- Privacy-Preserving Technologies in Data
- Mobile Crowdsensing and Crowdsourcing
- IoT and Edge/Fog Computing
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- UAV Applications and Optimization
- Human Mobility and Location-Based Analysis
- Blockchain Technology Applications and Security
- Indoor and Outdoor Localization Technologies
- Auction Theory and Applications
- Advanced Neural Network Applications
- Robotics and Sensor-Based Localization
- Advanced Steganography and Watermarking Techniques
- Energy Harvesting in Wireless Networks
- Advanced Image and Video Retrieval Techniques
- Caching and Content Delivery
- Cloud Data Security Solutions
- Age of Information Optimization
- Security in Wireless Sensor Networks
- Cloud Computing and Resource Management
- Evacuation and Crowd Dynamics
- Video Surveillance and Tracking Methods
- Image Processing Techniques and Applications
Hunan University of Science and Technology
2016-2025
Shandong University of Science and Technology
2021-2024
The University of Melbourne
2024
Hebei University of Technology
2024
Zhejiang University of Technology
2012-2023
Northwest University
2016-2023
Hunan Software Vocational Institute
2023
Anhui Medical University
2022-2023
Xidian University
2023
Changchun University of Chinese Medicine
2023
The factor analysis literature includes a range of recommendations regarding the minimum sample size necessary to obtain solutions that are adequately stable and correspond closely population factors.A fundamental misconception about this issue is size, or ratio number variables, invariant across studies.In fact, dependent on several aspects any given study, including level communality variables overdetermination factors.The authors present theoretical mathematical framework provides basis...
The authors examine the practice of dichotomization quantitative measures, wherein relationships among variables are examined after 1 or more have been converted to dichotomous by splitting sample at some point on scale(s) measurement. A common form is median split, where independent variable split high and low groups, which then compared with respect their means dependent variable. consequences for measurement statistical analyses illustrated discussed. use in described, justifications that...
Background: The coronavirus disease 2019 (COVID-19) outbreak originating in Wuhan, Hubei province, China, coincided with chunyun, the period of mass migration for annual Spring Festival. To contain its spread, China adopted unprecedented nationwide interventions on January 23 2020. These policies included large-scale quarantine, strict controls travel and extensive monitoring suspected cases. However, it is unknown whether these have had an impact epidemic. We sought to show how control...
The development of the Internet Things (IoT) and intelligent vehicles brings a comfortable environment for users. Various emerging vehicular applications using artificial intelligence (AI) technologies are expected to enrich users' daily life. However, how execute computation-intensive on resource-constrained based AI still faces great challenges. In this article, we consider computation offloading problem in mobile-edge computing (MEC), which multiple mobile select nearby MEC servers...
The authors examine the practice of dichotomization quantitative measures, wherein relationships among variables are examined after 1 or more have been converted to dichotomous by splitting sample at some point on scale(s) measurement.A common form is median split, where independent variable split high and low groups, which then compared with respect their means dependent variable.The consequences for measurement statistical analyses illustrated discussed.The use in described, justifications...
With the development of wireless communication and positioning technology, location-based services (LBSs) have been gaining tremendous popularity, due to its ability greatly facilitate people's daily lives. Meanwhile, it also entails risk location privacy disclosure. To address this issue, general solutions introduce a single trusted anonymizer between users service provider (LSP). However, offers limited guarantees incurs high overhead in continuous LBSs. Once is compromised, may put user...
Billions of sensors and devices are connecting to the Internet Thing (IoT) generating massive data which benefit for smart network systems. However, low-cost, secure, efficient collection from billions IoT in city is a huge challenge. Recruiting mobile vehicles (MVs) has been proved be an effective scheme. previous approaches rarely considered security. In this paper, novel Baseline Data based Verifiable Trust Evaluation (BD-VTE) scheme proposed guarantee security at low cost. BD-VTE...
Vehicular Edge Computing (VEC) is a promising paradigm that leverages the vehicles to offload computation tasks nearby VEC server with aim of supporting low latency vehicular application scenarios. Incentivizing servers participate in offloading activities and make full use resources great importance success intelligent transportation services. In this paper, we formulate competitive interactions between as two-stage Stackelberg game leader players followers. After obtaining information...
Using highly maneuverable Unmanned Aerial Vehicles (UAV) to collect data is a fast and efficient method that widely studied. In most studies, they assume the UAVs can obtain location of Cluster Head (CH) before take-off, allocate CHs, optimize trajectory in advance. However, many real scenarios, sensing devices are deployed areas with no basic communication infrastructure or cannot communicate Internet due emergencies such as disasters. this kind network, surviving often change, CHs be known...
Abstract Mobile edge computing (MEC) is envisioned as a promising platform for supporting emerging computation‐intensive applications on capacity and resource constrained mobile devices (MDs). In this platform, the task with high demand can be offloaded to nodes computing. Moreover, result cached nodes. When other MDs request that has been cached, directly return MD. However, storage of limited, effective prediction caching scheme one key issues MEC. article, matrix completion technology...