Zheng Wen

ORCID: 0000-0002-9942-8431
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Data and IoT Technologies
  • Advanced MIMO Systems Optimization
  • Blockchain Technology Applications and Security
  • Millimeter-Wave Propagation and Modeling
  • Video Surveillance and Tracking Methods
  • Cooperative Communication and Network Coding
  • Advanced Neural Network Applications
  • Advanced Wireless Communication Technologies
  • IoT Networks and Protocols
  • Advanced Image Processing Techniques
  • Precipitation Measurement and Analysis
  • Terahertz technology and applications
  • Cryptography and Data Security
  • Environmental Quality and Pollution
  • Image Processing Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Internet of Things and AI
  • Hand Gesture Recognition Systems
  • Machine Learning and ELM
  • Indoor and Outdoor Localization Technologies
  • Advanced Image Fusion Techniques

Taiyuan University of Technology
2025

Waseda University
2015-2024

Shenzhen Bao'an District People's Hospital
2023

First Hospital of Xi'an
2023

China Institute of Water Resources and Hydropower Research
2021

Beijing Information Science & Technology University
2020

Panasonic (Japan)
2018

Stanford University
2014

Northwest University of Politics and Law
2013

Beijing University of Technology
2013

Advanced metering infrastructure (AMI), as the totality of systems and networks to measure, collect, store, analyze, use energy usage data, is supposed be core component in smart grid. In AMI, there are numerous challenges among which cyber security a major one that needs addressed with priority. The information centric networking (ICN) promising architecture for future Internet disseminates content based on named data instead hosts. congestion control self-security can enable more scalable,...

10.1109/tim.2015.2444238 article EN IEEE Transactions on Instrumentation and Measurement 2015-07-10

The coronavirus disease (COVID-19) pandemic has greatly altered peoples’ daily lives, and it continues spreading as a crucial concern globally. Knowledge, attitudes, practices (KAP) toward COVID-19 are related to individuals’ adherence government measures. This study evaluated KAP among university students in Japan between May 22 July 16, 2020, via an online questionnaire, further investigated the associated determining factors. Among eligible respondents (n = 362), 52.8% were female, 79.0%...

10.1371/journal.pone.0244350 article EN cc-by PLoS ONE 2020-12-21

The most burning topic of today, calls for a holistic solution that is reliable, secure, privacy preserved, cost effective Cloud storage can tide over the turbulent conditions rapidly budding digital technologies. This send an outcry devoted solution, in form individualized, patient-centric care - IoMT augments precise disease identifications, decrease errors, reduction costs through support technology, allows patients to direct health information data doctors,manage drugs, keep Personal...

10.1109/access.2020.3040240 article EN cc-by IEEE Access 2020-01-01

<abstract><p>The image super-resolution reconstruction method can improve the quality in Internet of Things (IoT). It improves data transmission efficiency, and is great significance to encryption. Aiming at problem low using neural networks, a self-attention-based proposed for secure IoT environment. The network model improved, residual structure sub-pixel convolution are used extract feature image. self-attention module detailed information Using generative confrontation...

10.3934/mbe.2021330 article EN cc-by Mathematical Biosciences & Engineering 2021-01-01

With the increasing public attention on sustainability, conservation of energy and materials has been a general demand for wastewater treatment plants (WWTPs). To meet demand, efficient optimal management decision mechanism are expected to reasonably configure resource materials.In recent years, advanced computational techniques such as neural networks genetic algorithm provided data-driven solutions overcome some industrial problems. They work from perspective statistical learning, mining...

10.1109/access.2020.3032531 article EN cc-by-nc-nd IEEE Access 2020-01-01

The threat of terrorism has spread all over the world, and situation become grave. Suspicious object detection in Internet Things (IoT) is an effective way to respond global terrorist attacks. traditional solution requires performing security checks one by at entrance each gate, resulting bottlenecks crowding. In IoT paradigm, it necessary be able perform suspicious on moving people. Artificial intelligence (AI) millimeter-wave imaging are advanced technologies field. However, for persons...

10.1109/access.2020.2991225 article EN cc-by IEEE Access 2020-01-01

Color medical images better reflect a patient's lesion information and facilitate communication between doctors patients. The combination of image processing the Internet has been widely used for clinical medicine on things. classical Welsh method uses matching pixels to achieve color migration grayscale images, but it exists problems such as unclear boundary single coloring effect. Therefore, key after can't be reflected efficiently. To address this issue, we propose an based Gabor...

10.1109/access.2020.2999454 article EN cc-by IEEE Access 2020-01-01

Information-Centric Networking (ICN) was born in an era that more and users are shifting their interests to the content itself rather than location where contents stored. This paradigm shift usage patterns of Internet, along with urgent needs for naming, pervasive caching, better security, mobility support, has prompted researchers consider a radical change Internet architecture. However, ICN is still its infancy development stage, many issues exist need be addressed. The common architecture...

10.1109/access.2019.2925885 article EN cc-by IEEE Access 2019-01-01

The Internet of Health Things (IoHT) enables health devices to connect the and communicate with each other, which provides high-accuracy high-security diagnosis result in medical area. As essential parts IoHT, computed tomography (CT) images help doctors diagnose disease. In traditional disease diagnosing process, low-resolution CT produce low-accuracy results for microlesions. Moreover, can only provide 2D information about organs, should estimate 3D shape a lesion based on experience. To...

10.1109/access.2020.3007024 article EN cc-by IEEE Access 2020-01-01

Fingerprint-based positioning in a wireless local area network (WLAN) environment has received much attention recently. One key issue for the method is radio map construction, which generally requires significant effort to collect enough measurements of signal strength (RSS). Based on observation that RSSs have high spatial correlation, we propose an efficient construction based low-rank approximation. Different from conventional interpolation methods, proposed represents distribution as...

10.1155/2013/461089 article EN Mathematical Problems in Engineering 2013-01-01

Information Centric Networking (ICN) had merits in terms of mobility, security, power consumption and network traffic. When a large-scale disaster occurred, the current communication system might be fragile server based service unavailable due to damages, congestions, failure, etc. In this paper, we proposed an ICN Disaster Sharing Service (DISS) [1], [2] system. DISS could provide robust information sharing service. Users publish as content message with help our DISS. addition, by utilizing...

10.1587/transfun.e98.a.1610 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2015-01-01

Accident prevention for trucks, cranes and work vehicles at construction sites is important. Here, we use high-precision surveillance cameras with 4K as IoT terminals to implement safe workplace environments. In this research, the system transmits photographic images from cranes, other equipment fitted site a database via 5G wireless networks, uses AI assess interactions movements of workers in database. We introduce that makes it possible avoid crashes by informing truck crane drivers,...

10.1109/wpmc.2018.8712896 article EN 2018-11-01

Urban surveillance systems are being applied in a rapid pace with mature but inefficient solutions. The inefficiency is revealed two aspects, too concentrated bandwidth and processing requirement. To solve this problem, we proposed content oriented system based on Information- Centric Network. However, can't simply replace TCP/IP streaming structure named contents because it improve the system's efficiency enough. In paper, took ICN network's profits even further contents. Instead of live...

10.1109/glocomw.2016.7848866 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2016-12-01

Edge computing can provide many key functions without connecting to centralized servers, which enables remote areas obtain real-time medical diagnoses. The combination of edge and Internet things (IoT) devices send patient data the hospital, will help more effectively address long-term or chronic diseases. CT images are widely used in diagnosis clinical diseases, their characteristics an important basis for pathological diagnosis. In imaging process, speckle noise is caused by interference...

10.1109/access.2021.3052469 article EN cc-by IEEE Access 2021-01-01

Image style transfer can realize the mutual between different styles of images and is an essential application for big data systems. The use neural network‐based image mining technology effectively mine useful information in improve utilization rate information. However, when using deep learning method to transform style, content often lost. To address this problem, paper introduces L1 loss on basis VGG‐19 network reduce difference adds perceptual calculate semantic feature map model’s...

10.1155/2021/8387382 article EN cc-by Computational Intelligence and Neuroscience 2021-01-01

In the literature, Information communication technology (ICT)-assisted health systems have been intensively discussed. However, it has seldom become a reality. This is mainly due to current wireless technologies' limited transmission rate, few connected devices and high latency. On contrary, fifth generation (5G) communications can connect more devices, provide faster rates lower this article, we first introduce 5G-enabled our specific implementation in affiliated hospital of Zhengzhou...

10.23919/ituk48006.2019.8995906 article EN 2019-12-01

Advanced Metering Infrastructure (AMI), as the totality of systems and networks to measure, collect, store, analyze, use energy usage data, is supposed key component that should be preferentially constructed for smart grid. In meanwhile, content-centric networking (CCN) perceived a promising approach where content itself becomes core communication instead address or location in future internet research. Based on its caching advantage, it widely believed CCN can effectively reduce AMI network...

10.1109/amps.2014.6947719 article EN 2014-09-01

The stealth address protocol is to create a one-time temporary output of transaction, hide its real address, destroy the association between input and achieve privacy protection for user identities in transaction. However, widely used double-key (DKSAP) requires sender transmit public key along with which enables attackers easily identify non-stealth transactions can lead loss some private information. We propose without leakage -- PDKSAP by senders receivers maintain local transaction...

10.1109/icccworkshops49972.2020.9209929 article EN 2020-08-09

A Pseudo Double Scattering Channel (PDSC) Matrix assumption is proposed here for the downlink Non- Orthogonal Multiple Access (NOMA) within massive Multi-Input Multi-Output (MIMO) systems. Afterwards, outage probability analysis of such a system investigated. That is, with aid random matrix and statistics theories, Cumulative Probability Distribution (CDF) also performance are addressed. After that, mathematics derivations obtained verified through numerical simulation results, wherein we...

10.1109/vtcspring.2016.7504394 article EN 2016-05-01

Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment that uses cryptocurrency named bitcoins (BTCs) was released as open-source software in 2009. platform has attracted both social anti-social elements. On the one hand, it ensures exchange of value, maintaining trust cooperative, community-driven manner without need for trusted third party. At same time, creates hurdles law enforcement to trace suspicious transactions due anonymity privacy. To understand how tendencies...

10.1109/icccworkshops49972.2020.9209945 article EN 2020-08-09
Coming Soon ...