Lin Gu

ORCID: 0000-0002-6525-9334
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Graph Theory and Algorithms
  • Advanced Data Storage Technologies
  • Energy Harvesting in Wireless Networks
  • Parallel Computing and Optimization Techniques
  • Advanced Graph Neural Networks
  • Network Security and Intrusion Detection
  • Interconnection Networks and Systems
  • Network Traffic and Congestion Control
  • Advanced Optical Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Advanced MIMO Systems Optimization
  • Software System Performance and Reliability
  • Context-Aware Activity Recognition Systems
  • Age of Information Optimization
  • Cooperative Communication and Network Coding
  • Blockchain Technology Applications and Security
  • Advanced Memory and Neural Computing
  • Distributed and Parallel Computing Systems
  • Indoor and Outdoor Localization Technologies

Huazhong University of Science and Technology
2015-2024

Jilin University
2018-2022

State Key Laboratory of Supramolecular Structure and Materials
2022

Research Institute of Forestry
2013-2021

Chinese Academy of Forestry
2013-2021

State Forestry and Grassland Administration
2021

Beijing Jiaotong University
2010-2019

China University of Geosciences
2017-2018

Beijing Haidian Hospital
2018

Kunming University of Science and Technology
2015-2016

The focus of surveillance missions is to acquire and verify information about enemy capabilities positions hostile targets. Such often involve a high element risk for human personnel require degree stealthiness. Hence, the ability deploy unmanned missions, by using wireless sensor networks, great practical importance military. Because energy constraints devices, such systems necessitate an energy-aware design ensure longevity missions. Solutions proposed recently this type system show...

10.1145/990064.990096 article EN 2004-06-06

Extensive empirical studies presented in this paper confirm that the quality of radio communication between low power sensor devices varies significantly with time and environment. This phenomenon indicates previous topology control solutions, which use static transmission power, range, link quality, might not be effective physical world. To address issue, online adapts to external changes is necessary. presents ATPC, a lightweight algorithm Adaptive Transmission Power Control for wireless...

10.1145/1182807.1182830 article EN 2006-10-31

This article describes one of the major efforts in sensor network community to build an integrated system for surveillance missions. The focus this effort is acquire and verify information about enemy capabilities positions hostile targets. Such missions often involve a high element risk human personnel require degree stealthiness. Hence, ability deploy unmanned missions, by using wireless networks, great practical importance military. Because energy constraints devices, such systems...

10.1145/1138127.1138128 article EN ACM Transactions on Sensor Networks 2006-02-01

Traditional standalone embedded system is limited in their functionality, flexibility, and scalability. Fog computing platform, characterized by pushing the cloud services to network edge, a promising solution support strengthen traditional system. Resource management always critical issue performance. In this paper, we consider fog supported software-defined system, where task images lay storage server while computations can be conducted on either device or computation server. It...

10.1109/tc.2016.2536019 article EN publisher-specific-oa IEEE Transactions on Computers 2016-02-29

With the recent development in information and communication technology, more smart devices penetrate into people's daily life to promote quality. As a growing healthcare trend, medical cyber-physical systems (MCPSs) enable seamless intelligent interaction between computational elements devices. To support MCPSs, cloud resources are usually explored process sensing data from However, high quality-of-service of MCPS challenges unstable long-delay links center combat this issue, mobile edge...

10.1109/tetc.2015.2508382 article EN publisher-specific-oa IEEE Transactions on Emerging Topics in Computing 2015-12-17

A wide variety of sensors have been incorporated into a spectrum wireless sensor network (WSN) platforms, providing flexible sensing capability over large number low-power and inexpensive nodes. Traditional signal processing algorithms, however, often prove too complex for energy-and-cost-effective WSN This study explores how to design efficient classification algorithms that achieve reliable performance on energy-and-cost effective hardware without special powerful nodes in continuously...

10.1145/1098918.1098941 article EN 2005-11-02

Target tracking systems, consisting of thousands low-cost sensor nodes, have been used in many application domains such as battlefield surveillance, wildlife monitoring and border security. These applications need to meet certain real-time constraints response transient events, fast-moving targets. While the performance is a major concern these applications, it should be compatible with other important system properties energy consumption accuracy. Hence, desirable ability exploit tradeoffs...

10.1109/rtas.2006.9 article EN 2006-04-28

Distributed sensor networks are quickly gaining recognition as viable embedded computing platforms. Current techniques for programming cumbersome, inflexible, and low-level. We introduce EnviroTrack, an object-based distributed middleware system that raises the level of abstraction by providing a convenient powerful interface to application developer geared towards tracking physical environment. EnviroTrack is novel in its seamless integration objects live time space into computational...

10.1109/icdcs.2004.1281625 article EN 2004-01-01

Power management is an important technique to prolong the lifespan of sensor networks. Many power-management protocols employ wake-up/sleep schedules, which are often complicated and inefficient. We present power schemes that eliminate such wake-up periods unless node indeed needs wake up. This type capability enabled by a new radio-triggered hardware component. evaluate potential saving in terms network application, using experiment data SPICE circuit simulations. Comparing result with...

10.1109/rttas.2004.1317246 article EN 2004-11-12

With the advent of edge computing, it is highly recommended to extend some cloud services network such that can be provisioned in proximity end users, with better performance efficiency and cost efficiency. Compared computing has high dynamics, therefore resources shall correspondingly managed an adaptive way. Traditional model-based resource management approaches are limited practical application due involvement assumptions or prerequisites. We think desirable introduce a model-free...

10.1109/mnet.2019.1800386 article EN IEEE Network 2019-05-01

Extensive empirical studies presented in this article confirm that the quality of radio communication between low-power sensor devices varies significantly with time and environment. This phenomenon indicates previous topology control solutions, which use static transmission power, range, link quality, might not be effective physical world. To address issue, online power adapts to external changes is necessary. presents ATPC, a lightweight algorithm for Adaptive Transmission Power Control...

10.1145/2746342 article EN ACM Transactions on Sensor Networks 2016-03-10

The explosive growth of demands on big data processing imposes a heavy burden computation, storage, and communication in centers, which hence incurs considerable operational expenditure to center providers.Therefore, cost minimization has become an emergent issue for the upcoming era.Different from conventional cloud services, one main features services is tight coupling between computation as tasks can be conducted only when corresponding are available.As result, three factors, i.e., task...

10.1109/tetc.2014.2310456 article EN IEEE Transactions on Emerging Topics in Computing 2014-03-11

Hosting virtualized network functions (VNF) has been regarded as an effective way to realize function virtualization (NFV). Considering the cost diversity in cloud computing, from perspective of service providers, it is significant orchestrate VNFs and schedule traffic flows for utility maximization (NUM) implies maximal revenue. However, traditional heuristic solutions based on optimization models usually follow some assumptions, limiting their applicability. Recent studies have shown that...

10.1109/jsac.2019.2959182 article EN IEEE Journal on Selected Areas in Communications 2019-12-12

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Federated Learning</i> (FL) is an emerging approach in edge computing for collaboratively training machine learning models among multiple devices, which aims to address limited bandwidth, system heterogeneity, and privacy issues traditional centralized training. However, the existing federated methods focus on a shared global model all may not always be ideal different devices. Such situations...

10.1109/tpds.2022.3225185 article EN cc-by-nc-nd IEEE Transactions on Parallel and Distributed Systems 2022-11-28

The development of a reliable large-scale wireless sensor network (WSN) is very difficult because resource constraints, energy budget, and demanding application requirements. Three OS features-OS protection, virtual memory, preemptive scheduling-can significantly improve the reliability WSN systems facilitate developing complex software. However, due to lack hardware support for privileged execution address translation, it impossible implement these features with traditional design...

10.1145/1182807.1182809 article EN 2006-10-31

Energy efficiency is a fundamental issue for outdoor sensor network systems. This article presents the design and implementation of multidimensional power management strategies in VigilNet, major recent effort to support long-term surveillance using power-constrained devices. A novel tripwire service integrated with an effective sentry duty cycle scheduling order increase system lifetime, collaboratively. The partitions into distinct, nonoverlapping sections allows each section be scheduled...

10.1145/1464420.1464429 article EN ACM Transactions on Sensor Networks 2009-02-01

With the explosion of big data, processing large numbers continuous data streams, i.e., stream (BDSP), has become a crucial requirement for many scientific and industrial applications in recent years. By offering pool computation, communication storage resources, public clouds, like Amazon's EC2, are undoubtedly most efficient platforms to meet ever-growing needs BDSP. Public cloud service providers usually operate number geo-distributed datacenters across globe. Different datacenter pairs...

10.1109/tc.2015.2417566 article EN IEEE Transactions on Computers 2015-03-29

With the proliferation of automobile industry, vehicles are augmented with various forms increasingly powerful computation, communication, storage and sensing resources. A vehicle therefore can be regarded as "computer-on-wheels". such rich resources, it is great significance to efficiently utilize these This puts forward vision vehicular cloud computing. In this paper, we provide an extensive survey current computing research highlight several key issues architecture, inherent features,...

10.1109/glocomw.2013.6825021 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2013-12-01

With the rising demands on cloud services, electricity consumption has been increasing drastically as main operational expenditure (OPEX) to data center providers. The geographical heterogeneity of prices motivates us study task placement problem over geo-distributed centers. We exploit dynamic frequency scaling technique and formulate an optimization that minimizes OPEX while guaranteeing quality-of-service, i.e, expected response time tasks. Furthermore, optimal solution is discovered for...

10.1109/tc.2014.2349510 article EN IEEE Transactions on Computers 2014-08-19

Network function virtualization (NFV) decouples the traditional network functions from specific or proprietary hardware, such that virtualized (VNFs) can run in software form. By exploring NFV, a consecutive set of VNFs constitute service chain (SFC) to provide service. From perspective providers, how maximize utility is always one major concerns. To this end, there are two main issues need be considered at runtime: 1) handle unpredictable traffic burst? and 2) fairly allocate resources...

10.1109/jsac.2019.2906746 article EN IEEE Journal on Selected Areas in Communications 2019-03-25

DDoS attack is a major Internet security problem-DoS that lots of clients simultaneously send service requests to certain server on the internet such this too busy provide normal services for others. Attackers using legitimate packets and often changing package information, so traditional detection methods based feature descriptions difficult detect it. This paper present an artificial intelligence method neural networks. In method, analysis resources network traffic, To training ability or...

10.1109/isac.2010.5670479 article EN 2010-11-01

As Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task understand behavior patterns of end-hosts network applications. This paper presents a novel approach based on behavioral graph analysis study the similarity end-hosts. Specifically, we use bipartite graphs model host communications from build one-mode projections for discovering social-behavior By applying simple efficient clustering algorithms matrices coefficient projection graphs,...

10.1109/tnet.2013.2264634 article EN IEEE/ACM Transactions on Networking 2013-06-05
Coming Soon ...