Kai Lei

ORCID: 0000-0001-9197-895X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Topic Modeling
  • Cooperative Communication and Network Coding
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Complex Network Analysis Techniques
  • Natural Language Processing Techniques
  • Advanced Text Analysis Techniques
  • Advanced Graph Neural Networks
  • Biomedical Text Mining and Ontologies
  • Text and Document Classification Technologies
  • Multimodal Machine Learning Applications
  • Web Data Mining and Analysis
  • Sentiment Analysis and Opinion Mining
  • Data Management and Algorithms
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • Software-Defined Networks and 5G
  • Spam and Phishing Detection
  • Carbon and Quantum Dots Applications
  • Data Quality and Management
  • Semantic Web and Ontologies
  • Network Security and Intrusion Detection

Peking University
2015-2024

Nanchang University
2023

Peng Cheng Laboratory
2018-2021

Dongfang Electric Corporation (China)
2009-2021

Peking University Shenzhen Hospital
2014-2020

Shaanxi University of Science and Technology
2018

Beijing Institute of Big Data Research
2015

Beijing Jiaotong University
2009-2014

In this paper, we generally formulate the dynamics prediction problem of various network systems (e.g., mobility, traffic and topology) as temporal link task. Different from conventional techniques that ignore potential non-linear characteristics informative weights in dynamic network, introduce a novel model GCN-GAN to tackle challenging task weighted networks. The proposed leverages benefits graph convolutional (GCN), long short-term memory (LSTM) well generative adversarial (GAN). Thus,...

10.1109/infocom.2019.8737631 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Powered by a number of smart devices distributed throughout the whole network, Internet Things (IoT) is supposed to provide services computing for massive data from devices. Fog computing, an extension cloud-based IoT-oriented solutions, has emerged with requirements distribution and decentralization. In this respect, conjunction Blockchain provides natural solution decentralization, as well potentially helps fog overcome some deficiencies such security privacy then consequently expand...

10.1109/tsc.2019.2949801 article EN IEEE Transactions on Services Computing 2020-03-01

Recent artificial intelligence research has witnessed great interest in automatically generating text descriptions of images, which are known as the image captioning task. Remarkable success been achieved on domains where a large number paired data multimedia available. Nevertheless, annotating sufficient is labor-intensive and time-consuming, establishing significant barriers for adapting systems to new domains. In this study, we introduc novel Multitask Learning Algorithm cross-Domain...

10.1109/tmm.2018.2869276 article EN IEEE Transactions on Multimedia 2018-09-21

The Practical Byzantine Fault Tolerance algorithm (PBFT)has been highly applied in consortium blockchain systems, however, this kind of consensus can hardly identify and remove faulty nodes time, also vulnerable to many attacks against the primary node PBFT. equality members' discourse rights is inapplicable some real scenarios where dominating members are likely have a larger voting process. To address these problems, paper presents Reputation-based (RBFT)algorithm that incorporates...

10.1109/padsw.2018.8644933 article EN 2018-12-01

Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC) are believed as supporting technologies for building a smart city. The advancement flourish IoT facilitating the entry human society into Everything era, which lay foundation To address conflict between computation capability low-cost devices in IoT, MA-MEC is available resource-limited computation-sensitive services applications by offloading distributed content delivery/caching. However, deploying cloud...

10.1109/access.2019.2913438 article EN cc-by-nc-nd IEEE Access 2019-01-01

Large scale, high concurrency, and vast amount of data are important trends for the new generation website. Node.js becomes popular successful to build data-intensive web applications. To study compare performance Node.js, Python-Web PHP, we used benchmark tests scenario tests. The experimental results yield some valuable data, showing that PHP handle much less requests than in a certain time. In conclusion, our clearly demonstrate is quite lightweight efficient, which an idea fit I/O...

10.1109/cse.2014.142 article EN 2014-12-01

Named data networking (NDN) enables fast and efficient content dissemination in mission-critical unmanned aerial vehicle ad hoc networks (UAANETs); however, its in-network caching mechanism brings a new security challenge: poisoning. Poisoned can contaminate the cache on routers isolate valid from network, leading to performance degradation or denial of service. To mitigate such attacks enhance network-layer trust NDN-based UAANETs, this article proposes novel systematic framework that...

10.1109/mcom.2019.1800722 article EN IEEE Communications Magazine 2019-06-01

Ranking question answer pairs has attracted increasing attention recently due to its broad applications such as information retrieval and answering (QA). Significant progresses have been made by deep neural networks. However, background hidden relations beyond the context, which play crucial roles in human text comprehension, received little recent networks that achieve state of art ranking QA pairs. In paper, we propose KABLSTM, a Knowledge-aware Attentive Bidirectional Long Short-Term...

10.1145/3209978.3210081 article EN 2018-06-27

Blockchain provides a new approach for participants to maintain reliable databases in untrusted networks without centralized authorities. However, there are still many serious problems real blockchain systems IP network such as the lack of support multicast and hierarchies status. In this paper, we design bitcoin-like system named BlockNDN over Named Data Networking implement deploy it on our cluster well. The resulting solves those network. It completely decentralized simplifies...

10.1109/icufn.2017.7993751 article EN 2017-07-01

Answer selection and knowledge base question answering (KBQA) are two important tasks of (QA) systems. Existing methods solve these separately, which requires large number repetitive work neglects the rich correlation information between tasks. In this paper, we tackle answer KBQA simultaneously via multi-task learning (MTL), motivated by following motivations. First, both can be regarded as a ranking problem, with one at text-level while other knowledge-level. Second, benefit each other:...

10.1609/aaai.v33i01.33016318 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

The challenging requirements of fifth-generation (5G) Internet-of-Things (IoT) applications have motivated a desired need for feasible network architecture, while Named Data Networking (NDN) is suitable candidate to support the high density IoT applications. To effectively distribute increasingly large volumes data in large-scale applications, this paper applies coding techniques into NDN improve throughput and efficiency content delivery 5G. A probability-based multipath forwarding strategy...

10.1109/tii.2017.2781372 article EN IEEE Transactions on Industrial Informatics 2017-12-08

Recently, attention-based encoder-decoder models have been used extensively in image captioning. Yet there is still great difficulty for the current methods to achieve deep understanding. In this work, we argue that such understanding requires visual attention correlated regions and semantic coherent attributes of interest. To perform effective attention, explore captioning from a cross-modal perspective propose Global-and-Local Information Exploring-and-Distilling approach explores distills...

10.24963/ijcai.2019/708 preprint EN 2019-07-28

Abstract The recent marriage of materials science and artificial intelligence has created the need to extract collate information from tremendous backlog academic publications. However, this is notoriously hard achieve in sophisticated application domains, such as Li‐ion battery (LIB) cathodes, which require multiple variables for selection, making it challenging automatically identify critical terms text. Herein, a semantics representation framework, featuring dual‐attention module that...

10.1002/adfm.202201437 article EN Advanced Functional Materials 2022-03-28

Named Data Networking is built with security which requires each named object to be digitally signed by its producer. Thus, the NDN project has proposed a key management model on testbed for verification of packet immune distributing poisoned content. However, in practice, this poses two challenges verifying fake content: (1) centralized architecture easily leads single point failure, especially when root fails, difficult verify keys across sites due lack trust between them, and (2)...

10.1109/hoticn.2018.8605993 article EN 2018-08-01
Coming Soon ...