- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Mobile Ad Hoc Networks
- Cloud Computing and Resource Management
- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Wireless Networks and Protocols
- Vehicle Routing Optimization Methods
- IoT Networks and Protocols
- Age of Information Optimization
- Indoor and Outdoor Localization Technologies
- UAV Applications and Optimization
- Peer-to-Peer Network Technologies
- Distributed Control Multi-Agent Systems
- Network Security and Intrusion Detection
- Energy Harvesting in Wireless Networks
- Forest ecology and management
- Spam and Phishing Detection
- Advanced Manufacturing and Logistics Optimization
- Opportunistic and Delay-Tolerant Networks
- Optimization and Packing Problems
- Artificial Immune Systems Applications
- Mathematics and Applications
- Advanced Wireless Communication Technologies
National University of Defense Technology
2019-2023
Ningxia University
2022
Tianjin University of Technology
2007-2018
PLA Army Engineering University
2011-2015
Nanjing Institute of Technology
2011
Nanjing University of Posts and Telecommunications
2010
Various security threats and corresponding countermeasures has been a major concern of the maintainers multi-hop wireless networks (MHWNs) in recent years. This is accompanied with background advances link bandwidth rapid growth deployment network. As one main MHWN faces, jamming attack attracted much attention since it easy to launch can cause severe damages Accurate jammer localization plays an essential role applying various anti-jamming hot topic survey overviews works done field for...
Unmanned aerial vehicles (UAVs) are considered a promising solution for carrying communications and computational facilities to increase the flexibility of cloud-to-thing continuum, where short-range long-range wireless links adopted connect mobile devices fog node remote data center, respectively. Most existing UAV-involved resource allocation algorithms focus mainly on radio problem, much less attention has been paid resources. Moreover, dynamic arrival tasks queueing delay at each...
With the proliferation of Internet Things (IoT), current "cloud-only" architectures cannot efficiently handle IoT's data processing and communications needs, while providing satisfactory service latency to support emerging mobile applications on horizon that require almost real-time responses. fog computing is introduced as a new paradigm distributes computation, communication, control, storage closer end users along "cloud- to-things" continuum. In this paper, we present deadline-aware task...
Mobile cloud computing (MCC) enables the mobile devices to offload their applications and thus greatly enriches types of on enhances quality service applications. Under various circumstances, researchers have put forward several MCC architectures. However, how reduce response latency while efficiently utilizing idle capacities still remains a challenge. In this paper, we firstly give definition divide recently proposed architectures into four categories. Secondly, present Hybrid Local Cloud...
In recent years, reputation management schemes have been proposed as promising solutions to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for contribute more resources system and thus promote whole performance. But few of them implemented practically since they still suffer from various security threats, such collusion, Sybil attack so on. Therefore, how detect plays a critical role...
Supporting Artificial Intelligence (AI)-enhanced intelligent applications on the resource-limited Unmanned Aerial Vehicle (UAV) platform is difficult due to resource gap between two. It promising partition an AI application into a service function (SF) chain and then dispatch SFs onto multiple UAVs. However, it still challenging task efficiently schedule computation communication resources of UAVs support large number SF chains (SFCs). Under multi-UAV edge computing paradigm, this paper...
With the gradual deepening and development of modern military warfare towards Network Centric Warfare (NCW), performance network protocols will play an important role. However, popular based on end-to-end is not suited for communication networks, which long/variable delay, high error rates greatly heterogeneous. Delay/Disruption Tolerant (DTN) a new type architecture aiming at scenes connection periodic, intermittent, and/or prone to disruptions. Two application modes in communications be...
In recent years, researchers have proposed many jammer localization schemes. Among them, Packet Delivery Ratio (PDR)-based is a promising scheme which locates by successive forwarding of PDR measurements to neighbours in distributed manner without any modifications hardware. Since strong jamming signal corrupts the communication jammed nodes, value such nodes drops zero. As result, gradient descent process couldn't go forward on causing certain location error. this paper, we put method...
Abstract Wireless sensor network can be easily attacked by jammers for its shared character and open access to the wireless channel. Jamming attack could produce a significant threat interrupting normal transmission of nodes. To this end, several anti-jamming countermeasures have been proposed improve quality service network. As an important building block countermeasures, estimation jammer’s location provide us possible way eliminate artificially. However, existing localization algorithms...
Cloud-as-the-center computing paradigms face multiple challenges in the 5G and Internet of Things scenarios, where service requests are usually initiated by end-user devices located at network edge have rigid time constraints. Therefore, Fog computing, or mobile is introduced as a promising solution to provision tiered IoT infrastructure compensate shortage traditional cloud-only architecture. In this cloud-to-things continuum, several cloudlet server entities placed access handle task...
Mobile Cloud Computing (MCC) enables the mobile devices to offload their applications cloud, and thus greatly enriches types of on enhances quality service applications. Under various circumstances, researchers have put forward several MCC architectures. However, how reduce response latency while efficiently utilizing idle capacities is still a challenge. This paper firstly gives definition MCC. Secondly, by extending Cloudlet architecture, Hybrid Local Model (HLMCM) presented. Thirdly, from...
在新的应用模式下,传统层次结构数据中心网络在规模、带宽、扩展性和成本方面存在诸多不足.为了适应新型应用的需求,数据中心网络需要在低成本的前提下,满足高扩展性、低配置开销、健壮性和节能的要求.首先,概述了传统数据中心网络体系结构及其不足,并指出了新的需求;其次,将现有方案划分为两类,即以网络为中心和以服务器为中心的方案;然后,对两类方案中的代表性结构进行了详细的综述和对比分析;最后指出了数据中心网络未来的发展方向.;Under the new application mode, traditional hierarchy data centers face several limitations in size, bandwidth, scalability, and cost. In order to meet needs of applications, center network should fulfill requirements with low-cost, such as high low configuration overhead, robustness...
Jamming attack may pose a significant threat to the wireless network by occupying channel used legal nodes. As an important building block for anti-jamming strategies, jammer localization provides us feasibility eliminate jammers from networks and few algorithms have been presented this end. However, current mainly focus on locating equipped with omnidirectional antennas are usually fail cope directional jammers. In order bridge gap, Directional Jammer Localization Algorithm (DJLA) is put...
It is crucial to find the location of radio jammer for implementing anti-jamming methods and thus resuming communication management MHWN. Nevertheless, due influence environmental factors mutual interference normal nodes, several unaffected nodes are unable accurately identify whether they affected by become noise in location-oriented process, thereby influencing precision jamming localization algorithm causing remarkable error. In this paper, an put forward eliminate based on Mean Squared...
Multihop Wireless Networks (MHWNs) can be easily attacked by the jammer for their shared nature and open access to wireless medium. The jamming attack may prevent normal communication through occupying same channel of legal nodes. It is critical locate accurately, which provide necessary message implementation antijamming mechanisms. However, current range-free methods are sensitive distribution nodes parameters jammer. In order improve localization accuracy, this article proposes a method...
Abstract To support artificial intelligence (AI)‐involved tasks offloaded from the mobile devices (MDs), it is necessary to equip Unmanned Aerial Vehicle (UAV) with custom‐made co‐processor (CP) for handling AI workloads in multi‐UAV‐empowered Edge Intelligence. Existing CPU‐oriented task scheduling algorithm cannot apply CPU+CP heterogeneous architecture. In this backdrop, paper first formulates joint service function placement, collaborative scheduling, UAV deployment, and MD position...
In recent years, Multi-Hop Wireless Network (MHWN) has been widely researched and deployed since it is a feasible architecture to realize pervasive network connection in complex environment. As one of the hot research topics MHWN, jamming attack attracted much attention due fact that simple but effective method reduce throughput MHWN. The current methods are mostly proposed from perspective time or frequency domain. contrast, as non-negligible problem, jammers' spatial deployment drawn...