Qiong Zhang

ORCID: 0000-0002-9450-8205
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Advanced Optical Network Technologies
  • Security in Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Network Traffic and Congestion Control
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Advanced Photonic Communication Systems
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Smart Grid Security and Resilience
  • Optical Network Technologies
  • Software System Performance and Reliability
  • Interconnection Networks and Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Wastewater Treatment and Reuse
  • Blockchain Technology Applications and Security
  • Water-Energy-Food Nexus Studies
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Neural Networks and Applications
  • Face and Expression Recognition
  • IoT Networks and Protocols

Xi’an University of Posts and Telecommunications
2007-2022

Guodian Institute of Science and Technology
2021

Fujitsu (United States)
2008-2019

University of South Florida
2012

Hunan University
2009

University of Bradford
2008

Arizona State University
2005-2007

Recent advances in the areas of Internet Things (IoT), big data, and machine learning have contributed to rise a growing number complex applications. These applications will be data-intensive, delay-sensitive, real-time as smart devices prevail more our daily life. Ensuring quality service (QoS) for delay-sensitive is must, fog computing seen one primary enablers satisfying such tight QoS requirements, it puts compute, storage, networking resources closer user. In this paper, we first...

10.1109/jiot.2019.2896311 article EN IEEE Internet of Things Journal 2019-01-31

Network function virtualization (NFV) provides an efficient and flexible way to deploy network services in the form of service chains (SFCs) by adopting generalized equipment. However, software-based virtualized functions (VNFs) bring new challenge for operators providing availability guarantees. Traditionally, network-level protection mechanisms are considered separately from function-level VNF backup mechanisms. a SFC's cannot be guaranteed if only network- level or considered. In this...

10.1109/glocom.2017.8254730 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Recent advances in the areas of Internet Things (IoT), Big Data, and Machine Learning have contributed to rise a growing number complex applications. These applications will be data-intensive, delay-sensitive, real-time as smart devices prevail more our daily life. Ensuring Quality Service (QoS) for delay-sensitive is must, fog computing seen one primary enablers satisfying such tight QoS requirements, it puts compute, storage, networking resources closer user. In this paper, we first...

10.48550/arxiv.1802.00800 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Delay-tolerant networking (DTN) is an architecture to enable data communications between isolated or remote regions, where long delays and intermittent connectivity can be tolerated. An emerging class of DTN, called vehicular DTNs (VDTN), exploits transportation systems as the transport layer transfer data. In these networks, vehicles (e.g., busses, boats, trains) act mobile nodes carry messages around. Mobile exchange using devices relay nodes. Relay nodes, placed in strategic positions...

10.1109/glocom.2008.ecp.483 article EN 2008-01-01

Selective forwarding attack in wireless sensor networks shows great impact on network performance and consumes limited energy resource. In previous countermeasures, it is assumed that all nodes the communication range can detect misbehaviors of attacker. However, as devices require certain signal-to-noise ratio to receive frames correctly, interference among inevitable densely deployed networks, very difficult for approaches accurately. this article, a scheme named E-watchdog proposed...

10.1177/1550147718824008 article EN cc-by International Journal of Distributed Sensor Networks 2019-01-01

We jointly consider problems of virtual network mapping and routing wavelength assignment in WDM networks. Flexible node enabled by virtualization achieves significant optical resource savings compared to fixed mapping.

10.1364/nfoec.2013.jth2a.65 article EN 2013-01-01

Location privacy is very important for event-triggered type of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring wild animals. Most the security schemes WSNs are designed to provide protection content privacy. Contextual node identity anonymity has received much less attention. The adversary can fully explore contextual information disclose location critical components source nodes or base station. existing at network layer. As no measures taken data link layer,...

10.1155/2022/2440313 article EN Security and Communication Networks 2022-04-18

In 5G, network slicing is considered as an important enabler to support various verticals simultaneously, by providing dedicated and isolated slice services over a common infrastructure. Many have specific Service Level Agreement (SLA), which should be guaranteed mechanisms like service assurance (SA). SA required collaborate with orchestration management automate the provisioning process. this paper, we first propose hierarchical, distributive, modular architecture assure entire from end...

10.1109/pimrc.2019.8904232 article EN 2019-09-01

We propose a vertex-centric distributed resource orchestration algorithm for finding all feasible mappings of service function chain in multi-domain networks. Simulation results show superior efficiency and scalability computing large requests.

10.1364/ofc.2016.th1a.6 article EN Optical Fiber Communication Conference 2016-01-01

In this paper, we address the problem of data-burst grooming in optical burst-switched (OBS) networks. OBS networks, IP packets with same edge-node destination are assembled into larger called data bursts. Depending on core node's switching technology, bursts required to have a minimum length. On other hand, each packet burst has time delay constraint, maximum end-to-end delay, which determines upper limit before must reach its destination. Thus, cannot wait indefinitely until sufficient...

10.1109/jlt.2005.856236 article EN Journal of Lightwave Technology 2005-10-01

This paper introduces a novel congestion detection scheme for high-bandwidth TCP flows over optical burst switching (OBS) networks, called statistical additive increase multiplicative decrease (SAIMD). SAIMD maintains and analyzes number of previous round-trip time (RTTs) at the senders in order to identify confidence with which packet loss event is due network congestion. The derived by positioning short-term RTT spectrum long-term historical RTTs. corresponding then taken developed policy...

10.1109/jlt.2007.912057 article EN Journal of Lightwave Technology 2009-02-01

We present the SPN OS, a Network-as-a-Service orchestration platform for NFV/SDN integrated service provisioning across multiple datacenters over packet/optical networks. Our prototype showcases template-driven function chaining and high-level network programming-based optical networking.

10.1364/ofc.2017.w4j.4 article EN Optical Fiber Communication Conference 2017-01-01

Considering the availability of datacenter's network elements, we propose a coordinated protection mechanism that adopts both backup path and SFC replicas distributed among datacenters to support high while reducing total cost.

10.1364/ofc.2018.w1d.1 article EN Optical Fiber Communication Conference 2018-01-01

The open wireless channel makes the data prone to being eavesdropped. Current security schemes are designed protect through cryptography. But an adversary can still recover secrets by eavesdropping frames and performing off-line brute-force attacks. Capturing valid is fundamental for such It generally accepted that each frame at link layer include cyclic redundancy check (CRC) checksum sequence integrity check. However, also helps capture correct drop corrupted ones, which future In this...

10.1177/1550147717731041 article EN cc-by International Journal of Distributed Sensor Networks 2017-09-01

Abstract With the development of new technologies for smart grid construction, is gradually developing. Smart construction an important field next generation information technology, and its value significance have been widely recognized. not only provides opportunities, but also brings great challenges. Security privacy become serious problems in grid. Based on this, this paper discusses system structure block chain, puts forward security diagnosis scheme according to existing theoretical...

10.1088/1742-6596/1744/2/022129 article EN Journal of Physics Conference Series 2021-02-01

Network slicing is a concept to provide dedicated and isolated telco services tailored specific needs of different verticals over common infrastructure. Offering service assurance (SA) in network implies full awareness quick response all frequent changes topology, resources, function operation, requests, slice performance. It requires precise coordination between components facilitate efficient access, processing, analysis the information necessary take right actions an architecture that...

10.1109/nfv-sdn.2018.8725792 article EN 2018-11-01

We consider virtual optical network (VON) provisioning over a flexible-grid multi-domain with the objective of minimizing total cost, including cost transponders, regenerators, and spectrum. propose three-step heuristic algorithm that addresses issues domain selection, topology aggregation, routing, modulation format, spectrum assignment (RMSA) when mapping links onto physical links. selection technique attempts to minimize number inter- then suggest aggregation (TA) exchange intra...

10.1109/glocom.2014.7417771 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2014-12-01

We present Object-oriented Network Virtualization (OONV), a new virtual networking paradigm. OONV provides Virtual abstraction for network resources that is commensurate with VM-oriented computing resources. With OONV, Software-defined Networking (SDN) evolves into Software-programmed (SPN).

10.1364/networks.2014.nt1c.2 article EN 2014-01-01

This paper introduces a novel congestion control scheme for TCP over OBS networks, called Statistical Additive Increase Multiplicative Decrease (SAIMD), which aims to improve the throughput performance high-bandwidth flows in networks. We show through analytic model and extensive simulations that proposed can effectively solve false detection problem significantly outperform conventional counterparts without losing fairness.

10.1109/glocom.2007.462 article EN 2007-11-01

With the emergence of 5G and Internet Things technologies, there is an increasing trend network services integrating edge centralized cloud computing for guaranteeing low latency, real-time processing, better security/privacy. In this demo, we present intelligent IoT solution with virtual functions (VNFs) running on uCPE. We demonstrate system architecture VNFs uCPE show that, in addition to typical VNFs, can be included increase opportunities new revenues while using same...

10.1109/nfv-sdn.2018.8725618 article EN 2018-11-01

Ad hoc networks have been a fundamental building block for Machine-to-Machine (M2M) communications that can be often disconnected, intermittent, and limited. The consequent limitations addressed researched. In this paper, we proposed the Multicast Cardinality Smart Selection (MCSS) scheme wireless ad networks, based on modified stochastic branching process, to support data exchange in fast switching topology. A network of smart devices such as drones or vehicles with different velocity is...

10.1109/iccnc.2019.8685558 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2019-02-01

It has been shown that burst retranmsission scheme and deflection can effectively reduce the loss probability, thereby improving performance of loss-based TCP implementations. However, both schemes introduce additional delays for bursts are retransmitted or deflected. The could result in delay-based falsely detecting network congestion, which may negatively impact implementations, such as Vegas. In this paper we investigate Vegas behavior over OBS networks. Furthermore, analyze throughput a...

10.1109/broadnets.2006.4374336 article EN 2006-10-01

We propose a novel communication model based on modified stochastic branching process to support data exchange between smart "things" connected via ad hoc networks. Ad networks are believed be good fit for dynamic network infrastructure which can disconnected, intermittent, and limited (DIL). Our approach aims balance reachability, node usage, average factor in message transmission by controlling the local transmssion ratio concurrent topology. first introduce delivery prove its reachability...

10.1109/iccw.2018.8403793 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2018-05-01
Coming Soon ...