- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Advanced Chemical Sensor Technologies
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Gas Sensing Nanomaterials and Sensors
- Face and Expression Recognition
- Image Retrieval and Classification Techniques
- Energy Harvesting in Wireless Networks
- Advanced Image and Video Retrieval Techniques
- Insect Pheromone Research and Control
- Text and Document Classification Technologies
- Machine Learning and Algorithms
- Domain Adaptation and Few-Shot Learning
- Advanced Algorithms and Applications
- Water Quality Monitoring Technologies
- Advanced Sensor and Control Systems
- Network Time Synchronization Technologies
- Blind Source Separation Techniques
- Caching and Content Delivery
- Urban Stormwater Management Solutions
- Wireless Sensor Networks and IoT
- Advanced Clustering Algorithms Research
- Algorithms and Data Compression
- Complex Network Analysis Techniques
Chongqing University of Posts and Telecommunications
2008-2024
Guangzhou University
2015-2022
Yale University
2021
Chongqing University
2013-2017
Yunnan University
2017
University of South China
2014
Michigan State University
2006-2012
Carnegie Mellon University
2008-2009
Tianjin University
2008
Hefei University of Technology
2008
5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to provide decentralized medical services while device-to-device (D2D) communication a promising paradigm for future networks. To assure secure and reliable in D2D IoMT systems, this article presents intelligent trust cloud management method. First, active training mechanism proposed construct the standard clouds. Second, individual clouds devices can be established through fuzzy inferring recommending....
The emerging sixth generation (6G) is the integration of heterogeneous wireless networks, which can seamlessly support anywhere and anytime networking. But high quality trust should be offered by 6G to meet mobile user expectations. Artificial intelligence (AI) considered as one most important components in 6G. AI-based management a promising paradigm provide trusted reliable services. In this article, generative-adversarial-learning-en-abled method presented for networks. Some typical...
Similarity measurement is a critical component in content-based image retrieval systems, and learning good distance metric can significantly improve performance. However, despite extensive study, there are several major shortcomings with the existing approaches for that affect their application to medical retrieval. In particular, "similarity" mean very different things retrieval: resemblance visual appearance (e.g., two images look like one another) or similarity semantic annotation of...
Wireless sensor networks (WSNs) is associated with a new exemplification of real-time embedded system used for various applications that make the traditional infrastructure-based network seem infeasible. Due to imbalanced energy consumption among nodes, WSN has challenges better utilization and enhancement. Clustering been approach in this sequence. Therefore, paper will utilize fuzzy logic-based clustering protocol (unequal clustering) multi-hop transmission load balancing, minimization,...
Edge enabled Industrial Internet of Things (IIoT) platform is great significance to accelerate the development smart industry. However, with dramatic increase in real-time IIoT applications, it a challenge support fast response time, low latency, and efficient bandwidth utilization. To address this issue, Time Sensitive Network (TSN) recently researched realize latency communication via deterministic scheduling. best our knowledge, combinability multiple flows, which can significantly affect...
Security is one of the major concerns in Industrial Wireless Sensor Networks (IWSNs). To assure security clustered IWSNs, this paper presents a secure clustering protocol with fuzzy trust evaluation and outlier detection (SCFTO). Firstly, to deal transmission uncertainty an open wireless medium, interval type-2 logic controller adopted estimate trusts. And then density based mechanism introduced acquire adaptive threshold used isolate malicious nodes from being cluster heads. Finally, heads...
A typical wireless sensor network (WSN) is often deployed in harsh or hostile environment to work an unattended mode. It prone various attacks during routing process as the open medium. Traditional encryption and authentication-based secure mechanisms cannot avoid from internal compromised nodes, they also need much resource for complex computing. To conquer these problems, trust-based mechanism usually used WSNs. However, how get behavior evidences trust assessment rarely addressed date. In...
Clustering is an effective topology control method in wireless sensor networks (WSNs), since it can enhance the network lifetime and scalability. To prolong clustered WSNs, efficient cluster head (CH) optimization policy essential to distribute energy among nodes. Recently, game theory has been introduced model clustering. Each node considered as a rational selfish player which will play clustering with equilibrium strategy. Then decides whether act CH according this strategy for tradeoff...
With the convergence of telemedicine and electronic health (e-health) services, Consumer Internet Things (CIoT) enabled smart healthcare has attracted much attention from researchers. Telemedicine e-health care can help to eliminate geographical barriers provide high-quality medicine services. Whereas, deterministic low-latency communication is a major problem in system with commercial network, since latency affect process diagnosis treatment while producing inaccuracy. To address this...
Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs) because it restricts the lifetime of network. Recently, emergence energy harvesting techniques has brought with them expectation to overcome this problem. In particular, possible for node abilities work perpetually an Neutral state. paper, Multi-hop Clustering (MENC) algorithm proposed construct optimal multi-hop clustering architecture WSNs, goal achieving perpetual network operation. All cluster...
Trustworthy and reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to unique characteristics constraints. To acquire secured address the conflict between security energy, this paper we present an evolutionary game based secure clustering protocol with fuzzy trust evaluation outlier detection for WSNs. Firstly, method presented transform transmission evidences into values while effectively alleviating uncertainty. And then, K-Means scheme proposed further...
In recent years, the electronic nose (E-nose) technology has made a great progress in practical application. However, interferences, such as interferences from non-target gas, manufacturing deviation and sensor drift, have negative impact on detection accuracy during real-time process, which will affect industrialization commercialization of E-nose. Thus, it is necessary to research method interference suppression for realizing long-term stable detection. This paper proposes sparse...
Traditional machine learning techniques have been widely used to establish the trust management systems. However, scale of training dataset can significantly affect security performances systems, while it is a great challenge detect malicious nodes due absence labeled data regarding novel attacks. To address this issue, paper presents generative adversarial network (GAN) based mechanism for Industrial Wireless Sensor Networks (IWSNs). First, type-2 fuzzy logic adopted evaluate reputation...
In this work, we extend the ellipsoid method, which was originally designed for convex optimization, online learning. The key idea is to approximate by an classification hypotheses that are consistent with all training examples received so far. This in contrast most learning algorithms where only a single classifier maintained at each iteration. Efficient presented updating both centroid and positive definite matrix of given misclassified example. addition classical improved version also...
Clustering is an effective method for reducing energy consumption in wireless sensor networks (WSNs). In a multihop clustered network scenario, each node transmits data to its own cluster head (CH), and the CH aggregates from member nodes forwards it base station (BS) via other CHs. However, "hot spot" problem prone occur WSNs because CHs closer BS have heavier intercluster forwarding tasks. To address this problem, paper proposes unequal clustering algorithm based on interval type-2 TSK...