Xiaoqiang Ma

ORCID: 0000-0001-9987-0329
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Image and Video Quality Assessment
  • Indoor and Outdoor Localization Technologies
  • Advanced MIMO Systems Optimization
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Particle physics theoretical and experimental studies
  • High-Energy Particle Collisions Research
  • Advanced Wireless Communication Techniques
  • Quantum Chromodynamics and Particle Interactions
  • Wireless Communication Networks Research
  • Advanced Wireless Network Optimization
  • Spam and Phishing Detection
  • Cooperative Communication and Network Coding
  • PAPR reduction in OFDM
  • Privacy-Preserving Technologies in Data
  • Human Mobility and Location-Based Analysis
  • Power Line Communications and Noise
  • Energy Harvesting in Wireless Networks
  • Advanced Data Storage Technologies
  • Peer-to-Peer Network Technologies
  • UAV Applications and Optimization
  • Green IT and Sustainability

Douglas College
2023-2024

Huazhong University of Science and Technology
2011-2022

Institute of High Energy Physics
2021

Northwest University
2021

Ruhr University Bochum
2021

Simon Fraser University
2011-2019

Tianjin Internal Combustion Engine Research Institute
2019

Huazhong University of Science and Technology Hospital
2016

University of British Columbia
2014

Wuhan National Laboratory for Optoelectronics
2010

Conventional sensing methodologies for smart home are known to be labor-intensive and complicated practical deployment. Thus, researchers resorting alternative mechanisms. Wi-Fi is one of the key technologies that enable connectivity services. Apart from its primary use communication, signal has now been widely leveraged various tasks, such as gesture recognition fall detection, due sensitivity environmental dynamics. Building based on cost-effective, non-invasive, enjoys convenient In this...

10.1109/access.2018.2812887 article EN cc-by-nc-nd IEEE Access 2018-01-01

With the booming development of Internet-of-Things (IoT) and communication technologies such as 5G, our future world is envisioned an interconnected entity where billions devices will provide uninterrupted service to daily lives industry. Meanwhile, these generate massive amounts valuable data at network edge, calling for not only instant processing but also intelligent analysis in order fully unleash potential edge big data. Both traditional cloud computing on-device cannot sufficiently...

10.1109/access.2020.2982411 article EN cc-by IEEE Access 2020-01-01

Popularity prediction, with both technological and economic importance, has been extensively studied for conventional video sharing sites (VSSes), where the videos are mainly found via searching, browsing, or related links. Recent statistics however suggest that online social network (OSN) users regularly share contents from VSSes, which contributed to a significant portion of accesses; yet popularity prediction in this new context remains largely unexplored. In paper, we present an initial...

10.1145/2505515.2505523 article EN 2013-01-01

Dynamic Adaptive Streaming over HTTP (DASH) has been widely adopted to deal with such user diversity as network conditions and device capabilities. In DASH systems, the computation-intensive transcoding is key technology enable video rate adaptation, cloud become a preferred solution for massive transcoding. Yet cloud-based following two drawbacks. First, stream now multiple versions after transcoding, which increases traffic traversing core network. Second, strategy normally fixed thus not...

10.1109/tsc.2018.2828426 article EN IEEE Transactions on Services Computing 2018-04-19

Federated learning (FL) has recently emerged as a promising distributed machine (ML) paradigm. Practical needs of the "right to be forgotten" and countering data poisoning attacks call for efficient techniques that can remove, or unlearn, specific training from trained FL model. Existing unlearning in context ML, however, are no longer effect FL, mainly due inherent distinction way how ML learn data. Therefore, enable removal models remains largely under-explored. In this paper, we take...

10.1109/iwqos52092.2021.9521274 article EN 2021-06-25

The emergence of cloud computing has been dramatically changing the landscape services for modern computer applications. Offloading computation to effectively expands usability mobile terminals beyond their physical limits, and also greatly extends battery charging intervals through potential energy savings. In this article, we present an overview offloading in computing. We identify key issues developing new applications that leverage resources computation-intensive modules, or migrating...

10.1109/mnet.2013.6616112 article EN IEEE Network 2013-09-01

The state-of-the-art cloud computing platforms are facing challenges, such as the high volume of crowdsourced data traffic and highly computational demands, involved in typical deep learning applications. More recently, Edge Computing has been recently proposed an effective way to reduce resource consumption. In this paper, we propose edge framework by introducing concept demonstrate superiority our on reducing network running time.

10.1109/icnp.2017.8117585 article EN 2017-10-01

In recent decades, unmanned aerial vehicles (UAVs, also known as drones) equipped with multiple sensors have been widely utilized in various applications. Nevertheless, constrained by limited battery capacities, the hovering time of UAVs is quite limited, prohibiting them from serving a wide area. To cater remote sensing applications, people often employ to transport, launch, and recycle them. The so-called vehicle-drone cooperation (VDC) benefits both far driving distance high mobility...

10.1109/jiot.2018.2878602 article EN IEEE Internet of Things Journal 2018-10-30

Recent years have witnessed an explosive growth of online shopping, which has posted unprecedented pressure on the logistics industry, especially last mile parcel delivery. Existing solutions mostly rely dedicated couriers, suffer from high cost and low elasticity when dealing with a massive amount local addresses. Advances in Internet Things, however, enabled vehicle information to be readily accessible anytime anywhere, forming Vehicles (IoV), further enables intelligent scheduling...

10.1109/mnet.2019.1800228 article EN IEEE Network 2019-03-01

Over the past years, emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects human life. However, using in also presents potential security and privacy threats. A common practice is so-called poisoning attacks where malicious users inject fake training data with aim corrupting learned model. In this survey, we comprehensively review existing as well countermeasures for first time. We emphasize compare principles formal...

10.1016/j.dcan.2021.07.009 article EN cc-by-nc-nd Digital Communications and Networks 2021-07-30

Mobile data traffic has been experiencing a phenomenal rise in the past decade. This ever-increasing puts significant pressure on infrastructure of state-of-the-art cellular networks. Recently, device-to-device (D2D) communication that smartly explores local wireless resources suggested as complement great potential, particularly for popular proximity-based applications with instant exchange between nearby users. Significant studies have conducted coordinating D2D and paradigms share same...

10.1109/jsac.2015.2452586 article EN IEEE Journal on Selected Areas in Communications 2015-07-07

Recently, edge computing has attracted significant interest due to its ability extend cloud utilities and services the network with low response times communication costs. In general, requires mobile users upload their raw data a centralized server for further processing. However, these usually contain sensitive information about that do not want reveal, such as sexual orientation, political stance, health status, service access history. The transmission of user increases leakage risk...

10.1109/mnet.011.2000215 article EN IEEE Network 2021-01-09

The explosion of online shopping brings great challenges to traditional logistics industry, where the massive parcels and tight delivery deadline impose a large cost on process, in particular last mile parcel delivery. On other hand, modern cities never lack transportation resources such as private car trips. Motivated by these observations, we propose novel effective mechanism through trip sharing, leverage available trips incidentally deliver during their original To achieve this, major...

10.1109/tits.2019.2944134 article EN IEEE Transactions on Intelligent Transportation Systems 2019-10-07

Finite battery capacity limits the network lifetime of wireless sensor networks, and thus severely impedes deployment large scale networks. To prolong lifetime, researchers utilize mobile chargers to recharge sensors with external power sources. In this paper, we study both periodic charging time scheduling path planning multiple chargers. First, present an efficient slot-based algorithm a fine-grained node classification scheme prevent unnecessary visits energy-sufficient nodes, balanced...

10.1109/access.2018.2885949 article EN cc-by-nc-nd IEEE Access 2018-12-10

We investigate the problem of joint frequency offset and channel estimation for OFDM systems. The complexity maximum likelihood (ML) procedure motivates us to propose an adaptive MLE algorithm which iterates between estimating parameters. Pilot tones are used obtain initial estimates then a decision-directed technique provides effective technique. modified (averaged) Cramer-Rao lower bounds (MCRB) coefficients derived discussed. It is shown that, case large number subcarriers in system,...

10.1109/glocom.2003.1258193 article EN 2004-07-08

Combining powerful sensors and near ubiquitous distribution, the smartphone has become an irreplaceable part of modern day life. Using its pervasive sensing capabilities, smart-phone guides us to our destination with precise step-by-step directions, advises on what have for lunch, improves photography skills through stabilizing camera. popular augmented reality (AR) app Pokemon Go as a case study, we explore world sensing. In this paper, show both current state art that enable applications...

10.1109/access.2017.2696953 article EN cc-by-nc-nd IEEE Access 2017-01-01

Recently, there is a growing emphasis on device-to-device (D2D) communication, which the key component of Internet-of-Things ecosystem. D2D communication can operate licensed spectrum cellular networks so as to improve utilization. In this paper, we focus resource allocation problem for general multihop and introduce users' mobility into underlaying networks. Maximizing total end-to-end data rate involves complex tasks, such routing. By leveraging square tessellation technique, propose an...

10.1109/jiot.2018.2834517 article EN IEEE Internet of Things Journal 2018-05-09

Using smartphones for indoor motion trajectory tracing has attracted a lot of attention in recent years, which offers great potential to support broad spectrum applications environment, including elder care, business analysis, and navigation. Yet most existing approaches only work certain pedestrian's modes or smartphone's carrying patterns, lack the robustness adaptability general scenarios. In this paper, we propose SmartMTra, comprehensive, robust, accurate solution based on built-in...

10.1109/jsen.2017.2692263 article EN IEEE Sensors Journal 2017-04-07

Estimating a channel that is subject to frequency-selective Rayleigh fading challenging problem in an orthogonal frequency division multiplexing (OFDM) system. We propose three EM-based algorithms efficiently estimate the impulse response (CIR) or of such system operating on with multipath and additive white Gaussian noise (AWGN). These are capable improving by making use modest number pilot tones using previous frame obtain initial for iterative procedure. Simulation results show bit error...

10.1155/s1110865704311121 article EN cc-by EURASIP Journal on Advances in Signal Processing 2004-09-07

Data collection is of paramount importance in many applications wireless sensor networks (WSNs). Especially, to accommodate ever increasing demands signal source coding applications, the capacity processing multi-user data query crucial WSNs where efficiency one key consideration. To that end, this paper presents EDCA: an Efficient Collection Approach for WSNs, which exploits recent matrix completion techniques. Specifically, energy consumption, we randomly select a part nodes from network...

10.1109/glocom.2010.5684139 article EN 2010-12-01

Energy efficient broadcasting is of paramount importance for many broadcast applications in wireless ad hoc networks. With respects network coding, it has been proved that the energy gain upper bounded by 3. However, coding opportunity often highly dependent on established routing paths, resulting a lot opportunities could be lost practice. By combining with Connected Dominating Set (CDS)-based broadcasting, we take full use coding. The intuition behind our algorithm to intersect information...

10.1109/icc.2011.5962913 article EN 2011-06-01
Coming Soon ...