Yingyou Wen

ORCID: 0000-0002-6659-1785
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Indoor and Outdoor Localization Technologies
  • Network Security and Intrusion Detection
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Underwater Vehicles and Communication Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Context-Aware Activity Recognition Systems
  • Mobile Agent-Based Network Management
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Security and Verification in Computing
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • Image Processing Techniques and Applications
  • Energy Harvesting in Wireless Networks
  • Cloud Data Security Solutions
  • Peer-to-Peer Network Technologies
  • Distributed systems and fault tolerance
  • Advanced Authentication Protocols Security
  • Video Surveillance and Tracking Methods
  • Data Stream Mining Techniques

Northeastern University
2012-2024

Neusoft (China)
2007-2024

Universidad del Noreste
2023

Northeastern University
2006-2014

Ministry of Education of the People's Republic of China
2014

China Jiliang University
2007

Zhejiang University
2007

Software602 (Czechia)
2007

Smartphone-based pedestrian dead-reckoning (PDR) has become promising in indoor localization since it locates users with a smartphone only. However, existing PDR approaches are still facing the problem of accumulated errors due to low-cost noisy sensors and complicated human movements. This paper presents novel algorithm combined online sequential extreme learning machine (OS-ELM). By analyzing process localization, this first formulates as an approximation function, then,...

10.1109/access.2018.2791579 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract Large language models have achieved outstanding performance on various downstream tasks with their advanced understanding of natural and zero-shot capability. However, they struggle knowledge constraints, particularly in requiring complex reasoning or extended logical sequences. These limitations can affect question answering by leading to inaccuracies hallucinations. This paper proposes a novel framework called KnowledgeNavigator that leverages large graphs achieve accurate...

10.1007/s40747-024-01527-8 article EN cc-by Complex & Intelligent Systems 2024-07-02

10.32604/cmc.2025.063676 article EN Computers, materials & continua/Computers, materials & continua (Print) 2025-01-01

In recent years, with the development of cloud computing technology, size a data center is expanding rapidly. To minimize energy consumption center, we propose an energy-efficient virtual resource dynamic integration (VRDI) method. proposed VRDI method, first, by monitoring load patterns physical machines (PMs) and corresponding thresholds PMs calculated using statistical data, PM selection algorithm to find set PMs, which should be integrated. Furthermore, machine (VM) based on minimum...

10.1109/access.2017.2721548 article EN cc-by-nc-nd IEEE Access 2017-01-01

This paper studies the performance of large-scale cache-enabled device-to-device (D2D) networks with homogeneous Poisson point process distributed mobile helpers(MHs) and user equipments (UEs). The MHs are assumed to have caching capabilities able serve random requests from UEs within collaboration distance D2D transmission. To avoid collisions among concurrent transmissions, a contention-based multimedia delivery protocol is proposed, under which MH allowed transmit only if its back-off...

10.1109/access.2017.2664807 article EN cc-by-nc-nd IEEE Access 2017-01-01

Moving target tracking in wireless sensor networks is of paramount importance. This paper considers the problem state estimation for L-sensor linear dynamic systems. Firstly, establishes fuzzy model measurement condition estimation. Then, Generalized Kalman Filter design performed to incorporate novel neighborhood function and motion information, improving with an increasing number active sensors. The proposed selection approach has some advantages time cost. As such, if desired accuracy...

10.3390/s16010029 article EN cc-by Sensors 2016-01-02

Multi-channel communication in a Wireless Mesh Network with routers having multiple radio interfaces significantly enhances the network capacity. Efficient channel assignment is critical for realization of optimal throughput such networks. In this paper, we investigate problem finding largest number links that can be connected overall interference minimized. Since radios on any node less than available channels, must obey constraint different channels assigned to incident at most node. The...

10.1145/1543834.1543841 article EN 2009-06-12

With the surge service requirements from vehicular users, especially for automated driving, providing real-time high-rate wireless connections to fast-moving vehicles is ever demanding. This motivates development of emerging LTE-V network, a 5G cellular-based technology. However, note that user group typically very large scale, whereas bandwidth spectrum available communications limited. To efficiently allocate and utilize slim resource vehicle users are therefore important. paper develops...

10.1109/tits.2018.2850311 article EN IEEE Transactions on Intelligent Transportation Systems 2018-07-26

This letter introduces our initial results of target coverage model in wireless visual sensor networks (WVSNs). In this letter, we develop the Q-coverage for detection which is a basis application WVSNs, and propose novel degree (CD)-coverage model. First, present new concept CD-coverage formulate problem. Further, harmony search-based coverage-enhancing (HS-CE) approach to obtain an approximate optimal solution The extensive simulations show validity HS-CE approach.

10.1109/lwc.2019.2894667 article EN IEEE Wireless Communications Letters 2019-01-24

Legal judgment prediction (LJP) is a crucial task in legal intelligence to predict charges, law articles and terms of penalties based on case fact description texts. Although existing methods perform well, they still have many shortcomings. First, the significant limitations understanding long documents, especially those RNNs BERT. Secondly, are not good at solving problem similar charges do fully effectively integrate information articles. To address above problems, we propose novel LJP...

10.3390/app12052531 article EN cc-by Applied Sciences 2022-02-28

To extend the lifetime of sensor networks as far possible while maintaining quality network coverage is a major concern in research control. A systematical analysis on relationship between and cover sets alternation given, by introducing concept time weight factor, maximization model presented. Through introduction solution granularity T, optimization problem transformed into sets. based NSGA-II proposed. Compared with previous method, which has additional requirement that being disjoint...

10.1145/1543834.1543842 article EN 2009-06-12

Wireless sensor networks are new integrative technologies arising from the development of wireless communication and tiny sensors. With reduction power consumption cost instruments maintenances, it's ready to install over large-scale traffic areas monitor roads in a much fine way, which is certain bring some breakthroughs field monitoring. Surveying vehicle detecting nodes, networks, forecasting algorithms architecture, this paper gives full view application monitoring systems. The key...

10.1061/40932(246)340 article EN 2007-07-09

Wireless visual sensor networks (WVSNs) comprise a large number of camera-equipped sensors, which are often deployed densely to gain enhanced observations in field interest. Therefore, there exists abundant image redundancy caused by the content correlation (ICC) between cameras with overlapped views (FoVs). Image compression is an important method remove redundancy. Aiming at problem compression, this paper designs 3-D compression-oriented ICC (3D-COICC) model for WVSNs quantitatively...

10.1109/jsen.2018.2847332 article EN IEEE Sensors Journal 2018-06-14

Wireless Sensor Networks (WSNs) are vulnerable to various localization attacks where attackers intended provide improper beacons or manipulate the location determination. Attack classification for in WSNs is not only condition, prerequisite and premise of threat analysis, but, m ore significantly, a vital part security anomaly detection. In this paper, attack recognition method using deep learning architecture was proposed. To enhance performance, good feature representation established...

10.3233/jifs-169677 article EN Journal of Intelligent & Fuzzy Systems 2018-06-19

The target selection algorithm of passive worms makes them difficult to detect, and therefore they threaten the Internet greatly. Modeling propagation can provide profound insight into worm behavior. In this paper we present a mathematical model named as (PWP) model. Based on two-factor model, it represents worms. simulation indicates that spread is governed by initial value worms, infectious rate removal time delay. We also analyze feasibility one kind benign To best our knowledge, there no...

10.1109/iccgi.2007.48 article EN 2007-03-01
Coming Soon ...