Yong Qi

ORCID: 0000-0002-7682-5653
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Software Reliability and Analysis Research
  • Parallel Computing and Optimization Techniques
  • Blockchain Technology Applications and Security
  • Distributed and Parallel Computing Systems
  • Access Control and Trust
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Distributed systems and fault tolerance
  • Context-Aware Activity Recognition Systems
  • RFID technology advancements
  • Advanced Computational Techniques and Applications
  • Advanced Software Engineering Methodologies
  • Mobile Agent-Based Network Management
  • Indoor and Outdoor Localization Technologies
  • Caching and Content Delivery
  • Advanced Data Storage Technologies

Xi'an Jiaotong University
2015-2024

Nanjing University of Science and Technology
2014-2024

Gene Tech (China)
2024

Inner Mongolia Electric Power (China)
2023

Central South University
2022

General Hospital of Central Theater Command
2022

University of Minnesota
2022

University of Minnesota System
2022

Guangdong Provincial People's Hospital
2022

Central Hospital of Wuhan
2022

As wireless sensor networks (WSNs) are increasingly being deployed in some important applications, it becomes imperative that we consider application requirements in-network processes. We intend to use a WSN aid information querying and navigation within dynamic real-time environment. propose novel method relies on the heat diffusion equation finish process conveniently easily. From perspective of theoretical analysis, our proposed work holds lower constraint condition. multiple scales reach...

10.3390/s110504794 article EN cc-by Sensors 2011-05-03

In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, verification indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining disproportionately large influence. this paper, we propose novel attack detection mechanism, Footprint, using trajectories for identification while still preserving their privacy. More specifically, when vehicle approaches...

10.1109/tpds.2011.263 article EN IEEE Transactions on Parallel and Distributed Systems 2011-10-27

Bag-of-words (BOW) is now the most popular way to model text in statistical machine learning approaches sentiment analysis. However, performance of BOW sometimes remains limited due some fundamental deficiencies handling polarity shift problem. We propose a called dual analysis (DSA), address this problem for classification. first novel data expansion technique by creating sentiment-reversed review each training and test review. On basis, we algorithm make use original reversed reviews pairs...

10.1109/tkde.2015.2407371 article EN IEEE Transactions on Knowledge and Data Engineering 2015-02-26

Modern applications especially cloud-based or cloud-centric always have many components running in the large distributed environment with complex interactions. They are vulnerable to suffer from performance availability problems due highly dynamic runtime such as resource hogs, configuration changes and software bugs. In order make efficient maintenance provide some hints bugs, we build a system named CauseInfer, low cost blackbox cause inference without instrumenting application source...

10.1109/infocom.2014.6848128 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

This study constructs a comprehensive index to effectively judge the optimal number of topics in LDA topic model. Based on requirements for selecting topics, judgment perplexity, isolation, stability, and coincidence is constructed select topics. method provides four advantages topics: (1) good predictive ability, (2) high isolation between (3) no duplicate (4) repeatability. First, we use three general datasets compare our proposed with existing methods, results show that selection has...

10.3390/e23101301 article EN cc-by Entropy 2021-10-03

Prior work on anti-collision for Radio Frequency IDentification (RFID) systems usually schedule adjacent readers to exclusively interrogate tags avoiding reader collisions. Although such a pattern can effectively deal with collisions, the lack of readers' collaboration wastes numerous time scheduling process and dramatically degrades throughput identification. Even worse, within overlapped interrogation regions (termed as contentious tags), even if number is very small, introduce significant...

10.1109/infcom.2011.5935154 article EN 2011-04-01

The study of today's cyber-physical system (CPS) has been an important research area. Internet data centers (IDCs) are energy consuming CPSs that support the reliable operations many online services. Along with increasing services and cloud computing in recent years, power usage associated IDC had surging significantly. Such mass consumption brought extremely heavy burden on operators. While most previous work only consider about dynamical optimization under electricity markets, reaction...

10.1109/tsg.2012.2211386 article EN IEEE Transactions on Smart Grid 2012-09-24

In order to simultaneously power and cool hundreds of thousands servers, large-scale data centers usually consume several tens megawatts electricity. This enormous electricity consumption leads considerable concerns in the cost including both bills carbon tax. To achieve a sustainable center, many Internet service providers begin build their own on-site renewable energy plants help reduce cost. However, considering performance constraint delay tolerant workloads lack future information about...

10.1109/tsusc.2017.2711925 article EN IEEE Transactions on Sustainable Computing 2017-04-01

Efficient aggregation of data collected by sensors is crucial for a successful application wireless sensor networks (WSNs). Both minimizing the energy cost and reducing time duration (or called latency) have been extensively studied WSNs. Algorithms with theoretical performance guarantees are only known under protocol interference model, or graph-based models generally. In this paper, we study problem designing efficient algorithm physical model. To best our knowledge, no algorithms in...

10.1109/mobhoc.2009.5336978 article EN 2009-10-01

Abstract Understanding the interactions between proteins and ligands is critical for protein function annotations drug discovery. We report a new sequence‐based template‐free predictor (TargetATPsite) to identify Adenosine‐5′‐triphosphate (ATP) binding sites with machine‐learning approaches. Two steps are implemented in TargetATPsite: residues pockets predictions, respectively. To predict residues, novel image sparse representation technique proposed encode residue evolution information...

10.1002/jcc.23219 article EN Journal of Computational Chemistry 2013-01-03

Accurate identification of the cancer types is essential to diagnoses and treatments. Since tissue normal have different gene expression, expression data can be used as an efficient feature source for classification. However, accurate classification directly using original profiles remains challenging due intrinsic high-dimension small size samples. We proposed a new self-training subspace clustering algorithm under low-rank representation, called SSC-LRR, on data. Low-rank representation...

10.1109/tcbb.2017.2712607 article EN IEEE/ACM Transactions on Computational Biology and Bioinformatics 2017-06-06

Modern computing systems especially cloud-based and cloud-centric always consist of a mass components running in large distributed environments with complicated interactions. They are vulnerable to performance problems due the highly dynamic runtime environment changes (e.g., overload resource contention) or software bugs memory leak). Unfortunately, it is notoriously difficult diagnose root causes these fine granularity interactions cardinality potential cause set. In this paper, we build...

10.1109/tsc.2016.2607739 article EN IEEE Transactions on Services Computing 2016-09-09

10.1016/j.physa.2018.08.017 article EN Physica A Statistical Mechanics and its Applications 2018-08-10

The application of blockchain to Vehicular Edge Computing (VEC) has attracted significant interests. As the Internet Things plays an essential and fundamental role for data collecting, analyzing, management in VEC, it is vital guarantee security data. However, resource-constraint nature edge node makes challenging meet needs maintain long life-cycle IoT since vast volumes quickly increase. In this paper, we propose Acce-chain, a storage-elastic based on different storage capacities at edge....

10.1109/tits.2021.3108052 article EN IEEE Transactions on Intelligent Transportation Systems 2021-09-10

The rapid development of Internet Things (IoT) enables digital twin (DT) technology to precisely represent a real product in virtual space by generating multitude IoT data items record many aspects the product. To support various DT-based applications, generated need be shared among multiple parties involving lifecycle product, which raises increasing demand for access control. decentralization and tamper-proofing properties blockchain enable it promising immutability protection items....

10.1109/jsac.2023.3310061 article EN IEEE Journal on Selected Areas in Communications 2023-09-04

In this paper, we address the problem of joint channel assignment, link scheduling, and routing for throughput optimization in wireless networks with multi-radios multi-channels. We mathematically formulate by taking into account interference, number available radios set usable channels, other resource constraints at nodes. also consider possible combining several consecutive channels one so that a network interface card (NIC) can use larger range frequencies thus improve capacity....

10.1109/tmc.2008.160 article EN IEEE Transactions on Mobile Computing 2008-12-03

Although it is difficult to assess the achievable performance of nonlinear tracking applications, nevertheless remains extremely important do so. This paper illustrates how mean and covariance estimated online state can be used recursively calculate an approximate posterior Cramer-Rao lower bound (CRLB). Most CRLB implementations require true state, but this impractical except for appropriately designed experiments or simulations where exact value given as prior knowledge. The (PCRLB) in...

10.1109/taes.2011.5705658 article EN IEEE Transactions on Aerospace and Electronic Systems 2011-01-01

Software systems that run continuously over a long time have been frequently reported encountering gradual degradation issues. That is, as progresses, software tends to exhibit degraded performance, deflated service capacity, or deteriorated QoS. Currently, the state-of-the-art approach of Mann-Kendall Test & Seasonal Kendall Sen's Slope Estimator (MKSK) detects and characterizes via combination techniques in statistical trend analysis. Nevertheless, we pinpoint some drawbacks MKSK this...

10.1109/tr.2014.2338255 article EN IEEE Transactions on Reliability 2014-07-22
Coming Soon ...