Ke Luo

ORCID: 0000-0003-0118-7236
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Robotics and Sensor-Based Localization
  • Blockchain Technology Applications and Security
  • Age of Information Optimization
  • Advanced Image and Video Retrieval Techniques
  • Privacy-Preserving Technologies in Data
  • Advanced Vision and Imaging
  • Context-Aware Activity Recognition Systems
  • Chaos-based Image/Signal Encryption
  • Video Surveillance and Tracking Methods
  • Advanced Graph Neural Networks
  • Scientific Computing and Data Management
  • Robotic Path Planning Algorithms
  • Digital Media Forensic Detection
  • Bioinformatics and Genomic Networks
  • Advanced Steganography and Watermarking Techniques
  • Image Enhancement Techniques
  • Interconnection Networks and Systems
  • Graph Theory and Algorithms
  • Stochastic Gradient Optimization Techniques
  • Embedded Systems Design Techniques
  • Advanced Neural Network Applications
  • Modular Robots and Swarm Intelligence
  • Parallel Computing and Optimization Techniques

Sun Yat-sen University
2018-2024

Institute of Agricultural Resources and Regional Planning
2024

Chinese Academy of Agricultural Sciences
2024

Shaoyang University
2012-2022

Tiandi Science & Technology (China)
2020-2021

Changzhou Architectural Research Institute Group (China)
2020-2021

China Coal Technology and Engineering Group Corp (China)
2021

Tianjin University
2021

Changsha University of Science and Technology
2006

Hunan University
2004

With the breakthroughs in deep learning, recent years have witnessed a booming of artificial intelligence (AI) applications and services, spanning from personal assistant to recommendation systems video/audio surveillance. More recently, with proliferation mobile computing Internet Things (IoT), billions IoT devices are connected Internet, generating zillions bytes data at network edge. Driving by this trend, there is an urgent need push AI frontiers edge so as fully unleash potential big...

10.1109/jproc.2019.2918951 article EN Proceedings of the IEEE 2019-06-12

With the wide penetration of smart robots in multifarious fields, simultaneous localization and mapping (SLAM) technique robotics has attracted growing attention community. Yet collaborating SLAM over multiple still remains challenging due to performance contradiction between intensive graphics computation limited computing capability robots. While traditional solutions resort powerful cloud servers acting as an external provider, we show by real-world measurements that significant...

10.1109/jiot.2022.3146461 article EN IEEE Internet of Things Journal 2022-01-27

The Yellow River Delta (YRD), known for its vast and diverse wetland ecosystem, is the largest estuarine delta in China. However, human activities climate change have significantly degraded ecosystem recent decades YRD. Therefore, an understanding of land use modifications essential efficient management preservation ecosystems this region. This study utilized time series remote sensing data extreme gradient boosting method to generate maps YRD from 2000 2020. Several methods, including...

10.3390/rs16111946 article EN cc-by Remote Sensing 2024-05-28

Three-dimensional magnetic recording (3DMR) is a highly promising approach to achieving ultra-large data storage capacity in hard disk drives. One of the greatest challenges for 3DMR lies performing sequential and correct writing bits into multi-layer medium. In this work, we have proposed hierarchical architecture based on layered heat-assisted with multi-head array. The feasibility validated dual-layer system FePt-based thin films via micromagnetic simulation. Our results reveal...

10.48550/arxiv.2501.16053 preprint EN arXiv (Cornell University) 2025-01-27

Recently, the explosion of resource-hungry and delay-sensitive Internet-of-Things (IoT) applications as exemplified by wearable appliances, video surveillance, connected vehicles have posed great challenges on underlying IoT devices which typically limited computation resource. In response, offloading is envisioned a promising approach to augmenting capability devices. Toward real-time efficient offloading, in this paper we propose novel edge resource pooling framework, massive crowd at...

10.1109/jiot.2018.2882588 article EN IEEE Internet of Things Journal 2018-11-21

With the breakthroughs in deep learning, recent years have witnessed a booming of artificial intelligence (AI) applications and services, spanning from personal assistant to recommendation systems video/audio surveillance. More recently, with proliferation mobile computing Internet-of-Things (IoT), billions IoT devices are connected Internet, generating zillions Bytes data at network edge. Driving by this trend, there is an urgent need push AI frontiers edge so as fully unleash potential big...

10.48550/arxiv.1905.10083 preprint EN other-oa arXiv (Cornell University) 2019-01-01

In many delay-sensitive monitoring and surveillance applications, unmanned aerial vehicles (UAVs) can act as edge servers in the air to coordinate with base stations (BSs) for in-situ data collection processing achieve real-time situation awareness. order ensure long-term freshness requirements of awareness, a swarm UAVs need fly frequently among different sensing regions. However, nonstop flying may quickly drain batteries armed UAVs, hence an energy-efficient algorithm UAVs' dynamic...

10.1109/iccc49849.2020.9238897 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2020-08-09

Graph Neural Networks (GNNs) have gained growing interest in miscellaneous applications owing to their outstanding ability extracting latent representation on graph structures. To render GNN-based service for IoT-driven smart applications, the traditional model serving paradigm resorts cloud by fully uploading geo-distributed input data remote datacenter. However, our empirical measurements reveal significant communication overhead of such cloud-based and highlight profound potential...

10.1145/3485447.3511982 article EN Proceedings of the ACM Web Conference 2022 2022-04-25

Federated Learning (FL) has been a promising paradigm in distributed machine learning that enables in-situ model training and global aggregation. While it can well preserve private data for end users, to apply efficiently on IoT devices yet suffer from their inherent variants: available computing resources are typically constrained, heterogeneous, changing dynamically. Existing works deploy FL by pruning sparse or adopting tiny counterpart, which alleviates the workload but may have negative...

10.1145/3545008.3545015 article EN 2022-08-29

With wide penetration of smart robots in many application fields, Simultaneous Localization And Mapping (SLAM) has attracted great attention the community. Yet performance issue on multi-robot SLAM still remains challenging due to contradiction constrained on-device resources and intensive graphics computation. While traditional approaches resort powerful cloud servers accelerate computing, we show by real-world measurements that significant communication overhead prevents its practicability...

10.1109/iccc52777.2021.9580413 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2021-07-28

Graph Neural Networks (GNNs) have gained growing interest in miscellaneous applications owing to their outstanding ability extracting latent representation on graph structures. To render GNN-based service for IoT-driven smart applications, traditional model serving paradigms usually resort the cloud by fully uploading geo-distributed input data remote datacenters. However, our empirical measurements reveal significant communication overhead of such cloud-based and highlight profound...

10.1109/tnet.2023.3293052 article EN IEEE/ACM Transactions on Networking 2023-07-20

The explosion of resource-hungry mobile applications has posed great challenges on the underlying devices which typically have limited computation resource. In response, device-to-device (D2D) offloading is envisioned as a promising approach to problem by gearing resource-rich and resource-poor devices. Towards real-time efficient offloading, in this paper, we proposed novel edge resource pooling framework called ERP, massive crowd at network exploit D2D collaboration for sharing with each...

10.23919/wiopt.2018.8362882 article EN 2018-05-01

To identify dense and small-size pedestrians in surveillance systems, high-resolution cameras are widely deployed, where images captured delivered to off-the-shelf pedestrian detection models. However, given the highly computation-intensive workload brought by high resolution, resource-constrained fail afford accurate inference real time. address that, we propose Hode, an offloaded video analytic framework that utilizes multiple edge nodes proximity expedite with inputs. Specifically, Hode...

10.1109/icc45041.2023.10278678 article EN ICC 2022 - IEEE International Conference on Communications 2023-05-28

In view of the fact that accuracy texture image classification is easily affected by changes in illumination and rotation, based on analysis geometric curvatures information microscopic surface completed local binary pattern (CLBP), this paper proposed a new descriptor, named as Geometry-based Completed Local Binary Pattern (GCLBP). Inspired continuous rotation invariance robustness curvature information, principal (PCs) all pixels are first calculated then used to represent gradient...

10.1109/icicsp50920.2020.9232056 article EN 2020-09-01

An algorithm is called stable at a training set S if any change of single point in yields only small the output. Stability learning necessary for learnability supervised classification and regression setting. In this paper, we give formal definitions strong weak stability randomized algorithms prove non-asymptotic bounds on difference between empirical expected error.

10.1109/icct.2012.6511323 article EN 2012-11-01

To reduce invalid rules in the mining of association rules, we have analyzed reasons and presented a relative confidence judgment criteria. Based on value confidence, classify strong into positive, negative rules. We offer an algorithm with new criterion make tests Visual FoxPro. The indicate that method stated this paper can obviously

10.1109/icmlc.2003.1264448 article EN 2004-05-13

Target tracking is currently a hot research topic in machine vision. The traditional target algorithm based on the generative model selects features manually, which has simple structure and fast running speed, but it cannot meet requirements of accuracy complex scenes. Compared with algorithms, due to good performance, method full convolutional network become one important methods tracking. However, RPN-based Siamese lacks positional reliability when predicting area. Aiming at low network,...

10.1155/2021/9127092 article EN Mathematical Problems in Engineering 2021-10-01
Coming Soon ...