Ying Zhang

ORCID: 0000-0002-2637-6765
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Underwater Vehicles and Communication Systems
  • Mobile Ad Hoc Networks
  • Higher Education and Teaching Methods
  • Indoor and Outdoor Localization Technologies
  • Water Quality Monitoring Technologies
  • Security in Wireless Sensor Networks
  • Wireless Networks and Protocols
  • Mobile Agent-Based Network Management
  • Network Security and Intrusion Detection
  • Advanced Algorithms and Applications
  • Industrial Technology and Control Systems
  • Opportunistic and Delay-Tolerant Networks
  • Water Quality Monitoring and Analysis
  • Advanced Computational Techniques and Applications
  • Fault Detection and Control Systems
  • Distributed Control Multi-Agent Systems
  • Advanced Sensor and Control Systems
  • Underwater Acoustics Research
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Network Traffic and Congestion Control
  • Energy Harvesting in Wireless Networks
  • Fish Ecology and Management Studies
  • Software-Defined Networks and 5G

Shanghai Maritime University
2015-2024

Wuhan National Laboratory for Optoelectronics
2024

Huazhong University of Science and Technology
2024

Chengdu University of Technology
2024

Southeast University
2013-2024

Institute of Software
2024

State Key Laboratory of Digital Medical Engineering
2024

Hohai University
2024

Xi'an University of Architecture and Technology
2024

Nanjing University of Science and Technology
2024

With the advent of Internet Things (IoT), security network layer in IoT is getting more and attention. The traditional intrusion detection technologies cannot be well adapted complex environment IoT. For deep learning algorithm detection, a neural structure may have fine accuracy for one kind attack, but it not good effect when facing other attacks. Therefore, urgent to design self-adaptive model change different attack types. This paper presents an based on improved genetic (GA) belief...

10.1109/access.2019.2903723 article EN cc-by-nc-nd IEEE Access 2019-01-01

Many applications of sensor networks require the base station to collect all data generated by nodes. As a consequence many-to-one communication pattern, referred as convergecast, is prevalent in networks. In this paper, we address challenge fast and reliable convergecast on top collision-prone CSMA MAC layer. More specifically, extend previous work considering following two situations: (1) length packets nodes much smaller than maximum frame that can be transmitted one time slot (2) not...

10.1109/rtss.2007.13 article EN 2007-12-01

Software Defined Networking (SDN) and cloud automation enable a large number of diverse parties (network operators, application admins, tenants/end-users) control programs (SDN Apps, network services) to generate policies independently dynamically. Yet existing policy abstractions frameworks do not support natural expression automatic composition high-level from sources. We tackle the open problem automatic, correct fast multiple specified policies. first develop Policy Graph Abstraction...

10.1145/2785956.2787506 article EN 2015-08-17

ZmPTF1 regulates drought tolerance in maize by promoting root development and ABA synthesis, binding to the G-box promoter activating expression of NCEDs, CBF4, NAC081, NAC30.

10.1093/jxb/erz307 article EN cc-by-nc Journal of Experimental Botany 2019-06-27

Due to the problems of high bit error rate and delay, low bandwidth limited energy sensor nodes in underwater acoustic network (UASN), it is particularly important design a routing protocol with reliability, strong robustness, end-to-end delay efficiency which can flexibly be employed dynamic environment. Therefore, reinforcement learning-based opportunistic (RLOR) proposed this paper by combining advantages learning algorithm. The RLOR kind distributed approach, comprehensively considers...

10.1109/tvt.2021.3058282 article EN IEEE Transactions on Vehicular Technology 2021-02-10

Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes floating. This results in lower beacon node distribution density, longer time for localization, more energy consumption. Currently most of localization algorithms this field do not pay enough consideration on mobility nodes. In paper, by analyzing patterns water near seashore, method UWSNs based Mobility Prediction Particle Swarm Optimization algorithm...

10.3390/s16020212 article EN cc-by Sensors 2016-02-06

Infrared ship detection has important application value for ensuring navigation safety and real-time monitoring of the sea surface. It is also great significance in marine intelligent defense become an research branch field computer vision. Affected by weather at limitations infrared cameras, images often have problems small targets being submerged noise low information entropy, which bring challenges to detection. In this article, rotating target algorithm FMR-YOLO based on synthetic fog...

10.1109/tim.2023.3336445 article EN IEEE Transactions on Instrumentation and Measurement 2023-11-28

In wireless sensor networks, some nodes are put in sleep mode while other active for sensing and communication tasks order to reduce energy consumption extend network lifetime. This approach is a special case (k=2) of randomized scheduling algorithm, which k subsets sensors work alternatively. this paper, we first study the algorithm via both analysis simulations terms coverage intensity, detection delay, probability. We further asymptotic properties. Finally, analyze problem maximizing...

10.1109/tc.2009.170 article EN IEEE Transactions on Computers 2009-11-13

This paper proposes the minimum power configuration (MPC) approach to energy conservation in wireless sensor networks. In sharp contrast earlier research that treats topology control, power-aware routing, and sleep management isolation, MPC integrates them as a joint optimization problem which of network consists set active nodes transmission powers nodes. We show through analysis is inherently dependent on data rates sources. propose several approximation algorithms with provable...

10.1145/1062689.1062738 article EN 2005-05-25

We consider applications of sensor networks wherein data packets generated by every node have to reach the base station. This results in a many-to-one communication paradigm referred as convergecast. are interested determining TDMA schedule that minimizes total time required complete simple version problem generates exactly one packet. propose distributed convergecast scheduling algorithm requires at most 3N timeslots, where N represents number nodes network. Through extensive simulations,...

10.1109/icdcs.2006.30 article EN 2006-08-02

Internet interdomain routing is policy-driven, and thus physical connectivity does not imply reachability. On average, on today's works quite well, ensuring reachability for most networks achieving reasonable performance across paths. However, there a serious lack of understanding resilience to significant but realistic failures such as those caused by the 911 event, 2003 Northeast blackout, recent Taiwan earthquake in December 2006. In this paper, we systematically analyze how current...

10.1145/1364654.1364687 article EN 2007-01-01

Synthetic Aperture Radar (SAR) target detection is a significant research direction in radar information processing. Aiming at the poor robustness and low accuracy of traditional algorithms, SAR image based on Convolutional Neural Network (CNN) reviewed this paper. Firstly, algorithms are briefly discussed, their limitations pointed out. Secondly, CNN’s network principle, basic structure, development process computer vision introduced. Next, CNN emphatically analyzed, including some common...

10.3390/rs14246240 article EN cc-by Remote Sensing 2022-12-09

Purpose The purpose of this paper is to examine stocks that are most actively discussed by online posters and see if the messages posted about these have information or they just noise. Design/methodology/approach This study uses on TheLion.com, which reports a real time list ten stocks. in at daily market close during 2005‐2006 examined. An event performed estimate abnormal returns Contemporaneous lead–lag regressions against message posting activities performed. Findings Online prefer...

10.1108/03074350810872813 article EN Managerial Finance 2008-05-09

This article proposes the minimum power configuration (MPC) approach to management in wireless sensor networks. In contrast earlier research that treats different radio states (i.e., transmission/reception/idle) isolation, MPC integrates them a joint optimization problem depends on both set of active nodes and transmission power. We propose four approximation algorithms with provable performance bounds two practical routing protocols. Simulations based realistic models show can conserve more...

10.1145/1240226.1240231 article EN ACM Transactions on Sensor Networks 2007-06-01

In this paper, we investigate efficient strategies for supporting on-demand information dissemination and gathering in large-scale wireless sensor networks. particular, propose a "comb-needle" discovery support model resembling an ancient method: use comb to help find needle sand or haystack. The combines push pull gathering. component features data duplication linear neighborhood of each node. dynamic formation routing structure comb. comb-needle enables us the cost spectrum combinations...

10.1109/tmc.2007.34 article EN IEEE Transactions on Mobile Computing 2007-02-09

One of the most common communication patterns in sensor networks is routing data to a base station, while station can be either static or mobile. Even cases, spanning tree may not survive for long time due failures nodes. In this paper, we present an adaptive mechanism, using real-time reinforcement learning strategies. We demonstrate via simulation that without additional control packets maintenance, trees maintain best connectivity spite node mobility station. And by general...

10.4304/jcm.1.2.12-21 article EN Journal of Communications 2006-05-01

With the development of autonomous unmanned intelligent systems, such as boats, planes and underwater vehicles, studies on Wireless Sensor-Actor Networks (WSANs) have attracted more attention. Network connectivity algorithms play an important role in data exchange, collaborative detection information fusion. Due to harsh application environment, abnormal nodes often appear, network will be prone lost. self-healing mechanisms become critical for these systems. In order decrease movement...

10.3390/s18010153 article EN cc-by Sensors 2018-01-08

Summary We propose a new sparse estimation method for Cox (1972) proportional hazards models by optimizing an approximated information criterion. The main idea involves approximation of the norm with continuous or smooth unit dent function. proposed bridges best subset selection and regularization borrowing strength from both. It mimics using penalized likelihood approach yet no need tuning parameter. further reformulate problem reparameterization step so that it reduces to one unconstrained...

10.1111/biom.12484 article EN Biometrics 2016-02-12

Ocean wireless sensor networks (OWSNs) play an important role in marine environment monitoring, underwater target tracking, and defense. OWSNs not only monitor the surface information real time but also act as relay layer for to establish data communication between sensors ship-based base stations, land-based satellites. The destructive resistance of is closely related where they are located. Affected by dynamics seawater, location nodes extremely easy shift, resulting deterioration...

10.3390/jmse11040843 article EN cc-by Journal of Marine Science and Engineering 2023-04-16
Coming Soon ...