- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Mobile Crowdsensing and Crowdsourcing
- Speech and Audio Processing
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Iterative Learning Control Systems
- Analog and Mixed-Signal Circuit Design
- Industrial Technology and Control Systems
- Advanced Sensor and Control Systems
- Auction Theory and Applications
- Quantum Information and Cryptography
- X-ray Diffraction in Crystallography
- Advancements in PLL and VCO Technologies
- Crystallization and Solubility Studies
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Interconnection Networks and Systems
- Advanced SAR Imaging Techniques
- Speech Recognition and Synthesis
- Context-Aware Activity Recognition Systems
- Optical Network Technologies
- Indoor and Outdoor Localization Technologies
- Image and Video Quality Assessment
Beijing Institute of Technology
2006-2025
Shanghai Institute of Technology
2024
Hohai University
2022-2024
Dalian Municipal Central Hospital
2024
Dalian University of Technology
2019-2024
Kuaishou (China)
2024
Hebei University
2009-2024
Dalian University of Foreign Languages
2023
Chinese Academy of Sciences
2011-2023
China Machine Press
2023
Network Function Virtualization (NFV) has been emerging as an appealing solution that transforms complex network functions from dedicated hardware implementations to software instances running in a virtualized environment. Due the numerous advantages such flexibility, efficiency, scalability, short deployment cycles, and service upgrade, NFV widely recognized next-generation provisioning paradigm. In NFV, requested is implemented by sequence of Virtual Functions (VNF) can run on generic...
Mobile edge computing (MEC) offers a way to shorten the cloud servicing delay by building small-scale infrastructures, such as cloudlets at network edge, which are in close proximity end users. On one hand, it is energy consuming and costly place each cloudlet on access point (AP) process requested tasks. other service provider should provide delay-guaranteed users, otherwise they may get revenue loss. In this paper, we first model how calculate task completion MEC mathematically analyze...
The efficacy of Network Function Virtualization (NFV) depends critically on (1) where the virtual network functions (VNFs) are placed and (2) how traffic is routed. Unfortunately, these aspects not easily optimized, especially under time-varying states with different QoS requirements. Given importance NFV, many approaches have been proposed to solve VNF placement Service Chaining (SFC) routing problem. However, those prior mainly assume that state static known, disregarding dynamic...
Hydraulic exoskeleton with human-robot interaction becomes an important solution for those heavy load carrying applications. Good human motion intent inference and accurate trajectory tracking are two challenging issues the control of these systems, especially hydraulically actuated where nonlinear dynamics is quite complicated various uncertainties exist. However, robust performance to model has been ignored in most existing research. To regulate problems, adaptive cascade force strategy...
With the proliferation of Internet Things (IoT), zillions bytes data are generated at network edge, incurring an urgent need to push frontiers artificial intelligence (AI) edge so as fully unleash potential IoT big data. To materialize such a vision which is known intelligence, federated learning emerging promising solution enable nodes collaboratively learn shared model in privacy-preserving and communication-efficient manner, by keeping nodes. While pilot efforts on have mostly focused...
Since the number of cars has grown rapidly in recent years, driving safety draws more and public attention. Drowsy is one biggest threatens to safety. Therefore, a simple but robust system that can detect drowsy with commercial off-the-shelf devices (such as smart-phones) very necessary. With this motivation, we explore feasibility purely using acoustic sensors embedded smart-phones driving. We first study characteristics driving, find some unique patterns Doppler shift caused by three...
Mobile devices are promising to apply two-factor authentication in order improve system security and enhance user privacy-preserving. Existing solutions usually have certain limits of requiring some form effort, which might seriously affect experience delay time. In this paper, we propose PPGPass, a novel mobile system, leverages Photoplethysmography (PPG) sensors wrist-worn wearables extract individual characteristics PPG signals. realize both nonintrusive secure, design two-stage algorithm...
Recently, crowdsensing revolutionizes sensing paradigm in Internet of Things (IoTs). However, a practical incentive mechanism which works for time-varying scenario and fairly incentivizes users to participate is less studied. In this paper, we propose an under continuous using three-stage Stackelberg game. such scenario, different requesters generate tasks with payments the platform at each time slot. The makes pricing decision determine rewards without complete information, then notifies...
Abstract Pipeline structures are widely used in industry, but the increase service life may lead to damage pipeline structure, bringing economic losses. Ultrasonic Guided Wave has been for accurate detection of structures. However, temperature variations can also changes guided wave signals. In order reduce influence brought by external environment, this paper proposes a dual-signal reconstruction method based on empirical modal decomposition. By simultaneously performing mode decomposition...
Spectrum-sliced elastic optical path (SLICE) technology offers a more flexible bandwidth allocation in networks than wavelength division multiplexing. It allows different connections to be served via modulation formats. However, as with any network, the signal may susceptible impairments, especially when traverses over long distances. The degree of impairment differ per type, but case must taken into account. If levels get too high, needs regenerated by regenerators placed selectively (due...
Classroom activity detection (CAD) focuses on accurately classifying whether the teacher or student is speaking and recording both length of individual utterances during a class. A CAD solution helps teachers get instant feedback their pedagogical instructions. This greatly improves educators' teaching skills hence leads to students' achievement. However, very challenging because (1) model needs be generalized well enough for different students; (2) data from vocal language modalities has...
Inputting a pattern or PIN code on the touch screen is popular method to prevent unauthorized access mobile devices. However, these sensitive tokens are highly susceptible being inferred by various types of side-channel attacks, which can compromise security private data stored in device. This paper presents second-factor authentication method, TouchPrint, relies user's hand posture shape traits (dependent individual different type and unique geometry biometrics) when user inputs pattern. It...
The safety of the elderly has attracted much attention nowadays. Among various daily activities, fall is one most dangerous events for elderly, especially those who live alone. Most existing works on detection are based wearable devices, which inconvenient in using. Several solutions only use coarse-grained Wi-Fi signal information that contains many biases, and lack considerations environmental changes. These situations motivate us to design a fine-grained robust approach. In this article,...
With the rapid development of Internet, more and computing-intensive applications with high requirements on computing delay energy consumption have emerged. Recently, use mobile-edge servers for auxiliary is considered as an effective way to reduce latency consumption. In addition, such autonomous driving will generate a large number repetitive tasks. Using cache store computational results popular tasks can avoid overhead caused by processing. this article, we study problem computation...
Recent years have witnessed video streaming gradually evolve into one of the most popular Internet applications. With rapidly growing personalized demand for real-time services, maximizing their Quality Experience (QoE) is a long-standing challenge. The emergence serverless computing paradigm has potential to meet this challenge through its fine-grained management and highly parallel structures. However, it still ambiguous how implement configure components optimize services. In paper, we...
ICN architectures use pull-based communication with single interest response pairs. Content retrieval using this model is very efficient when the content already exists in network. Subscription services for that being dynamically generated or will be future, do not work well pull based systems. In we investigate as a publisher-subscriber enabler, and present its challenges limitations. Based on observations, propose group-based subscription architecture, which enables only seamless model,...