Yifei Yuan

ORCID: 0000-0002-9089-580X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Network Packet Processing and Optimization
  • Software System Performance and Reliability
  • Information and Cyber Security
  • Cybersecurity and Cyber Warfare Studies
  • Software Testing and Debugging Techniques
  • Formal Methods in Verification
  • Complex Network Analysis Techniques
  • Machine Learning and Algorithms
  • Generative Adversarial Networks and Image Synthesis
  • semigroups and automata theory
  • Cloud Computing and Resource Management
  • Smart Grid Security and Resilience
  • UAV Applications and Optimization
  • Multimodal Machine Learning Applications
  • Vehicular Ad Hoc Networks (VANETs)
  • Evacuation and Crowd Dynamics
  • Manufacturing Process and Optimization
  • Opinion Dynamics and Social Influence
  • Peer-to-Peer Network Technologies
  • Radiation Effects in Electronics
  • Advanced Optical Network Technologies
  • Computational Physics and Python Applications
  • Autonomous Vehicle Technology and Safety

Northwestern Polytechnical University
2023-2024

Shenzhen University
2023-2024

Alibaba Group (United States)
2024

Bellevue Hospital Center
2024

Antea Group (France)
2023

Institute of Electrical and Electronics Engineers
2023

IBM (United States)
2012-2023

Dominion (United States)
2023

Old Dominion University
2023

Xiamen University
2023

Influence maximization is the problem of finding a small set most influential nodes in social network so that their aggregated influence maximized. In this paper, we study linear threshold model, one important models formalizing behavior propagation networks. We first show computing exact general networks model #P-hard, which closes an open left seminal work on by Kempe, Kleinberg, and Tardos, 2003. As contrast, directed cyclic graphs (DAGs) can be done time to size graphs. Based fast...

10.1109/icdm.2010.118 article EN 2010-12-01

Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set seed nodes in social network that maximizes spread influence under certain cascade models. In this paper, we propose an extension to independent model incorporates emergence propagation negative opinions. The new has explicit parameter called quality factor natural behavior people turning product due defects. Our negativity bias (negative opinions usually dominate over positive...

10.1137/1.9781611972818.33 article EN 2011-04-28

We propose a deterministic model for associating costs with strings that is parameterized by operations of interest (such as addition, scaling, and minimum), notion regularity provides yardstick to measure expressiveness, study decision problems theoretical properties resulting classes cost functions. Our definition relies on the theory string-to-tree transducers, allows events are conditioned regular future events. register automata computation functions using multiple "write-only"...

10.1109/lics.2013.65 article EN 2013-06-01

In network management today, dynamic updates are required for traffic engineering and timely response to security threats. Decisions such based on monitoring compute numerical quantities a variety of application-level performance metrics. Today's state-of-the-art tools lack programming abstractions that capture application or session-layer semantics, thus require operators specify reason about complex state machines interactions across layers. To address this limitation, we present the...

10.1145/3098822.3098830 article EN 2017-08-04

The emergence of programmable interfaces to network controllers offers operators the flexibility implement a variety policies. We propose NetEgg, programming framework that allows operator specify desired functionality using example behaviors. Our synthesis algorithm automatically infers state needs be maintained exhibit behaviors along with rules for processing packets and updating state. report on an initial prototype NetEgg. experiments evaluate proposed based number examples needed...

10.1145/2670518.2673879 article EN 2014-10-27

There is a strong trend in networking to move towards Software-Defined Networks (SDN). SDNs enable easier network configuration through separation between centralized controller and distributed data plane comprising of switches. The implements policies installing rules on Recently the "Big Switch" abstraction [1] was proposed as specification mechanism for high-level behavior, i.e., policies. operating system or compiler can use his placing individual However, this constrained by limited...

10.1109/dsn.2014.24 article EN 2014-06-01

Recent emergence of software-defined networks offers an opportunity to design domain-specific programming abstractions aimed at network operators. In this paper, we propose scenario-based programming, a framework that allows operators program policies by describing representative example behaviors. Given these scenarios, our synthesis algorithm automatically infers the controller state needs be maintained along with rules process events and update state. We have developed NetEgg tool, which...

10.1145/2716281.2836119 article EN 2015-12-01

In recent years, large enterprises (e.g., Google, Alibaba, etc.) have been building and deploying their wide-area routers based on shallow-buffered switching chips. However, with legacy reactive transport TCP Cubic), shallow buffer can easily get overwhelmed by BDP traffic, leading to high packet losses degraded throughput. To address it, we ask: design a simultaneously achieve throughput low loss for WAN?We answer this question affirmatively employing proactive congestion control (PCC). two...

10.1109/icnp52444.2021.9651988 article EN 2021-11-01

Additive manufacturing (AM) are an emerging technique to generate complex structures of composite. However, the instability AM process leads adverse effects, including dimensional inaccuracies and poor mechanical performance in CFRP composites. Online monitoring adaptive control based on autonomous cognition suggested ensure accuracy as-fabricated parts enhance their quality upon manufacturing. In this study, a method online self-adaptive multi-sensor fusion is proposed predict adjust...

10.1080/17452759.2024.2412192 article EN cc-by-nc Virtual and Physical Prototyping 2024-10-16

In part 1 of this article (IEEE Consumer Electronics Magazine, April 2012), the consumer was cast to a central role in development smart grid. The focus how thoroughly modernized grid would impact consumers by making electricity system more reliable, efficient, and accessible individuals. It also argued that for succeed, have be educated so they could understand benefits modern participate meaningful way.

10.1109/mce.2012.2193691 article EN IEEE Consumer Electronics Magazine 2012-06-21

This paper addresses the problem of consistently updating network configurations in a software-defined network. We are interested generating an update sequence ordering that guarantees per-packet consistency. present procedure computes safe by add-before rule dependency graph. Nodes graph correspond to rules be installed and edges capture relations among them.

10.1145/2620728.2620774 article EN 2014-08-12

Unmanned aerial vehicles (UAVs) and unmanned ground (UGVs) can be jointly deployed to form a collaborative surveillance system, where UAVs collect low-resolution images at high altitude obtain global perception UGVs observe high-resolution within focused detection range. Such multiresolution heterogeneous observations create opportunities yet pose challenges model the dynamics of targeted crowds. Existing approaches that integrate rely on intensive computation large volume historical data,...

10.1109/tsmc.2022.3146455 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2022-02-07

Mapping virtual networks to physical under bandwidth constraints is a key computational problem for the management of data centers. Recently proposed heuristic strategies this work efficiently, but are not guaranteed always find an allocation even when one exists. Given that NP-complete, and state-of-the-art SAT solvers have recently been successfully applied NP-hard problems in planning formal verification, goal paper study whether these can be used solve exactly with acceptable overhead....

10.1109/fmcad.2013.6679389 article EN Formal Methods in Computer-Aided Design 2013-10-01

Recent emergence of software-defined networks offers an opportunity to design domain-specific programming abstractions aimed at network operators. In this paper, we propose scenario-based programming, a framework that allows operators program policies by describing example behaviors in representative scenarios. Given these scenarios, our synthesis algorithm automatically infers the controller state needs be maintained along with rules process events and update state. We have developed NetEgg...

10.1109/tnet.2018.2861919 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2018-08-28

Social media plays a significant role in boosting the fashion industry, where massive amount of fashion-related posts are generated every day. In order to obtain rich information from posts, we study task social knowledge extraction. Fashion knowledge, which typically consists occasion, person attributes, and item information, can be effectively represented as set tuples. Most previous studies on extraction based product images without considering text posts. Existing work is...

10.48550/arxiv.2309.16270 preprint EN cc-by arXiv (Cornell University) 2023-01-01
Coming Soon ...