- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Caching and Content Delivery
- Graph Theory and Algorithms
- Advanced Data Storage Technologies
- Energy Harvesting in Wireless Networks
- Parallel Computing and Optimization Techniques
- Advanced Graph Neural Networks
- Network Security and Intrusion Detection
- Interconnection Networks and Systems
- Network Traffic and Congestion Control
- Advanced Optical Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Advanced MIMO Systems Optimization
- Software System Performance and Reliability
- Context-Aware Activity Recognition Systems
- Age of Information Optimization
- Cooperative Communication and Network Coding
- Blockchain Technology Applications and Security
- Advanced Memory and Neural Computing
- Distributed and Parallel Computing Systems
- Indoor and Outdoor Localization Technologies
Huazhong University of Science and Technology
2015-2024
Jilin University
2018-2022
State Key Laboratory of Supramolecular Structure and Materials
2022
Research Institute of Forestry
2013-2021
Chinese Academy of Forestry
2013-2021
State Forestry and Grassland Administration
2021
Beijing Jiaotong University
2010-2019
China University of Geosciences
2017-2018
Beijing Haidian Hospital
2018
Kunming University of Science and Technology
2015-2016
The focus of surveillance missions is to acquire and verify information about enemy capabilities positions hostile targets. Such often involve a high element risk for human personnel require degree stealthiness. Hence, the ability deploy unmanned missions, by using wireless sensor networks, great practical importance military. Because energy constraints devices, such systems necessitate an energy-aware design ensure longevity missions. Solutions proposed recently this type system show...
Extensive empirical studies presented in this paper confirm that the quality of radio communication between low power sensor devices varies significantly with time and environment. This phenomenon indicates previous topology control solutions, which use static transmission power, range, link quality, might not be effective physical world. To address issue, online adapts to external changes is necessary. presents ATPC, a lightweight algorithm Adaptive Transmission Power Control for wireless...
This article describes one of the major efforts in sensor network community to build an integrated system for surveillance missions. The focus this effort is acquire and verify information about enemy capabilities positions hostile targets. Such missions often involve a high element risk human personnel require degree stealthiness. Hence, ability deploy unmanned missions, by using wireless networks, great practical importance military. Because energy constraints devices, such systems...
Traditional standalone embedded system is limited in their functionality, flexibility, and scalability. Fog computing platform, characterized by pushing the cloud services to network edge, a promising solution support strengthen traditional system. Resource management always critical issue performance. In this paper, we consider fog supported software-defined system, where task images lay storage server while computations can be conducted on either device or computation server. It...
With the recent development in information and communication technology, more smart devices penetrate into people's daily life to promote quality. As a growing healthcare trend, medical cyber-physical systems (MCPSs) enable seamless intelligent interaction between computational elements devices. To support MCPSs, cloud resources are usually explored process sensing data from However, high quality-of-service of MCPS challenges unstable long-delay links center combat this issue, mobile edge...
A wide variety of sensors have been incorporated into a spectrum wireless sensor network (WSN) platforms, providing flexible sensing capability over large number low-power and inexpensive nodes. Traditional signal processing algorithms, however, often prove too complex for energy-and-cost-effective WSN This study explores how to design efficient classification algorithms that achieve reliable performance on energy-and-cost effective hardware without special powerful nodes in continuously...
Target tracking systems, consisting of thousands low-cost sensor nodes, have been used in many application domains such as battlefield surveillance, wildlife monitoring and border security. These applications need to meet certain real-time constraints response transient events, fast-moving targets. While the performance is a major concern these applications, it should be compatible with other important system properties energy consumption accuracy. Hence, desirable ability exploit tradeoffs...
Distributed sensor networks are quickly gaining recognition as viable embedded computing platforms. Current techniques for programming cumbersome, inflexible, and low-level. We introduce EnviroTrack, an object-based distributed middleware system that raises the level of abstraction by providing a convenient powerful interface to application developer geared towards tracking physical environment. EnviroTrack is novel in its seamless integration objects live time space into computational...
Power management is an important technique to prolong the lifespan of sensor networks. Many power-management protocols employ wake-up/sleep schedules, which are often complicated and inefficient. We present power schemes that eliminate such wake-up periods unless node indeed needs wake up. This type capability enabled by a new radio-triggered hardware component. evaluate potential saving in terms network application, using experiment data SPICE circuit simulations. Comparing result with...
With the advent of edge computing, it is highly recommended to extend some cloud services network such that can be provisioned in proximity end users, with better performance efficiency and cost efficiency. Compared computing has high dynamics, therefore resources shall correspondingly managed an adaptive way. Traditional model-based resource management approaches are limited practical application due involvement assumptions or prerequisites. We think desirable introduce a model-free...
Extensive empirical studies presented in this article confirm that the quality of radio communication between low-power sensor devices varies significantly with time and environment. This phenomenon indicates previous topology control solutions, which use static transmission power, range, link quality, might not be effective physical world. To address issue, online power adapts to external changes is necessary. presents ATPC, a lightweight algorithm for Adaptive Transmission Power Control...
The explosive growth of demands on big data processing imposes a heavy burden computation, storage, and communication in centers, which hence incurs considerable operational expenditure to center providers.Therefore, cost minimization has become an emergent issue for the upcoming era.Different from conventional cloud services, one main features services is tight coupling between computation as tasks can be conducted only when corresponding are available.As result, three factors, i.e., task...
Hosting virtualized network functions (VNF) has been regarded as an effective way to realize function virtualization (NFV). Considering the cost diversity in cloud computing, from perspective of service providers, it is significant orchestrate VNFs and schedule traffic flows for utility maximization (NUM) implies maximal revenue. However, traditional heuristic solutions based on optimization models usually follow some assumptions, limiting their applicability. Recent studies have shown that...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Federated Learning</i> (FL) is an emerging approach in edge computing for collaboratively training machine learning models among multiple devices, which aims to address limited bandwidth, system heterogeneity, and privacy issues traditional centralized training. However, the existing federated methods focus on a shared global model all may not always be ideal different devices. Such situations...
The development of a reliable large-scale wireless sensor network (WSN) is very difficult because resource constraints, energy budget, and demanding application requirements. Three OS features-OS protection, virtual memory, preemptive scheduling-can significantly improve the reliability WSN systems facilitate developing complex software. However, due to lack hardware support for privileged execution address translation, it impossible implement these features with traditional design...
Energy efficiency is a fundamental issue for outdoor sensor network systems. This article presents the design and implementation of multidimensional power management strategies in VigilNet, major recent effort to support long-term surveillance using power-constrained devices. A novel tripwire service integrated with an effective sentry duty cycle scheduling order increase system lifetime, collaboratively. The partitions into distinct, nonoverlapping sections allows each section be scheduled...
With the explosion of big data, processing large numbers continuous data streams, i.e., stream (BDSP), has become a crucial requirement for many scientific and industrial applications in recent years. By offering pool computation, communication storage resources, public clouds, like Amazon's EC2, are undoubtedly most efficient platforms to meet ever-growing needs BDSP. Public cloud service providers usually operate number geo-distributed datacenters across globe. Different datacenter pairs...
With the proliferation of automobile industry, vehicles are augmented with various forms increasingly powerful computation, communication, storage and sensing resources. A vehicle therefore can be regarded as "computer-on-wheels". such rich resources, it is great significance to efficiently utilize these This puts forward vision vehicular cloud computing. In this paper, we provide an extensive survey current computing research highlight several key issues architecture, inherent features,...
With the rising demands on cloud services, electricity consumption has been increasing drastically as main operational expenditure (OPEX) to data center providers. The geographical heterogeneity of prices motivates us study task placement problem over geo-distributed centers. We exploit dynamic frequency scaling technique and formulate an optimization that minimizes OPEX while guaranteeing quality-of-service, i.e, expected response time tasks. Furthermore, optimal solution is discovered for...
Network function virtualization (NFV) decouples the traditional network functions from specific or proprietary hardware, such that virtualized (VNFs) can run in software form. By exploring NFV, a consecutive set of VNFs constitute service chain (SFC) to provide service. From perspective providers, how maximize utility is always one major concerns. To this end, there are two main issues need be considered at runtime: 1) handle unpredictable traffic burst? and 2) fairly allocate resources...
DDoS attack is a major Internet security problem-DoS that lots of clients simultaneously send service requests to certain server on the internet such this too busy provide normal services for others. Attackers using legitimate packets and often changing package information, so traditional detection methods based feature descriptions difficult detect it. This paper present an artificial intelligence method neural networks. In method, analysis resources network traffic, To training ability or...
As Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task understand behavior patterns of end-hosts network applications. This paper presents a novel approach based on behavioral graph analysis study the similarity end-hosts. Specifically, we use bipartite graphs model host communications from build one-mode projections for discovering social-behavior By applying simple efficient clustering algorithms matrices coefficient projection graphs,...