Lulu Chen

ORCID: 0000-0002-5108-8116
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Neural Networks Stability and Synchronization
  • Cloud Computing and Resource Management
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Advanced Data Storage Technologies
  • Nonlinear Dynamics and Pattern Formation
  • Complex Network Analysis Techniques
  • IoT and Edge/Fog Computing
  • Biometric Identification and Security
  • Caching and Content Delivery
  • Blind Source Separation Techniques
  • Mobile Ad Hoc Networks
  • Green IT and Sustainability
  • Advanced Computational Techniques and Applications
  • Software-Defined Networks and 5G
  • Parallel Computing and Optimization Techniques
  • Gene Regulatory Network Analysis
  • Photosynthetic Processes and Mechanisms
  • Machine Fault Diagnosis Techniques
  • Spam and Phishing Detection
  • Border Security and International Relations
  • Bayesian Methods and Mixture Models
  • Network Time Synchronization Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Digital Games and Media

Fudan University
2020-2024

University of Electronic Science and Technology of China
2019-2024

China Electronics Technology Group Corporation
2021-2022

China National Space Administration
2022

University of Reading
2020

China University of Petroleum, Beijing
2020

Xi'an High Tech University
2017

Virginia Tech
2017

Anhui University
2009-2013

Anhui University of Traditional Chinese Medicine
2011

The edge-cloud hybrid environment requires complex deployment strategies to enable the smart Internet-of-Things (IoT) system. However, current service use simple, generalized heuristics and ignore heterogeneous characteristics in environment. In this article, we devise a method find microservice-based strategy that can reduce average waiting time of IoT devices For purpose, first propose problem (MSDP) based on dynamic environment, including heterogeneity edge server capacities, geographical...

10.1109/jiot.2020.3014970 article EN IEEE Internet of Things Journal 2020-08-07

The wide deployment of advanced robots with industrial IoT (IIoT) technologies in smart factories generates a large volume data during production and variety processing workloads are launched to maintain productivity safety manufacture. emerging fog computing paradigm offers promising solution enhancing performance factory environment while on the other hand brings new challenges resource management, which call for more effective approach recommending configurations heterogeneous workloads....

10.1109/tase.2022.3141590 article EN IEEE Transactions on Automation Science and Engineering 2022-01-21

While non-negative blind source separation (nBSS) has found many successful applications in science and engineering, model order selection, determining the number of sources, remains a critical yet unresolved problem. Various selection methods have been proposed applied to real-world data sets but with limited success, both over- under-estimation reported. By studying existing schemes, we that unsatisfactory results are mainly due invalid assumptions, oversimplification, subjective...

10.1109/tnnls.2017.2749279 article EN IEEE Transactions on Neural Networks and Learning Systems 2017-10-03

Edge computing can provide high bandwidth and low-latency service for big data tasks by leveraging the edge side's computing, storage, network resources. With development of microservice docker technology, providers flexibly dynamically cache at side to respond efficiently with limited Automatically caching needed services on nearest nodes scheduling users' requests realize that power software flow users continuous services. However, achieving goal needs overcome many challenges, such as...

10.1109/jiot.2021.3119181 article EN IEEE Internet of Things Journal 2021-10-11

As a new distributed machine learning (ML) framework for privacy protection, federated (FL) enables substantial Internet of Things (IoT) devices (e.g., mobile phones, tablets, etc.) to participate in collaborative training an ML model. FL can protect the data IoT without exposing their raw data. However, diversity may degrade overall process due straggler issue. To tackle this problem, we propose gear-based asynchronous (AsyFed) architecture. It adds gear layer between clients and server as...

10.1109/jiot.2022.3231913 article EN IEEE Internet of Things Journal 2022-12-26

Dear editor, This letter puts forward a secure feedback control scheme to bipartite tracking consensus for set of generic linear autonomous agents subject aperiodic and unknown denial-of-service (DoS) attacks. In contrast the DoS attack model that disables all transmission channels simultaneously, we are concerned with general independent attacks over each channel. Such malicious not only destroy connectivity underlying network, but also induce dynamic reachable information. A time-varying...

10.1109/jas.2022.105758 article EN IEEE/CAA Journal of Automatica Sinica 2022-08-01

Byte-addressable Persistent Storage (BPS), such as persistent memory and CXL-enabled SSDs, has become an extension of main memory. This opens up new possibilities for indexes that operate persist data directly on the bus. Recent learned exploit distribution have shown great potential some workloads. Despite work proposed integrating into BPS, they are mainly based Intel's first-generation The current design suffers from following problems: 1) Excessive storage line accesses due to large node...

10.1145/3673038.3673113 article EN 2024-08-08

Pervasive and useR fOcused biomeTrics bordEr projeCT (PROTECT) is an EU project funded by the Horizon 2020 research Innovation Programme. The main aim of PROTECT was to build advanced biometric-based person identification system that works robustly across a range border crossing types has strong user-centric features. This work presents case study multibiometric verification developed within PROTECT. been be suitable for different borders such as air, sea, land borders. covers two use cases:...

10.1049/iet-bmt.2020.0033 article EN IET Biometrics 2020-09-24

Bipartite consensus is a common collective behavior emerging from multiagent systems (MASs) when cooperative and hostile relationships are present simultaneously in the interaction network. The main focus of this study problem bipartite for high-order MASs subject to asynchronous communications, where instants each agent derive information neighboring agents adjust its state determined by exclusive clock. Through construction augmented system, we establish algebraic graph conditions...

10.1109/tnse.2021.3110846 article EN IEEE Transactions on Network Science and Engineering 2021-09-08

Abstract This paper reports a new method for determination of VB6 (pyridoxine hydrochloride) by its perturbation effects on novel Belousov-Zhabotinskii (BZ) oscillating system. BZ system, in which malic acid serves as the substrate, contains an enzyme-like complex, macrocyclic complex {[CuL](ClO4)2}, catalyst. The ligand L is 5,7,7,12,14,14-hexamethyl-1,4,8,11-tetraazacyclotetradeca-4,11-diene. Results show that addition pyridoxine hydrochloride can perturb oscillation amplitude and period,...

10.2478/s11532-013-0383-4 article EN Open Chemistry 2013-12-20

New hardware, such as SmartNICs, has been released to offload network applications in data centers. Off-path a type of multi-core SoC have attracted the attention many researchers. Unfortunatelly, they lack fully exploration off-path SmartNICs. In this paper, we use BlueField SmartNIC an example conduct systematical study on advantages and disadvantages We make detailed performance characterization including computing power communication overhead, propose following advices: 1) Directly...

10.48550/arxiv.2301.06070 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Continuous wave (CW) mud pulse telemetry technology has high-speed real-time data transmission that is widely used in drilling and logging measurements. It important to effectively eliminate the strong pump noise with frequency-variant channel extract extremely weak signal which carries downhole information. In this paper, an adaptive cancellation (ANC) system for processing designed based on main auxiliary dual sensors. addition, improved variable step-size iteration algorithm proposed a...

10.1109/icca51439.2020.9264449 article EN 2022 IEEE 17th International Conference on Control & Automation (ICCA) 2020-10-09

Fine-tuning pre-trained models with task-specific data can produce customized effective for downstream tasks. However, operating large-scale such fine-tuning tasks in real time the center faces non-trivial challenges, including unpredictable task arrival and system environment dynamics, complex deadline-driven scheduling, intertwined pricing cost management. In this paper, targeting popular Low-Rank Adaptation (LoRA) technique, we present design study of a novel auction-based mechanism to...

10.1145/3673038.3673083 article EN other-oa 2024-08-08

10.1109/icarcv63323.2024.10821706 article EN 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV) 2024-12-12

Multiple Intelligence Theory has innovated and improved the Previous Theory. It stressed multiplity, development, collaboration, diversity construction of intelligence development. This new perspective brings us inspiration for our designing game-learning. paper analyzed education superiority role playing game-learning, discussed its design flow from multi-dimensional theory. Combing characteristics game, aiming at constructing an game environment which can promote development intelligence,...

10.1109/fie.2007.4417941 article EN Proceedings/Proceedings - Frontiers in Education Conference 2007-10-01

In this study, we focus on the bipartite containment control of a group networked agents with general linear dynamics and antagonistic interactions in DoS attack environment. Under attacks, communication links at each time change quite dynamically, which are captured by dynamic signed digraphs. By introducing transformation vectors designing feedback matrix, new time-varying augmented system is derived. Main analytical tools including edge composition properties related to product...

10.1109/spac53836.2021.9539956 article EN 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC) 2021-06-18
Coming Soon ...