- Indoor and Outdoor Localization Technologies
- Privacy-Preserving Technologies in Data
- Energy Efficient Wireless Sensor Networks
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Wireless Networks and Protocols
- Underwater Vehicles and Communication Systems
- Cloud Computing and Resource Management
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Energy Harvesting in Wireless Networks
- Caching and Content Delivery
- Speech and Audio Processing
- Mobile Crowdsensing and Crowdsourcing
- Anomaly Detection Techniques and Applications
- UAV Applications and Optimization
- RFID technology advancements
- Wireless Communication Security Techniques
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- User Authentication and Security Systems
- Video Surveillance and Tracking Methods
- Distributed Control Multi-Agent Systems
Nanjing University of Posts and Telecommunications
2016-2025
Hong Kong Polytechnic University
2006-2024
Peking University People's Hospital
2024
Peking University
2024
Shanghai Research Center for Wireless Communications
2013-2023
Jilin University
2021-2023
Shell (Netherlands)
2023
University of Colorado Colorado Springs
2023
Nanjing Institute of Technology
2023
Hebei University of Technology
2021
Due to rapid developments of smart devices and mobile applications, there is an urgent need for a new human-in-the-loop architecture with better system efficiency user experience. Compared conventional device-based human-computer interactive (HCI) methods, device-free technology WiFi provides HCI method promising providing user-perceived quality-of-experience. Being essential human detection has gained increasing interest, which through-the-wall (TTW) great challenge. Existing TTW systems...
Exploiting radio frequency signals is promising for locating and tracking objects. Prior works focus on per-tag localization, in which each object attached with one tag. In this paper, we propose a comprehensive localization scheme by attaching two RFID tags to object. Instead of using pattern, adding one-more tag the exhibits several benefits: 1) providing rich freedom reader's antenna spacing placement; 2) supporting accurate calibration location spacing, 3) enabling fine-grained...
In this paper, a distributed filtering scheme is presented to deal with the fault detection problem of nonlinear stochastic systems wireless sensor networks (WSNs). The systems, which are discrete-time form, represented by interval type-2 (IT2) Takagi-Sugeno (T-S) fuzzy models. Each WSN can receive measurements from itself and its neighboring sensors subject deterministic interconnection topology. Independent random variables obeying Bernoulli distribution formulated characterize randomly...
As the infrastructure of intelligent transportation system, vehicular ad hoc networks (VANETs) have greatly improved traffic efficiency. However, due to openness characteristics VANETs, trust and privacy are still two challenging issues in building a more secure network environment: it is difficult protect vehicles meanwhile determine whether message sent by vehicle credible. In this article, blockchain-based management model, combined with conditional privacy-preserving announcement scheme...
Understanding and predicting cellular traffic at large-scale fine-granularity is beneficial valuable to mobile users, wireless carriers, city authorities. Predicting in modern metropolis particularly challenging because of the tremendous temporal spatial dynamics introduced by diverse user Internet behaviors frequent mobility citywide. In this paper, we characterize investigate root causes such through a big usage dataset covering 1.5 million users 5,929 cell towers major China. We reveal...
Mobile crowdsensing has shown elegant capacity in data collection and given rise to numerous applications. In the sense of coverage quality, marginal works have considered efficient (less cost) effective (considerable coverage) design for mobile networks. We investigate optimal quality-aware The difference between ours conventional problem is that we only select a subset users so quality maximized with constrained budget. To address this new problem, which proved be NP-hard, first prove set...
Cloud computing offers the possibility to store and process massive amounts of remotely sensed hyperspectral data in a distributed way. Dimensionality reduction is an important task imaging, as often contains redundancy that can be removed prior analysis repositories. In this regard, development dimensionality techniques cloud environments provide both efficient storage preprocessing data. paper, we develop parallel implementation widely used technique for reduction: principal component...
Infrared small target detection technology is one of the key technologies in field computer vision. In recent years, several methods have been proposed for detecting infrared targets. However, existing are highly sensitive to challenging heterogeneous backgrounds, which mainly due to: 1) images containing mostly heavy clouds and chaotic sea backgrounds 2) inefficiency utilizing structural prior knowledge target. this article, we propose a novel approach order take both self-correlation...
With the increasing popularity of location-based services (LBSs), it is paramount importance to preserve one's location privacy. The commonly used privacy preserving approach, k-anonymity, strives aggregate queries k nearby users within a so-called cloaked region via trusted third-party anonymizer. As such, probability identify every user involved no more than 1/k, thus offering preservation for users. One inherent limitation however, that all are assumed be and report their real locations....
Water quality prediction has great significance for water environment protection. A method based on the Improved Grey Relational Analysis (IGRA) algorithm and a Long-Short Term Memory (LSTM) neural network is proposed in this paper. Firstly, considering multivariate correlation of information, IGRA, terms similarity proximity, to make feature selection information. Secondly, time sequence model LSTM, whose inputs are features obtained by established. Finally, applied two actual datasets: Tai...
Data mining has heralded the major breakthrough in data analysis, serving as a "super cruncher" to discover hidden information and valuable knowledge big systems. For many applications, collection of usually involves various parties who are interested pooling their private sets together jointly train machine-learning models that yield more accurate prediction results. However, owners may not be willing disclose own due privacy concerns, making it imperative provide guarantee collaborative...
Accurate and sufficient location information is the prerequisite for most wireless sensor networks (WSNs) applications. Existing range-based localization approaches often suffer from incomplete corrupted range measurements. Recently, some matrix completion-based have been proposed, which only take into account Gaussian noise outlier when modeling However, in real-world applications, inevitable structural usually degrades accuracy prevents recognition drastically. To address these challenges,...
Vital signs such as heart rate and heartbeat interval are currently measured by electrocardiograms (ECG) or wearable physiological monitors. These techniques either require contact with the patient's skin usually uncomfortable to wear, rendering them too expensive user-unfriendly for daily monitoring. In this paper, we propose a new noninvasive technology generate an Acousticcardiogram (ACG) that precisely monitors heartbeats using inaudible acoustic signals. ACG uses only commodity...
With the popularization of Internet-of-Things (IoT) systems, passive action recognition on channel state information (CSI) has attracted much attention. Most conventional work under machine-learning framework utilizes handcrafted features (e.g., statistic features) that are unable to sufficiently describe sequence data and heavily rely designers' experiences. Therefore, how automatically learn abundant spatial-temporal from CSI is a topic worthy study. In this article, we propose deep...
Unmanned aerial vehicle (UAV)-aided Wireless Rechargeable Sensor Network (WRSN) is a promising application in providing sustainable power supply to the rechargeable sensor nodes (SNs). Constructing trajectory for UAV traverse all SNs with cheapest cost an important issue UAV-aided WRSN. Although some exact algorithms and heuristic methods have been proposed, they cannot achieve superb result large-scale scene within tolerable time. In this paper, we study UAV`s optimization problem from...
In medical scenarios supported by edge clouds, it is difficult for patients to truly gain ownership of their electronic health records (EHRs). However, easy doctors modify hospital data deny incorrect treatment records, which makes protect the rights patients. To improve patient control over EHRs, an attribute-based encryption protection scheme named CEC-ABE EHRs combined with a blockchain proposed in cloud environments. this scheme, agreement process between and completed before ABE stage,...
Regional medical consortium systems facilitates information sharing. However, many security issues exposed by the dominant centralized architectures, such as single points of failure, unauthorized operations and illegal access, are increasingly apparent constraints on efficiency data sharing across domains. Even more, any malicious operation detected, effective measures should be executed promptly for identity tracing. In this paper, we propose a secure efficient cross-domain authentication...
Due to overshadow and channel fading, many mobile users are unable receive the signal transmitted from satellite directly. Hence, some relay stations should be set help this type of signals reliably. In paper, we present a novel cognitive hybrid satellite-terrestrial model, where two relays forward their received for user successively. Furthermore, address its achievable rate maximization. We first convert co-channel interference threshold into transmit power constraints, then formulate...
Cross-modal hashing has attracted increasing research attention due to its efficiency for large-scale multimedia retrieval. With simultaneous feature representation and hash function learning, deep cross-modal (DCMH) methods have shown superior performance. However, most existing on DCMH adopt binary quantization functions (e.g., sign(·)) generate codes, which limit the retrieval performance since are sensitive variations of numeric values. Toward this end, we propose a novel end-to-end...