Liang Qiao

ORCID: 0000-0002-3366-9881
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Digital Transformation in Industry
  • Advanced Neural Network Applications
  • Matrix Theory and Algorithms
  • Robotics and Automated Systems
  • Brain Tumor Detection and Classification
  • Artificial Intelligence in Healthcare
  • Traffic Prediction and Management Techniques
  • Advanced Computing and Algorithms
  • Domain Adaptation and Few-Shot Learning
  • Electromagnetic Scattering and Analysis
  • Artificial Intelligence in Healthcare and Education
  • Big Data Technologies and Applications
  • Advanced Technologies in Various Fields
  • Stochastic Gradient Optimization Techniques
  • Cognitive Computing and Networks
  • EEG and Brain-Computer Interfaces
  • Advanced Wireless Communication Technologies
  • Advanced Data and IoT Technologies
  • Visual Attention and Saliency Detection
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Age of Information Optimization
  • Economic and Technological Innovation

University of Science and Technology of China
2022-2025

Qingdao University
2020-2023

Qingdao University of Science and Technology
2021

Cardiff University
2021

10.1016/j.future.2020.03.039 article EN Future Generation Computer Systems 2020-03-25

In order to explore the application value of deep learning denoising autoencoder (DAE) in Internet-of-Things (IoT) fusion security, this study, a hierarchical intrusion security detection model stacked DAE supporting vector machine (SDAE-SVM) is constructed based on three-layer neural network self-encoder. The sample data after dimension reduction are obtained by layer pretraining and fine-tuning. traditional algorithms [stacked noise (SNAE), (SAE), contractive (SCAE), sparse (SSAE), belief...

10.1109/jiot.2020.3007130 article EN IEEE Internet of Things Journal 2020-07-09

In order to solve the problem of privacy protection unmanned aerial vehicle (UAV) big data, it is necessary design a scheme that guarantees safe sharing UAV data. this work, blockchain technology adopted particular, proposed uses number theory research unit cryptosystem for encryption Privacy analysis provided validate security requirements. The performance evaluation results show data based on has low computing cost in terms key production, encryption, and decryption. It also outperforms...

10.1109/mnet.011.2000154 article EN IEEE Network 2021-01-01

10.1007/s12083-021-01103-8 article EN Peer-to-Peer Networking and Applications 2021-03-16

The brain-computer interface (BCI) connects the brain and external world through an information transmission channel by interpreting physiological of during thinking activities. effective classification electroencephalogram (EEG) signals is key to improving performance system. To improve accuracy EEG in BCI system, transfer learning algorithm improved Common Spatial Pattern (CSP) are combined construct a data model. Finally, effectiveness proposed verified. results show that actual imagined...

10.1109/tcbb.2020.3010014 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2020-07-17

To explore the electric vehicle networks in smart cities through big data analysis technology, this study utilizes K-means and fuzzy theory technology to construct an objective function-based mean clustering algorithm (FCM). Then, FCM is improved, network simulated. The results show that of transmission performance, when probability successful propagation 100% λ value between 0.01-0.05, it closest actual result, delay smallest. In route guidance effects, facing congested road sections,...

10.1109/tits.2020.3008884 article EN IEEE Transactions on Intelligent Transportation Systems 2020-07-22

Smart cities fully utilize the new generation of Internet Things (IoT) technology in process urban informatization to optimize management and service. However, IoT system, while information exchange communication, wireless sensor network devices may not be able resist all forms attacks, which lead security issues such as user data disclosure. Aiming at risks smart city, typical technologies is analyzed from perspective perception layer provides corresponding solutions for existing threats....

10.1145/3406115 article EN ACM Transactions on Internet Technology 2021-07-22

Objective: To realize the full coverage, spectrum, and application, of 6G networks, channel measurement, characteristics, research 6G-oriented full-spectrum full-scene wireless network are explored. Methods: At present, constructing an information covering three dimensions sea, land air is one directions technology development. Meanwhile, coverage communication requires multiple channels including frequency bands scenarios, mainly terahertz, light band, satellite, unmanned aerial vehicle,...

10.1109/tits.2020.3034817 article EN IEEE Transactions on Intelligent Transportation Systems 2020-11-10

10.1016/j.compeleceng.2021.107372 article EN Computers & Electrical Engineering 2021-09-22

As deep learning, virtual reality, and other technologies become mature, real-time data processing applications running on intelligent terminals are emerging endlessly; meanwhile, edge computing has developed rapidly a popular research direction in the field of distributed computing. Edge network is environment composed multi-edge nodes centers. First, framework key analyzed to improve performance applications. In system scenario where collaborative deployment tasks centers considered,...

10.1145/3421510 article EN ACM Transactions on Internet Technology 2021-07-16

Recently, decentralization has been extensively explored by researchers. Blockchain, as a representation of decentralized technology, attracted attention with its unique characteristics, such irrevocability and security. Consequently, herein, we introduce cutting-edge blockchain technologies from four directions: system, consensus algorithms, smart contract, scalability. Subsequently, analyze the current lack mechanism, fault tolerance, block capacity blockchain, integration into 5G/6G...

10.1016/j.dcan.2021.07.004 article EN cc-by Digital Communications and Networks 2021-07-21

The work aims to improve the stability of wireless energy transfer (WET) in Internet Things (IoT), prolong service life devices, and promote green communication. Based on a digital twins (DTs) IoT environment, we depict how optimize efficiency large-scale multiple-input multiple-output (MIMO) systems under WET technology. distributed antenna array is applied sensor network. MIMO can produce extremely narrow beams so that system reduces interference other users. Our system's optimization uses...

10.1109/mcom.004.2100990 article EN IEEE Communications Magazine 2022-05-20

The coronavirus disease 2019 (COVID-19) has put enormous pressure on the global supply chain. This work aims to solve chain interruption caused by public health emergencies in real life through resilient based digital twins (DTs). research example used here is disruption of N95 medical masks under COVID-19 epidemic. First, chain's emergency decision cost and profit model established manufacturer-supplier shared mode. <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tem.2022.3195903 article EN IEEE Transactions on Engineering Management 2022-08-15

With the increasing size of data, massive amounts data are being generated continuously. It is hoped to find a cognitive computing technology that can effectively learn and process large-scale data. The decision tree algorithm optimized from perspective machine learning. A model based on context-aware flow constructed. Classification regression (CART) used in layer model. In addition, clustering effectiveness index frequent patterns optimizes K-means method. performance analyzed through...

10.1109/tcss.2020.3011158 article EN IEEE Transactions on Computational Social Systems 2020-07-31

With increasing amounts of information, the image information received by people also increases exponentially. To perform fine-grained categorization and recognition images visual calculations, this study combines Visual Geometry Group Network 16 model convolutional neural networks vision attention mechanism to build a multi-level feature model. Finally, TensorFlow platform is utilized simulate classification based on mechanism. The results show that in terms accuracy required training time,...

10.1145/3418215 article EN ACM Transactions on Multimedia Computing Communications and Applications 2021-01-31

To realize the great potential of intelligent transportation infrastructure, investment in infrastructure system should be rationally planned. Firstly, application status cutting-edge Data Envelopment Analysis (DEA) model efficiency evaluation is analyzed, and based on this, a DEA under Digital Twins technology established. Secondly, with 12 prefecture-level cities Jiangsu Province from 2005 to 2020 as research object, traditional Stochastic Frontier Approach (SFA) are used estimate cities....

10.1109/tits.2022.3166585 article EN IEEE Transactions on Intelligent Transportation Systems 2022-04-25

The research aims to reduce the network resource pressure on cloud centers (CC) and edge nodes, improve service quality optimize performance. In addition, it studies designs a kind of edge–cloud collaboration framework based Internet Things (IoT). First, raspberry pi (RP) card working machines are utilized as is designed for computing. consists mainly three layers, including RP (ERP), monitoring & scheduling (MSRP), CC. Among collaborative communication can be realized between RPs CCs....

10.1016/j.asoc.2023.110082 article EN cc-by-nc-nd Applied Soft Computing 2023-02-10

To study the security performance of Internet multimedia things on privacy protection user identity, behavior trajectory, and preference under new information technology industry wave, in this study, aiming at problems sharing perception data exposure users’ information, Anonymous Batch Authentication Scheme (ABAH) for is designed. Hash-based Message Code used to cancel list-checking process analyze its performance. Compared with methods elliptic curve digital signature algorithm, Bayes...

10.1145/3398201 article EN ACM Transactions on Multimedia Computing Communications and Applications 2020-07-07

Abstract It aims to explore the efficient and reliable wireless transmission cooperative communication mechanism of Internet Vehicles (IoV) based on edge intelligence technology. first proposes an intelligent network architecture for IoV services by combining slicing deep learning (DL) technology, then began study key technologies needed achieve architecture. designs control unmanned vehicle full resource allocation algorithm from micro level. Second, in order improve safety driving,...

10.1002/spe.3080 article EN Software Practice and Experience 2022-03-07

it aims to adopt deep transfer learning combined with Digital Twins (DTs) in Magnetic Resonance Imaging (MRI) medical image enhancement.MRI enhancement method based on metamaterial composite technology is proposed by analyzing the application status of DTs direction and principle MRI imaging. On basis learning, super-resolution neural network structure established. To address problem that different imaging methods have advantages disadvantages, a multi-mode fusion algorithm adaptive...

10.1109/tcbb.2022.3168189 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2022-04-19

To accurately and effectively analyze electroencephalogram (EEG) with high complexity, large amount of data, strong uncertainty, brain–computer interface (BCI) cognitive computing its signal analysis algorithms are studied based on the digital twins (DTs) platform. avoid influence noise EEG results, it is necessary to use filtering defalsification methods process EEG. Four methods, including Butterworth filter, finite impulse response (FIR) elliptic wavelet decomposition, summarized. Based...

10.1109/tcss.2022.3202872 article EN IEEE Transactions on Computational Social Systems 2022-09-12
Coming Soon ...