Jian Yuan

ORCID: 0000-0001-9734-6056
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Complex Network Analysis Techniques
  • Human Mobility and Location-Based Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Advanced MIMO Systems Optimization
  • Chaos-based Image/Signal Encryption
  • Caching and Content Delivery
  • Cooperative Communication and Network Coding
  • Wireless Networks and Protocols
  • Wireless Communication Security Techniques
  • Software-Defined Networks and 5G
  • Reinforcement Learning in Robotics
  • Topic Modeling
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Wireless Communication Networks Research
  • Cellular Automata and Applications
  • Network Security and Intrusion Detection
  • Distributed Control Multi-Agent Systems
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Theoretical and Computational Physics
  • Generative Adversarial Networks and Image Synthesis

Longhua Hospital Shanghai University of Traditional Chinese Medicine
2025

Shanghai University of Traditional Chinese Medicine
2025

Shanghai Jiao Tong University
2005-2025

Tsinghua University
2015-2024

ShanghaiTech University
2023-2024

China United Network Communications Group (China)
2024

Beijing University of Chinese Medicine
2024

Risun (China)
2024

PLA Rocket Force University of Engineering
2024

Xi’an Children’s Hospital
2024

The growing popularity and development of data mining technologies bring serious threat to the security individual,'s sensitive information. An emerging research topic in mining, known as privacy-preserving (PPDM), has been extensively studied recent years. basic idea PPDM is modify such a way so perform algorithms effectively without compromising information contained data. Current studies mainly focus on how reduce privacy risk brought by operations, while fact, unwanted disclosure may...

10.1109/access.2014.2362522 article EN cc-by-nc-nd IEEE Access 2014-01-01

Rapid progresses have been achieved in the photonic applications of two-dimensional materials such as graphene, transition metal dichalcogenides, and topological insulators. The strong light–matter interactions large optical nonlinearities these atomically thin layered make them promising saturable absorbers for pulsed laser applications. Either Q-switching or mode-locking pulses with particular output characteristics can be by using different absorbers. However, it remains still very...

10.1021/acsphotonics.5b00193 article EN ACS Photonics 2015-06-08

With emergency of demands for local area services, device-to-device (D2D) communication is proposed as a vital technology component the next generation cellular system to improve spectral reuse and enhance capacity. These benefits depend on efficient interference management resource allocation. Existing works usually consider these problems under restricted consisting pair D2D users user. In this paper, we address uplink allocation problem multiple from game theory point view. Combing...

10.1109/twc.2014.2325552 article EN IEEE Transactions on Wireless Communications 2014-05-19

Vehicular fog computing (VFC) has been expected as a promising scheme that can increase the computational capability of vehicles without relying on servers. Comparing with accessing remote cloud, VFC is suitable for delay-sensitive tasks because its low-latency vehicle-to-vehicle (V2V) transmission. However, due to dynamic vehicular environment, how motivate share their idle resource while simultaneously evaluating service availability in terms vehicle mobility and heterogeneous networks...

10.1109/tvt.2020.3041929 article EN IEEE Transactions on Vehicular Technology 2020-12-01

Vehicular edge computing (VEC) is an effective method to increase the capability of vehicles, where vehicles share their idle resources with each other. However, due high mobility it challenging design optimal task allocation policy that adapts dynamic vehicular environment. Further, computation offloading often occurs between unfamiliar how motivate while guaranteeing reliability resource in one main challenge. In this paper, we propose a blockchain-enabled VEC framework ensure and...

10.1109/tmc.2022.3153346 article EN IEEE Transactions on Mobile Computing 2022-02-23

This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensively Voice over Internet Protocol (VoIP). study reveals that, contrary to existing thought, VoIP are more suitable than active streams; that is, attains larger capacity under same imperceptibility. By analyzing concealment codec with 6.3 kb/s, authors propose new different speech parameters frames....

10.1109/tifs.2011.2108649 article EN IEEE Transactions on Information Forensics and Security 2011-01-28

In the long pursuit of smart robotics, it has been envisioned to empower robots with human-like senses, especially vision and touch. While tremendous progress made in image sensors computer over past decades, tactile sense abilities are lagging behind due lack large-scale flexible sensor array high sensitivity, spatial resolution, fast response. this work, we have demonstrated a 64 × record-high resolution 0.9 mm (equivalently 28.2 pixels per inch) by integrating high-performance...

10.1021/acsnano.2c06432 article EN ACS Nano 2022-09-27

In this paper, colocated MIMO radar waveform design is considered by minimizing the integrated side-lobe level to obtain beam patterns with lower levels than competing methods. First, a quadratic programming problem formulated using criteria for minimal level. A theorem derived that provides closed-form analytical optimal solution appears be an extension of Rayleigh quotient minimization possibly singular matrix in form. Such singularities are shown occur interest, but proofs optimum these...

10.1109/taes.2014.140249 article EN IEEE Transactions on Aerospace and Electronic Systems 2015-04-01

Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information. Unfortunately, continuously for suspicious activities presents difficult challenges because may arise anywhere at any time attackers constantly modify attack dynamics evade detection. In this paper, we propose a method early Using only few observation points, our proposed can monitor the macroscopic effect...

10.1109/tdsc.2005.50 article EN IEEE Transactions on Dependable and Secure Computing 2005-10-01

In next generation networks, mobile communication calls for service with higher quality, which brings new challenge mobility management. Thereinto, utilization and improvement of prediction helps preserving resource providing better performance. So this paper aims to propose a theoretical factual method perform in cellular network. By analyzing the demand character kind personal large spacial temporal scale, it is concluded that Hidden Markov Model fits system modeling. However, classical...

10.1109/ccnc.2010.5421684 article EN 2010-01-01

As the volume of mobile traffic has been growing quickly in recent years, reducing congestion networks become an important problem networking research. Researchers found out that inhomogeneity spatio-temporal distribution data leads to extremely insufficient utilization network resources. Thus, it is fundamentally understand this help us make better resource planning or introduce new management tools such as time-dependent pricing reduce congestion. However, due requirement a large dataset,...

10.1145/2757513.2757518 article EN 2015-06-12

10.1016/j.physa.2010.10.033 article EN Physica A Statistical Mechanics and its Applications 2010-10-21

Wireless virtualization has been proposed as a promising way to overcome the current plight of wireless network, i.e. spectrum crisis, by enabling multiple concurrent virtual networks running on shared substrate resource. However, making efficient use underlying requires effectively assigning physical resources several networks. Since opportunistic sharing makes communication more intelligent and efficient, we present an based resource allocation scheme for virtualization. First, formulate...

10.1109/imis.2013.18 article EN 2013-07-01

In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although the UAV are quite similar to traditional mobile ad hoc networks, special characteristics of application scenario have not considered literature. this paper, we propose a distributed gateway selection algorithm with dynamic network partition by taking into account networks....

10.1109/tetc.2014.2382433 article EN IEEE Transactions on Emerging Topics in Computing 2014-12-19

Knowledge graphs (KGs) can help enhance recommendations, especially for the data-sparsity scenarios with limited user-item interaction data. Due to strong power of representation learning graph neural networks (GNNs), recent works KG-based recommendation deploy GNN models learn from both knowledge and bipartite graph. However, these have not well considered hierarchical structure graph, leading sub-optimal results. Despite benefit structure, leveraging it is challenging since always...

10.1145/3595632 article EN ACM transactions on office information systems 2023-07-11

Efficient key-value (KV) cache compression is critical for scaling transformer-based Large Language Models (LLMs) in long sequences and resource-limited settings. Existing methods evict tokens based on their positions or importance scores, but position-based strategies can miss crucial information outside predefined regions, while those relying global scores resulting strong regional biases, limiting the KV cache's overall context retention potentially impairing performance of LLMs complex...

10.48550/arxiv.2501.04987 preprint EN arXiv (Cornell University) 2025-01-09

Given concerns about treatment, there is uncertainty surrounding the effect of prior malignancy on survival individuals with metastatic colorectal cancer. This study sought to evaluate how impacts patients cancer (mCRC). Patients diagnosed stage IV mCRC (per American Joint Committee Cancer [AJCC] 6th edition) between 2004 and 2015 were identified from Surveillance, Epidemiology, End Results (SEER) database. Those without a history assigned control group, whereas those research group....

10.1038/s41598-025-88555-7 article EN cc-by-nc-nd Scientific Reports 2025-02-03

10.1109/icassp49660.2025.10889583 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Vehicular fog computing (VFC) has been expected as a promising paradigm that can improve the computational capability of vehicles, where vehicles share their idle resource among each other. Considering limited single vehicle and short vehicle-to-vehicle (V2V) link duration, binary task offloading may suffer from long execution time V2V interruption, which not be appropriate for some computation-intensive tasks. partial computation is to solution tasks are divided into several parts executed...

10.1109/wcnc49053.2021.9417450 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2021-03-29

This paper proposes a semi-analytic finite element method to treat the open boundary axisymmetric electrostatic field problems. The is applied computing potential distribution of high voltage porcelain metal oxide arrester (MOA). numerical example shows good agreement between calculated and measured results.

10.1109/tmag.2005.844350 article EN IEEE Transactions on Magnetics 2005-05-01

The benefits of Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative relay for secure communication are investigated within Wyner's wiretap channel. We characterize the secrecy rate when source, destination, eavesdropper all use single antenna channel conditions fix. Both AF DF strategies proved theoretically to be able facilitate communication. Detailed analysis scheme reveals a trade off between area request rate. In addition, constraints in discussed used explain differences...

10.1109/wcnc.2009.4917597 article EN IEEE Wireless Communications and Networking Conference 2009-04-01
Coming Soon ...