Zhenhua Liu

ORCID: 0000-0002-8026-4502
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Cryptography and Data Security
  • Caching and Content Delivery
  • Advanced Neural Network Applications
  • Interconnection Networks and Systems
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Quantum Information and Cryptography
  • Privacy-Preserving Technologies in Data
  • Distributed and Parallel Computing Systems
  • Blockchain Technology Applications and Security
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Advanced Image and Video Retrieval Techniques
  • Energy Efficient Wireless Sensor Networks
  • Age of Information Optimization
  • Human Pose and Action Recognition
  • Higher Education and Teaching Methods
  • Software System Performance and Reliability
  • Green IT and Sustainability
  • Multimodal Machine Learning Applications
  • Parallel Computing and Optimization Techniques
  • Mobile Ad Hoc Networks

Stony Brook University
2015-2024

Huawei Technologies (China)
2022-2024

State Key Laboratory of Cryptology
2022-2024

Xidian University
2004-2024

State University of New York
2023

Huawei Technologies (Sweden)
2023

Wells Fargo (United States)
2023

Northwest Normal University
2021-2022

Tencent (China)
2021-2022

Applied Mathematics (United States)
2015-2021

Energy expenditure has become a significant fraction of data center operating costs. Recently, "geographical load balancing" been suggested to reduce energy cost by exploiting the electricity price differences across regions. However, this reduction can paradoxically increase total use.

10.1145/1993744.1993767 article EN 2011-06-07

Recently, the demand for data center computing has surged, increasing total energy footprint of centers worldwide. Data typically comprise three subsystems: IT equipment provides services to customers; power infrastructure supports and cooling equipment; removes heat generated by these subsystems. This work presents a novel approach model flows in optimize its operation. Traditionally, supply-side constraints such as or availability were treated independently from workload management....

10.1145/2254756.2254779 article EN 2012-06-11

Recently, transformer has achieved remarkable performance on a variety of computer vision applications. Compared with mainstream convolutional neural networks, transformers are often sophisticated architectures for extracting powerful feature representations, which more difficult to be developed mobile devices. In this paper, we present an effective post-training quantization algorithm reducing the memory storage and computational costs transformers. Basically, task can regarded as finding...

10.48550/arxiv.2106.14156 preprint EN other-oa arXiv (Cornell University) 2021-01-01

In this paper, a novel Diffusion-based 3D Pose estimation (D3DP) method with Joint-wise reProjection-based Multi-hypothesis Aggregation (JPMA) is proposed for probabilistic human pose estimation. On the one hand, D3DP generates multiple possible hypotheses single 2D observation. It gradually diffuses ground truth poses to random distribution, and learns denoiser conditioned on keypoints recover uncontaminated poses. The compatible existing estimators supports users balance efficiency...

10.1109/iccv51070.2023.01356 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

Recently, the demand for data center computing has surged, increasing total energy footprint of centers worldwide. Data typically comprise three subsystems: IT equipment provides services to customers; power infrastructure supports and cooling equipment; removes heat generated by these subsystems. This work presents a novel approach model flows in optimize its operation. Traditionally, supply-side constraints such as or availability were treated independently from workload management....

10.1145/2318857.2254779 article EN ACM SIGMETRICS Performance Evaluation Review 2012-06-07

As the computing power of modern hardware is increasing strongly, pre-trained deep learning models (e.g., BERT, GPT-3) learned on large-scale datasets have shown their effectiveness over conventional methods. The big progress mainly contributed to representation ability transformer and its variant architectures. In this paper, we study low-level computer vision task denoising, super-resolution deraining) develop a new model, namely, image processing (IPT). To maximally excavate capability...

10.48550/arxiv.2012.00364 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Programmable packet scheduling enables algorithms to be programmed into the data plane without changing hardware. Existing proposals either have no hardware implementations for switch ASICs or require multiple strict-priority queues.

10.1145/3452296.3472887 article EN 2021-08-09

Modern deep learning frameworks support a variety of hardware, including CPU, GPU, and other accelerators, to perform computation. In this paper, we study how schedule jobs over such interchangeable resources - each with different rate computation optimize performance while providing fairness among users in shared cluster. We demonstrate theoretically empirically that existing solutions their straightforward modifications poorly the presence resources, which motivates design implementation...

10.1145/3342195.3387547 article EN 2020-04-15

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider location information interferers jammers. However, this can provide important insights for networks manage its resource defend against interference. In paper, we explore methods localize in wireless networks. We first exploit feasibility using two range-free localization algorithms, centroid (CL) weighted (WCL),...

10.1109/percom.2009.4912878 article EN IEEE International Conference on Pervasive Computing and Communications 2009-03-01

Internet of Things has remarkable effects in human's daily life. It is important for users and sensors to securely access data collected by low-cost via real-time IoT applications. There exist many authentication protocols guaranteeing secure communication between sensors. However, some protocols, the privacy unattended subjected capture node attacks cannot be guaranteed. Moreover, physical tampering can still execute normally process. Besides, an protocol should lightweight due restricted...

10.1109/access.2020.3034219 article EN cc-by IEEE Access 2020-01-01

Emerging virtual network functions (VNFs) bring new opportunities to services on the edge within customers' premises. Network are realized by chained up VNFs, which called service function chains (SFCs). These deployed commercial servers for higher flexibility and scalability. Despite such promises, it is still unclear how provide highly available cost-effective SFCs under resource limitations time-varying VNF failures. In this paper, we propose a novel Reliability-aware Adaptive Deployment...

10.1109/tmc.2020.3048885 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2021-01-01

Quantum networks are considered as a promising future platform for quantum information exchange and applications, which have capabilities far beyond the traditional communication networks. Remote entanglement is an essential component of network. How to efficiently design multi-routing protocol fundamental yet challenging problem. In this paper, we study routing problem simultaneously maximize number quantum-user pairs their expected throughput. Our approach formulate two sequential integer...

10.1109/infocom48880.2022.9796810 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Today's network is notorious for its complexity and uncertainty. Network operators often rely on models to achieve efficient planning, operation, optimization. The model responsible understanding the complex relationships between performance metrics (e.g., latency) characteristics traffic). However, we still lack a systematic approach developing accurate lightweight that are aware of impact configurations (i.e., expressiveness) provide fine-grained flow-level temporal predictions...

10.1109/infocom48880.2022.9796726 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Compact neural networks are specially designed for applications on edge devices with faster inference speed yet modest performance. However, training strategies of compact models borrowed from that conventional at present, which ignores their difference in model capacity and thus may impede the performance models. In this paper, by systematically investigating impact different ingredients, we introduce a strong strategy We find appropriate designs re-parameterization knowledge distillation...

10.48550/arxiv.2404.11202 preprint EN arXiv (Cornell University) 2024-04-17

The fast development of virtual network functions (VNFs) brings new opportunities to service deployment on edge networks. For complicated services, VNFs can chain up form function chains (SFCs). Despite the promises, it is still not clear how backup minimize cost while meeting SFC availability requirements in an online manner. In this paper, we propose a novel self-adapting scheme named SAB efficiently over both and cloud. Specifically, uses static backups dynamic ones created fly...

10.1109/infocom41043.2020.9155394 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Mobile edge computing is becoming one of the ubiquitous paradigms to support applications requiring low latency and high capability. FPGA-based reconfigurable accelerators have energy efficiency compared general-purpose servers. Therefore, it natural incorporate in mobile systems. This paper formulates studies problem joint task offloading, access point selection, resource allocation heterogeneous environments for minimization. Due heterogeneity devices coupling between decisions,...

10.1109/infocom53939.2023.10229015 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2023-05-17

10.1016/j.jisa.2025.104060 article EN Journal of Information Security and Applications 2025-04-24

Jamming attacks are especially harmful to the reliability of wireless communication, as they can effectively disrupt communication between any node pairs. Existing jamming defenses primarily focus on repairing connectivity adjacent nodes. In this paper, we address at network level and restoring end-to-end data delivery through multipath routing. As long all paths do not fail concurrently, path availability is maintained. Prior work in selection improves routing by choosing node-disjoint or...

10.1109/tdsc.2012.69 article EN IEEE Transactions on Dependable and Secure Computing 2012-08-06

The fast development of mobile edge computing (MEC) and service virtualization brings new opportunities to the deployment interactive applications, e.g., VR education, stream gaming, autopilot assistance, at network for better performance. Ensuring quality experience (QoE) such services often requires satisfaction multiple (QoS) factors, short delay, high throughput rate, low packet loss. Nevertheless, existing networks fail meet these requirements due mobility end users volatility...

10.1109/infocom48880.2022.9796811 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

The rise of real-time reader interaction in Chinese web novels has revolutionized digital storytelling, transforming it from a traditionally author-driven process into highly dynamic and audience-influenced medium. Unlike conventional literature, where narratives are predetermined, novelists frequently adjust plot structure, pacing, character development based on feedback. This paper explores the various mechanisms interaction, including comment sections, bullet chats, voting systems,...

10.56397/saa.2025.02.05 article EN Studies in Art and Architecture 2025-02-01
Coming Soon ...