Ruitao Xie

ORCID: 0000-0002-7198-9261
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Energy Efficient Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Cloud Data Security Solutions
  • Wireless Networks and Protocols
  • Cryptography and Data Security
  • Cooperative Communication and Network Coding
  • Vehicular Ad Hoc Networks (VANETs)
  • Image and Video Quality Assessment
  • Energy Harvesting in Wireless Networks
  • Advanced MIMO Systems Optimization
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • Stochastic Gradient Optimization Techniques
  • Sparse and Compressive Sensing Techniques
  • Software-Defined Networks and 5G
  • Distributed and Parallel Computing Systems
  • Underwater Vehicles and Communication Systems
  • Visual Attention and Saliency Detection
  • Full-Duplex Wireless Communications
  • Smart Parking Systems Research
  • Data Management and Algorithms
  • Advanced Wireless Network Optimization

Shenzhen University
2019-2024

City University of Hong Kong
2011-2016

Beijing University of Posts and Telecommunications
2009

Data access control is an effective way to ensure data security in the cloud. However, due outsourcing and untrusted cloud servers, becomes a challenging issue storage systems. Existing schemes are no longer applicable systems, because they either produce multiple encrypted copies of same or require fully trusted server. Ciphertext-policy attribute-based encryption (CP-ABE) promising technique for data. inefficiency decryption revocation, existing CP-ABE cannot be directly applied construct...

10.1109/tifs.2013.2279531 article EN IEEE Transactions on Information Forensics and Security 2013-08-23

Compressive sensing (CS) can reduce the number of data transmissions and balance traffic load throughout networks. However, total for collection by using pure CS is still large. The hybrid method was proposed to in sensor previous works use on routing trees. In this paper, we propose a clustering that uses nodes are organized into clusters. Within cluster, transmit cluster head (CH) without CS. CHs sink. We first an analytical model studies relationship between size clusters method, aiming...

10.1109/tpds.2013.90 article EN IEEE Transactions on Parallel and Distributed Systems 2013-03-27

Due to the high volume and velocity of big data, it is an effective option store data in cloud, because cloud has capabilities storing processing user access requests. Attribute-Based Encryption (ABE) a promising technique ensure end-to-end security cloud. However, policy updating always been challenging issue when ABE used construct control schemes. A trivial implementation let owners retrieve re-encrypt under new policy, then send back This method incurs communication overhead heavy...

10.1109/infocom.2014.6848142 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

With the recent development of wireless communication, sensing, and computing technologies, Internet Vehicles (IoV) has attracted great attention in both academia industry. Nevertheless, it is challenging to process time-critical tasks due unique characteristics IoV, including heterogeneous computation communication capacities network nodes, intermittent connections, unevenly distributed workload, massive data transmission, intensive demands, high mobility vehicles. In this article, we...

10.1109/jiot.2020.2997720 article EN IEEE Internet of Things Journal 2020-05-26

Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public to verify integrity outsourced on behalf users. To resist malicious TPAs, many blockchain-based verification proposed. However, existing rely a centralized TPA, and they are vulnerable tempting auditors who may collude blockchain miners produce biased results. In this article, we propose decentralized (BDPA)...

10.1109/tcc.2021.3051622 article EN IEEE Transactions on Cloud Computing 2021-01-14

Mobile edge computing provides users with low response time and avoids unnecessary data transmission. Due to the deployment of 5G, emerging systems can provide gigabit bandwidth. However, network protocols have not evolved together. In TCP, initial congestion window (IW) is such a value that most short flows still stay in slow start phase when finishing, do fully utilize available Naively increasing IW may result congestion, which causes long latency. Moreover, since environment dynamic, we...

10.1109/jsac.2019.2959187 article EN IEEE Journal on Selected Areas in Communications 2019-12-27

Cloud computing is an emerging computational infrastructure for cost-efficient workflow execution that provides flexible and dynamically scalable resources at pay-as-you-go pricing. Workflow scheduling, as a typical NP-Complete problem, one of the major issues in cloud computing. However, scenario with unlimited resources, how to generate efficient economical scheduling scheme under deadline constraint still extraordinary challenge. In this paper, we propose hybrid heuristic algorithm called...

10.1109/tsc.2022.3196620 article EN IEEE Transactions on Services Computing 2022-01-01

In the data center, a server can work in either active state or power-saving state. The power consumption is almost 0, thus it always desirable to allocate as many VMs possible some servers and leave rest order reduce energy of center. this paper, we study such VM allocation problem. Given set each has resource demand (CPU, memory, storage) starting time finishing time, capacity. There an additional cost for switch from are non-homogeneous. problem our concern onto servers, that demands be...

10.1109/icdcsw.2013.37 article EN 2013-07-01

Virtual machine migration has been touted as one of the crucial technologies in improving data center efficiency, such reducing energy cost and maintaining load balance. However, traditional approaches could not avoid service interruption completely. Moreover, they often result longer delay are prone to failures. In this paper, we leverage emerging named networking (NDN) design an efficient robust protocol support seamless virtual cloud center. Specifically, machines (VMs) with services...

10.1109/tpds.2014.2377119 article EN IEEE Transactions on Parallel and Distributed Systems 2014-12-04

Compressive sensing (CS) can reduce the number of data transmissions and balance traffic load throughout networks. However, total required in CS method is still large. It observed that there are many zero elements measurement matrix. In each round transmission method, sensor nodes corresponding to matrix do not have their own transmit. To further network, we aim compute a gathering tree by taking advantages these matrix, such minimized. We formulate problem as linear programming with boolean...

10.1109/glocom.2011.6134304 article EN 2011-12-01

The emerging vehicular ad hoc network (VANET) enables vehicles to access the Internet through roadside points (APs). An important issue in system deployment is determining how many APs shall be installed on a road. However, existing works fail provide rigorous and accurate analysis for VANETs. In this paper, we propose general structure It allows both real-time traffic delay-tolerant delivered users most efficient ways. analytical model also proposed analyze performance with random arrival...

10.1109/tvt.2015.2491358 article EN IEEE Transactions on Vehicular Technology 2015-10-15

Many big-data computing applications have been deployed in cloud platforms. These normally demand concurrent data transfers among nodes for parallel processing. It is important to find the best transfer scheduling leading least retrieval time-the maximum throughput other words. However, existing methods cannot achieve this, because they ignore link bandwidths and diversity of replicas paths. In this paper, we aim develop a max-throughput minimize time applications. Specifically, problem...

10.1109/tcc.2015.2464808 article EN IEEE Transactions on Cloud Computing 2015-08-12

Recently, deep learning has been used to tackle mobile sensing problems, and the inference phase of is preferred be run on devices for speedy responses. However, are resource-constrained platforms both computation power. Moreover, an task with involves tens billions mathematical operations millions parameter reads. Thus, it a critical issue reduce energy consumption algorithms. In this article, we survey various reduction approaches, classify them into three categories: compressing neural...

10.1109/mwc.2019.1800321 article EN IEEE Wireless Communications 2019-06-01

The coexistence of heterogeneous devices in wireless networks brings a new topic on cross-technology communication (CTC) to improve the efficiency and boost collaboration among these devices. Current advances CTC mainly fall into two categories, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">physical-layer CTC</i> xmlns:xlink="http://www.w3.org/1999/xlink">packet-level energy modulation</i> (PLEM). achieves high data rate, but with channel...

10.1109/tmc.2021.3065998 article EN cc-by-nc-nd IEEE Transactions on Mobile Computing 2021-03-17

Towards the large amount of data generated everyday, selective sharing and acquisition is one most significant services in cloud-based systems, which enables owners to selectively share their some particular users, users acquire interested data. However, it challenging protect security user privacy during acquisition, because cloud servers are curious about or user's interests, even send unauthorized uninterested users. In this paper, we propose an efficient provably secure Data Sharing...

10.1109/tifs.2022.3216956 article EN IEEE Transactions on Information Forensics and Security 2022-11-04

By providing rich context of lane information on roads, lane-level maps play a vital role in intelligent transportation systems. Since Global Positioning Systems (GPS) have been widely applied to vehicles, vehicle-based crowdsourcing offers an economical way the map building by collecting and analyzing GPS trajectories vehicles. However, existing works cannot directly extract road from raw interleaved trajectories, moreover they are time-consuming inaccurate. In this article, we propose...

10.1109/tits.2020.3040728 article EN IEEE Transactions on Intelligent Transportation Systems 2020-12-10

The variation of wireless signal in dynamic indoor parking environments may seriously compromise the performance fingerprint-based localization methods. In this regard, paper investigates problem robust WiFi vehicle tracking environments, aiming at designing an online learning framework to continuously train model and counteract effect variation. Specifically, a Hidden Markov Model (HMM) based Online Evaluation (HOE) method is firstly proposed assess accuracy results by measuring...

10.1109/tmc.2022.3200411 article EN IEEE Transactions on Mobile Computing 2022-01-01

With the prosperity of Internet Things, a large number heterogeneous wireless devices share same unlicensed spectrum, leading to severe cross-technology interference (CTI). Especially, transmission power asymmetry will further deteriorate this problem, as high-power (like WiFi) always corrupt ongoing transmissions low-power ZigBee), because energy ZigBee signal perceived by WiFi is too weak achieve CCA (Clear Channel Assessment) threshold and channel considered be idle. This paper proposes...

10.1109/tvt.2022.3213663 article EN IEEE Transactions on Vehicular Technology 2022-10-11

This paper tackles a survivability problem of the Optical-Wireless Broadband Access Network (WOBAN). The proposed scheme introduces ONU with wireless function (called WONU) for multiple service applications, and uses resource to protect network from fiber failure. It establishes link between two WONU inter-ONU communication restore when last-drop is cut. Moreover, reduce bandwidth confliction achieve high effective utilization, strategy by using time-domain adaptive linear prediction Media...

10.1109/icbnmt.2009.5348543 article EN 2009-10-01

Leveraging emerging mobile edge computing and 5G networks, researchers proposed to offload the 3D rendering of interactive applications (e.g. virtual reality cloud gaming) onto GPU-based servers reduce user experienced latency. A task offloading problem arises, that is where tasks such each will experience tolerable delay meanwhile cost used minimized. The multi-dimensional resource sharing feature makes challenging. We formulate into a boolean linear programming. propose sharing-aware...

10.1109/tcc.2021.3127345 article EN IEEE Transactions on Cloud Computing 2021-11-11

Software Defined Networking has been adopted to improve data center network efficiency. In SDN, the controllers are responsible for exchanging information with switches perform specific operations such as forwarding. The transmission of control traffic usually uses networks different from networks. However, building an additional wired leads high cabling complexity. Since a wireless involves almost no and is easy install, we propose solution where make connection via access points (AP). this...

10.1109/glocom.2016.7841558 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Cooperative sensing and heterogeneous information fusion are critical to realize vehicular cyber-physical systems (VCPSs). This paper makes the first attempt quantitatively measure quality of VCPS by designing a new metric called Age View (AoV). Specifically, we present system architecture where can be cooperatively sensed uploaded via vehicle-to-infrastructure (V2I) communications in edge computing (VEC). Logical views constructed fusing at nodes. Further, formulate problem deriving...

10.1109/tits.2023.3340334 article EN IEEE Transactions on Intelligent Transportation Systems 2023-12-20
Coming Soon ...