Sanglu Lu

ORCID: 0000-0003-1467-4519
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Indoor and Outdoor Localization Technologies
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • RFID technology advancements
  • Wireless Networks and Protocols
  • Network Traffic and Congestion Control
  • Energy Harvesting in Wireless Networks
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • Privacy-Preserving Technologies in Data
  • Advanced MIMO Systems Optimization
  • Image and Video Quality Assessment
  • Hand Gesture Recognition Systems
  • Age of Information Optimization
  • Context-Aware Activity Recognition Systems
  • Robotics and Sensor-Based Localization
  • QR Code Applications and Technologies
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques

Nanjing University
2016-2025

Nanjing University of Science and Technology
2006-2017

Wikimedia Foundation
2017

University of Washington
2017

Shandong University
2017

Northwestern University
2017

University of Minnesota
2017

Drexel University
2017

Victoria University of Wellington
2017

University of Central Florida
2017

Some pioneer WiFi signal based human activity recognition systems have been proposed. Their key limitation lies in the lack of a model that can quantitatively correlate CSI dynamics and activities. In this paper, we propose CARM, Activity Recognition Monitoring system. CARM has two theoretical underpinnings: CSI-speed model, which quantifies correlation between value movement speeds, CSI-activity speeds different body parts specific activity. By these models, build uses as profiling...

10.1145/2789168.2790093 article EN 2015-08-27

Since human bodies are good reflectors of wireless signals, activities can be recognized by monitoring changes in WiFi signals. However, existing WiFi-based activity recognition systems do not build models that quantify the correlation between signal dynamics and activities. In this paper, we propose a Channel State Information (CSI)-based Activity Recognition Monitoring system (CARM). CARM is based on two theoretical models. First, CSI-speed model quantifies relation CSI movement speeds....

10.1109/jsac.2017.2679658 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2017-03-10

Sensor-based human activity recognition is a fundamental research problem in ubiquitous computing, which uses the rich sensing data from multimodal embedded sensors such as accelerometer and gyroscope to infer activities. The existing approaches either rely on domain knowledge or fail address spatial-temporal dependencies of signals. In this paper, we propose novel attention-based neural network model called AttnSense for recognition. introduce framework combining attention mechanism with...

10.24963/ijcai.2019/431 article EN 2019-07-28

Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how quickly estimate the number distinct tags without reading each tag individually. This plays a crucial role many real-time monitoring privacy-preserving applications. In this paper, we present an efficient anonymous scheme for population estimation. leverages position first reply from group...

10.1109/infcom.2010.5461944 article EN 2010-03-01

The limited battery capacity of sensor nodes has become one the most critical impediments that stunt deployment wireless networks (WSNs). Recent breakthroughs in energy transfer and rechargeable lithium batteries provide a promising alternative to power WSNs: mobile vehicles/robots carrying high volume serve as chargers periodically deliver nodes. In this paper, we consider how schedule multiple optimize usage effectiveness, such every will not run out energy. We introduce novel charging...

10.1109/tc.2013.2297926 article EN IEEE Transactions on Computers 2014-01-31

The limited battery capacity of sensor nodes has become the biggest impediment to wireless network (WSN) applications. Two recent breakthroughs in areas energy transfer and rechargeable lithium batteries promise use mobile vehicles, with high volume batteries, as chargers that wirelessly. In this paper, for first time, we envision a novel charging paradigm: collaborative charging, where are allowed charge each other. We investigate problem scheduling multiple chargers, which collaboratively...

10.1109/mass.2012.6502505 article EN 2012-10-01

Recently, gesture recognition has gained considerable attention in emerging applications (e.g., AR/VR systems) to provide a better user experience for human-computer interaction. Existing solutions usually recognize the gestures based on wearable sensors or specialized signals WiFi, acoustic and visible light), but they are either incurring high energy consumption susceptible ambient environment, which prevents them from efficiently sensing fine-grained finger movements. In this paper, we...

10.1109/infocom.2018.8486346 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

This paper considers a category of rogue access points (APs) that pretend to be legitimate APs lure users connect them. We propose practical timing-based technique allows the user avoid connecting APs. Our detection scheme is client-centric approach employs round trip time between and DNS server independently determine whether an AP without assistance from WLAN operator. implemented our on commercially available wireless cards evaluate their performance. Extensive experiments have...

10.1109/tpds.2011.125 article EN IEEE Transactions on Parallel and Distributed Systems 2011-09-12

As tenants take networked virtual machines (VMs) as their requirements, effective placement of VMs is needed to reduce the network cost in cloud data centers. The one major concerns for providers. In addition caused by traffics (N-cost), utilization physical (PM-cost) also non-negligible. this paper, we focus on optimized minimize cost, combination N-cost and PM-cost. We define various functions, according different communication models. formulate problem, prove it be NP-hard. investigate...

10.1109/infocom.2014.6848123 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Mobile-edge cloud computing is a new paradigm to provide capabilities at the edge of pervasive radio access networks in close proximity mobile users. Aiming provisioning flexible on-demand mobile-edge service, this paper we propose comprehensive framework consisting resource-efficient computation offloading mechanism for users and joint communication (JCC) resource allocation network operator. Specifically, first study problem user, order reduce user's occupation by determining its optimal...

10.1109/tvt.2018.2846232 article EN IEEE Transactions on Vehicular Technology 2018-06-11

The Multipath TCP (MPTCP) protocol has been standardized by the IETF as an extension of conventional TCP, which enables multi-homed devices to establish multiple paths for simultaneous data transmission. Congestion control is a fundamental mechanism design and implementation MPTCP. Due diverse QoS characteristics heterogeneous links, existing multipath congestion mechanisms suffer from number performance problems such bufferbloat, suboptimal bandwidth usage, etc. In this paper, we propose...

10.1109/jsac.2019.2933761 article EN IEEE Journal on Selected Areas in Communications 2019-08-08

Network virtualization has emerged as a promising approach to overcome the ossification of Internet. A major challenge in network is so-called virtual embedding problem, which deals with efficient networks resource constraints into shared substrate network. number heuristics have been proposed cope NP-hardness this problem; however, all existing proposals reserve fixed resources throughout entire lifetime In paper, we re-examine problem position that time-varying requirements should be taken...

10.1109/tpds.2013.64 article EN IEEE Transactions on Parallel and Distributed Systems 2013-10-28

Due to the widespread use of mobile devices, it is essential authenticate users on devices prevent sensitive information leakage. In this paper, we propose TouchID, which combinedly uses touch sensor and inertial for gesture analysis, provide a based user authentication scheme. Specifically, TouchID utilizes analyze on-screen while using device's motion caused by gesture, then combines unique features from authentication. To mitigate intra-class difference reduce inter-class similarity,...

10.1145/3432192 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2020-12-17

Social psychology and neuroscience had confirmed that emotion state exerts a significant effect on human communication, perception, social behavior decision making. With the wide availability of smartphones equipped with microphone, accelerometer, GPS, other source sensors, it is worthwhile to explore possibility automatic detection via smartphone sensing. Particularly, we focus novel research problem tries detect compound (a set multiple dimensional basic emotions) users. We observe users'...

10.1145/3161414 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2018-01-08

The booming of Convolutional Neural Networks (CNNs) has empowered lots computer-vision applications. Due to its stringent requirement for computing resources, substantial research been conducted on how optimize deployment and execution resource-constrained devices. However, previous works have several weaknesses, including limited support various CNN structures, fixed scheduling strategies, overlapped computations, high synchronization overheads, etc. In this article, we present DeepSlicing,...

10.1109/tpds.2021.3058532 article EN IEEE Transactions on Parallel and Distributed Systems 2021-02-11

Wireless Sensor Networks (WSNs) are key for various applications that involve long-term and low-cost monitoring actuating. In these applications, sensor nodes use batteries as the sole energy source. Therefore, efficiency becomes critical. We observe many WSN require redundant to achieve fault tolerance Quality of Service (QoS) sensing. However, same redundancy may not be necessary multihop communication because light traffic load stable wireless links. this paper, we present a novel...

10.1109/tpds.2011.305 article EN IEEE Transactions on Parallel and Distributed Systems 2011-12-13

The advances of Radio-Frequency Identification (RFID) technology have significantly enhanced the capability capturing data from pervasive space. It becomes a great challenge in information era to effectively understand human behavior, mobility and activity through perceived RFID data. Focusing on management, this article provides an overview current challenges, emerging opportunities recent progresses RFID. In particular, has described analyzed research work three aspects: algorithm,...

10.1109/surv.2014.022614.00143 article EN IEEE Communications Surveys & Tutorials 2014-01-01

Network virtualization provides a promising way to overcome Internet ossification. A major challenge is virtual network mapping, i.e., how embed multiple requests with resource constraints into substrate network, such that physical resources are utilized in an efficient and effective manner. Since this problem known be NP-complete, variety of heuristic algorithms have been proposed. In paper, we re-examine propose mapping framework, ORS TA, which based on Opportunistic Resource Sharing...

10.1109/infcom.2012.6195630 article EN 2012-03-01

Wireless power transfer is a promising technology to extend the lifetime of, and thus enhance usability energy-hungry battery-powered devices. It enables energy be wirelessly transmitted from chargers receiving Existing studies have mainly focused on maximizing network lifetime, optimizing charging efficiency, minimizing delay, etc. Different these works, our objective optimize quality in 2-D target area. Specifically, we consider following charger Placement Power allocation Problem (P <sup...

10.1109/infocom.2015.7218622 article EN 2015-04-01

As an important indicator of autonomic regulation for circulatory function, Heart Rate Variability (HRV) is widely used general health evaluation. Apart from using dedicated devices (e.g, ECG) in a wired manner, current methods search ubiquitous manner by either wearable devices, which suffer low accuracy and limited battery life, or applying wireless techniques (e.g., FMCW), usually utilize USRP) the measurement. To address these issues, we present RF-ECG based on Commercial-Off-The-Shelf...

10.1145/3214288 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2018-07-05

Wireless power transfer is a promising technology used to extend the lifetime of, and thus enhance usability energy-hungry battery-powered devices. It enables energy be wirelessly transmitted from chargers energy-receiving Existing studies have mainly focused on maximizing network lifetime, optimizing charging efficiency, minimizing delay, etc. In this paper, we consider wireless service provision in two-dimensional target area focus quality, where of each charger adjustable. We first...

10.1109/tmc.2017.2771425 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2017-11-08

Real-time on-device object detection for video analytics fails to meet the accuracy requirement due limited resources of mobile devices while offloading inference edges is time-consuming transference data over edge networks. Based on system with both tracking and edge-assisted analysis, we formulate a non-linear time-coupled program time, maximizing overall by deciding frequency inference, under consideration dynamic networks constrained latency. We then design learning-based online...

10.1109/infocom42981.2021.9488741 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2021-05-10

Mobile Edge Computing (MEC) has become an attractive solution to enhance the computing and storage capacity of mobile devices by leveraging available resources on edge nodes. In MEC, arrivals tasks are highly dynamic hard predict precisely. It is great importance yet very challenging assign nodes with guaranteed system performance. this article, we aim optimize revenue earned each node optimally offloading We formulate revenue-driven online task (ROTO) problem, which proved be NP-hard. first...

10.1109/tpds.2021.3105325 article EN IEEE Transactions on Parallel and Distributed Systems 2021-08-18
Coming Soon ...