Chase Q. Wu

ORCID: 0000-0002-8218-1209
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Software-Defined Networks and 5G
  • Network Traffic and Congestion Control
  • Scientific Computing and Data Management
  • Interconnection Networks and Systems
  • Peer-to-Peer Network Technologies
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Indoor and Outdoor Localization Technologies
  • Blockchain Technology Applications and Security
  • Advanced Data Storage Technologies
  • Advanced Optical Network Technologies
  • Mobile Ad Hoc Networks
  • Parallel Computing and Optimization Techniques
  • Advanced Wireless Network Optimization
  • Data Management and Algorithms
  • Distributed Sensor Networks and Detection Algorithms
  • Energy Efficient Wireless Sensor Networks
  • Target Tracking and Data Fusion in Sensor Networks
  • Distributed systems and fault tolerance
  • Radiation Detection and Scintillator Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks

New Jersey Institute of Technology
2016-2025

University of Memphis
2008-2020

Southwest Jiaotong University
2020

Montclair State University
2019

Northwest University
2014-2017

Beijing Institute of Big Data Research
2016

University of Tennessee Health Science Center
2016

Microservice has been increasingly recognized as a promising architectural style for constructing large-scale cloud-based applications within and across organizational boundaries. This microservice-based architecture greatly increases application scalability, but meanwhile incurs an expensive performance overhead, which calls careful design of modeling task scheduling. However, these problems have thus far remained largely unexplored. In this paper, we develop prediction method independent...

10.1109/tpds.2019.2901467 article EN IEEE Transactions on Parallel and Distributed Systems 2019-02-25

Next-generation e-Science features large-scale, compute-intensive workflows of many computing modules that are typically executed in a distributed manner. With the recent emergence cloud and rapid deployment infrastructures, an increasing number scientific have been shifted or active transition to environments. As makes utility, scientists across different application domains facing same challenge reducing financial cost addition meeting traditional goal performance optimization. We develop...

10.1109/tcc.2014.2358220 article EN IEEE Transactions on Cloud Computing 2014-09-15

Anomaly detection plays a critical role in ensuring safe, smooth, and efficient operation of machinery equipment industrial environments. With the wide deployment multimodal sensors rapid development Internet Things (IoT), data generated modern production has become increasingly diverse complex. However, traditional methods for anomaly based on single source cannot fully utilize to capture anomalies systems. To address this challenge, we propose new model environments using temporal data....

10.3390/s24020637 article EN cc-by Sensors 2024-01-19

Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in distributed network. While blockchain well-known for its initial usage public manner, such as cryptocurrency of Bitcoin, consortium blockchain, which requires authentication all involved participants, also been widely adopted various domains. Nevertheless, there lack comprehensive study terms architecture design, consensus mechanisms, comparative performance, etc. In this study, we...

10.3390/cryptography8020012 article EN cc-by Cryptography 2024-03-22

Intrusion detection systems (IDS) play an important role in the protection of network operations and services. In this paper, we propose effective intrusion scheme based on deep learning techniques. The proposed employs a denoising autoencoder (DAE) with weighted loss function for feature selection, which determines limited number features to reduce dimensionality. selected data is then classified by compact multilayer perceptron (MLP) identification. Extensive experiments are conducted...

10.1109/icpr.2018.8546162 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2018-08-01

Device-free localization (DFL) plays an important role in many applications, such as wildlife population and migration tracking. Most of current DFL systems leverage the distorted received signal strength (RSS) changes to localize target(s). However, they assume a fixed distribution RSS change measurements, although are by different types targets. It inevitably causes fail if targets for modeling testing belong categories. This paper presents TLCS-a transferring compressive sensing based...

10.1109/tie.2014.2360140 article EN IEEE Transactions on Industrial Electronics 2014-09-24

Next-generation e-Science features large-scale, compute-intensive workflows of many computing modules that are typically executed in a distributed manner. With the recent emergence cloud and rapid deployment infrastructures, an increasing number scientific have been shifted or active transition to environments. As makes utility, scientists across different application domains facing same challenge reducing financial cost addition meeting traditional goal performance optimization. We...

10.1109/icpp.2013.18 article EN 2013-10-01

10.1016/j.nima.2015.01.037 article EN Nuclear Instruments and Methods in Physics Research Section A Accelerators Spectrometers Detectors and Associated Equipment 2015-01-29

Blockchain technology has been increasingly used for decentralizing cloud-based Internet of Things (IoT) architectures to address limitations faced by centralized systems. While many existing efforts are successful in decentralization with multiple servers (i.e., full nodes) handle faulty nodes, an important issue arisen that external clients have rely on a relay node communicate the nodes blockchain. Compromization such may result security breach and even blockage IoT sensors from network....

10.1109/tii.2019.2939797 article EN publisher-specific-oa IEEE Transactions on Industrial Informatics 2019-09-06

Because of their proficiency in capturing the category characteristics graphs, graph neural networks have shown remarkable advantages for graph-level classification tasks, that is, rumor detection and anomaly detection. Due to manipulation special means (e.g. bots) on online media, rumors may spread across whole network at an overwhelming speed. Compared with normal information, popular usually a propagation structure, especially early stage information dissemination. More specifically,...

10.1177/00368504241307816 article EN cc-by-nc Science Progress 2025-01-01

Recently, cross-border logistics has experienced rapid development. Cross-border courier orders come in various formats, featuring diverse layouts. Additionally, there is no standardized format for the writing of address and other information on these orders. It challenging current automated recognition models to handle such images. In this paper, we presented an end-to-end trainable neural network model based feature enhancement, SwFB, capable achieving conversion from raw images structured...

10.3390/app15020698 article EN cc-by Applied Sciences 2025-01-12

Cloud computing enables the delivery of computing, software, storage, and data access through web browsers as a metered service. In addition to commercial applications, an increasing number large-scale workflow-based scientific applications are being supported by cloud computing. order meet rapidly growing dynamic demands users, service provider needs employ efficient cost-effective job schedulers guarantee workflow completion time well improve resource utilization for high throughput. Based...

10.1109/pccc.2012.6407766 article EN 2012-12-01

In the data mining of road networks, trajectory clustering moving objects is particular interest for its practical importance in many applications. Most existing approaches to this problem are based on distance measurement, and suffer from several performance limitations including inaccurate clustering, expensive computation, incompetency handle high dimensional data. This paper investigates complex network theory explores application networks address these issues. Specifically, we model a...

10.1109/tits.2019.2937882 article EN IEEE Transactions on Intelligent Transportation Systems 2019-09-13

Density peaks clustering (DPC) algorithm is a novel density-based algorithm, which simple and efficient, not necessary to specify the number of clusters in advance, can find any nonspherical class clusters. However, DPC relies heavily on calculation methods cutoff distance threshold local density cannot analyze complex manifold data, especially datasets with uneven distribution multiple same cluster. To solve these problems, we propose an improved based layered k-nearest neighbors subcluster...

10.1109/access.2020.3006069 article EN cc-by IEEE Access 2020-01-01

Gesture detection based on radio frequency signals has gained increasing popularity in recent years due to several benefits it brought, such as eliminating the need carry additional devices and providing better privacy. In traditional methods, significant breakthroughs have been made improve recognition accuracy scene robustness, but limited computing power of edge (the first-level equipment receive signals) requirement fast response for not adequately addressed. this article, we propose a...

10.1145/3532094 article EN ACM Transactions on Sensor Networks 2022-04-22

The elastic resource provision, non-interfering sharing and flexible customized configuration provided by the Cloud infrastructure has shed light on efficient execution of many scientific applications. Due to increasing deployment data centers computer servers around globe escalated higher electricity price, energy cost running computing, communication cooling together with amount CO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub>...

10.1109/services.2014.76 article EN 2014-06-01

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around globe and economic benefit cloud-based storage services, an increasing number scientific workflows shifted or are active transition to clouds. As scale applications continues grow, it is now common deploy data-and network-intensive multi-cloud environments, where inter-cloud data transfer oftentimes plays significant role both workflow...

10.1109/scc.2016.25 article EN 2016-06-01

Radiation source detection is an important problem in homeland security-related applications. Deploying a network of detectors expected to provide improved due the combined, albeit dispersed, capture area multiple detectors. Recently, localization-based algorithms provided performance gains beyond simple "aggregated" as result localization being enabled by networked We propose following three approaches: 1) source-attractor radiation (SRD); 2) triangulation-based (TriRSD); and 3) ratio...

10.1109/tii.2019.2891253 article EN publisher-specific-oa IEEE Transactions on Industrial Informatics 2019-01-08

Convolutional neural networks have been widely used for image recognition as they are capable of extracting features with high accuracy. In this paper, we propose a DenseFood model based on densely connected convolutional network architecture, which consists multiple layers. A combination softmax loss and center is during the training process to minimize variation within same category maximize across different ones. For performance comparison, three models, namely, DenseFood, DenseNet121,...

10.1109/icaiic48513.2020.9065281 article EN 2020-02-01
Coming Soon ...