Zhenyu Li

ORCID: 0000-0002-9959-1124
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Image and Video Quality Assessment
  • Network Traffic and Congestion Control
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Opportunistic and Delay-Tolerant Networks
  • Software System Performance and Reliability
  • Cloud Computing and Resource Management
  • Anomaly Detection Techniques and Applications
  • Plant and animal studies
  • Image Processing Techniques and Applications
  • Advanced Data Storage Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Video Coding and Compression Technologies
  • Multimedia Communication and Technology
  • Plant and Fungal Species Descriptions
  • Plant Diversity and Evolution
  • Indoor and Outdoor Localization Technologies
  • Complex Network Analysis Techniques
  • Network Packet Processing and Optimization
  • Sparse and Compressive Sensing Techniques
  • Cooperative Communication and Network Coding
  • Ureteral procedures and complications

Institute of Computing Technology
2016-2025

University of Chinese Academy of Sciences
2008-2025

Shijiazhuang Yiling Pharmaceutical (China)
2025

Chinese Academy of Sciences
2015-2024

Purple Mountain Laboratories
2019-2024

Institute of Botany
2007-2024

International Centre for Theoretical Physics Asia-Pacific
2015-2024

Peking University
2023-2024

Peking University First Hospital
2023-2024

Shandong University of Science and Technology
2022-2023

Abstract Chirita D. Don, a large genus in the subfamily Cyrtandroideae of Gesneriaceae, has been subject much debate whether it is natural group or not. In addition, highly heterogeneous also very problematic with regard to delimitation and subdivision. Here we used nrDNA internal transcribed spacer cpDNA trnL-F for molecular phylogenetic analaysis, combined morphological data. Our results suggest that an artificial, polyphyletic genus. The most important character defines Chirita,...

10.1111/j.1759-6831.2010.00113.x article EN Journal of Systematics and Evolution 2011-01-01

In this paper, we examine mobile users' behavior and their corresponding video viewing patterns from logs extracted the servers of a large scale VoD system. We focus on analysis main discrepancies that might exist when users access system catalog WiFi or 3G connections. also study factors impact interests popularity. The exhibits strong daily weekly patterns, with being surprisingly spread across almost all categories lengths, independently connection type. However, by examining activity...

10.1145/2398776.2398797 preprint EN 2012-11-14

Content-centric networking (CCN) is a promising framework to rebuild the Internet's forwarding substrate around concept of content. CCN advocates ubiquitous in-network caching enhance content delivery, and thus each router has storage space cache frequently requested In this work, we focus on allocation problem, namely, how distribute capacity across routers under constrained total budget for network. We first formulate problem as placement obtain optimal solution by two-step method. then...

10.1109/tc.2015.2409848 article EN IEEE Transactions on Computers 2015-03-09

Depth estimation is an important computer vision problem with many practical applications to mobile devices. While solutions have been proposed for this task, they are usually very computationally expensive and thus not applicable on-device inference. To address problem, we introduce the first Mobile AI challenge, where target develop end-to-end deep learning-based depth that can demonstrate a nearly real-time performance on smartphones IoT platforms. For this, participants were provided new...

10.1109/cvprw53098.2021.00288 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2021-06-01

ABR algorithms dynamically select the bitrate of chunks based on network capacity. To estimate capacity, most use throughput prediction while recent works start to leverage delivery time prediction. We in this paper examine all components predictor for algorithms, i.e., input features, mapping function and output target. build an automated video streaming measurement platform, collect extensive dataset under various environments, containing 2500+ sessions. Through analysis, we find that...

10.1109/infocom48880.2022.9796948 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Low-latency live streaming has imposed stringent latency requirements on video transport networks. In this paper we report the design and operation of Alibaba low-latency network, LiveNet. LiveNet builds a flat CDN overlay with centralized controller for global optimization. As part this, present our routing computation path assignment, as well fast data transmission architecture fine-grained control frames. The performance results obtained from three years demonstrate effectiveness in...

10.1145/3544216.3544236 article EN 2022-08-11

Collabieae (Orchidaceae) is a long neglected tribe with confusing tribal and generic delimitation little-understood phylogenetic relationships. Using plastid matK, psaB, rbcL, trnH-psbA DNA sequences morphological evidence, the relationships within were assessed as basis for revising their delimitation. (including previously misplaced mycoheterotrophic Risleya) supported monophyletic nested superclade that also includes Epidendreae, Podochileae, Cymbidieae Vandeae. Risleya in Collabiinae...

10.1371/journal.pone.0087625 article EN cc-by PLoS ONE 2014-01-31

Content Centric Networking (CCN) performance by definition depends on the in-network caching efficiency. We propose CodingCache which utilizes network coding and random forwarding to improve efficiency under multipath forwarding. Its advantage is that existing strategies can be easily incorporated with it for better performance. evaluate extensive simulation experiments China Telecom topology a unique dataset consisting of video access logs from PPTV system. The results demonstrate compared...

10.1145/2491224.2491240 article EN 2013-08-12

The pantropical genus Bauhinia, along with the northern temperate Cercis and several tropical genera, bear bilobate, bifoliolate, or sometimes unifoliolate leaves, which constitute tribe Cercideae as sister to rest of family Leguminosae based on molecular phylogenetics. Hence, fossil record is pivotal understand early evolution biogeographic history legumes. Three species Bauhinia were described from Oligocene Ningming Formation Guangxi, South China. ningmingensis sp. nov. characterized by...

10.1186/1471-2148-14-88 article EN cc-by BMC Evolutionary Biology 2014-01-01

Consistency maintenance mechanism is necessary for the emerging Peer-to-Peer applications due to their frequent data updates. Centralized approaches suffer single point of failure, while previous decentralized incur too many duplicate update messages because locality-ignorant structures. To address this issue, we propose a scalable and efficient consistency scheme heterogeneous P2P systems. Our takes heterogeneity nature into account forms replica nodes key locality-aware hierarchical...

10.1109/tpds.2008.46 article EN IEEE Transactions on Parallel and Distributed Systems 2008-10-07

Streaming live content to mobile terminals has become prevalent. While there are extensive measurement studies of non-mobile streaming (and in particular P2P streaming) and video-on-demand (both non-mobile), user behavior systems is yet be explored. This paper relies on over 4 million access logs collected from the PPTV system study viewing activity pattern, with emphasis discrepancies that might exist when users catalog terminals. We observe high rates abandoned sessions for identify...

10.1145/2740908.2743054 preprint EN 2015-05-18

Open vSwitch (OvS) has been widely used in cloud networks view of its programmability and flexibility. However, we observe a huge performance drop when it loads practical networking services (e.g., tunneling firewalling). Our further analysis reveals that the root cause lies gap between needs supporting various selections packet header fields one-size-fits-all data path vanilla OvS. Motivated by this, design Hoda, high-performance OvS dataplane with multiple specialized paths. Specifically,...

10.1145/3627703.3629564 article EN 2024-04-18

Increasing bandwidth demands of mobile video streaming pose a challenge in optimizing the Quality Experience (QoE) for better user engagement. Multipath transmission promises to extend network capacity by utilizing multiple wireless links simultaneously. Previous studies mainly tune packet scheduler multipath transmission, expecting higher QoE accelerating transmission. However, since Adaptive BitRate (ABR) algorithms overlook impact scheduling on throughput prediction, adaptive can even...

10.1145/3636534.3649359 article EN cc-by Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2024-05-29

The widespread availability of smart mobile terminals along with the ever increasing bandwidth capabilities has promoted popularity Internet video systems. Understanding geographic features content consumption is an extreme importance for design and performance optimization a delivery system. This paper first step towards characterization patterns large-scale commercial video-on-demand (VoD) system, by measuring both uniformity intensity interests on videos. In particular, we identify...

10.1109/infocom.2014.6847962 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Cloud storage services are serving a rapidly increasing number of mobile users. However, little is known about the differences between and traditional cloud at scale. In order to understand user access behavior, we analyzed dataset 350 million HTTP request logs from large-scale service. This paper presents our results discusses implications for system design network performance. Our key observation that examined service dominated by uploads, vast majority users rarely retrieve their uploads...

10.1145/2987443.2987465 article EN 2016-11-10

This article presents SOFIA, a service-oriented information-centric networking architecture. SOFIA is designed by exploring the design space between host abstraction and content abstraction. It can facilitate ICN to easily support various applications beyond retrieval. decouples flexible service processing efficient data transmission into two stack layers: network layers. Service requesting driven name processed intermediate routers according rules at layer. Applications build on layer...

10.1109/mnet.2014.6843227 article EN IEEE Network 2014-05-01

Video delivery performance is the main factor that affects Internet video quality. Characterizing performance, especially throughput, can help content providers as well service (ISPs) in system optimization and network planning. Based on a unique dataset consisting of 20 million download speed measurements , this paper comprehensively studies throughput large-scale commercial video-on- demand (VoD) system. We observe user exhibits large variation over time day across provincial locations. In...

10.1109/tmm.2015.2417771 article EN IEEE Transactions on Multimedia 2015-03-29

In mobile live streaming systems, users have fairly limited interactions with objects due to the constraints coming from devices and event-driven nature of content. The could lead unique user behavior characteristics, which yet be explored. This paper investigates over 9 million access logs collected PPTV system, an emphasis on discrepancies that might exist when catalog nonmobile terminals. We observe a much higher likelihood abandoning sessions by examine structure abandoned perspectives...

10.1109/tcsvt.2016.2595325 article EN IEEE Transactions on Circuits and Systems for Video Technology 2016-07-27

The attacks, faults, and severe communication/system conditions in Mobile Crowd Sensing (MCS) make false data detection a critical problem. Observing the intrinsic low dimensionality of general monitoring sparsity data, can be performed based on separation normal anomalies. Although existing algorithm Direct Robust Matrix Factorization (DRMF) is proven to effective, requiring iteratively performing Singular Value Decomposition (SVD) for low-rank matrix approximation would result...

10.1109/tnet.2020.2982685 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2020-04-16
Coming Soon ...