- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Network Packet Processing and Optimization
- Software System Performance and Reliability
- Information and Cyber Security
- Cybersecurity and Cyber Warfare Studies
- Software Testing and Debugging Techniques
- Formal Methods in Verification
- Complex Network Analysis Techniques
- Machine Learning and Algorithms
- Generative Adversarial Networks and Image Synthesis
- semigroups and automata theory
- Cloud Computing and Resource Management
- Smart Grid Security and Resilience
- UAV Applications and Optimization
- Multimodal Machine Learning Applications
- Vehicular Ad Hoc Networks (VANETs)
- Evacuation and Crowd Dynamics
- Manufacturing Process and Optimization
- Opinion Dynamics and Social Influence
- Peer-to-Peer Network Technologies
- Radiation Effects in Electronics
- Advanced Optical Network Technologies
- Computational Physics and Python Applications
- Autonomous Vehicle Technology and Safety
Northwestern Polytechnical University
2023-2024
Shenzhen University
2023-2024
Alibaba Group (United States)
2024
Bellevue Hospital Center
2024
Antea Group (France)
2023
Institute of Electrical and Electronics Engineers
2023
IBM (United States)
2012-2023
Dominion (United States)
2023
Old Dominion University
2023
Xiamen University
2023
Influence maximization is the problem of finding a small set most influential nodes in social network so that their aggregated influence maximized. In this paper, we study linear threshold model, one important models formalizing behavior propagation networks. We first show computing exact general networks model #P-hard, which closes an open left seminal work on by Kempe, Kleinberg, and Tardos, 2003. As contrast, directed cyclic graphs (DAGs) can be done time to size graphs. Based fast...
Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set seed nodes in social network that maximizes spread influence under certain cascade models. In this paper, we propose an extension to independent model incorporates emergence propagation negative opinions. The new has explicit parameter called quality factor natural behavior people turning product due defects. Our negativity bias (negative opinions usually dominate over positive...
We propose a deterministic model for associating costs with strings that is parameterized by operations of interest (such as addition, scaling, and minimum), notion regularity provides yardstick to measure expressiveness, study decision problems theoretical properties resulting classes cost functions. Our definition relies on the theory string-to-tree transducers, allows events are conditioned regular future events. register automata computation functions using multiple "write-only"...
In network management today, dynamic updates are required for traffic engineering and timely response to security threats. Decisions such based on monitoring compute numerical quantities a variety of application-level performance metrics. Today's state-of-the-art tools lack programming abstractions that capture application or session-layer semantics, thus require operators specify reason about complex state machines interactions across layers. To address this limitation, we present the...
The emergence of programmable interfaces to network controllers offers operators the flexibility implement a variety policies. We propose NetEgg, programming framework that allows operator specify desired functionality using example behaviors. Our synthesis algorithm automatically infers state needs be maintained exhibit behaviors along with rules for processing packets and updating state. report on an initial prototype NetEgg. experiments evaluate proposed based number examples needed...
There is a strong trend in networking to move towards Software-Defined Networks (SDN). SDNs enable easier network configuration through separation between centralized controller and distributed data plane comprising of switches. The implements policies installing rules on Recently the "Big Switch" abstraction [1] was proposed as specification mechanism for high-level behavior, i.e., policies. operating system or compiler can use his placing individual However, this constrained by limited...
Recent emergence of software-defined networks offers an opportunity to design domain-specific programming abstractions aimed at network operators. In this paper, we propose scenario-based programming, a framework that allows operators program policies by describing representative example behaviors. Given these scenarios, our synthesis algorithm automatically infers the controller state needs be maintained along with rules process events and update state. We have developed NetEgg tool, which...
In recent years, large enterprises (e.g., Google, Alibaba, etc.) have been building and deploying their wide-area routers based on shallow-buffered switching chips. However, with legacy reactive transport TCP Cubic), shallow buffer can easily get overwhelmed by BDP traffic, leading to high packet losses degraded throughput. To address it, we ask: design a simultaneously achieve throughput low loss for WAN?We answer this question affirmatively employing proactive congestion control (PCC). two...
Additive manufacturing (AM) are an emerging technique to generate complex structures of composite. However, the instability AM process leads adverse effects, including dimensional inaccuracies and poor mechanical performance in CFRP composites. Online monitoring adaptive control based on autonomous cognition suggested ensure accuracy as-fabricated parts enhance their quality upon manufacturing. In this study, a method online self-adaptive multi-sensor fusion is proposed predict adjust...
In part 1 of this article (IEEE Consumer Electronics Magazine, April 2012), the consumer was cast to a central role in development smart grid. The focus how thoroughly modernized grid would impact consumers by making electricity system more reliable, efficient, and accessible individuals. It also argued that for succeed, have be educated so they could understand benefits modern participate meaningful way.
This paper addresses the problem of consistently updating network configurations in a software-defined network. We are interested generating an update sequence ordering that guarantees per-packet consistency. present procedure computes safe by add-before rule dependency graph. Nodes graph correspond to rules be installed and edges capture relations among them.
Unmanned aerial vehicles (UAVs) and unmanned ground (UGVs) can be jointly deployed to form a collaborative surveillance system, where UAVs collect low-resolution images at high altitude obtain global perception UGVs observe high-resolution within focused detection range. Such multiresolution heterogeneous observations create opportunities yet pose challenges model the dynamics of targeted crowds. Existing approaches that integrate rely on intensive computation large volume historical data,...
Mapping virtual networks to physical under bandwidth constraints is a key computational problem for the management of data centers. Recently proposed heuristic strategies this work efficiently, but are not guaranteed always find an allocation even when one exists. Given that NP-complete, and state-of-the-art SAT solvers have recently been successfully applied NP-hard problems in planning formal verification, goal paper study whether these can be used solve exactly with acceptable overhead....
Recent emergence of software-defined networks offers an opportunity to design domain-specific programming abstractions aimed at network operators. In this paper, we propose scenario-based programming, a framework that allows operators program policies by describing example behaviors in representative scenarios. Given these scenarios, our synthesis algorithm automatically infers the controller state needs be maintained along with rules process events and update state. We have developed NetEgg...
Social media plays a significant role in boosting the fashion industry, where massive amount of fashion-related posts are generated every day. In order to obtain rich information from posts, we study task social knowledge extraction. Fashion knowledge, which typically consists occasion, person attributes, and item information, can be effectively represented as set tuples. Most previous studies on extraction based product images without considering text posts. Existing work is...