Derek Leong

ORCID: 0000-0002-7681-5834
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Caching and Content Delivery
  • Mobile Crowdsensing and Crowdsourcing
  • Opportunistic and Delay-Tolerant Networks
  • Privacy, Security, and Data Protection
  • Energy Efficient Wireless Sensor Networks
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing
  • Human Mobility and Location-Based Analysis
  • Tropical and Extratropical Cyclones Research
  • Peer-to-Peer Network Technologies
  • Wireless Body Area Networks
  • Internet Traffic Analysis and Secure E-voting
  • Context-Aware Activity Recognition Systems
  • Wireless Networks and Protocols
  • Covalent Organic Framework Applications
  • Cardiac Arrhythmias and Treatments
  • Advanced Wireless Network Optimization
  • Distributed systems and fault tolerance
  • Limits and Structures in Graph Theory
  • Wireless Communication Security Techniques
  • Bluetooth and Wireless Communication Technologies
  • Advanced Wireless Communication Technologies
  • Digital Platforms and Economics

Cedars-Sinai Medical Center
2022

Institute for Infocomm Research
2000-2020

Agency for Science, Technology and Research
2000-2020

University College London
2017

California Institute of Technology
2009-2013

Carnegie Mellon University
2005

Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need joint design of traffic engineering caching strategies, in order optimize network performance view current loads future demands. We present a systematic framework dynamic interest request forwarding cache placement eviction, within context Named Data Networking (NDN) architecture. The employs virtual control plane which...

10.1145/2660129.2660151 article EN 2014-09-23

Context-aware mobile computing requires wearable sensors to acquire information about the user. Continuous sensing rapidly depletes -wearable system's energy, which is a critically constrained resource. In this paper, we analyze trade-off between power consumption and prediction accuracy of context classifiers working on dual-axis accelerometer data collected from eWaich notification platform. We improve techniques by providing competitive classification performance even in low frequency...

10.1109/iswc.2005.52 article EN 2005-12-13

We examine the problem of allocating a given total storage budget in distributed system for maximum reliability. A source has single data object that is to be coded and stored over set nodes; it allowed store any amount each node, as long used does not exceed budget. collector subsequently attempts recover original by accessing only random subset nodes. By using an appropriate code, successful recovery can achieved whenever accessed at least size object. The goal find optimal allocation...

10.1109/tit.2012.2191135 article EN IEEE Transactions on Information Theory 2012-03-19

Mobile crowdsensing has emerged as an efficient sensing paradigm that combines the crowd intelligence and power of mobile devices, such phones Internet Things gadgets. This article addresses contradicting incentives privacy preservation by users, accuracy maximization collection true data service providers. We first define individual contributions users based on in analytics achieved provider from buying their data. then propose a truthful mechanism for achieving high while protecting user...

10.1109/mcom.2017.1600737 article EN IEEE Communications Magazine 2017-01-01

We consider a real-time streaming system where messages are created sequentially at the source, and encoded for transmission over packet erasure channel. Each message must subsequently be decoded receiver within given delay from its creation time. code design maximum rates when all decodable by their respective deadlines under specified set of patterns (erasure model). Specifically, we provide construction that achieves optimal rate an asymptotic number messages, models containing limited...

10.1109/isit.2012.6284055 preprint EN 2012-07-01

We consider a real-time streaming system where messages created at regular time intervals source are encoded for transmission to receiver over packet erasure link; the must subsequently decode each message within given delay from its creation time. study bursty model in which all patterns containing bursts of limited length admissible. For certain classes parameter values, we provide code constructions that asymptotically achieve maximum size among codes allow decoding under admissible...

10.1109/isit.2013.6620379 article EN 2013-07-01

We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced using audibility (ELSA), which can be implemented at backend server without modifying existing legacy IoT systems. ELSA is based on statistical decision theory framework uses two-way time-of-arrival (TW-TOA) information between user's device anchors. In addition to TW-TOA information, exploits implicit (or outage information) improve...

10.1109/jiot.2016.2535165 article EN IEEE Internet of Things Journal 2016-02-26

Internet of things (IoT) produces massive data from devices embedded with sensors. The IoT allows creating profitable services using machine learning. However, previous research does not address the problem optimal pricing and bundling learning-based services. In this paper, we define value service quality a learning perspective. We present an market model which consists vendors selling to providers, providers offering customers. Then, introduce schemes for standalone bundled sales, provider...

10.1109/jsac.2020.2971898 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2020-02-05

We consider the problem of optimally allocating a given total storage budget in distributed system. A source has data object which it can code and store over set nodes; is allowed to any amount each node, subject constraint. collector subsequently attempts recover original by accessing random fixed-size subset these nodes. Successful recovery occurs when coded this nodes at least size object. The goal determine node so that probability successful maximized. solve high regime. Our results be...

10.1109/icc.2010.5502492 article EN IEEE International Conference on Communications 2010-05-01

Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the identities of communicating source-destination pairs. Usually, addition is done heuristically with no guarantees that transmission cost, latency, and so on, are optimized every network topology. In this paper, we explicitly examine privacy-utility tradeoff problem for develop a novel privacy-preserving algorithm called optimal privacy enhancing (OPERA). OPERA uses...

10.1109/tifs.2017.2698424 article EN IEEE Transactions on Information Forensics and Security 2017-04-26

With the emerging sensing technologies such as mobile crowdsensing and Internet of Things (IoT), people-centric data can be efficiently collected used for analytics optimization purposes. This is typically required to develop render services. In this paper, we address privacy implication, optimal pricing, bundling We first define inverse correlation between service quality level from perspectives. then present profit maximization models selling standalone, complementary, substitute...

10.1109/jsac.2017.2680845 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2017-03-16

Time synchronization is an enabling service that allows devices to share a consistent notion of time and thus makes it easier build efficient robust collaborative services. However, existing protocols based on wireless packet transmissions are not energy because powering the radio often consumes significant fraction budget. In this paper, we propose PSync, visible light-based protocol relies LED light source highly for receivers. The key novelty in our use De Bruijn sequence provide rough...

10.1109/infocom.2016.7524358 article EN 2016-04-01

We investigate the problem of using several storage nodes to store a data object, subject an aggregate budget or redundancy constraint. It is challenging find optimal allocation that maximizes probability successful recovery by collector because large space possible symmetric and nonsymmetric allocations, nonconvexity problem. For special case probability-1 recovery, we show minimizes required symmetric. further explore access models, determine in high-probability regime for interest. Based...

10.1109/netcod.2009.5191399 article EN 2009-06-01

We consider the problem of optimally allocating a given total storage budget in distributed system. A source has data object which it can code and store over set nodes; is allowed to any amount coded each node, as long used does not exceed budget. collector subsequently attempts recover original by accessing nodes independently with some constant probability. By using an appropriate code, successful recovery occurs when accessed at least size object. The goal find optimal allocation that...

10.1109/glocom.2010.5683962 preprint EN 2010-12-01

We examine the problem of creating an encoded distributed storage representation a data object for network mobile nodes so as to achieve optimal recovery delay. A source node creates single and disseminates it other storage, subject given total budget. collector subsequently attempts recover original by contacting accessing stored in them. By using appropriate code, successful is achieved when amount accessed at least size object. The goal find allocation budget over that optimizes delay...

10.1109/isit.2011.6033779 preprint EN 2011-07-01

In deploying body sensor networks (BSNs), sampling rates might be dynamically tuned to fit application requirements (e.g., monitoring patients' different activities), which helps conserving energy for battery-powered sensors. However, this results in variable data among sensors, further requires an efficient resource allocation maintain reliable transmission accommodating all traffic loads. We thereby address joint problem of reliability and efficiency by proposing a BSN system that...

10.1109/jsen.2019.2915635 article EN IEEE Sensors Journal 2019-05-08

Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need joint design of traffic engineering caching strategies. We present a systematic framework dynamic interest request forwarding cache placement eviction, within context Named Data Networking (NDN) architecture. The employs virtual control plane which operates on user demand rate data objects in network, an actual handles...

10.1109/iccnc.2015.7069430 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2015-02-01

We present a unified linear program formulation for optimal content delivery in networks (CDNs), taking into account various costs and constraints associated with dissemination from the origin server to storage nodes, data storage, eventual fetching of nodes by end users. Our can be used achieve variety performance goals system behavior, including bounding fetch delay, load balancing, robustness against node arc failures. Simulation results suggest that our performs significantly better than...

10.1109/ciss.2009.5054756 article EN 2009-03-01

10.6057/2013tcrr03.04 article EN Tropical Cyclone Research and Review 2013-09-01

We consider a distributed storage system where the nodes have heterogeneous access probabilities. The problem is to allocate given budget across so as store unit-size data object with maximum reliability. propose efficient algorithms for optimizing over several classes of allocations. In basic one-level symmetric allocation, spread evenly an appropriately chosen subset nodes. multi k-level divided into k parts, each different nodes, such that amount allocated node in higher levels multiple...

10.1109/allerton.2013.6736541 article EN 2013-10-01

We propose a new framework combining dynamic sampling rates for healthcare sensors driven by user behavior, and an adaptive MAC scheduling scheme applied to the time-slotted channel hopping (TSCH) protocol in IEEE 802.15.4, which provides high throughput reliable communications. First, we introduce system software architecture machine-learning-assisted monitoring that detects user's behavior using edge computing adjusts of accordingly. Second, TSCH based on state machine model reacts traffic...

10.1109/healthcom.2017.8210762 article EN 2017-10-01

We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-destination pair (or contextual privacy) while using an adjustable amount overhead. also study how traditional network coding and opportunistic can leak privacy. then incorporated both into our for better performance show we mitigate its vulnerability. Contrary prior works, allow destination anonymously submit acknowledgment source enhanced reliability. Performance analysis simulations are used...

10.1109/icc.2015.7249323 article EN 2015-06-01

Mobile crowd sensing is an emerging paradigm where applications buy sensor data from mobile smartphone users (workers) instead of deploying their own networks to estimate some statistics a spatial event. In many monitoring applications, the crowdsourcer needs incentivize contribute so that collected dataset has good coverage. To further privacy-concerned workers contribute, we propose Stackelberg incentive framework allows specify location privacy requirements while also increasing coverage...

10.1109/icc.2017.7997418 article EN 2017-05-01
Coming Soon ...