- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Network Traffic and Congestion Control
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Network Security and Intrusion Detection
- Corporate Finance and Governance
- Islamic Finance and Banking Studies
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Opportunistic and Delay-Tolerant Networks
- Advanced Queuing Theory Analysis
- Advanced Measurement and Detection Methods
- Data Stream Mining Techniques
- Monetary Policy and Economic Impact
- Mobile Ad Hoc Networks
- Stochastic Gradient Optimization Techniques
- Geoscience and Mining Technology
- Advanced MIMO Systems Optimization
- Advanced Algorithms and Applications
- Advanced Wireless Network Optimization
University of Electronic Science and Technology of China
2016-2025
Capital University of Physical Education and Sports
2023-2025
Shanghai Electric (China)
2023-2024
Qufu Normal University
2024
Joint United Nations Programme on HIV/AIDS
2024
Xinjiang Medical University
2023-2024
Fuyang Normal University
2014-2023
Tumor Hospital of Xinjiang Medical University
2023
South China Institute of Collaborative Innovation
2023
Science and Technology Department of Sichuan Province
2023
Recently, network function virtualization (NFV) has been proposed to solve the dilemma faced by traditional networks and improve performance through hardware software decoupling. The deployment of service chain (SFC) is a key technology that affects virtual (VNF). issue in SFCs proposing effective algorithms achieve efficient use resources. In this article, we propose an SFC optimization (SFCDO) algorithm based on breadth-first search (BFS). first uses BFS-based find shortest path between...
Generally, a service request must specify its required virtual network functions (VNFs) and their specific order, which is known as the function chain (SFC). When mapping SFCs, providers face many challenges due to requirements of maintaining correct order satisfying other constraints VNFs. Furthermore, SFC orchestration becomes more difficult problem when considered in multi-domain networks, because confidentiality topology information each domain be considered. In this paper, we study...
5G/B5G is intended to support various services with the assistance of network slices, and each slice requires adequate resources provide prenegotiated service quality. The Slice Admission Control (SAC) algorithm a necessity for Providers (SPs) guarantee Quality Service (QoS) Experience (QoE) admitted request. In such circumstances, concerns regarding priority fairness resource allocation are meaningful topics. However, these two issues do not receive sufficient research attention...
The vehicle-to-vehicle (V2V) communication driven by the fifth generation (5G) cellular mobile network with features of ultra-high reliability and low latency provides promising solutions to various applications in intelligent transportation system (ITS). To improve resource utilization guarantee quality-of-service (QoS), users 5G vehicular networks have select appropriate modes control their own transmission power. However, highly dynamic topology channel status pose challenges mode...
Network slicing endows 5G/B5G with differentiated and customized capabilities to cope the proliferation of diversified services, whereas limited physical network resources may not be able support all service requests. Slice admission control is regarded as an essential means ensure quality isolation when under burden. Herein, scenario where rational tenants coexist partially competitive slice providers adopted. We aim maximize long-term average revenue operators through control, feasibility...
UAV (unmanned aerial vehicle) is rapidly gaining traction in various human activities and has become an integral component of the satellite-air-ground-sea (SAGS) integrated network. As high-speed moving objects, UAVs not only have extremely strict requirements for communication delay, but also cannot be maliciously controlled as a weapon by attacker. Therefore, it necessary to design efficient secure mechanism (ESCM) network (a mobile ad hoc composed multiple UAVs). For high efficiency, ESCM...
This paper focuses on the routing algorithm for communications between vehicles and places in urban vehicular ad hoc networks. As one of basic transportation facilities an setting, buses periodically run along their fixed routes cover many city streets. The trajectory bus lines can be seen as a submap city. Based characters networks, we propose bus-trajectory-based street-centric (BTSC) algorithm, which uses main relay to deliver messages. In BTSC, build graph based trajectories by analyzing...
With the development of cloud computing, virtual machine migration is emerging as a promising technique to save energy, enhance resource utilizations, and guarantee Quality Service (QoS) in datacenters. Most existing studies on migration, however are based single migration. Although there some researches multiple machines author usually does not consider correlation among these machines. In practice, order energy maintain system performance, providers need migrate correlated or entire...
With the popularization and development of cloud computing, network function virtualization service chain (SFC) provisioning have attracted increasing attention from researchers. Excellent reliable is important for development. Moreover, as number users increases, construction costs become very high. Therefore, an efficient algorithm necessary to provide SFC with excellent performance low resource costs. In this paper, we re-examine problem optimizing deployment resource-saving service. We...
With the development of vehicle networks, information transmission between vehicles is becoming increasingly important. Many applications, particularly regarding security, are based on communication vehicles. These applications have strict requirements for factors such as quality and time delay. theoretical protocols ignore presence buildings or other obstacles that present during practical use, especially in urban areas. can cause a signal to fade even block direct communication. often...
Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on an efficient strategy for vehicle-to-vehicle (V2V) communication in VANETs. Because, VANET performance are affected mainly by intersections, traffic lights, and conditions, propose intersection-based distributed (IDR) strategy. view fact that lights used cause vehicles stop at intersection vehicle fog (IVF) model, which waiting...
As network virtualization becomes popular, the problem of efficiently mapping a virtual infrastructure (VI) over substrate while guaranteeing its survivability in event failures increasingly important. In this paper, we study survivable VI to recover from facility node failures. We develop two solutions namely 1-redundant scheme and K-redundant for surviving minimizing resource costs. also model schemes as MILP propose efficient heuristics based on formulations. compare efficiency our using...
Network function virtualization (NFV) in 6G can use standard techniques to enable network functions via software. Resource scheduling is one of the key research areas NFV and mainly used deploy service chains (SFCs) substrate networks. However, determining how utilize resources efficiently has always been a difficult problem SFC deployment. This article focuses on provision online requests with 6G. We first establish mathematical model for provisioning. Then, we propose an efficient chain...
To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEVs) to energy Internet, we propose a local vehicle-to-vehicle (V2V) trading architecture based on fog computing in social hotspots and model welfare maximization (SWM) problem balance interests of both charging discharging PHEVs. Considering transaction security privacy protection issues, employ consortium blockchain our designed architecture, which is different from traditional centralized power systems, reduce...
With the rapid development of Internet vehicles (IoV), routing in vehicular ad hoc networks (VANETs) has become a popular research topic. Due to features dynamic network structure, constraints road topology and variable states vehicle nodes, VANET protocols face many challenges, including intermittent connectivity, large delay high communication overhead. Location-based geographic is most suitable method for VANETs, such performs well on paths with an appropriate density load. We propose...
Federated learning is gaining popularity as a distributed machine method that can be used to deploy AI-dependent Internet of Things applications while protecting client data privacy and security. Due the differences clients, single global model may not perform well on all so personalized federated method, which trains for each better suits its individual needs, becomes research hotspot. Most research, however, focuses heterogeneity ignoring need architecture heterogeneity. existing methods...
As people pay more attention to environment protection, the number of electric vehicles (EVs) is gradually increasing. Energy trading management for EVs becoming a challenge. However, existing research has not considered problem information sharing between energy traders and issues surrounding protection user privacy. Therefore, in this article, we propose vehicle-to-vehicle (V2V) vehicle-to-grid (V2G) electricity architecture based on blockchain. All transactions can be recorded blockchain...