- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Energy Efficient Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Cloud Data Security Solutions
- Wireless Networks and Protocols
- Cryptography and Data Security
- Cooperative Communication and Network Coding
- Vehicular Ad Hoc Networks (VANETs)
- Image and Video Quality Assessment
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Caching and Content Delivery
- Blockchain Technology Applications and Security
- Stochastic Gradient Optimization Techniques
- Sparse and Compressive Sensing Techniques
- Software-Defined Networks and 5G
- Distributed and Parallel Computing Systems
- Underwater Vehicles and Communication Systems
- Visual Attention and Saliency Detection
- Full-Duplex Wireless Communications
- Smart Parking Systems Research
- Data Management and Algorithms
- Advanced Wireless Network Optimization
Shenzhen University
2019-2024
City University of Hong Kong
2011-2016
Beijing University of Posts and Telecommunications
2009
Data access control is an effective way to ensure data security in the cloud. However, due outsourcing and untrusted cloud servers, becomes a challenging issue storage systems. Existing schemes are no longer applicable systems, because they either produce multiple encrypted copies of same or require fully trusted server. Ciphertext-policy attribute-based encryption (CP-ABE) promising technique for data. inefficiency decryption revocation, existing CP-ABE cannot be directly applied construct...
Compressive sensing (CS) can reduce the number of data transmissions and balance traffic load throughout networks. However, total for collection by using pure CS is still large. The hybrid method was proposed to in sensor previous works use on routing trees. In this paper, we propose a clustering that uses nodes are organized into clusters. Within cluster, transmit cluster head (CH) without CS. CHs sink. We first an analytical model studies relationship between size clusters method, aiming...
Due to the high volume and velocity of big data, it is an effective option store data in cloud, because cloud has capabilities storing processing user access requests. Attribute-Based Encryption (ABE) a promising technique ensure end-to-end security cloud. However, policy updating always been challenging issue when ABE used construct control schemes. A trivial implementation let owners retrieve re-encrypt under new policy, then send back This method incurs communication overhead heavy...
With the recent development of wireless communication, sensing, and computing technologies, Internet Vehicles (IoV) has attracted great attention in both academia industry. Nevertheless, it is challenging to process time-critical tasks due unique characteristics IoV, including heterogeneous computation communication capacities network nodes, intermittent connections, unevenly distributed workload, massive data transmission, intensive demands, high mobility vehicles. In this article, we...
Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public to verify integrity outsourced on behalf users. To resist malicious TPAs, many blockchain-based verification proposed. However, existing rely a centralized TPA, and they are vulnerable tempting auditors who may collude blockchain miners produce biased results. In this article, we propose decentralized (BDPA)...
Mobile edge computing provides users with low response time and avoids unnecessary data transmission. Due to the deployment of 5G, emerging systems can provide gigabit bandwidth. However, network protocols have not evolved together. In TCP, initial congestion window (IW) is such a value that most short flows still stay in slow start phase when finishing, do fully utilize available Naively increasing IW may result congestion, which causes long latency. Moreover, since environment dynamic, we...
Cloud computing is an emerging computational infrastructure for cost-efficient workflow execution that provides flexible and dynamically scalable resources at pay-as-you-go pricing. Workflow scheduling, as a typical NP-Complete problem, one of the major issues in cloud computing. However, scenario with unlimited resources, how to generate efficient economical scheduling scheme under deadline constraint still extraordinary challenge. In this paper, we propose hybrid heuristic algorithm called...
In the data center, a server can work in either active state or power-saving state. The power consumption is almost 0, thus it always desirable to allocate as many VMs possible some servers and leave rest order reduce energy of center. this paper, we study such VM allocation problem. Given set each has resource demand (CPU, memory, storage) starting time finishing time, capacity. There an additional cost for switch from are non-homogeneous. problem our concern onto servers, that demands be...
Virtual machine migration has been touted as one of the crucial technologies in improving data center efficiency, such reducing energy cost and maintaining load balance. However, traditional approaches could not avoid service interruption completely. Moreover, they often result longer delay are prone to failures. In this paper, we leverage emerging named networking (NDN) design an efficient robust protocol support seamless virtual cloud center. Specifically, machines (VMs) with services...
Compressive sensing (CS) can reduce the number of data transmissions and balance traffic load throughout networks. However, total required in CS method is still large. It observed that there are many zero elements measurement matrix. In each round transmission method, sensor nodes corresponding to matrix do not have their own transmit. To further network, we aim compute a gathering tree by taking advantages these matrix, such minimized. We formulate problem as linear programming with boolean...
The emerging vehicular ad hoc network (VANET) enables vehicles to access the Internet through roadside points (APs). An important issue in system deployment is determining how many APs shall be installed on a road. However, existing works fail provide rigorous and accurate analysis for VANETs. In this paper, we propose general structure It allows both real-time traffic delay-tolerant delivered users most efficient ways. analytical model also proposed analyze performance with random arrival...
Many big-data computing applications have been deployed in cloud platforms. These normally demand concurrent data transfers among nodes for parallel processing. It is important to find the best transfer scheduling leading least retrieval time-the maximum throughput other words. However, existing methods cannot achieve this, because they ignore link bandwidths and diversity of replicas paths. In this paper, we aim develop a max-throughput minimize time applications. Specifically, problem...
Recently, deep learning has been used to tackle mobile sensing problems, and the inference phase of is preferred be run on devices for speedy responses. However, are resource-constrained platforms both computation power. Moreover, an task with involves tens billions mathematical operations millions parameter reads. Thus, it a critical issue reduce energy consumption algorithms. In this article, we survey various reduction approaches, classify them into three categories: compressing neural...
The coexistence of heterogeneous devices in wireless networks brings a new topic on cross-technology communication (CTC) to improve the efficiency and boost collaboration among these devices. Current advances CTC mainly fall into two categories, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">physical-layer CTC</i> xmlns:xlink="http://www.w3.org/1999/xlink">packet-level energy modulation</i> (PLEM). achieves high data rate, but with channel...
Towards the large amount of data generated everyday, selective sharing and acquisition is one most significant services in cloud-based systems, which enables owners to selectively share their some particular users, users acquire interested data. However, it challenging protect security user privacy during acquisition, because cloud servers are curious about or user's interests, even send unauthorized uninterested users. In this paper, we propose an efficient provably secure Data Sharing...
By providing rich context of lane information on roads, lane-level maps play a vital role in intelligent transportation systems. Since Global Positioning Systems (GPS) have been widely applied to vehicles, vehicle-based crowdsourcing offers an economical way the map building by collecting and analyzing GPS trajectories vehicles. However, existing works cannot directly extract road from raw interleaved trajectories, moreover they are time-consuming inaccurate. In this article, we propose...
The variation of wireless signal in dynamic indoor parking environments may seriously compromise the performance fingerprint-based localization methods. In this regard, paper investigates problem robust WiFi vehicle tracking environments, aiming at designing an online learning framework to continuously train model and counteract effect variation. Specifically, a Hidden Markov Model (HMM) based Online Evaluation (HOE) method is firstly proposed assess accuracy results by measuring...
With the prosperity of Internet Things, a large number heterogeneous wireless devices share same unlicensed spectrum, leading to severe cross-technology interference (CTI). Especially, transmission power asymmetry will further deteriorate this problem, as high-power (like WiFi) always corrupt ongoing transmissions low-power ZigBee), because energy ZigBee signal perceived by WiFi is too weak achieve CCA (Clear Channel Assessment) threshold and channel considered be idle. This paper proposes...
This paper tackles a survivability problem of the Optical-Wireless Broadband Access Network (WOBAN). The proposed scheme introduces ONU with wireless function (called WONU) for multiple service applications, and uses resource to protect network from fiber failure. It establishes link between two WONU inter-ONU communication restore when last-drop is cut. Moreover, reduce bandwidth confliction achieve high effective utilization, strategy by using time-domain adaptive linear prediction Media...
Leveraging emerging mobile edge computing and 5G networks, researchers proposed to offload the 3D rendering of interactive applications (e.g. virtual reality cloud gaming) onto GPU-based servers reduce user experienced latency. A task offloading problem arises, that is where tasks such each will experience tolerable delay meanwhile cost used minimized. The multi-dimensional resource sharing feature makes challenging. We formulate into a boolean linear programming. propose sharing-aware...
Software Defined Networking has been adopted to improve data center network efficiency. In SDN, the controllers are responsible for exchanging information with switches perform specific operations such as forwarding. The transmission of control traffic usually uses networks different from networks. However, building an additional wired leads high cabling complexity. Since a wireless involves almost no and is easy install, we propose solution where make connection via access points (AP). this...
Cooperative sensing and heterogeneous information fusion are critical to realize vehicular cyber-physical systems (VCPSs). This paper makes the first attempt quantitatively measure quality of VCPS by designing a new metric called Age View (AoV). Specifically, we present system architecture where can be cooperatively sensed uploaded via vehicle-to-infrastructure (V2I) communications in edge computing (VEC). Logical views constructed fusing at nodes. Further, formulate problem deriving...