Tao Zhang

ORCID: 0000-0002-4834-9442
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Genetic Associations and Epidemiology
  • Quantum optics and atomic interactions
  • Interconnection Networks and Systems
  • Satellite Communication Systems
  • Software System Performance and Reliability
  • Advanced Image and Video Retrieval Techniques
  • Robotics and Automated Systems
  • Cloud Data Security Solutions
  • Telecommunications and Broadcasting Technologies
  • Green IT and Sustainability
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Energy Efficient Wireless Sensor Networks
  • Wireless Sensor Networks and IoT
  • Caching and Content Delivery
  • Video Analysis and Summarization
  • Blockchain Technology Applications and Security
  • Social Robot Interaction and HRI
  • Indoor and Outdoor Localization Technologies
  • Innovative Human-Technology Interaction
  • Ideological and Political Education
  • Forensic and Genetic Research

Ministry of Public Security of the People's Republic of China
2011-2021

Wuhan University
2016

National Administration of Surveying, Mapping and Geoinformation of China
2016

Institute of Forensic Science
2015

China Electric Power Research Institute
2013

North China Electric Power University
2013

University of Science and Technology of China
2009

Hubei Normal University
2008

Quantum key distribution (QKD) networks have recently attracted growing attention. The topology of the local QKD network is basis next-generation global secure communication network. In this letter, we report a realization wavelength-routing star type which can span metropolis using commercial backbone optical fiber without trusted relays. longest and shortest lengths between two geographically separated nodes are 42.6 32 km, respectively, maximum average quantum bit-error rate below 8%. A...

10.1109/lpt.2009.2015058 article EN IEEE Photonics Technology Letters 2009-02-26

Robots, as the creation of humans, became an irreplaceable component in human society. With advancement technologies, robots have become more and intelligent been widely used many fields, such disease diagnosis, customer services, healthcare for older people, so on. As made our lives much convenient than ever before, they also brought potential risks challenges technology, security, ethic. To better understand development robots, we proposed a concept robot's living space analyzed role In...

10.1016/j.dcan.2020.12.001 article EN cc-by-nc-nd Digital Communications and Networks 2020-12-11

Structural health monitoring with wireless sensor networks has been increasingly popular in recent years because of the convenience. In this paper, a real-time system for cracks on surface reactor containment buildings is presented. Customized platforms are designed and implemented sensors especially crack monitoring, which include crackmeters temperature detectors. Software protocols like route discovery, time synchronization data transfer developed to satisfy requirements stay simple at...

10.3390/s16060883 article EN cc-by Sensors 2016-06-14

Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components next-generation wireless networks. This paper focuses on influences different strategies Device-to-Device (D2D) We model D2D User Equipments (DUEs) Gauss determinantal point process considering repulsion between DUEs, well replacement a many-to-many matching game. By analyzing existing placement strategies, new strategy proposed, which...

10.26599/tst.2020.9010044 article EN Tsinghua Science & Technology 2021-06-09

Reducing the delay-sensitive Short Flows Completion Time (SFCT) is a hot topic in data center networks, and prioritizing short flows an effective way to do that. However, precisely identifying flow still challenge, which makes many proposed schemes unfeasible commodity switch. The often have small Congestion Window (CWND) due their sizes, thus CWND can be used as coarse metric identify flows. Based on this idea, Low Delay Data Center Transport Control Protocol (LD-DCTCP) proposed. When...

10.1109/access.2019.2956119 article EN cc-by IEEE Access 2019-01-01

The firewall is one of the most important network security facility and widely used as a base infrastructure in large enterprise network. When policy changes, administrator must find all potential conflicts between existing policies to ensure security. That's waste time energy. Proceeding from demands, this paper analyzes key points difficulties design process for tools, applies mature algorithm conflict detection, finally proposes flexible scalable design. prototype system proves that tool...

10.4028/www.scientific.net/amm.433-435.1597 article EN Applied Mechanics and Materials 2013-10-15

With the rapid development of network and multimedia technologies, a large number image databases have been produced, data has experiencing an exponential growth. Meanwhile, requirement for searching images, i.e. retrieval in is hot issue. Many traditional methods search images accurately according to feature vector image, but this method computationally expensive. The most famous improved solution Locality Sensitive Hashing (LSH, Hashing) which sacrifices some accuracy improve efficiency....

10.1109/iccc51575.2020.9345175 article EN 2020-12-11

With the integration of various smart devices (smartphones, laptops, desktops, etc.) into people's lives, some traditional user tracking methods such as cookies, browser fingerprints, etc. have become ineffective. There is an urgent need for a new paradigm that can track users across browsers and devices. In particular, we propose architecture cross-device tracking. We exploit physical behavioral characteristics to discover more about users' habits, build corresponding user-device pairs...

10.1016/j.procs.2021.04.036 article EN Procedia Computer Science 2021-01-01
Coming Soon ...