Feng Zeng

ORCID: 0000-0002-1541-1326
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Cooperative Communication and Network Coding
  • Energy Efficient Wireless Sensor Networks
  • Wireless Networks and Protocols
  • Advanced Optical Network Technologies
  • Software-Defined Networks and 5G
  • Network Traffic and Congestion Control
  • Mobile Crowdsensing and Crowdsourcing
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy-Preserving Technologies in Data
  • IoT Networks and Protocols
  • HVDC Systems and Fault Protection
  • Complex Network Analysis Techniques
  • Human Mobility and Location-Based Analysis
  • Power System Optimization and Stability
  • Age of Information Optimization
  • Advanced Text Analysis Techniques
  • Microgrid Control and Optimization
  • Mobile Agent-Based Network Management
  • Text and Document Classification Technologies
  • Security in Wireless Sensor Networks

Central South University
2016-2025

Hikvision (China)
2024

Shenzhen Technology University
2019-2023

Huawei Technologies (China)
2014-2021

Huawei Technologies (United Kingdom)
2016-2021

Xi'an Jiaotong University
2019-2020

Hunan University
2019

Chongqing University of Posts and Telecommunications
2013-2015

Beihang University
2010-2011

Hunan International Economics University
2011

As a promising new paradigm, Vehicular Edge Computing (VEC) can improve the QoS of vehicular applications by computation offloading. However, with more and computation-intensive applications, VEC servers face challenges limited resources. In this paper, we study how to effectively economically utilize idle resources in volunteer vehicles handle overloaded tasks servers. First, present model assisted edge computing, which cost utility functions are defined for requesting servers, encouraged...

10.1109/tits.2020.2980422 article EN publisher-specific-oa IEEE Transactions on Intelligent Transportation Systems 2020-03-18

The rapid development of mobile communication technologies prompts the emergence edge computing (MEC). As key technology toward 5th generation (5G) wireless networks, it allows users to offload their computational tasks nearby servers deployed in base stations alleviate shortage resource. Nevertheless, various challenges, especially edge-user-allocation problem, are yet be properly addressed. Traditional studies consider this problem as a static global optimization where user positions...

10.1109/icws.2019.00026 article EN 2019-07-01

Geographic routing is a research hotspot of the Internet Vehicles (IoV) and intelligent traffic system (ITS). In practice, vehicle movement not only affected by its characteristics relationship between position but also some implicit factors. Pointing to this problem, we combine moving probability matrix, association factors study influence potential features propose algorithm based on (RAVP) analysis, which can obtain more accurate prediction trajectory. Then, distance obtained By...

10.1109/jiot.2020.2999469 article EN IEEE Internet of Things Journal 2020-06-02

Remote clouds are gradually unable to achieve ultra-low latency meet the requirements of mobile users because intolerable long distance between remote and network congestion caused by tremendous number users. Mobile edge computing, a new paradigm, has been proposed mitigate aforementioned effects. Existing studies mostly assume servers have deployed properly they just pay attention how minimize delay In this paper, considering practical environment, we investigate deploy effectively...

10.3390/s19010032 article EN cc-by Sensors 2018-12-21

In vehicular edge computing (VEC), the execution of offloading task needs not only data uploaded by requesting vehicle, but also additional to support be executed successfully, and how efficiently cache access these supporting becomes key issue for in VEC. this paper, we study efficient caching mechanism minimize acquisition delay data. Firstly, with software defined network (SDN) based VEC framework, analyze ways collaboration between servers. Then, according density vehicles, divide...

10.1109/tvt.2022.3213130 article EN IEEE Transactions on Vehicular Technology 2022-10-10

In vehicular edge computing, the servers may be overloaded once too many vehicles request task offloading service, which will cause failure or high service delay. To provide high-quality VEC processing capabilities of vehicles, servers, and cloud should utilized simultaneously in offloading. this article, we focus on allocation for requesting vehicle pricing schemes server cloud. From a market perspective, model competition cooperation among vehicle, server, as Stackelberg game. Then, based...

10.1109/jiot.2022.3222408 article EN IEEE Internet of Things Journal 2022-11-15

Network virtualization is enabling infrastructure providers (InPs) to offer new services service (SPs). InPs are usually bound by level agreements ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN request conform the SLAs during physical failures in infrastructure. An extreme provisioning reserve a mutually exclusive each element request. Such dedicated protection scheme can enable...

10.1109/tnsm.2016.2574239 article EN IEEE Transactions on Network and Service Management 2016-05-30

Skin cancer is a prevalent and perilous form of presents significant diagnostic challenges due to its high costs, dependence on medical experts, time-consuming procedures. The existing process inefficient expensive, requiring extensive expertise time. To tackle these issues, researchers have explored the application artificial intelligence (AI) tools, particularly machine learning techniques such as shallow deep learning, enhance for skin cancer. These tools employ computer algorithms neural...

10.3390/a17080353 article EN cc-by Algorithms 2024-08-12

The detection of malware attacks remains a significant challenge due rapid increase in variety malicious files. An efficient system is crucial to ensure robust protection and support post-attack recovery systems. In response this challenge, we propose novel deep learning-based framework which designed improve the accuracy effectiveness detection. employes two advanced pre-trained models including InceptionV3 MobileNetV2, are known for their feature extraction capabilities. To make...

10.20944/preprints202501.1944.v1 preprint EN 2025-01-29

Using Google cluster traces, the research presents a task offloading algorithm and hybrid forecasting model that unites Bidirectional Long Short-Term Memory (BiLSTM) with Gated Recurrent Unit (GRU) layers along an attention mechanism. This predicts resource usage for flexible scheduling in Internet of Things (IoT) applications based on edge computing. The suggested improves distribution to boost performance reduce energy consumption. system’s design includes collecting data, fusing preparing...

10.3390/s25072197 article EN cc-by Sensors 2025-03-30

10.1109/tetci.2025.3554804 article EN IEEE Transactions on Emerging Topics in Computational Intelligence 2025-01-01

With the emergence of computation-intensive applications such as face recognition, natural language processing, etc., performance mobile devices appears to be weak. Mobile cloud computing is extensively used cover aforementioned shortage. However, distance between remote and might too far tolerable. Cloudlet computing, fog edge are proposed bring resources near reduce high delay caused by long distance. Although there exist tremendous studies focused on offloading strategies, where how place...

10.1109/icccn.2018.8487438 article EN 2018-07-01

Word-of-Mouth (WoM) mode, as a new mode of task sensing in crowdsourcing, shows high efficiency building contributor groups. To better tap the potential WoM mobile underlying rationale interactions among contributors needs to be well understood. In this article, we analyze behavior based on Stackelberg game, and find optimal strategies for contributors. We consider two different crowdsourcing tasks announcement methods: 1) one-time parallel 2) multitime sequential ways, which form market...

10.1109/jiot.2020.2989745 article EN IEEE Internet of Things Journal 2020-04-23

In vehicular edge computing, network performance and computing resources dynamically change, vehicles should find the optimal strategy for offloading their tasks to servers achieve a rapid service. this paper, we address multi-layered vehicle edge-computing framework, where each can choose one of three strategies task offloading. For best performance, propose prediction-based task-offloading scheme vehicles, in which deep-learning model is designed predict result (success/failure) service...

10.3390/math10071010 article EN cc-by Mathematics 2022-03-22

In this paper, we present the results of comparison three reactive routing protocols for Wireless sensor networks (WSNs), AODV, DYMO and RPL. For purpose performance evaluation, detailed comparisons are made with AODV DYMO. Simulations run to estimate network topology change, overhead average packet End-to-End Delay. We simulate RPL COOJA based on contiki operating system. It is showed that protocol offers adaptation changing performances superior other two in 6lowpan, it has a higher stability than

10.1109/icsess.2014.6933646 article EN 2014-06-01

Mobile edge computing (MEC) is concerned with moving complex tasks from data sources to nearby resources, which can reduce latency and remote cloud workload. Although there has been significant research in the field of MEC, on server placement wireless metropolitan area networks (WMANs) overlooked, load balancing problem servers seldom discussed. From a practical perspective, how place efficiently WMANs while considering between studied. A greedy algorithm proposed that balance workload more...

10.1049/iet-com.2020.0651 article EN IET Communications 2020-12-01

In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by strong share ability of "circles friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that relationships consist explicit implicit parts. The part comes from direct contact nodes, can be measured through friends". We present definitions between two adaptive weights parts are given according...

10.3390/s17051109 article EN cc-by Sensors 2017-05-12

Traditional underground coalmine monitoring systems are mainly based on the use of wired transmission. However, when cables damaged during an accident, it is difficult to obtain relevant data environmental parameters and emergency situation underground. To address this problem, wireless sensor networks (WSNs) has been proposed. shape tunnels not conducive deployment WSNs as they long narrow. Therefore, issues with network arise, such extremely large energy consumption, very weak...

10.3390/s16122032 article EN cc-by Sensors 2016-11-30

This paper addresses Connectivity-aware Virtual Network Embedding (CoViNE) problem, which consists in embedding a virtual network (VN) on substrate while ensuring VN connectivity (without any bandwidth guarantee) against multiple link failures. CoViNE provides weaker form of survivability incurring less resource overhead than traditional models. To optimally solve CoViNE, we present an Integer Linear Program (ILP), namely CoViNE-opt. CoViNE-opt enumerates exponential number edge-cuts...

10.1109/tcomm.2019.2954410 article EN IEEE Transactions on Communications 2019-11-19
Coming Soon ...