Yongping Xiong

ORCID: 0000-0001-8670-3898
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Topic Modeling
  • Caching and Content Delivery
  • Natural Language Processing Techniques
  • Energy Efficient Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Handwritten Text Recognition Techniques
  • Energy Harvesting in Wireless Networks
  • Underwater Vehicles and Communication Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Text and Document Classification Technologies
  • Wireless Networks and Protocols
  • Image Retrieval and Classification Techniques
  • Digital Media Forensic Detection
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Power Line Communications and Noise
  • Biometric Identification and Security
  • Bluetooth and Wireless Communication Technologies
  • Advanced Image Processing Techniques
  • Human Mobility and Location-Based Analysis
  • Image and Signal Denoising Methods
  • Advanced Authentication Protocols Security
  • Network Traffic and Congestion Control

Beijing University of Posts and Telecommunications
2011-2024

Guangzhou University
2023

Guangzhou Vocational College of Science and Technology
2021

Chongqing University
2015

Peking University
2013-2014

State Key Laboratory of Networking and Switching Technology
2011-2014

China Information Technology Security Evaluation Center
2013-2014

Wuxi Industrial Equipment Installation (China)
2011

Chinese Academy of Sciences
2008-2010

Institute of Computing Technology
2009-2010

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because data is located different places even all globe. and privacy protection are two main factors of user's concerns about Though many techniques on topics have investigated both academics industries, becoming more important for future development technology government, industry, business. issues relevant to hardware software architecture. This...

10.1155/2014/190903 article EN cc-by International Journal of Distributed Sensor Networks 2014-07-01

WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing infrastructure only provides intermittent connectivity for mobile users. Once leaving current network clients must actively discover new access points (APs), which wastes precious energy of devices. Although several solutions been proposed address this issue, they either require significant modifications infrastructures or rely on context information that is not...

10.1145/1859995.1860002 article EN 2010-09-20

Internet of Vehicles (IoV) is a typical application things in the field transportation, which aims at achieving an integrated intelligent transportation system to enhance traffics, avoid accidents, ensure road safety, and improve driving experiences. Due its characteristics dynamic topological structures, huge network scale, non-uniform distribution nodes, mobile limitation, IoV systems face various types attacks, such as authentication identification availability confidentiality routing...

10.1109/iiki.2015.33 article EN 2015-10-01

大量具备短距离通信能力的智能设备的出现推动了无线自组网应用的迅速发展.但在许多实际应用环境中,节点移动、网络稀疏或信号衰减等各种原因通常导致形成的网络大部分时间不连通.传统的移动自组织网络传输模式要求通信源和目标节点之间存在至少一条完整的路径,因而无法在这类环境中运行.机会网络利用节点移动形成的通信机会逐跳传输消息,以"存储-携带-转发"的路由模式实现节点间通信,这种完全不同于传统网络通信模式的新兴组网方式引起了研究界极大的兴趣.首先介绍机会网络的概念和理论基础,并给出了当前机会网络的一些典型应用,然后详细阐述了机会网络研究的热点问题,包括机会转发机制、移动模型和基于机会通信的数据分发和检索等,并简要叙述了机会网络的通信中间件、协作和安全机制以及机会网络新的应用等其他研究问题,最后进行总结并展望了机会网络未来一段时间内的研究重点.;The appearance of plenty intelligent devices equipped for short-range wireless communications boosts the fast rise ad hoc...

10.3724/sp.j.1001.2009.00124 article EN Journal of Software 2009-04-07

The goal of scene text image super-resolution is to reconstruct high-resolution text-line images from unrecognizable low-resolution inputs. existing methods relying on the optimization pixel-level loss tend yield edges that exhibit a notable degree blurring, thereby exerting substantial impact both readability and recognizability text. To address these issues, we propose TextDiff, first diffusion-based framework tailored for super-resolution. It contains two modules: Text Enhancement Module...

10.2139/ssrn.4818933 preprint EN 2024-01-01

With the increase of storage capacity, computing, and wireless networking vehicular embedded devices, networks bring a potential to enable new applications for drivers passengers in vehicles. Due prohibitive cost deployment management roadside unit (RSU), it is difficult cover roads with large number RSUs so that every vehicle can always keep connection nearby RSU. In this paper, we study problem deploying provide desired connectivity performance while minimizing deployed RSUs. The key idea...

10.1155/2013/690974 article EN cc-by International Journal of Distributed Sensor Networks 2013-03-01

Transformer models have achieved promising performances in point cloud segmentation. However, most existing attention schemes provide the same feature learning paradigm for all points equally and overlook enormous difference size among scene objects. In this paper, we propose Size-Aware (SAT) that can tailor effective receptive fields objects of different sizes. Our SAT achieves size-aware via two steps: introduce multi-scale features to each layer allow choose its attentive adaptively. It...

10.48550/arxiv.2301.06869 preprint EN other-oa arXiv (Cornell University) 2023-01-01

A new method, which assumes<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mi>ϕ</mml:mi><mml:mi>'</mml:mi></mml:math>with a function form of<mml:math id="M2"><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mrow><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mi>ϕ</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math>, is applied to solve the Dodd-Bullough equation<mml:math...

10.1155/2013/364718 article EN cc-by Journal of Applied Mathematics 2013-01-01

Graph-based approaches are successful for histology image classification tasks but still face many challenges, such as: 1) the lack of nuclei-level labels and significant variations between images make it extremely difficult to extract discriminative high-level nuclei features like type, texture micro-environment; 2) graph-based cannot handle large-scale cell graph nodes typically contained in images; 3) neural networks (GNNs) struggle learn long-range dependency graphs. To address above we...

10.1109/jbhi.2022.3199110 article EN IEEE Journal of Biomedical and Health Informatics 2022-08-15

The electric power customer service domain-specific knowledge graph aims to describe the concepts, entities, events and their relationships in business field, with a structured manner, provide more effective data organization, management, cognitive ability for business. This paper proposes method constructing field of service, constructs over 15,000 entities 20,000 relationships. Based on graph, an intelligent question answering application architecture is designed, which consists multiple...

10.1016/j.procs.2021.04.072 article EN Procedia Computer Science 2021-01-01

The fingerprint positioning based on received signal strength has a widespread development in many applications since the technology does not depend additional hardware deployment. However, site survey process which is executed before time consuming and labor intensive. Sampling cell size directly affects localization precision workload. We propose sampling optimization method to release workload while holding precision. adopted Gaussian model estimate some samples used inherent maximum...

10.1155/2014/273801 article EN cc-by International Journal of Distributed Sensor Networks 2014-09-01

Document binarization is a key pre-processing step for many document analysis tasks. However, existing methods can not extract stroke edges finely, mainly due to the fairtreatment nature of vanilla convolutions and extraction without adequate supervision by boundary-related information. In this paper, we formulate text as learning gating values propose an end-to-end gated convolutionsbased network (GDB) solve problem imprecise edge extraction. The are applied selectively features strokes...

10.2139/ssrn.4373083 article EN 2023-01-01

Wi-Fi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing infrastructure only provides intermittent connectivity for mobile users. Once leaving current network clients must actively discover new access points (APs), which wastes precious energy of devices. Although several solutions been proposed address this issue, they either require significant modifications infrastructures or rely on context information that is not...

10.1109/tmc.2014.2309610 article EN IEEE Transactions on Mobile Computing 2014-03-25

Network virtualization has become pervasive and is used in many applications. Through the combination of network wireless sensor networks, it can greatly improve multiple applications traditional networks. However, because dynamic reconfiguration topologies physical layer virtualized networks (VSNs), requires a mechanism to guarantee accuracy estimate values by sensors. In this paper, we focus on distributed Kalman filter algorithm with support requirement. As one strategy algorithms,...

10.1155/2016/8695102 article EN cc-by Mobile Information Systems 2016-01-01

Transformer models have achieved promising performances in point cloud segmentation. However, most existing attention schemes provide the same feature learning paradigm for all points equally and overlook enormous difference size among scene objects. In this paper, we propose Field-Aware (FAT) that adjusts attentive receptive fields objects of different sizes. Our FAT achieves field-aware via two steps: introduce multi-granularity features to each layer allow choose its adaptively. It...

10.1109/icip49359.2023.10222151 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2023-09-11

Multipath Transport Control Protocol (MPTCP) is a transport layer protocol that enables multiple TCP connections across various paths.Due to path heterogeneity, it incurs more energy in multipath wireless network.Recent work presents set of approaches described the literature support systems for consumption terms their performance, objectives and address issues based on design goals.The existing solutions mainly focused primary system model but did not discourse overall...

10.3837/tiis.2021.01.012 article EN KSII Transactions on Internet and Information Systems 2021-01-31

This paper raises a method for indoor location by using WIFI wireless signals auxiliary independent sensors localization to realize continuous and seamless localization. Independent uses dead reckoning mainly including three factors: step number, heading length. However, when person walks, length is random variable. It difficult get accurate just relying on sensors. So, this puts forward use positioning online adjusting person's Also, can aid people's position correction communication. Then,...

10.1109/iccsnt.2011.6182509 article EN 2011-12-01
Coming Soon ...