Xiaolong Li

ORCID: 0000-0002-9904-0912
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Network Security and Intrusion Detection
  • Underwater Vehicles and Communication Systems
  • Anomaly Detection Techniques and Applications
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Advanced Measurement and Detection Methods
  • Insect Pest Control Strategies
  • Microwave Imaging and Scattering Analysis
  • Energy Harvesting in Wireless Networks
  • Advanced Algorithms and Applications
  • Software-Defined Networks and 5G
  • Advanced Optical Network Technologies
  • Simulation and Modeling Applications
  • Network Traffic and Congestion Control
  • Entomopathogenic Microorganisms in Pest Control
  • Traffic Prediction and Management Techniques
  • Non-Invasive Vital Sign Monitoring
  • Opportunistic and Delay-Tolerant Networks
  • Internet Traffic Analysis and Secure E-voting

Hunan University of Technology
2013-2025

National University of Defense Technology
2008-2025

Shanghai Zhangjiang Laboratory
2023-2024

Hunan University
2006-2024

China University of Mining and Technology
2024

Hechi University
2024

Nanjing Institute of Technology
2024

China University of Geosciences
2024

Shanghai Advanced Research Institute
2023

Shanghai University
2023

The development of smart cities and deep learning technology is changing our physical world to a cyber world. As one the main applications, Internet Vehicles has been developing rapidly. However, privacy leakage delay problem for data collection remain as key concerns behind fast intelligence technologies. If original collected are directly uploaded cloud processing, it will bring huge load pressure network communication. Moreover, during this process, lead privacy. To end, in article we...

10.1109/tii.2019.2962844 article EN IEEE Transactions on Industrial Informatics 2019-12-30

The intelligent reflecting surface (IRS) and unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is widely used in temporary emergency scenarios. Our goal to minimize the energy consumption of MEC by jointly optimizing UAV locations, IRS phase shift, task offloading, resource allocation with a variable number UAVs. To this end, we propose flexible scheduling (FRES) framework employing novel deep progressive reinforcement learning that includes following innovations....

10.1109/tnnls.2023.3341067 article EN IEEE Transactions on Neural Networks and Learning Systems 2024-01-12

The purpose of this study is to determine if amino acid neurotransmitters such as gamma-aminobutyric (GABA), taurine, glutamate (Glu), and aspartate (Asp) can scavenge activated carbonyl toxicants. In vitro, direct reaction between malondialdehyde (MDA) acids was researched using different analytical methods. results indicated that scavenging function taurine GABA very strong Glu Asp weak in pathophysiological situations. provided perspective into the mechanism targets MDA protecting nerve...

10.1186/1556-276x-8-190 article EN cc-by Nanoscale Research Letters 2013-04-24

Abstract YBa 2 Cu 3 O 7-x (YBCO) films with low microwave surface resistance ( R S ) are essential for high temperature superconducting devices. The oxygen pressure during deposition has been found to influence significantly. In this work, we deposited highly c -axis aligned YBCO on single crystal MgO(001) substrates under different pressures via pulsed laser ablation. Their detailed microstructure was characterized three-dimensional reciprocal space mapping (3D-RSM) method and their also...

10.1088/1674-1056/adb261 article EN Chinese Physics B 2025-02-05

To address the vehicle-bridge coupling vibration issue of Qingyuan Maglev Tourist Line, it is necessary to establish a maglev vehicle–bridge dynamics simulation model that reflects actual line conditions. Based on vehicle and bridge structural parameters this paper utilizes multi-body software create medium–low-speed model, employs finite element construct model. Using modal reduction method, imported into through rigid–flex interface, establishing suspension system–bridge The accuracy...

10.3390/act14030107 article EN cc-by Actuators 2025-02-21

As a new type of rail transit vehicle, maglev trains have extremely high requirements for safety and reliability. With the gradual commercial operation trains, how to scientifically effectively assess analyze risks train equipment has become an urgent issue be addressed. Against backdrop practical application projects, this paper integrates domestic international risk analysis models, proposes steps conducting transit, establishes system entire lifecycle transit. Based on results fault...

10.3390/act14030111 article EN cc-by Actuators 2025-02-25

Different types of ore deposits exhibit distinct metal sources, physicochemical conditions, and ore-forming processes. Galena, a key sulfide in Pb-Zn deposits, possesses trace elements that may be utilized for classifying deposit types. Presently, research on based galena is sparse, there lack robust methods distinguishing using these elements. In this study, we demonstrate deep learning algorithm, the galena, can effectively The model training process UMAP visualization, evaluation was...

10.1016/j.oregeorev.2024.106133 article EN cc-by-nc-nd Ore Geology Reviews 2024-06-24

Soybean seed purity is a critical factor in agricultural products, standardization of quality, and food processing. In this study, laser-induced breakdown spectroscopy (LIBS) as an effective technology was successfully used to identify ten varieties soybean seeds. We improved the traditional sample preparation scheme for LIBS. Instead grinding squashing, we propose time-efficient method by pressing seeds into rubber sand filled with culture plates through ruler ensure relatively uniform...

10.3389/fpls.2021.714557 article EN cc-by Frontiers in Plant Science 2021-10-06

Due to increasing awareness of environmental and economic issues for network operators, energy-efficiency has received much attention lately becomes one the major design goals in wireless networks. Since power consumption base stations (BS) occupies most energy cost entire cellular networks, this paper, we propose a novel saving method denoted as clustering BS-off (CBSO) scheme that all cells are cooperated dynamically adjusted switch on/off along with space time. Instead adopting unified...

10.1109/chinacom.2013.6694626 article EN 2013-08-01

Deep learning-based approaches for automatic depression recognition offer advantages of low cost and high efficiency. However, symptoms are challenging to detect vary significantly between individuals. Traditional deep learning methods often struggle capture model these nuanced features effectively, leading lower accuracy. This paper introduces a novel multimodal method, HYNMDR, which utilizes hypergraphs represent the complex, high-order relationships among patients with depression. HYNMDR...

10.3390/electronics13224544 article EN Electronics 2024-11-19

By analyzing the data transmission Collisions for wireless sensor networks, due to shortage of energy efficiency and latency in MAC protocol, we propose a distributed TDMA scheduling protocol based on coloring algorithm (TDMA-CA), which uses spatial reuse channel. It allocates different colors conflict nodes arranges distinct slots each color by scheduling. Simulation results show that TDMA-CA is better than SMAC terms both efficient latency.

10.1109/iciss.2010.5657059 article EN 2010-10-01

The purpose of the image quality assessment is to evaluate consistently with human's subjective evaluation. In assessment, many structural features have been used measure degradation an image. However, most existing methods are block-based, which ignores among neighboring blocks. this paper, we argue that human visual system perceives distortions not only depends on local (intra-block structure) distortions, but also relates their neighborhoods (inter-block texture). Based insight, propose a...

10.1109/access.2020.3028282 article EN cc-by IEEE Access 2020-01-01

Chatbot-customer interaction is becoming increasingly prevalent. However, prior literature has not focused on the influence of chatbot-customer brand advocacy. In this paper, we study mechanism consumer Through a questionnaire survey 312 e-commerce users who used artificial intelligence-powered chatbot platforms, our shows that functional anthropomorphic interactions significantly affect Furthermore, customer experiences an intermediary role between and

10.1109/iceiec54567.2022.9835050 article EN 2022-07-15

The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in networks from both technical economic perspectives.From perspective, use Markov chain propose dynamic attack-defense tree-based model, which is temporal-aware, characterize an attack effort made by attacker corresponding countermeasure responded...

10.1109/access.2018.2818116 article EN cc-by-nc-nd IEEE Access 2018-01-01

Topology control is important for heterogeneous sensor networks in order to minimize the total network power consumption under constraint that all nodes' connectivity requirements are satisfied. To address this issue, an optimization problem first formulated, which formally proved be NP-hard. For practical applications, effective solution, named topology adaptation algorithm (TAA), proposed. TAA adopts both graph theory and maximum flow find prespecified node disjoint paths with low time...

10.1109/jsen.2016.2549543 article EN IEEE Sensors Journal 2016-04-01

In real-world applications, wireless sensor networks often consist of a large number nodes with constraint battery resources. How to reduce the power consumption and maximize network life, becomes most important goal topology control schemes in networks. During operation networks, may spend different levels energy, result uneven distribution residual energy nodes. order extend it is essential adjust burden dynamically, so as achieve balance among under consideration at this paper, we...

10.7498/aps.65.028401 article EN cc-by Acta Physica Sinica 2016-01-01

Network connectivity is a critical property that provides communication foundation for most wireless sensor network (WSN) applications to operate successfully. Existing results on the WSN analysis are primarily based uniform distribution of sensors in bounded field interest. However, can be non-uniform practice due diverse deployment strategies, deviations and geographical limitations. We thus investigate random following Gaussian it simulate various nonuniform distributions. Specifically,...

10.1109/wimob.2013.6673342 article EN 2013-10-01

This paper proposes a methodology for detecting intrusion in wireless sensor networks using Weak Hidden Markov Models (W-HMM). W-HMM is non-parametric version of models (HMM), wherein state transition probabilities are reduced to rules reachability. In particular, we introduce scoring scheme and deviation alarm mechanisms detect intrusion. Simulation results show that the efficient.

10.1109/iciss.2010.5657049 article EN 2010-10-01
Coming Soon ...