David S. L. Wei

ORCID: 0000-0002-3839-5576
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Wireless Networks and Protocols
  • Software-Defined Networks and 5G
  • Cooperative Communication and Network Coding
  • Interconnection Networks and Systems
  • Network Traffic and Congestion Control
  • Quantum Information and Cryptography
  • Bluetooth and Wireless Communication Technologies
  • Cloud Data Security Solutions
  • Quantum Computing Algorithms and Architecture
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Internet Traffic Analysis and Secure E-voting
  • Optimization and Search Problems
  • ECG Monitoring and Analysis
  • Blockchain Technology Applications and Security
  • Advanced Wireless Network Optimization
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Wireless Communication Networks Research
  • Quantum Mechanics and Applications

Fordham University
2016-2025

University of California, Davis
2024

Xidian University
2024

California State Polytechnic University
2023

University of Alabama in Huntsville
2021

University of Science and Technology of China
2021

University of Central Florida
2019

Imperial College London
2018

Jilin University
2014

Jilin Province Science and Technology Department
2014

The MAC protocol of a cognitive radio (CR) device should allow it to access unused or under-utilized spectrum without (or with minimal) interference primary users dynamically. To fulfill such goal, we propose using statistical channel allocation and call SCA-MAC in this work. is CSMA/CA-based protocol, which exploits statistics usage for decision making on access. For each transmission, the sender negotiates receiver transmission parameters through control channel. A model developed CR...

10.1109/wcnc.2007.25 article EN IEEE Wireless Communications and Networking Conference 2007-03-01

This paper addresses the problem of scheduling parallel programs represented as directed acyclic task graphs for execution on distributed memory architectures. Because high communication overhead in existing machines, a crucial step is clustering, process coalescing fine grain tasks into single coarser ones so that overall time minimized. The clustering NP-hard, even when number processors unbounded and duplication allowed. A simple greedy algorithm presented this which, graph with arbitrary...

10.1109/71.481597 article EN IEEE Transactions on Parallel and Distributed Systems 1996-01-01

Driving tasks are vulnerable to the effects of sleep deprivation and mental fatigue, diminishing driver's ability respond effectively unusual or emergent situations. Physiological brain activity analysis could help understand how provide useful feedback alert signals drivers for avoiding car accidents. In this study we analyze insurgence fatigue drowsiness during driving in a simulated environment by using high resolution EEG techniques as well neurophysiologic variables such heart rate (HR)...

10.1109/embc.2012.6347469 article EN Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2012-08-01

Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as promising technique to provide flexible, fine-grained, and secure data for with honest-but-curious servers. However, the existing CP-ABE schemes, single attribute authority must execute time-consuming user legitimacy verification secret key distribution, hence, it results single-point performance bottleneck when scheme large-scale system. Users...

10.1109/tifs.2016.2647222 article EN IEEE Transactions on Information Forensics and Security 2017-01-02

More and more users are eager to obtain comprehensive network services without revealing their private information. Traditionally, in order access a network, user is authorized with an identity corresponding keys, which generated managed by the operator. All users' personally identifying information centralized stored However, this approach makes lose control of Users concerned about who can these sensitive data whether they have been compromised. In paper, we propose blockchain-based...

10.1109/tvt.2020.2986041 article EN IEEE Transactions on Vehicular Technology 2020-04-08

In order to cope with the explosive growth of mobile traffic, many traffic offloading schemes such as heterogenous networks have been developed enhance network capacity Radio Access Network (RAN). Among them, networking Low-Earth Orbit (LEO) satellites promises significantly improve RAN performance due its economical prospect and advantages in high bandwidth low latency. this paper, by introducing cache-enabled LEO satellite a part RAN, we propose an integrated satellite/terrestrial...

10.1109/twc.2020.2964236 article EN IEEE Transactions on Wireless Communications 2020-01-14

Space information network (SIN) makes it possible for any object to be connected the Internet anywhere, even in areas with extreme conditions, where a cellular is not easy deploy. Access authentication key secure users' access control SIN, mainly prevent illegal adversaries from getting SIN services. However, highly complicated communication environment of (e.g., exposed links, higher signal delay, etc.) poses challenging issue design and efficient scheme. Although some schemes have been...

10.1109/jiot.2019.2902907 article EN IEEE Internet of Things Journal 2019-03-05

In public cloud storage services, data are outsourced to semi-trusted servers which outside of owners' trusted domain. To prevent untrustworthy service providers from accessing sensitive data, often encrypted. this scenario, conducting access control over these becomes a challenging issue. Attribute-based encryption (ABE) has been proved be powerful cryptographic tool express policies attributes, can provide fine-grained, flexible, and secure data. However, the existing ABE-based schemes do...

10.1109/tifs.2019.2911166 article EN IEEE Transactions on Information Forensics and Security 2019-05-21

In order to be TCP-friendly, the original Multipath TCP (MPTCP) congestion control algorithm is always restricted gain no better throughput than a traditional single-path on best path. However, it unable maximize over all available paths when they do not go through shared bottleneck. Also, bottleneck fairness based solutions detect and conduct different algorithms at sets increase while remaining fair single TCP. existing generally bottlenecks delay correlation loss between two flows, which...

10.1109/tnet.2020.2970032 article EN IEEE/ACM Transactions on Networking 2020-02-13

Inspired by Bitcoin, many different kinds of cryptocurrencies based on blockchain technology have turned up the market. Due to special structure blockchain, it has been deemed impossible directly trade between traditional currencies and or types cryptocurrencies. Generally, trading is conducted through a centralized third-party platform. However, problem single point failure, which vulnerable attacks thus affects security transactions. In this paper, we propose distributed cryptocurrency...

10.1109/tifs.2021.3096124 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary applications are now limelight, showcasing advantages of technology and becoming a research hotspot academia industry. To enable have more profound impact wider application, interconnection multiple nodes through channels becomes essential. Building an entanglement-assisted network, capable realizing transmission between these...

10.1109/comst.2023.3294240 article EN IEEE Communications Surveys & Tutorials 2023-01-01

In designing discrete-time filters, the length of impulse response is often used as an indication computational cost. systems where complexity dominated by arithmetic operations, number nonzero coefficients in may be a more appropriate metric to consider instead, and savings are realized omitting operations associated with zero-valued coefficients. This particularly relevant design sensor arrays, set array weights many entries allows for elimination physical elements, resulting reduction...

10.1109/tsp.2009.2036471 article EN IEEE Transactions on Signal Processing 2009-11-17

VCC is an emerging computing paradigm developed for providing various services to vehicle drivers, and has attracted more attention from researchers practitioners over the last few years. However, privacy preserving secure data sharing become a very challenging important issue in VCC. Unfortunately, existing access control schemes consume too many computation resources, which prevents them being performed on resource constrained onboard devices. Also, these cloud-based suffer large latency...

10.1109/mnet.2018.1700341 article EN IEEE Network 2018-05-01

Deep learning as a service has been widely deployed to utilize deep neural network models provide prediction services. However, this raises privacy concerns since clients need send sensitive information servers. In paper, we focus on the scenario where want classify private images with convolutional model hosted in server, while both parties keep their data private. We present FALCON, fast and secure approach for CNN predictions based Fourier Transform. Our solution enables linear layers of...

10.1109/cvpr42600.2020.00873 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020-06-01

With rapid advances in satellite technology, space information network (SIN) has been proposed to meet the increasing demands of ubiquitous mobile communication due its advantages providing extensive access services. However, satellites' resource constraint and SIN's highly dynamic topology, it poses a challenge on management utilization development SIN. There have some works integrating software defined (SDN) into SIN, as (SD-SIN), so simplify improve these ignore security issue SD-SIN....

10.1109/twc.2020.2975781 article EN IEEE Transactions on Wireless Communications 2020-02-28

With the advances of Software-Defined Networks (SDN) and Network Function Virtualization (NFV), Service Chain (SFC) has been becoming a popular paradigm to carry complete network services. Such new computing networking enables Virtual Functions (VNFs) be placed in software entities/virtual machines over physical equipments elastic flexible way with low capital operation expenses. VNFs are chained together steer traffic as needed. However, most existing steering routing path computation...

10.1109/jsac.2020.2986592 article EN IEEE Journal on Selected Areas in Communications 2020-04-09

Secure data aggregation has been widely studied in the area of smart grid. Many existing schemes have protecting user's privacy by using advanced cryptographic tools. However, they usually introduce a large computation burden to meters limited computing power or require trusted authority. How ensure efficiency on user side while preserving still not well addressed. In this article, we consider scenario where there does exist authority and users grid may dynamically change, propose an...

10.1109/jiot.2019.2961966 article EN IEEE Internet of Things Journal 2019-12-25

Secure and real-time communication is an essential condition in mobile vehicular networks, this requires secure authentication seamless access enabled by roaming services. As a security inspector, ensures that legitimate users can the network securely. However, today's protocols authenticate with help of centralized servers, leading to risk single point failure fraud. The massive device 5G networks further exacerbates losses when problems occur. In light it, we propose decentralized...

10.1109/tvt.2022.3148303 article EN IEEE Transactions on Vehicular Technology 2022-02-04

Multipath TCP is designed to utilize multiple network paths achieve improved throughput and robustness against failure. These features are supposed make MPTCP preferable single-path in mobile networks. However, it fails the expected performance practice. A key challenge of using networks how effectively spread packets over heterogeneous unstable devices with limited buffers. If not sent an effective way, may only provide equal or even lower than TCP. Several packet scheduling algorithms have...

10.1109/tnet.2023.3246168 article EN IEEE/ACM Transactions on Networking 2023-02-22

An efficient anonymous communication protocol, called MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for P2P applications over mobile ad-hoc networks (MANETs) is proposed in this work. MAPCP employs broadcasts with probabilistic-based flooding control to establish multiple paths between peers. It requires no hop-by-hop encrypt ion/decryption along and, hence, demands lower computational complexity and power consumption than those routing protocols. Since builds peers within a...

10.1109/jsac.2007.070119 article EN IEEE Journal on Selected Areas in Communications 2007-01-01

In power utility service outsourcing, some time-sensitive computations (e.g., dynamic prices prediction) are outsourced to a third-party provider. This brings in new privacy threats customers. Although existing works focus on achieving privacy-preserving temporal and spatial aggregation for one center, they basically cannot be directly applied the scenario of outsourcing with multiple centers providers). We thus propose scheme, called PPSO, real-time pricing demand response smart grid fault...

10.1109/jiot.2018.2870873 article EN IEEE Internet of Things Journal 2018-09-18

Information centric networking (ICN) has been regarded as an ideal architecture for the next-generation network to handle users' increasing demand content delivery with in-network cache. While making better use of resources and providing service delivery, effective access control mechanism is needed due widely disseminated contents. However, in existing solutions, cache-enabled routers or providers authenticate requests causes high computation overhead unnecessary delay. Also,...

10.1109/tnet.2019.2914189 article EN IEEE/ACM Transactions on Networking 2019-05-23

Attribute-based encryption (ABE) has opened up a popular research topic in cryptography over the past few years. It can be used various circumstances, as it provides flexible way to conduct fine-grained data access control. Despite its great advantages control, current ABE based control system cannot satisfy requirement well when judges behavior according attribute comparison, such "greater than x" or "less x", which are called comparable attributes this paper. In paper, on set of...

10.1109/tc.2017.2693265 article EN IEEE Transactions on Computers 2017-04-12

The theory and experiment of quantum information have been studied extensively in recent years, the feasibility communication has proved. Although fundamental technology is not yet mature, research on internet should be conducted. To implement internet, an architecture that describes how nodes are linked to form networks protocol functions vertically composed need developed urgently. In this paper, we present a novel design cluster-based structure describe interconnected, can improve...

10.23919/jcc.2021.10.001 article EN China Communications 2021-10-01

Psoriasis, an immune-mediated inflammatory skin disorder characterized by a chronically relapsing-remitting course, continues to be primarily managed through topical therapy. While oral administration of tyrosine kinase 2 inhibitors (TYK2i) stands as effective approach for psoriasis treatment, the potential efficacy application TYK2i remains unexplored. Herein, carbomer/alginic acid hydrogel is embedded with borneol (BO) new carrier achieving enhanced transdermal permeation and...

10.1016/j.bioactmat.2024.07.013 article EN cc-by-nc-nd Bioactive Materials 2024-07-16
Coming Soon ...