Ling Li

ORCID: 0000-0002-3338-8756
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Caching and Content Delivery
  • Wireless Communication Networks Research
  • Cognitive Radio Networks and Spectrum Sensing
  • Mobile Agent-Based Network Management
  • Blockchain Technology Applications and Security
  • Distributed and Parallel Computing Systems
  • Distributed Control Multi-Agent Systems
  • Power Line Communications and Noise
  • Indoor and Outdoor Localization Technologies
  • Advanced Data Storage Technologies
  • Distributed Sensor Networks and Detection Algorithms
  • Opportunistic and Delay-Tolerant Networks
  • Peer-to-Peer Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Cultural Insights and Digital Impacts
  • Evolutionary Game Theory and Cooperation
  • Advanced Queuing Theory Analysis
  • Wireless Networks and Protocols
  • Advanced Database Systems and Queries
  • Software Reliability and Analysis Research
  • Embedded Systems and FPGA Design

Kanazawa University
2024

ZTE (China)
2023

China Telecom
2023

Hebei North University
2023

China Telecom (China)
2023

Université Lumière Lyon 2
2020

China Electric Power Research Institute
2017

Shenyang Ligong University
2017

Beijing Jiaotong University
2017

China United Network Communications Group (China)
2017

A heterogeneous ring domain communication topology with equal area in each is presented this paper an effort to solve the energy balance problem original IPv6 routing protocol for low power and lossy networks (RPL). new clustering algorithm event-driven cluster head rotation mechanism are also proposed based on topology. The information announcement message acknowledgment were designed according RFC RPL structure. An energy-efficient (E2HRC) wireless sensor then corresponding algorithms...

10.1109/access.2017.2666818 article EN cc-by-nc-nd IEEE Access 2017-01-01

Service-oriented architectures for wireless sensor networks (WSNs) have been proposed to provide an integrated platform, where new applications can be rapidly developed through flexible service composition. In WSNs, the existing multipath routing schemes demonstrated effectiveness of traffic distribution over multipaths fulfill quality requirements applications. However, failure links might significantly affect transmission performance, scalability, reliability, and security WSNs. Thus, by...

10.1109/jsyst.2013.2260626 article EN IEEE Systems Journal 2013-06-12

Directed against the disadvantages of relatively short life-cycle and unbalanced energy utilization among nodes in WSN, a clustering routing algorithm combining sine cosine Lévy mutation is developed. During cluster head election stage, amount heads dynamically calculated according to surviving for keeping it at reasonable value; taking full account current nodes, only with high can be candidate heads; fitness function constructed inter-cluster distance, so that distribution structure within...

10.1109/access.2023.3252027 article EN cc-by-nc-nd IEEE Access 2023-01-01

Along with the development of network, video business has become mainstream network traffic gradually. In order to improve quality service, many websites use Content Delivery Network (CDN) technology accelerate browsing. At same time, cloud computing is becoming more and popular because it can process massive data high scalability. recent years, been applied in various fields. Both techniques are very promising, but they have their own drawbacks respectively: CDN faced lack IT infrastructure...

10.1109/mic.2013.6758055 article EN 2013-08-01

This paper investigates the architecture of mobile ad-hoc network security (MANS), a novel system that provides to networks (MANETs). MANET nodes operate in decentralized "trust no peer" mode complicates and inhibits services, thus creating formidable challenge. Here design MANS is presented its performance investigated. based on "neighborhood watch" concept. approach builds fully scalable policy law-governed globally using only local actions. formally prescribes collaborative group function...

10.1109/icsmc.2003.1244370 article EN 2004-04-23

Network technology plays an increasingly important role in all aspects of social life. The Internet has brought a new round industrial revolution and upgrading. arrival the “Internet” era is accompanied by large-scale increase network applications number netizens. At same time, severity cyberattacks continue to increase. Therefore, intrusion detection systems (IDSs) have become part current security infrastructure various industries. Anomaly traffic data effective method for protection. In...

10.1155/2023/5997304 article EN cc-by Journal of Sensors 2023-01-01

There are often some faults happening in the wireless sensor networks due to node failure or energy exhaustion. It is because nodes constrained and usually deployed harsh environments. These factors strongly influence reliability of data transmission decrease lifetime networks. An important issue designing network reliable routing protocols which provide as much possible. Another factor make best use limited presented by This paper proposes a new protocol called REEM(Reliable...

10.1109/pdcat.2010.51 article EN Parallel and Distributed Computing: Applications and Technologies 2010-12-08

Deploying task caching at edge servers has become an effective way to handle compute-intensive and latency-sensitive tasks on the industrial internet. However, how select scheduling location reduce delay cost while ensuring data security reliable communication of computing remains a challenge. To solve this problem, paper establishes model with joint blockchain in internet designs novel blockchain-assisted mechanism enhance system security. In paper, which couples decision, reward, is...

10.32604/cmc.2023.035530 article EN Computers, materials & continua/Computers, materials & continua (Print) 2023-01-01

Spectrum sensing is the key enabling technology for cognitive radio networks. The main objective of spectrum to provide more access opportunities (CR) users without interfering with licensed users. In this paper, we propose a half-voting based twice-cooperative scheme. Simulation results show that proposed method can achieve much better performance.

10.1109/wicom.2009.5304071 article EN 2009-09-01

For the problem that existing source-location privacy protection algorithms have lower safety periods, algorithm based on expected phantom source node is proposed. With coordinates of and sink node, establishes an ellipse selects a randomly as which providing direction for node. By selecting dispersive nodes, transmission paths adjacent packets are dispersive. Theoretical analysis shows can increase probability packet away from during procedure. The experimental results show enhance period.

10.1109/icsess.2016.7883231 article EN 2016-08-01

Among variant kinds of spectrum sensing strategies in cognitive radio (CR) broadly studied before, cooperative is the most popular one to detect primary user accurately. This paper proposes a new algorithm which double threshold energy detection will be employed at local decision and different fusion rules used center. Theoretic analysis shows that proposed scheme has good performance either minimizing total error probability or accuracy.

10.1109/wicom.2009.5305143 article EN 2009-09-01

In order to improve the issue that existing source location privacy protection algorithms have lower safety periods, random selection fake source-based algorithm for protecting source-location is put forward. The selects phantom node with walk. intermediate selected from nodes on shortest source-sink path number and information about hops sink. Fake by through Analytical results demonstrate can select during process of each packet transmission. simulation show enhance period level against...

10.1109/fskd.2016.7603499 article EN 2016-08-01

Software-defined radio (SDR) is a kind of communication system which attempts to place much or most the complex signal handling involved in receivers and transmitters into digital style. As wireless technologies become ubiquitous, SDR are gaining popularity. In this work, we introduce platform USRP with emphasizes on hardware components, processing procedure supporting software. A spectrum monitoring based LabVIEW designed implemented, web publishing real time realized.

10.4028/www.scientific.net/amm.610.233 article EN Applied Mechanics and Materials 2014-08-01

Directory-based protocols have been the de facto solution for maintaining cache coherence in shared-memory parallel systems comprising multi/many cores, where each store instruction is eagerly made globally visible by invalidating private (PC) backups of other cores. Consequently, directory not only consumes large chip area, but also incurs considerable energy consumption and performance degradation, due to number Invalidation/Ack messages transferred interconnection network resulting...

10.48550/arxiv.1206.4753 preprint EN other-oa arXiv (Cornell University) 2012-01-01

One protocol of P2P-based single sign-on presented in this paper is verified by executive analysis. This use validity period user credential as lifecycle and implement multiple after one authentication. can bilaterally authenticate between identity server application, initialize the session key communication peers, set up secure channel client application.

10.1109/dasc.2009.152 article EN 2009-12-01

The issue of interference suppression is considered for wireless time-division multiple-access (TDMA) systems equipped with multiple receive antennas in frequency-selective fading channels. A novel scheme presented to estimate the multipath channel, coherently demodulate information symbols, and meanwhile suppress radio interference. proposed simple implement able mitigate various origins, including inter-symbol interference, co-channel others. Numerical examples are illustrate performance scheme.

10.1049/el:20020271 article EN Electronics Letters 2002-04-11

10.1109/estc.2012.6485863 article EN 2012 4th Electronic System-Integration Technology Conference 2012-09-01
Coming Soon ...