- Caching and Content Delivery
- IPv6, Mobility, Handover, Networks, Security
- Wireless Networks and Protocols
- Green IT and Sustainability
- Interconnection Networks and Systems
- Logic, programming, and type systems
- Crime, Illicit Activities, and Governance
- Graph Theory and Algorithms
- Internet Traffic Analysis and Secure E-voting
- Imbalanced Data Classification Techniques
- Opportunistic and Delay-Tolerant Networks
- Distributed and Parallel Computing Systems
- Spam and Phishing Detection
- Simulation Techniques and Applications
- Nutritional Studies and Diet
- Advanced Wireless Network Optimization
- Advanced MIMO Systems Optimization
- Human Mobility and Location-Based Analysis
- Logic, Reasoning, and Knowledge
- Network Traffic and Congestion Control
- Cloud Computing and Resource Management
- Urban Transport and Accessibility
- AI-based Problem Solving and Planning
Tencent (China)
2024
Tsinghua University
2018-2023
Center for Information Technology
2021
National Engineering Research Center for Information Technology in Agriculture
2020
National University of Defense Technology
2014
Fraud detection is of great importance because fraudulent behaviors may mislead consumers or bring huge losses to enterprises. Due the lockstep feature behaviors, fraud problem can be viewed as finding suspicious dense blocks in attributed bipartite graph. In reality, existing attribute-based methods are not adversarially robust, fraudsters take some camouflage actions cover their behavior attributes normal. More importantly, structural information based only consider shallow topology...
Human mobility prediction is of great importance for various applications such as smart transportation and personalized recommender systems. Although many traditional pattern-based methods deep models ($e.g.,$ recurrent neural networks) based have been developed this task, they essentially do not well cope with the sparsity inaccuracy trajectory data complicated high-order nature sequential dependency, which are typical challenges in prediction. To solve problems, paper proposes a novel...
Anycast has been increasingly deployed for content delivery networks to map clients their nearby replicas, which relies on the underlying routing. However, simplicity of operation comes at cost less precise client-mapping control. Although many works have measured anycast DNS, CDNs, with different service goals and engineering, are still not fully understood. In this paper, we design novel methods combine large-scale traceroute HTTP measurement evaluate overall client-proximity inefficient...
Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP addresses. However, due little knowledge on the behavior and performance of DHCP, it challenging configure a proper lease time in complicated wireless network. In this paper, we conduct largest known measurement DHCP based network T University (TWLAN). TWLAN has more than 59,000 users, 10,000 access points 130,000 We find far from satisfactory: (1) The non-authenticated devices lead waste 25% addresses at rush...
Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP addresses users. However, due little knowledge on the behavior and performance of DHCP, it challenging configure lease time divide for address pools properly in large-scale wireless networks. In this paper, we conduct largest known measurement DHCP network T University (TWLAN). We find far from satisfactory: (1) The non-authenticated devices lead a waste 25% at rush hour. (2) Address pool utilization varies...
Welcome to the WIT Press eLibrary - home of Transactions Wessex Institute collection, providing on-line access papers presented at Institute's prestigious international conferences and from its State-of-the-Art in Science & Engineering publications.
WiFi has become one of the most popular ways to access Internet. However, in large-scale campus wireless networks, it is challenging for network administrators provide optimized quality without knowledge on fine-grained traffic characteristics and real performance. In this paper, we implement PerfMon, a performance measurement diagnosis system, which integrates collected multi-source datasets analysis methods. Based first conduct comprehensive application-level patterns behaviors from...
In recent years, more and wireless networks support both 2.4GHz 5GHz bands. However, in large-scale dual-band networks, lack of understanding on the behavior performance makes network diagnosis optimization extremely challenging. this paper, we conduct a comprehensive measurement to characterize (TD WLAN). We make several meaningful observations. (1) Although band outperforms band, 60% devices tend be associated with band. The device association has large impact performance. (2) Rogue...