- Interconnection Networks and Systems
- Optimization and Search Problems
- Caching and Content Delivery
- Advanced Optical Network Technologies
- Privacy-Preserving Technologies in Data
- Complexity and Algorithms in Graphs
- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Cloud Computing and Resource Management
- Peer-to-Peer Network Technologies
- Advanced Data Storage Technologies
- Energy Harvesting in Wireless Networks
- Advanced Graph Theory Research
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Complex Network Analysis Techniques
- Recommender Systems and Techniques
- Data Mining Algorithms and Applications
- Network Security and Intrusion Detection
- Rough Sets and Fuzzy Logic
- Optical Network Technologies
- Software-Defined Networks and 5G
- Advanced Graph Neural Networks
Central Queensland University
2023-2025
Sun Yat-sen University
2015-2024
Griffith University
1994-2024
Macao Polytechnic University
2023-2024
University of Electronic Science and Technology of China
2024
The University of Adelaide
2013-2023
Northwestern Polytechnical University
2022-2023
National University of Tucumán
2023
National Technological University
2023
Hamad bin Khalifa University
2023
Geographic routing is an attractive localized scheme for wireless sensor networks (WSNs) due to its desirable scalability and efficiency. Maintaining neighborhood information packet forwarding can achieve a high efficiency in geographic routing, but may not be appropriate WSNs highly dynamic scenarios where network topology changes frequently nodes mobility availability. We propose novel online scheme, called Energy-efficient Beaconless Routing (EBGR), which provide loop-free, fully...
Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, become vital when the network deployed hostile environment. There has been many related work proposed to address these issues. In this paper we survey classify them into two cases: hop-by-hop encrypted end-to-end aggregation. We also propose general frameworks for cases respectively. framework higher computation cost on nodes, but achieves stronger security,...
With the development of construction industry, increasing concern over and demolition waste (CDW) has initiated a wave environmental regulation by government in order to reduce impact ensure sustainable development. Research on behavioral decision-making can offer theoretical basis for individuals. This paper aims study stakeholders CDW recycling under regulation. Considering limited rationality difference reference points, an evolutionary game model including contractors manufacturers...
Mobile edge computing (MEC) integrated with wireless power transfer (WPT) has became a promising trend to shorten task delay and prolong battery life of devices (WDs). Introducing the relay technique WPT-MEC system can improve offloading capability energy efficiency, particularly in scenarios poor channel conditions between server WDs. In this paper, we focus on maximizing efficiency (EE) multi-user relay-aided system. The joint optimization configuration relay, charge time fraction,...
In rough set theory, attribute reduction is a challenging problem in the applications which data with numbers of attributes available. Moreover, due to dynamic characteristics collection decision systems, will change dynamically as systems varies over time. How carry out updating by utilizing previous information an important task that can help improve efficiency knowledge discovery. view algorithms incomplete variation have not yet been discussed so far. This paper focuses on positive...
Session-based recommendation is a challenging problem due to the inherent uncertainty of user behavior and limited historical click information. Latent factors complex dependencies within user’s current session have an important impact on user's main intention, but existing methods do not explicitly consider this point. In paper, we propose novel model, Interest Shift Factors Combination Model (ISLF), which can capture intention by taking into account interest shift (i.e. long-term...
The increasing density and complexity of electromagnetic signals have brought new challenges to multi-component radar signal recognition. To address the problem low recognition accuracy under signal-to-noise ratios (SNR) in adapting common framework combining time–frequency transformations (TFTs) with convolutional neural networks (CNNs), this paper proposes a dual-component (TFGM-RMNet) that combines deep generation module Transformer-based residual network. First, received noisy is...
Many applications require performing set operations without publishing individual datesets. In this article, we address problem for five fundamental including intersection, cardinality of element reduction, overthreshold set-union, and subset relation. Our protocols are obtained in the universally composable security framework, assumption probabilistic polynomial time bounded adversary, which actively controls a fixed t parties an authenticated broadcast channel. constructions utilize...
Border surveillance for intrusion detection is an important application of wireless sensor networks. Given a set mobile sensors and their initial positions, how to move these region border achieve barrier coverage energy-efficiently challenging. In this paper, we study the 2-D MinMax problem moving n in two-dimensional plane form specified line segment while minimizing maximum movement sake balancing battery power consumption. Previously, was shown be NP-hard general case. It open whether...
Delay-sensitive task offloading in a device-to-device assisted mobile edge computing (D2D-MEC) system with energy harvesting devices is critical challenge due to the dynamic load level at nodes and variability harvested energy. In this paper, we propose joint CPU frequency control scheme for delay-sensitive tasks D2D-MEC system, taking into account intricacies of multi-slot tasks, characterized by diverse processing speeds data transmission rates. Our methodology involves meticulous modeling...
Topology is important for any type of networks because it has great impact on the performance network. For wireless sensor (WSN), regular topologies, which can help to efficiently save energy and achieve long networking lifetime, have been well studied in [1, 4, 5, 7, 9]. However, little work focused routing patterned WSNs except shortest path with knowledge global location information. In this paper, we propose a protocol based random walk. It doesn’t require Moreover, walk achieves load...