Junshan Zhang

ORCID: 0000-0002-3840-1753
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • Privacy-Preserving Technologies in Data
  • Mobile Crowdsensing and Crowdsourcing
  • Wireless Networks and Protocols
  • Complex Network Analysis Techniques
  • Wireless Communication Networks Research
  • Electric Power System Optimization
  • Opinion Dynamics and Social Influence
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • Wireless Communication Security Techniques
  • Distributed Sensor Networks and Detection Algorithms
  • Energy Load and Power Forecasting
  • Smart Grid Energy Management
  • Cognitive Radio Networks and Spectrum Sensing
  • Energy Efficient Wireless Sensor Networks
  • Advanced Bandit Algorithms Research
  • Auction Theory and Applications
  • Advanced Wireless Communication Technologies
  • Domain Adaptation and Few-Shot Learning
  • Stochastic Gradient Optimization Techniques
  • Privacy, Security, and Data Protection
  • Opportunistic and Delay-Tolerant Networks

University of California, Davis
2021-2025

Weichai Power (China)
2024

Arizona State University
2014-2023

Northwest University
2023

Sherman Hospital
2022

Shandong University of Technology
2021

California Maritime Academy
2021

Nanyang Technological University
2020

Indiana University – Purdue University Indianapolis
2019

Beijing Normal University
2019

With the breakthroughs in deep learning, recent years have witnessed a booming of artificial intelligence (AI) applications and services, spanning from personal assistant to recommendation systems video/audio surveillance. More recently, with proliferation mobile computing Internet Things (IoT), billions IoT devices are connected Internet, generating zillions bytes data at network edge. Driving by this trend, there is an urgent need push AI frontiers edge so as fully unleash potential big...

10.1109/jproc.2019.2918951 article EN Proceedings of the IEEE 2019-06-12

We study the capacity of multiple-input multiple- output (MIMO) relay channels. first consider Gaussian MIMO channel with fixed conditions, and derive upper bounds lower that can be obtained numerically by convex programming. present algorithms to compute bounds. Next, we generalize Rayleigh fading case. find an bound a on ergodic capacity. It is somewhat surprising meet under certain regularity conditions (not necessarily degradedness), therefore characterized exactly; previously this has...

10.1109/tit.2004.839487 article EN IEEE Transactions on Information Theory 2005-01-01

Federated learning is an emerging machine technique that enables distributed model training using local datasets from large-scale nodes, e.g., mobile devices, but shares only updates without uploading the raw data. This provides a promising privacy preservation for devices while simultaneously ensuring high performance. The majority of existing work has focused on designing advanced algorithms with aim to achieve better However, challenges, such as incentive mechanisms participating in and...

10.1109/jiot.2019.2940820 article EN IEEE Internet of Things Journal 2019-09-11

Crowdsensing offers an efficient approach to meet the demand in large scale sensing applications. In crowdsensing, it is of great interest find optimal task allocation, which challenging since tasks with different requirements quality are typically associated specific locations and mobile users constrained by time budgets. We show that allocation problem NP hard. then focus on approximation algorithms, devise local ratio based algorithm (LRBA). Our analysis shows aggregate rewards obtained...

10.1109/infocom.2014.6848001 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Thanks to the convergence of pervasive mobile communications and fast-growing online social networking, networking is penetrating into our everyday life. Aiming develop a systematic understanding networks, in this paper we exploit ties human networks enhance cooperative device-to-device (D2D) communications. Specifically, as handheld devices are carried by beings, leverage two key phenomena, namely trust reciprocity, promote efficient cooperation among devices. With insight, coalitional...

10.1109/tnet.2014.2329956 article EN IEEE/ACM Transactions on Networking 2014-06-19

In-home health monitoring has attracted great attention for the ageing population worldwide. With abundant user data accessed by Internet of Things (IoT) devices and recent development in machine learning, smart healthcare seen many successful stories. However, existing approaches in-home do not pay sufficient to privacy thus are far from being ready large-scale practical deployment. In this paper, we propose FedHome, a novel cloud-edge based federated learning framework monitoring, which...

10.1109/tmc.2020.3045266 article EN IEEE Transactions on Mobile Computing 2020-12-17

Mobile edge caching aims to enable content delivery within the radio access network, which effectively alleviates backhaul burden and reduces response time. To fully exploit storage resources, most popular contents should be identified cached. Observing that user demands on certain vary greatly at different locations, this paper devises location-customized schemes maximize total hit rate. Specifically, a linear model is used estimate future For case with zero-mean noise, ridge...

10.1109/tmm.2018.2870521 article EN IEEE Transactions on Multimedia 2018-09-17

Recent advances in artificial intelligence have driven increasing intelligent applications at the network edge, such as smart home, factory, and city. To deploy computationally intensive Deep Neural Networks (DNNs) on resource-constrained edge devices, traditional approaches relied either offloading workload to remote cloud or optimizing computation end device locally. However, cloud-assisted suffer from unreliable delay-significant wide-area network, local computing are limited by...

10.1109/tnet.2020.3042320 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2020-12-17

Metaverse encapsulates our expectations of the next-generation Internet, while bringing new key performance indicators (KPIs). Although conventional ultra-reliable and low-latency communications (URLLC) can satisfy objective KPIs, it is difficult to provide a personalized immersive experience that distinctive feature Metaverse. Since quality (QoE) be regarded as comprehensive KPI, URLLC evolved towards next generation (xURLLC) with resource allocation scheme achieve higher QoE. To deploy...

10.1109/jsac.2023.3280978 article EN IEEE Journal on Selected Areas in Communications 2023-06-05

Distributed learning is envisioned as the bedrock of next-generation intelligent networks, where agents, such mobile devices, robots, and sensors, exchange information with each other or a parameter server to train machine models collaboratively without uploading raw data central entity for centralized processing. By utilizing computation/communication capability individual distributed paradigm can mitigate burden at processors help preserve privacy users. Despite its promising applications,...

10.1109/jsac.2023.3242710 article EN IEEE Journal on Selected Areas in Communications 2023-02-06

We consider a cyber-physical system consisting of two interacting networks, i.e., cyber-network overlaying physical-network. It is envisioned that these systems are more vulnerable to attacks since node failures in one network may result (due the interdependence) other network, causing cascade would potentially lead collapse entire infrastructure. The robustness interdependent against this sort catastrophic failure hinges heavily on allocation (interconnecting) links connect nodes network....

10.1109/tpds.2012.62 article EN IEEE Transactions on Parallel and Distributed Systems 2012-02-07

Online dynamic security assessment (DSA) is examined in a data-mining framework by taking into account the operating condition (OC) variations and possible topology changes of power systems during horizon. Specifically, robust scheme proposed based on adaptive ensemble decision tree (DT) learning. In offline training, boosting algorithm employed to build classification model as weighted voting multiple unpruned small-height DTs. Then, DTs are periodically updated incorporating new training...

10.1109/tpwrs.2013.2266617 article EN IEEE Transactions on Power Systems 2013-06-26

The virtual multiple input output (MIMO) technique can dramatically improve the performance of a multi-cell distributed antenna system (DAS), thanks to its great potentials for inter-cell interference mitigation. One most challenging issues MIMO is acquisition channel state information at transmitter (CSIT), which usually leads an overwhelming amount overhead. In this work, we focus on case that only slowly-varying large-scale required transmitter, and explore gain be achieved by coordinated...

10.1109/jsac.2013.131009 article EN IEEE Journal on Selected Areas in Communications 2013-09-17

This paper investigates the relation between three different notions of privacy: identifiability, differential privacy, and mutual-information privacy. Under a unified privacydistortion framework, where distortion is defined to be expected Hamming distance input output databases, we establish some fundamental connections these privacy notions. Given maximum allowable D, define privacy-distortion functions ∈ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tit.2016.2584610 article EN publisher-specific-oa IEEE Transactions on Information Theory 2016-06-25

We study the problem of minimum-number full-view area coverage in camera sensor networks, i.e., how to select minimum number sensors guarantee a given region. Full-view is challenging because 2-D continuous domain has be considered. To tackle this challenge, we first intrinsic geometric relationship between and point prove that can guaranteed, as long selected ensuring set points covered. This leads significant dimension reduction for problem. Next, NP-hard propose two approximation...

10.1109/tvt.2015.2498281 article EN publisher-specific-oa IEEE Transactions on Vehicular Technology 2015-11-05

We study the diffusion of information in an overlaying social-physical network. Specifically, we consider following set-up: There is a physical network where spreads amongst people through conventional communication media (e.g., face-to-face communication, phone calls), and conjoint to this network, there are online social networks via web sites such as Facebook, Twitter, FriendFeed, YouTube, etc. quantify size critical threshold epidemics by assuming that diffuses according SIR epidemic...

10.1109/jsac.2013.130606 article EN IEEE Journal on Selected Areas in Communications 2013-05-17

A data mining approach using ensemble decision trees (DTs) learning is proposed for online dynamic security assessment (DSA), with the objective of mitigating impact possibly missing PMU data. Specifically, multiple small DTs are first trained offline a random subspace method. In particular, developed method exploits hierarchy wide-area monitoring system (WAMS), locational information attributes, and availability measurements, so as to improve overall robustness Then, performance re-checked...

10.1109/tpwrs.2013.2246822 article EN IEEE Transactions on Power Systems 2013-03-06

Wind ramps introduce significant uncertainty into wind power generation. Reliable system operation, however, requires accurate detection and forecast of ramps, especially at high penetration levels. In this paper, to deal with the ramp dynamics, a support vector machine (SVM)-enhanced Markov model is developed for short-term forecast, based on one key observation from measurement data that often occur specific patterns. Specifically, using historical turbine outputs recorded an actual farm,...

10.1109/tste.2015.2406814 article EN IEEE Transactions on Sustainable Energy 2015-04-08

Fault diagnosis in power grids is known to be challenging, due the massive scale and spatial coupling therein. In this study, we explore multiscale network inference for fault detection localization. Specifically, model phasor angles across buses as a Markov random field (MRF), where conditional correlation coefficients of MRF are quantified terms physical parameters systems. Based on model, then study decentralized diagnosis, through change localization matrix MRF. Particularly, based...

10.1109/tsg.2011.2129544 article EN IEEE Transactions on Smart Grid 2011-05-17

Multicast communications is an efficient mechanism for one-to-many transmissions over a broadcast wireless channel, and considered as key technology supporting emerging broadband multimedia services in the next generation networks, such Internet Protocol Television (IPTV), mobile TV, etc. Therefore, it critical to design multicast scheduling schemes support these services. In this paper, we propose cooperative scheme achieving reliable transmission IEEE 802.16 based metropolitan area...

10.1109/twc.2009.080417 article EN IEEE Transactions on Wireless Communications 2009-03-01

Smart meters, designed for information collection and system monitoring in smart grid, report fine-grained power consumption to utility providers. With these highly accurate profiles of energy usage, however, it is possible identify consumers' specific activities or behavior patterns, thereby giving rise serious privacy concerns. This paper addresses concerns by designing a cost-effective privacy-preserving management technique that uses rechargeable battery. From holistic perspective,...

10.1109/tsg.2014.2343611 article EN IEEE Transactions on Smart Grid 2014-08-12

In this paper, we study distributed opportunistic scheduling (DOS) in an ad hoc network, where many links contend for the same channel using random access. such a DOS involves process of joint probing and scheduling. Due to fading, link condition corresponding successful could be either good or poor. latter case, further probing, although at cost additional delay, may lead better conditions hence yield higher throughput. The desired tradeoff boils down judiciously choosing optimal stopping...

10.1109/tit.2008.2008137 article EN IEEE Transactions on Information Theory 2009-01-01

Integrating volatile renewable energy resources into the bulk power grid is challenging, due to reliability requirement that at each instant load and generation in system remain balanced. In this study, we tackle challenge for smart with integrated wind generation, by leveraging multi-timescale dispatch scheduling. Specifically, consider grids two classes of users - traditional opportunistic (e.g., meters or appliances), investigate pricing timescales, via day-ahead scheduling realtime...

10.1109/infcom.2011.5935204 preprint EN 2011-04-01

In wireless sensor networks, relay node placement has been proposed to improve energy efficiency. this paper, we study two-tiered constrained problems, where the nodes can be placed only at some prespecified candidate locations. To meet connectivity requirement, connected single-cover problem each is covered by a base station or (to which transmit data), and form network with stations. survivability 2-connected double-cover two stations nodes, We these problems under assumption that R \ge 2r...

10.1109/tmc.2011.126 article EN IEEE Transactions on Mobile Computing 2011-06-21

In this paper, short-term forecast of wind farm generation is investigated by applying spatio-temporal analysis to extensive measurement data collected from a large where multiple classes turbines are installed. Specifically, using the turbines' power outputs recorded across two consecutive years, graph-learning based carried out characterize statistical distribution and quantify level crossing rate farm's aggregate output. Built on these characterizations, finite-state Markov chains...

10.1109/tpwrs.2014.2299767 article EN IEEE Transactions on Power Systems 2014-06-19
Coming Soon ...