Yu Li

ORCID: 0000-0002-0304-0505
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Distributed Control Multi-Agent Systems
  • Privacy-Preserving Technologies in Data
  • Advanced MIMO Systems Optimization
  • Constraint Satisfaction and Optimization
  • Advanced Wireless Communication Technologies
  • Advanced Database Systems and Queries
  • Neural Networks Stability and Synchronization
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Data Management and Algorithms
  • Wireless Communication Networks Research
  • Wireless Communication Security Techniques
  • Blockchain Technology Applications and Security
  • Scheduling and Timetabling Solutions
  • Recommender Systems and Techniques
  • stochastic dynamics and bifurcation
  • Optimization and Search Problems
  • Target Tracking and Data Fusion in Sensor Networks
  • Web Data Mining and Analysis
  • Internet Traffic Analysis and Secure E-voting

Chongqing Technology and Business University
2020-2023

Anhui University of Science and Technology
2023

Alibaba Group (United States)
2022

Jilin Province Science and Technology Department
2021

Jilin University
2021

China Electronics Technology Group Corporation
2021

Yunnan University of Finance And Economics
2019

Peking University
2018

Wuhan Textile University
2018

University of Bonn
2018

With the rapid growth of emerging applications like social network analysis, semantic Web analysis and bioinformatics a variety data to be processed continues witness quick increase. Effective management large-scale poses an interesting but critical challenge. Recently, big has attracted lot attention from academia, industry as well government. This paper introduces several processing technics system application aspects. First, view cloud mechanisms, we present key issues processing,...

10.1109/i-span.2012.9 article EN 2012-12-01

With the increasing demand of users for personalized social services, recommendation (SR) has been an important concern in academia. However, current research on SR universally faces two main challenges. On one hand, lacks considerable ability robust online data management. other fails to take ambiguity preference feedback into consideration. To bridge these gaps, a deep learning-embedded Internet Things (IoT) is proposed ambiguity-aware (SIoT-SR). Specifically, IoT architecture developed...

10.1109/tnse.2021.3049262 article EN IEEE Transactions on Network Science and Engineering 2021-01-05

Driven by numerous emerging mobile devices and various Quality-of-Service (QoS) requirements, mobile-edge computing (MEC) has been recognized as a prospective paradigm to promote the computation capability of devices, well reduce energy overhead service latency applications for Internet Things (IoT). However, there are still some open issues in existing research works: 1) limited network resource; 2) simple or nonintelligent resource management; 3) ignored security reliability. In order cope...

10.1109/jiot.2022.3185289 article EN IEEE Internet of Things Journal 2022-06-22

With the rapid growth of emerging applications like social network, semantic web, sensor networks and LBS (Location Based Service) applications, a variety data to be processed continues witness quick increase. Effective management processing large-scale poses an interesting but critical challenge. Recently, big has attracted lot attention from academia, industry as well government. This paper introduces several techniques system application aspects. First, view cloud mechanisms, we present...

10.1142/s0219265912500090 article EN Journal of Interconnection Networks 2012-09-01

A major feature of mobile devices in the future wireless network is high data rate. However, newly proposed power-consumption outage indicates that heat generated by rate has an influence on performance. This correspondence investigates a novel resource allocation scheme considering outage. Specifically, based analysis transfer model smartphone, we formulate problem to jointly allocate downlink power and bandwidth while impact According dynamic problem, Markov decision process (MDP) utilized...

10.1109/tvt.2023.3237730 article EN IEEE Transactions on Vehicular Technology 2023-01-17

The increasing prevalence of unknown-type attacks on the Internet highlights importance developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types attacks, need for innovative approaches becomes evident, as traditional methods may not be sufficient. In this research, we propose a deep solution called log-cosh variational autoencoder (LVAE) to address challenge. LVAE inherits strong modeling abilities (VAE), enabling it understand...

10.3390/app132212492 article EN cc-by Applied Sciences 2023-11-19

A large amount of sensitive information is generated in today’s evolving network environment. Some hackers utilize low-frequency attacks to steal from users. This generates minority attack samples real traffic. As a result, the data distribution traffic asymmetric, with number normal and rare To address imbalance problem, intrusion detection systems mainly rely on machine-learning-based methods detect attacks. Although this approach can attacks, performance not satisfactory. solve...

10.3390/sym16010042 article EN Symmetry 2023-12-28

NDN is one of promising underlying network architectures that supporting 5G because its characteristics such as decoupling senders and receivers, hop by transmission, in-network caching, etc. However, it still faces challenges in producer mobility management like the triangle routing problem (non-optimal path) global centralization home agent, causing a poor scalability large scales long handover delay. In this paper, we propose ESN - PBA, scheme using prediction to realize lightweight...

10.1109/padsw.2018.8644896 article EN 2018-12-01

Cooperative communication has been proposed recently to offer the possibility of wireless commu-nication systems explore inherent spatial diversity in relay channels. In this work we consider a scenario where base station (source) transmits information user (destination) via with amplify-and-forward technique. Using MPSK modulation, first derive closed-form symbol error rate (SER) formulation and corresponding lower bound which converges same limit as theoretical upper high signal noise...

10.1109/iccsit.2010.5564785 article EN 2010-07-01

Summary Cellular vehicular‐to‐everything (C‐V2X), as a key technology of Internet Vehicles (IoV), is promised to be enhanced and strengthened improve road traffic safety achieve intelligent transportation in 6G era. However, computation‐intensive latency‐sensitive computation tasks autonomous driving create great challenge for the storage limited vehicles. Fortunately, mobile edge computing (MEC) architecture offers possible solution challenge. In this paper, joint offloading resource...

10.1002/dac.5335 article EN International Journal of Communication Systems 2022-09-20

Peer-to-peer (P2P) spectrum sharing and energy trading are promising solutions to locally satisfy demands in power Internet of Things(IoT). However, implementation large-scale P2P confronts security privacy challenges. In this paper, we exploit consortium blockchain Directed Acyclic Graph (DAG) propose a new secure distributed framework IoT, named spectrum-energy chain, where set local aggregators (LAGs) cooperatively confirm the identity devices by utilizing blockchain, so as form main...

10.23919/jcc.2023.00.013 article EN China Communications 2023-02-28

The explosion of intelligent mobile applications has generated an unprecedented increase in the demand for diverse social content access. Device-to-device (D2D) communication, which enables direct transmission content, can partly support these needs by reusing cellular spectrum resources. Most existing works focus on mitigating interference D2D communication only physical space. However, effect user preference space is ignored. In this article, a satisfied matching-embedded Social Internet...

10.1109/jiot.2021.3113914 article EN IEEE Internet of Things Journal 2021-09-21

To significantly protect the user’s privacy and prevent preference disclosure from leading to malicious entrapment, we present a combination of recommendation algorithm protection mechanism. In this article, algorithm, PrivItem2Vec, concept recommended-internet things, which is consisting information, devices, items. Recommended-internet things uses bidirectional long short-term memory, based on item2vec, improves time series recommended accuracy. addition, reconstructed data set in...

10.1177/15501477211061250 article EN cc-by International Journal of Distributed Sensor Networks 2021-12-01

该文提出一种通过合理设置零矩阵构造可逆准循环低密度奇偶校验码(QC-LDPC)的方法,解决了传统QC- LDPC码校验矩阵不满秩及编码复杂度高的问题。将循环矩阵对应于有限域中的多项式,利用扩展的欧几里德算法构造可逆校验矩阵,克服了传统QC-LDPC码码率大于设计码率的问题。编码时先将校验矩阵分块,然后利用扩展欧几里德算法回溯求解循环矩阵的逆矩阵,显著降低了编码复杂度。EXIT图证明了译码器的收敛性。仿真表明短码时纠错性能优于随机LDPC码,适用于水声通信系统。另外,将可逆QC-LDPC码应用于ZP-OFDM系统的仿真表明QC-LDPC码能较大地提高水下通信系统的鲁棒性。

10.3724/sp.j.1146.2011.01373 article EN JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY 2013-07-08

In this paper we propose a theory of matching markets approach to get the access opportunity for unauthorized users who want share set channels. Matching game spectrum allocation which can be used in cognitive radio relay system is advocated. First, algorithm, selection abstracted market problem. Then, assigned by deferred acceptance algorithm. The algorithm balance interest among and encourage them do more contributions order exchange resource efficiently. proposed scheme reduce termination...

10.1109/mec.2013.6885398 article EN 2013-12-01

Cooperative communication has been recently proposed in wireless systems for exploring the inherent spatial diversity relay channels. In this work we investigate performance of selecting best protocol between amplify and forward (AF) decode (DF) multiple networks. selection scheme, AF DF is selected depending on source-relay links qualities. Particularly derive asymptotic closed form expression symbol error rate (SER) system under studied show that our scheme maintains full order better than...

10.1109/icct.2012.6511197 article EN 2012-11-01

The rising number of unknown-type attacks on the Internet emphasizes significance developing efficient intrusion detection systems, even if machine learning-based techniques can detect unknown types attacks. necessity for innovative is highlighted by possibility that traditional learning will not be sufficient identifying these In this research, we address difficulty proposing a deep solution: log-cosh variational autoencoder (LVAE). When it comes to understanding intricate data...

10.20944/preprints202310.1419.v1 preprint EN 2023-10-23
Coming Soon ...