Yi Yang

ORCID: 0000-0003-1059-7704
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • graph theory and CDMA systems
  • Security in Wireless Sensor Networks
  • Thermal Analysis in Power Transmission
  • Green IT and Sustainability
  • IoT Networks and Protocols
  • Energy Harvesting in Wireless Networks
  • Advanced Fiber Optic Sensors
  • Coding theory and cryptography
  • Semiconductor Lasers and Optical Devices
  • Power Line Communications and Noise
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Optical Network Technologies
  • Indoor and Outdoor Localization Technologies
  • Lightning and Electromagnetic Phenomena
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • Bluetooth and Wireless Communication Technologies
  • Caching and Content Delivery
  • Smart Agriculture and AI
  • UAV Applications and Optimization
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Web Application Security Vulnerabilities
  • Image and Video Quality Assessment

Donghua University
2014-2025

Northwestern Polytechnical University
2024

Institute of Electronics
2024

North China Electric Power University
2023

Beijing University of Posts and Telecommunications
1991-2022

Shandong Academy of Sciences
2022

Qilu University of Technology
2022

Wuhan University
2019-2022

University of South China
2021

Data Assurance and Communication Security
2019

Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge is: how can obtain good approximation fusion result when fraction compromised.To answer this challenge, we...

10.1145/1132905.1132944 article EN 2006-05-22

Sensors deployed to monitor the surrounding environment report such information as event type, location, and time when a real of interest is detected. An adversary may identify source through eavesdropping traffic analysis. Previous work has studied location privacy problem under local model. In this work, we aim provide stronger notion: unobservability, which promises that global cannot know whether ever occurred even if he capable collecting analyzing all messages in network at time....

10.1145/1352533.1352547 article EN 2008-03-31

Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, adversary may reprogram them with malicious code launch various insider attacks. Based on verifying genuineness running program, we propose two distributed software-based attestation schemes well tailored for sensor networks. These based a pseudorandom noise generation mechanism and lightweight block-based...

10.1109/srds.2007.31 article EN 2007-10-01

Modern mobile devices are equipped with multicore-based processors, which introduce new challenges on computation offloading. With the big.LITTLE architecture, instead of only deciding locally or remotely running a task in traditional we have to consider how exploit architecture minimize energy while satisfying application completion time constraints. In this paper, address problem energy-efficient offloading multiple applications. We first formalize as mixed-integer nonlinear programming...

10.1109/infocom.2018.8485875 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Modern city construction focuses on developing smart transportation, but the recognition of large number non-motorized vehicles in is still not sufficient. Compared to fixed equipment, drones have advantages image acquisition due their flexibility and maneuverability. With dataset collected from aerial images taken by drones, this study proposed a novel lightweight architecture for small objection detection based YOLO framework, named EBR-YOLO. Firstly, since targets application scenario are...

10.3390/s25010196 article EN cc-by Sensors 2025-01-01

Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge how can obtain good approximation fusion result when fraction compromised? To answer this challenge, we...

10.1145/1380564.1380568 article EN ACM Transactions on Information and System Security 2008-07-01

This paper explores the existing energy harvesting technologies, their stage of maturity and feasibility for powering sensor nodes. It contains a study requirements nodes that are part commercial domain. Further, it investigates methods concepts from electric magnetic fields present near utility assets through laboratory experimentation. The flux concentrator based approach scavenges field was considered to be most promising solution providing nearly 250 mW power sufficient node.

10.1109/ecce.2009.5316052 article EN 2009-09-01

Maritime transportation has ushered in a period of vigorous development and been the most critical mode transport international trade. communication is also becoming increasingly complex. This trend needs IoT-enabled Transportation System (IMTS) to enhance its ability privacy-preserving, performance continuously, add function joint management. Although many aggregate signcryption (ASC) schemes have presented satisfy this requirement, they still suffer from deficiencies or security...

10.1109/tgcn.2022.3163596 article EN IEEE Transactions on Green Communications and Networking 2022-03-30

Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited attack networks. We call malicious code exploits in worm. Clearly, will serious threat, if most dangerous one, when an attacker simply send single packet compromise entire network. Despite its importance, so far little work...

10.1145/1374618.1374640 article EN 2008-05-26

Computationally intensive applications may quickly drain mobile device batteries. One viable solution to address this problem utilizes computation offloading. The tradeoff is that offloading introduces additional communication, with a corresponding energy cost. Yet, previous research into has failed account for the special characteristics of cellular networks impact consumption. In paper, we aim develop efficient algorithms networks. We analyze effects long tail on task offloading, formalize...

10.1109/icnp.2015.20 article EN 2015-11-01

Significant work has been done on the sensing of utility assets. Most proposed approaches have based principle using few relatively expensive sensors and wireless communication links to provide a sample data status power line. This paper introduces concept distributed line sensornet (PLS) as an alternative approach realizing cost-effective grid monitoring. By way example sensor module is that can be clipped existing following four core functions: continuously monitoring critical parameters...

10.1109/pes.2006.1709566 article EN IEEE Power Engineering Society General Meeting, 2004. 2006-01-01

The task of monitoring asset status and optimizing utilization for the power grid, given millions assets hundreds thousands miles lines distributed over square miles, seems costly, if not impossible. Given traditionally high cost sensing communications, current grid has minimal dasiasmartspsila with much intelligence located at major substations. Dramatic reductions in sensor, computing communications costs, coupled significant performance enhancements increased possibility realizing widely...

10.1109/pes.2009.5275363 article EN 2009-07-01

Utilities require improved monitoring of their assets to ensure reliable power for customers. Sensors presently available in the market cater measuring multiple asset parameters and thus are expensive. This inhibits utilities' ability deploy such sensors on a large scale. paper addresses design implementation low cost self-powered "Stick-on" wireless current temperature sensor that can be mass deployed by utilities. Novel energy harvesting circuit techniques have been discussed shown operate...

10.1109/ecce.2010.5618430 article EN 2010-09-01

LoRa provides new communication solution for wireless underground sensor network. A propagation testing node is presented in this paper. The configuration of the discussed detail. Tests about in-soil were carried out. characteristics related to volumetric water content, burial depth and payload are experimentally evaluated with node. And some suggestions proposed LoRa-based WUSN which applied soil.

10.1109/apcap.2017.8420657 article EN 2017 Sixth Asia-Pacific Conference on Antennas and Propagation (APCAP) 2017-10-01

A widely and massively distributed power line sensor network (PLSN) has been proposed to monitor such a utility asset's status for enhancing reliability maximizing the existing grid utilization. One of its important applications is evaluate real time dynamic overload current capacity overhead lines down `per span' level granularity. How predict conductor temperature ahead subject various conditions most critical challenging task thermal rating. This paper proposes an Echo State Network (ESN)...

10.1109/demped.2009.5292772 article EN IEEE International Symposium on Diagnostics for Electric Machines, Power Electronics and Drives 2009-08-01

The demand for efficient data dissemination/access techniques to find relevant from within a sensor network has led the development of data-centric (DCS) networks, where instead nodes are named based on attributes such as event type or geographic location. However, saving inside also creates security problems due lack tamper resistance and unattended nature network. For example, an attacker may simply locate compromise node storing his interest. To address these problems, we present pDCS,...

10.1109/tmc.2008.168 article EN IEEE Transactions on Mobile Computing 2008-12-08

Smart Wires is a family of three Distributed FACTS (D-FACTS) technologies able to realize low-cost transmission line monitoring and power flow control in meshed networks. will allow utilities increase transfers networks by increasing average utilization. The technology projected have significantly lower cost lead time than alternatives, namely new construction, reconductoring, or conventional technology. This paper overviews the work done date demonstrate feasibility impact technology,...

10.1109/isgteurope.2010.5638853 article EN 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) 2010-10-01

One of the most important Internet Things applications is wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments small scale smart sensors in WBSNs, security, privacy guarantees (e.g., security safety-critical data, sensitive private information) are becoming a challenging issue because these nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious...

10.1109/access.2018.2855408 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract As an important branch of the Internet Things (IoT), Vehicular Ad Hoc Networks (VANETs) have attracted wide attention from industrial and academic. Due to opening wireless channel, security efficiency VANETs also become serious. To enhance efficiency, various batch verification schemes been proposed. However, most those suffer complicated certificate management problem or different kinds attacks. Also,the bilinear pairing which is intractable for lightweight devices in usually be...

10.1002/ett.3857 article EN Transactions on Emerging Telecommunications Technologies 2019-12-27

Dramatic reductions in sensor, computing and communications costs, coupled with significant performance enhancements has increased the possibility of realizing widely massively distributed power line sensor networks (PLSNs) to monitor utility asset status for enhancing reliability utilization. One important applications such a PLSN is evaluate overhead dynamic current capacity down dasiaper spanpsila level granularity. Due inherent non-linearity conductor thermal behavior, it usually quite...

10.1109/ijcnn.2009.5179006 article EN 2009-06-01

The energy consumed by video streaming includes the for data transmission and CPU processing, which are both affected frequency. High frequency can reduce time but it consumes more energy. Low reduces increases then consumption. In this paper, we aim to total of mobile adaptively adjusting Based on real measurement results, model effects TCP throughput system power. these models, propose an Energy-aware Frequency Scaling (EFS) algorithm selects that achieve a balance between saving Since...

10.1109/tmc.2018.2878842 article EN IEEE Transactions on Mobile Computing 2018-10-31

A widely distributed power line sensor network (PLSN) has been proposed to monitor such a utility asset's status. One of its important applications is evaluate the real time dynamic current capacity overhead lines down `per span' level granularity, and thus maximize existing grid utilization. How predict conductor temperature ahead subject various overload conditions most critical challenging task thermal rating. This paper proposes an Echo State Network (ESN) adaptively identify nonlinear...

10.1109/ecce.2009.5316095 article EN 2009-09-01
Coming Soon ...