Bo Ji

ORCID: 0000-0003-0149-7509
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Network Optimization
  • Age of Information Optimization
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Software-Defined Networks and 5G
  • Stochastic Gradient Optimization Techniques
  • Congenital Heart Disease Studies
  • Advanced Bandit Algorithms Research
  • Mobile Ad Hoc Networks
  • Advanced Neural Network Applications
  • Cloud Computing and Resource Management
  • Interconnection Networks and Systems
  • Network Traffic and Congestion Control
  • Optimization and Search Problems
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • IoT Networks and Protocols
  • Virtual Reality Applications and Impacts
  • Advanced Optical Network Technologies
  • Wireless Networks and Protocols
  • Cognitive Radio Networks and Spectrum Sensing
  • Adversarial Robustness in Machine Learning
  • Cognitive Functions and Memory
  • User Authentication and Security Systems
  • Digital Media Forensic Detection

Virginia Tech
2019-2025

National University of Singapore
2021-2025

Zhengzhou University
2003-2024

Chang'an University
2023

Colorado School of Mines
2022

Michigan State University
2022

Zhejiang University
2006-2021

Temple University
2014-2020

University of Rhode Island
2017-2020

Temple College
2014-2019

Nonorthogonal multiple access (NOMA) and mobile edge computing (MEC) have been emerging as promising techniques in narrowband Internet of Things (NB-IoT) systems to provide ubiquitously connected IoT devices with efficient transmission computation. However, the successive interference cancellation (SIC) ordering NOMA has become bottleneck limiting performance improvement for uplink transmission, which is dominant traffic flow NB-IoT communications. Also, order guarantee fairness task...

10.1109/jiot.2018.2875046 article EN publisher-specific-oa IEEE Internet of Things Journal 2018-10-09

We consider the problem of scheduling real-time traffic with hard deadlines in a wireless ad hoc network. In contrast to existing policies that merely ensure minimal timely throughput, our design goal is provide guarantees on both throughput and data freshness terms age-of-information (AoI), which newly proposed metric captures "age" most recently received information at destination link. The main idea introduce AoI as one driving factors making decisions. first prove policy...

10.1145/3209582.3209602 article EN 2018-06-20

Caching at the base stations brings contents closer to users, reduces traffic through backhaul links, and delay experienced by cellular users. The network operator may charge content providers for caching their contents. Moreover, lose users if are not getting desired quality of service, such as maximum tolerable in Video on Demand services. In this paper, we study collaborative problem a multicell-coordinated system from point view minimizing total cost paid providers. We formulate an...

10.1109/tmc.2015.2474364 article EN IEEE Transactions on Mobile Computing 2015-09-25

Network Function Virtualization (NFV) has the potential to significantly reduce capital and operating expenses, shorten product release cycle, improve service agility. In this paper, we focus on minimizing total number of Virtual (VNF) instances provide a specific (possibly at different locations) all flows in network. Certain network security analytics applications may allow fractional processing flow nodes (corresponding datacenters), giving an opportunity for greater optimization...

10.1109/infocom.2017.8057036 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

The multi-armed bandit (MAB) model has been widely adopted for studying many practical optimization problems (network resource allocation, ad placement, crowdsourcing, etc.) with unknown parameters. goal of the player (i.e., decision maker) here is to maximize cumulative reward in face uncertainty. However, basic MAB neglects several important factors system realworld applications, where multiple arms actions) can be simultaneously played and an arm could sometimes "sleeping" unavailable)....

10.1109/infocom.2019.8737461 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Scheduling is a critical and challenging resource allocation mechanism for multihop wireless networks. It well known that scheduling schemes favor links with larger queue length can achieve high throughput performance. However, these queue-length-based could potentially suffer from large (even infinite) packet delays due to the well-known last problem, whereby packets belonging some flows may be excessively delayed lack of subsequent arrivals. Delay-based have potential resolve this problem...

10.1109/tnet.2012.2227790 article EN IEEE/ACM Transactions on Networking 2012-12-06

This paper focuses on testing the current viability of using quantum computers for processing data-driven tasks fueled by emerging data science applications. We test publicly available IBM Grover's algorithm, a well-known search to obtain baseline general evaluations these devices and investigate impacts various factors such as number bits (or qubits), qubit choice, device choice. The main contributions this include new 4-qubit implementation algorithm results showing capabilities computers....

10.1109/bigdata.2018.8622457 article EN 2021 IEEE International Conference on Big Data (Big Data) 2018-12-01

With the advent of Network Function Virtualization (NFV), Physical Functions (PNFs) are gradually being replaced by Virtual (VNFs) that hosted on general purpose servers. Depending call flows for specific services, packets need to pass through an ordered set network functions (physical or virtual) called Service Chains (SFC) before reaching destination. Conceivably next few years during this transition, these networks would have a mix PNFs and VNFs, which brings interesting problems studied...

10.1109/infocom.2018.8485996 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

The multi-armed bandit (MAB) model has been widely adopted for studying many practical optimization problems (network resource allocation, ad placement, crowdsourcing, etc.) with unknown parameters. goal of the player (i.e., decision maker) here is to maximize cumulative reward in face uncertainty. However, basic MAB neglects several important factors system real-world applications, where multiple arms actions) can be simultaneously played and an arm could sometimes "sleeping" unavailable)....

10.1109/tnse.2019.2954310 article EN publisher-specific-oa IEEE Transactions on Network Science and Engineering 2019-11-19

Unmanned aerial vehicles (UAVs) can be used as wireless base stations when cellular networks go down. Prior studies on UAV-based coverage typically consider an Air-to-Ground path loss model, which assumes that the users are outdoor and they located a 2D plane. In this paper, we propose using single UAV to provide for indoor inside high-rise building under disaster situations (such earthquakes or floods), First, present realistic Outdoor-Indoor model describe tradeoff introduced by model....

10.1109/icc.2017.7997403 article EN 2017-05-01

With the advent of Network Function Virtualization (NFV), network services that traditionally run on proprietary dedicated hardware can now be realized using Virtual Functions (VNFs) are hosted general-purpose commodity hardware. This new paradigm offers a great flexibility to Internet service providers (ISPs) for efficiently operating their networks (collecting statistics, enforcing management policies, etc.). However, introducing NFV requires an investment deploy VNFs at certain nodes...

10.1109/infocom.2019.8737400 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It well known that scheduling schemes give higher priority to the link with larger queue length can achieve high throughput performance. However, this queue-length-based approach could potentially suffer from large (even infinite) packet delays due well-known last problem, whereby packets may get excessively delayed lack of subsequent arrivals. Delay-based have potential resolve problem by...

10.1109/infcom.2011.5935084 article EN 2011-04-01

The Internet of Things (IoT) is an emerging technology that proffers to connect massive smart devices together and the Internet. On basis IoT, a city endowed with real-time monitoring, ubiquitous sensing, universal connectivity, intelligent information processing control. An IoT-based can offer various services citizens administrators, thus improving utilization public resources regarding transportation, healthcare, environment, entertainment, energy. integration transmitting, computing,...

10.1109/mnet.2019.1800149 article EN IEEE Network 2019-03-01

The Age-of-Information is an important metric for investigating the timeliness performance in information-update systems. In this paper, we study AoI minimization problem under a new Pull model with replication schemes, where user proactively sends replicated request to multiple servers “pull” information of interest. Interestingly, find that model, schemes capture novel tradeoff between different values across (due random updating processes) and response times servers, which can be...

10.1109/tnet.2020.3041654 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2020-12-10

Structured pruning is a commonly used technique in deploying deep neural networks (DNNs) onto resource-constrained devices. However, the existing methods are usually heuristic, task-specified, and require an extra fine-tuning procedure. To overcome these limitations, we propose framework that compresses DNNs into slimmer architectures with competitive performances significant FLOPs reductions by Only-Train-Once (OTO). OTO contains two keys: (i) partition parameters of zero-invariant groups,...

10.48550/arxiv.2107.07467 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Mixed Reality (MR) devices are being increasingly adopted across a wide range of real-world applications, ranging from education and healthcare to remote work entertainment. However, the unique immersive features MR devices, such as 3D spatial interactions encapsulation virtual objects by invisible elements, introduce new vulnerabilities leading interaction obstruction misdirection. We implemented latency, click redirection, object occlusion, occlusion attacks within collaborative platform...

10.48550/arxiv.2501.16505 preprint EN arXiv (Cornell University) 2025-01-27

10.1109/wacv61041.2025.00243 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

High-resolution Vision-Language Models (VLMs) are widely used in multimodal tasks to enhance accuracy by preserving detailed image information. However, these models often generate an excessive number of visual tokens due the need encode multiple partitions a high-resolution input. Processing such large poses significant computational challenges, particularly for resource-constrained commodity GPUs. To address this challenge, we propose High-Resolution Early Dropping (HiRED), plug-and-play...

10.1609/aaai.v39i2.32171 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

In this paper, we consider the problem of link scheduling in multihop wireless networks under general interference constraints. Our goal is to design schemes that do not use per-flow or per-destination information, maintain a single data queue for each link, and exploit only local while guaranteeing throughput optimality. Although celebrated back-pressure algorithm maximizes throughput, it requires information. It usually difficult obtain type especially large networks, where there are...

10.1109/tnet.2012.2205017 article EN IEEE/ACM Transactions on Networking 2012-07-11

Fueled by advances in distributed deep learning (DDL), recent years have witnessed a rapidly growing demand for resource-intensive distributed/parallel computing to process DDL jobs. To resolve network communication bottleneck and load balancing issues computing, the so-called "ring-all-reduce" decentralized architecture has been increasingly adopted remove need dedicated parameter servers. date, however, there remains lack of theoretical understanding on how design resource optimization...

10.1109/infocom48880.2022.9796785 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Video deblurring has achieved remarkable progress thanks to the success of deep neural networks. Most methods solve for end-to-end with limited information propagation from video sequence. However, different frame regions exhibit characteristics and should be provided corresponding relevant information. To achieve fine-grained deblurring, we designed a memory branch memorize blurry-sharp feature pairs in bank, thus providing useful blurry query input. enrich our further bidirectional...

10.1109/cvpr52688.2022.00196 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

The Age-of-Information (AoI) has recently been proposed as an important metric for investigating the timeliness performance in information-update systems.Prior studies on AoI optimization often consider a Push model, which is concerned about when and how to "push" (i.e., generate transmit) updated information user.In stark contrast, this paper we introduce new Pull more relevant certain applications (such real-time stock quotes service), where user sends requests servers proactively "pull"...

10.1109/glocom.2017.8254040 preprint EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Unmanned aerial vehicles (UAVs) can be used as wireless base stations when cellular networks go down. Prior studies on UAV-based coverage typically consider downlink scenarios from an station to ground users. In this paper, we uplink scenario under disaster situations (such earthquakes or floods), are We formulate the placement problem of UAVs, where objective is determine locations a set UAVs that maximize time duration transmission until first device runs out energy. prove NP-complete. Due...

10.1109/tgcn.2019.2930642 article EN publisher-specific-oa IEEE Transactions on Green Communications and Networking 2019-07-23
Coming Soon ...