- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Distributed Control Multi-Agent Systems
- Privacy-Preserving Technologies in Data
- Advanced MIMO Systems Optimization
- Constraint Satisfaction and Optimization
- Advanced Wireless Communication Technologies
- Advanced Database Systems and Queries
- Neural Networks Stability and Synchronization
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Data Management and Algorithms
- Wireless Communication Networks Research
- Wireless Communication Security Techniques
- Blockchain Technology Applications and Security
- Scheduling and Timetabling Solutions
- Recommender Systems and Techniques
- stochastic dynamics and bifurcation
- Optimization and Search Problems
- Target Tracking and Data Fusion in Sensor Networks
- Web Data Mining and Analysis
- Internet Traffic Analysis and Secure E-voting
Chongqing Technology and Business University
2020-2023
Anhui University of Science and Technology
2023
Alibaba Group (United States)
2022
Jilin Province Science and Technology Department
2021
Jilin University
2021
China Electronics Technology Group Corporation
2021
Yunnan University of Finance And Economics
2019
Peking University
2018
Wuhan Textile University
2018
University of Bonn
2018
With the rapid growth of emerging applications like social network analysis, semantic Web analysis and bioinformatics a variety data to be processed continues witness quick increase. Effective management large-scale poses an interesting but critical challenge. Recently, big has attracted lot attention from academia, industry as well government. This paper introduces several processing technics system application aspects. First, view cloud mechanisms, we present key issues processing,...
With the increasing demand of users for personalized social services, recommendation (SR) has been an important concern in academia. However, current research on SR universally faces two main challenges. On one hand, lacks considerable ability robust online data management. other fails to take ambiguity preference feedback into consideration. To bridge these gaps, a deep learning-embedded Internet Things (IoT) is proposed ambiguity-aware (SIoT-SR). Specifically, IoT architecture developed...
Driven by numerous emerging mobile devices and various Quality-of-Service (QoS) requirements, mobile-edge computing (MEC) has been recognized as a prospective paradigm to promote the computation capability of devices, well reduce energy overhead service latency applications for Internet Things (IoT). However, there are still some open issues in existing research works: 1) limited network resource; 2) simple or nonintelligent resource management; 3) ignored security reliability. In order cope...
With the rapid growth of emerging applications like social network, semantic web, sensor networks and LBS (Location Based Service) applications, a variety data to be processed continues witness quick increase. Effective management processing large-scale poses an interesting but critical challenge. Recently, big has attracted lot attention from academia, industry as well government. This paper introduces several techniques system application aspects. First, view cloud mechanisms, we present...
A major feature of mobile devices in the future wireless network is high data rate. However, newly proposed power-consumption outage indicates that heat generated by rate has an influence on performance. This correspondence investigates a novel resource allocation scheme considering outage. Specifically, based analysis transfer model smartphone, we formulate problem to jointly allocate downlink power and bandwidth while impact According dynamic problem, Markov decision process (MDP) utilized...
The increasing prevalence of unknown-type attacks on the Internet highlights importance developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types attacks, need for innovative approaches becomes evident, as traditional methods may not be sufficient. In this research, we propose a deep solution called log-cosh variational autoencoder (LVAE) to address challenge. LVAE inherits strong modeling abilities (VAE), enabling it understand...
A large amount of sensitive information is generated in today’s evolving network environment. Some hackers utilize low-frequency attacks to steal from users. This generates minority attack samples real traffic. As a result, the data distribution traffic asymmetric, with number normal and rare To address imbalance problem, intrusion detection systems mainly rely on machine-learning-based methods detect attacks. Although this approach can attacks, performance not satisfactory. solve...
NDN is one of promising underlying network architectures that supporting 5G because its characteristics such as decoupling senders and receivers, hop by transmission, in-network caching, etc. However, it still faces challenges in producer mobility management like the triangle routing problem (non-optimal path) global centralization home agent, causing a poor scalability large scales long handover delay. In this paper, we propose ESN - PBA, scheme using prediction to realize lightweight...
Cooperative communication has been proposed recently to offer the possibility of wireless commu-nication systems explore inherent spatial diversity in relay channels. In this work we consider a scenario where base station (source) transmits information user (destination) via with amplify-and-forward technique. Using MPSK modulation, first derive closed-form symbol error rate (SER) formulation and corresponding lower bound which converges same limit as theoretical upper high signal noise...
Summary Cellular vehicular‐to‐everything (C‐V2X), as a key technology of Internet Vehicles (IoV), is promised to be enhanced and strengthened improve road traffic safety achieve intelligent transportation in 6G era. However, computation‐intensive latency‐sensitive computation tasks autonomous driving create great challenge for the storage limited vehicles. Fortunately, mobile edge computing (MEC) architecture offers possible solution challenge. In this paper, joint offloading resource...
Peer-to-peer (P2P) spectrum sharing and energy trading are promising solutions to locally satisfy demands in power Internet of Things(IoT). However, implementation large-scale P2P confronts security privacy challenges. In this paper, we exploit consortium blockchain Directed Acyclic Graph (DAG) propose a new secure distributed framework IoT, named spectrum-energy chain, where set local aggregators (LAGs) cooperatively confirm the identity devices by utilizing blockchain, so as form main...
The explosion of intelligent mobile applications has generated an unprecedented increase in the demand for diverse social content access. Device-to-device (D2D) communication, which enables direct transmission content, can partly support these needs by reusing cellular spectrum resources. Most existing works focus on mitigating interference D2D communication only physical space. However, effect user preference space is ignored. In this article, a satisfied matching-embedded Social Internet...
To significantly protect the user’s privacy and prevent preference disclosure from leading to malicious entrapment, we present a combination of recommendation algorithm protection mechanism. In this article, algorithm, PrivItem2Vec, concept recommended-internet things, which is consisting information, devices, items. Recommended-internet things uses bidirectional long short-term memory, based on item2vec, improves time series recommended accuracy. addition, reconstructed data set in...
该文提出一种通过合理设置零矩阵构造可逆准循环低密度奇偶校验码(QC-LDPC)的方法,解决了传统QC- LDPC码校验矩阵不满秩及编码复杂度高的问题。将循环矩阵对应于有限域中的多项式,利用扩展的欧几里德算法构造可逆校验矩阵,克服了传统QC-LDPC码码率大于设计码率的问题。编码时先将校验矩阵分块,然后利用扩展欧几里德算法回溯求解循环矩阵的逆矩阵,显著降低了编码复杂度。EXIT图证明了译码器的收敛性。仿真表明短码时纠错性能优于随机LDPC码,适用于水声通信系统。另外,将可逆QC-LDPC码应用于ZP-OFDM系统的仿真表明QC-LDPC码能较大地提高水下通信系统的鲁棒性。
In this paper we propose a theory of matching markets approach to get the access opportunity for unauthorized users who want share set channels. Matching game spectrum allocation which can be used in cognitive radio relay system is advocated. First, algorithm, selection abstracted market problem. Then, assigned by deferred acceptance algorithm. The algorithm balance interest among and encourage them do more contributions order exchange resource efficiently. proposed scheme reduce termination...
Cooperative communication has been recently proposed in wireless systems for exploring the inherent spatial diversity relay channels. In this work we investigate performance of selecting best protocol between amplify and forward (AF) decode (DF) multiple networks. selection scheme, AF DF is selected depending on source-relay links qualities. Particularly derive asymptotic closed form expression symbol error rate (SER) system under studied show that our scheme maintains full order better than...
The rising number of unknown-type attacks on the Internet emphasizes significance developing efficient intrusion detection systems, even if machine learning-based techniques can detect unknown types attacks. necessity for innovative is highlighted by possibility that traditional learning will not be sufficient identifying these In this research, we address difficulty proposing a deep solution: log-cosh variational autoencoder (LVAE). When it comes to understanding intricate data...