Additive Self-attention Transformers, to achieve balance between efficiency...

10.48550/arxiv.2408.03703 preprint EN arXiv (Cornell University) 2024-08-07

The amphiphilic dodecylbenzenesulfonic acid (DBSA) is usually added into wells as an asphaltene precipitation inhibitor. interfacially active DBSA and asphaltenes will be both adsorbed at the oil–water interface, influencing stability of crude oil emulsions. interactive effects between on interfacial properties are investigated in this paper. First, emulsions containing prepared, followed by a bottle test. weakens emulsion migrates from to water phase through interface. Then, adsorption...

10.1021/acs.energyfuels.0c00833 article EN Energy & Fuels 2020-05-18

The NASA Remote Exploration and Experimentation (REE) Project, managed by the Jet Propulsion Laboratory, has vision of bringing commercial supercomputing technology into space, in a form which meets demanding environmental requirements, to enable new class science investigation discovery. Dependability goals REE system are 99% reliability over 5 years availability. In this paper we focus on reliability/availability modeling analysis system. We carry out task using fault trees, block...

10.1109/dsn.2002.1028918 article EN 2003-06-25

Online services are now commonly deployed via cloud computing based on Infrastructure as a Service (IaaS) to Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). However, workload is not constant over time, so guaranteeing the quality of service (QoS) resource cost-effectiveness, which determined by on-demand requirements, challenging issue. In this article, authors propose neural network-based-method termed domain knowledge embedding regularization networks (DKRNN) for large-scale...

10.4018/jitr.2018100109 article EN Journal of Information Technology Research 2018-08-24

Handwritten character recognition (HCR) is a mainstream mobile device input method that has attracted significant research interest. Although previous studies have delivered reasonable accuracy, it remains difficult to directly embed the advanced HCR service into software and obtain excellent but fast results. Cloud computing relatively new online computational resource provider which can satisfy elastic requirements of with high-recognition accuracy. However, owing delay sensitivity...

10.1155/2018/6509275 article EN Scientific Programming 2018-09-05

Workload prediction is important for automatic scaling of resource management, and a high accuracy workload can reduce the cost improve utilization in cloud. But, task request usually random mutation, so it difficult to achieve more accurate result single models. Thus, result, authors proposed novel two-stage model based on artificial neural networks (ANNs), which composed one classification two On basis first-order gradient feature, categorize into classes adaptively. Then, predict by using...

10.4018/ijghpc.2019040101 article EN International Journal of Grid and High Performance Computing 2019-02-27

Aiming at the application scene with both burst signals and periodic signals, this paper proposes a cluster-based wireless sensor network MAC protocol combining TDMA, FDMA CSMA/CA - CBPMAC/TFC(a for system signals/based on FDMA, CSMA/CA). It adopts TDMA mechanism in clusters, assigns time-slots respectively. In signal time- slot, only one child node sends its signal, while time-slots, all nodes share channel according to mechanism. Among different is adopted. Different cluster works...

10.1109/wicom.2007.632 article EN International Conference on Wireless Communications, Networking and Mobile Computing 2007-09-01

Web services, with an emphasis on open standards and flexibility, can provide benefits over existing capital markets integration practices. However, services must first meet certain technical requirements including performance, security so on. SOAP, based Extensible Markup Language (XML), inherits not only the advantages of XML, but its relatively poor performance. This makes SOAP a choice for many high-performance services. In this paper, we propose new approach to improve Focusing avoiding...

10.1109/icws.2006.70 article EN 2006-01-01

Abstract Time-sensitive network requires monitoring the network’s operational status in real-time and dynamically changing traffic scheduling configuration. A method that can timely obtain operation information is needed. In this paper, a for proxy hosts to send packets proposed, which enables visits collection of all switches through single packet. Then, it returns packet CNC controller processing. To verify method, TSN ring topology simulated, mainly delay each hop node. The simulation...

10.1088/1742-6596/2849/1/012113 article EN Journal of Physics Conference Series 2024-09-01

Deep Neural Networks exhibit inherent vulnerabilities to adversarial attacks, which can significantly compromise their outputs and reliability. While existing research primarily focuses on attacking single-task scenarios or indiscriminately targeting all tasks in multi-task environments, we investigate selectively one task while preserving performance others within a framework. This approach is motivated by varying security priorities among real-world applications, such as autonomous...

10.48550/arxiv.2411.17936 preprint EN arXiv (Cornell University) 2024-11-26

Entity relation extraction (RE) is an very important research domain in information extraction, we can regard RE as a classification problem this paper, still original study field Chinese language now, maximum entropy (ME)-based machine learning the first time to be used extract entity relations between named entities from texts, Thirteen features have been designed for which includes morphology, grammar and semantic feature. The system architecture has constructed. Experiment shows that...

10.1109/isda.2006.115 article EN 2006-10-01

This paper presents an open source tool for testing the recognition accuracy of Chinese handwriting input methods. The consists two modules, namely PC and Android mobile client. client reads handwritten samples in computer, transfers them individually to accordance with socket communication protocol. After receives data, it simulates on screen device, triggers corresponding method. is recorded by We present design principles describe implementation test platform. construct several datasets...

10.48550/arxiv.1506.00176 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...