Gang Sun

ORCID: 0000-0002-2448-8915
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Advanced Optical Network Technologies
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Corporate Finance and Governance
  • Islamic Finance and Banking Studies
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Queuing Theory Analysis
  • Advanced Measurement and Detection Methods
  • Data Stream Mining Techniques
  • Monetary Policy and Economic Impact
  • Mobile Ad Hoc Networks
  • Stochastic Gradient Optimization Techniques
  • Geoscience and Mining Technology
  • Advanced MIMO Systems Optimization
  • Advanced Algorithms and Applications
  • Advanced Wireless Network Optimization

University of Electronic Science and Technology of China
2016-2025

Capital University of Physical Education and Sports
2023-2025

Shanghai Electric (China)
2023-2024

Qufu Normal University
2024

Joint United Nations Programme on HIV/AIDS
2024

Xinjiang Medical University
2023-2024

Fuyang Normal University
2014-2023

Tumor Hospital of Xinjiang Medical University
2023

South China Institute of Collaborative Innovation
2023

Science and Technology Department of Sichuan Province
2023

Recently, network function virtualization (NFV) has been proposed to solve the dilemma faced by traditional networks and improve performance through hardware software decoupling. The deployment of service chain (SFC) is a key technology that affects virtual (VNF). issue in SFCs proposing effective algorithms achieve efficient use resources. In this article, we propose an SFC optimization (SFCDO) algorithm based on breadth-first search (BFS). first uses BFS-based find shortest path between...

10.1109/jiot.2019.2937110 article EN IEEE Internet of Things Journal 2019-08-23

Generally, a service request must specify its required virtual network functions (VNFs) and their specific order, which is known as the function chain (SFC). When mapping SFCs, providers face many challenges due to requirements of maintaining correct order satisfying other constraints VNFs. Furthermore, SFC orchestration becomes more difficult problem when considered in multi-domain networks, because confidentiality topology information each domain be considered. In this paper, we study...

10.1109/tnsm.2018.2861717 article EN IEEE Transactions on Network and Service Management 2018-08-17

5G/B5G is intended to support various services with the assistance of network slices, and each slice requires adequate resources provide prenegotiated service quality. The Slice Admission Control (SAC) algorithm a necessity for Providers (SPs) guarantee Quality Service (QoS) Experience (QoE) admitted request. In such circumstances, concerns regarding priority fairness resource allocation are meaningful topics. However, these two issues do not receive sufficient research attention...

10.1109/tnse.2022.3195862 article EN IEEE Transactions on Network Science and Engineering 2022-08-02

The vehicle-to-vehicle (V2V) communication driven by the fifth generation (5G) cellular mobile network with features of ultra-high reliability and low latency provides promising solutions to various applications in intelligent transportation system (ITS). To improve resource utilization guarantee quality-of-service (QoS), users 5G vehicular networks have select appropriate modes control their own transmission power. However, highly dynamic topology channel status pose challenges mode...

10.1109/tits.2022.3198046 article EN IEEE Transactions on Intelligent Transportation Systems 2022-08-22

Network slicing endows 5G/B5G with differentiated and customized capabilities to cope the proliferation of diversified services, whereas limited physical network resources may not be able support all service requests. Slice admission control is regarded as an essential means ensure quality isolation when under burden. Herein, scenario where rational tenants coexist partially competitive slice providers adopted. We aim maximize long-term average revenue operators through control, feasibility...

10.1109/tnet.2023.3297883 article EN IEEE/ACM Transactions on Networking 2023-08-01

UAV (unmanned aerial vehicle) is rapidly gaining traction in various human activities and has become an integral component of the satellite-air-ground-sea (SAGS) integrated network. As high-speed moving objects, UAVs not only have extremely strict requirements for communication delay, but also cannot be maliciously controlled as a weapon by attacker. Therefore, it necessary to design efficient secure mechanism (ESCM) network (a mobile ad hoc composed multiple UAVs). For high efficiency, ESCM...

10.1109/tnsm.2024.3357824 article EN IEEE Transactions on Network and Service Management 2024-01-26

This paper focuses on the routing algorithm for communications between vehicles and places in urban vehicular ad hoc networks. As one of basic transportation facilities an setting, buses periodically run along their fixed routes cover many city streets. The trajectory bus lines can be seen as a submap city. Based characters networks, we propose bus-trajectory-based street-centric (BTSC) algorithm, which uses main relay to deliver messages. In BTSC, build graph based trajectories by analyzing...

10.1109/tvt.2018.2828651 article EN IEEE Transactions on Vehicular Technology 2018-04-19

With the development of cloud computing, virtual machine migration is emerging as a promising technique to save energy, enhance resource utilizations, and guarantee Quality Service (QoS) in datacenters. Most existing studies on migration, however are based single migration. Although there some researches multiple machines author usually does not consider correlation among these machines. In practice, order energy maintain system performance, providers need migrate correlated or entire...

10.1109/tsc.2015.2477825 article EN IEEE Transactions on Services Computing 2015-09-11

With the popularization and development of cloud computing, network function virtualization service chain (SFC) provisioning have attracted increasing attention from researchers. Excellent reliable is important for development. Moreover, as number users increases, construction costs become very high. Therefore, an efficient algorithm necessary to provide SFC with excellent performance low resource costs. In this paper, we re-examine problem optimizing deployment resource-saving service. We...

10.1109/jsyst.2018.2879883 article EN IEEE Systems Journal 2018-12-06

With the development of vehicle networks, information transmission between vehicles is becoming increasingly important. Many applications, particularly regarding security, are based on communication vehicles. These applications have strict requirements for factors such as quality and time delay. theoretical protocols ignore presence buildings or other obstacles that present during practical use, especially in urban areas. can cause a signal to fade even block direct communication. often...

10.1109/tvt.2018.2884525 article EN IEEE Transactions on Vehicular Technology 2019-01-01

Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on an efficient strategy for vehicle-to-vehicle (V2V) communication in VANETs. Because, VANET performance are affected mainly by intersections, traffic lights, and conditions, propose intersection-based distributed (IDR) strategy. view fact that lights used cause vehicles stop at intersection vehicle fog (IVF) model, which waiting...

10.1109/tits.2019.2918255 article EN IEEE Transactions on Intelligent Transportation Systems 2019-06-06

As network virtualization becomes popular, the problem of efficiently mapping a virtual infrastructure (VI) over substrate while guaranteeing its survivability in event failures increasingly important. In this paper, we study survivable VI to recover from facility node failures. We develop two solutions namely 1-redundant scheme and K-redundant for surviving minimizing resource costs. also model schemes as MILP propose efficient heuristics based on formulations. compare efficiency our using...

10.1109/icc.2011.5962604 article EN 2011-06-01

Network function virtualization (NFV) in 6G can use standard techniques to enable network functions via software. Resource scheduling is one of the key research areas NFV and mainly used deploy service chains (SFCs) substrate networks. However, determining how utilize resources efficiently has always been a difficult problem SFC deployment. This article focuses on provision online requests with 6G. We first establish mathematical model for provisioning. Then, we propose an efficient chain...

10.1109/tii.2020.3042872 article EN IEEE Transactions on Industrial Informatics 2020-12-09

To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEVs) to energy Internet, we propose a local vehicle-to-vehicle (V2V) trading architecture based on fog computing in social hotspots and model welfare maximization (SWM) problem balance interests of both charging discharging PHEVs. Considering transaction security privacy protection issues, employ consortium blockchain our designed architecture, which is different from traditional centralized power systems, reduce...

10.1109/jiot.2020.2992994 article EN IEEE Internet of Things Journal 2020-05-07

With the rapid development of Internet vehicles (IoV), routing in vehicular ad hoc networks (VANETs) has become a popular research topic. Due to features dynamic network structure, constraints road topology and variable states vehicle nodes, VANET protocols face many challenges, including intermittent connectivity, large delay high communication overhead. Location-based geographic is most suitable method for VANETs, such performs well on paths with an appropriate density load. We propose...

10.1109/tits.2021.3053958 article EN IEEE Transactions on Intelligent Transportation Systems 2021-02-03

Federated learning is gaining popularity as a distributed machine method that can be used to deploy AI-dependent Internet of Things applications while protecting client data privacy and security. Due the differences clients, single global model may not perform well on all so personalized federated method, which trains for each better suits its individual needs, becomes research hotspot. Most research, however, focuses heterogeneity ignoring need architecture heterogeneity. existing methods...

10.1109/jiot.2022.3172114 article EN IEEE Internet of Things Journal 2022-05-03

As people pay more attention to environment protection, the number of electric vehicles (EVs) is gradually increasing. Energy trading management for EVs becoming a challenge. However, existing research has not considered problem information sharing between energy traders and issues surrounding protection user privacy. Therefore, in this article, we propose vehicle-to-vehicle (V2V) vehicle-to-grid (V2G) electricity architecture based on blockchain. All transactions can be recorded blockchain...

10.1109/jiot.2021.3082769 article EN IEEE Internet of Things Journal 2021-05-21
Coming Soon ...