Xiaoheng Deng

ORCID: 0000-0003-2740-8025
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • Energy Efficient Wireless Sensor Networks
  • Complex Network Analysis Techniques
  • Network Security and Intrusion Detection
  • Wireless Networks and Protocols
  • Age of Information Optimization
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Neural Network Applications
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Mobile Crowdsensing and Crowdsourcing
  • Opinion Dynamics and Social Influence
  • Peer-to-Peer Network Technologies
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Caching and Content Delivery
  • UAV Applications and Optimization
  • Energy Harvesting in Wireless Networks
  • Network Traffic and Congestion Control
  • Visual Attention and Saliency Detection
  • IoT Networks and Protocols
  • Security in Wireless Sensor Networks
  • Software-Defined Networks and 5G

Central South University
2016-2025

City University of Hong Kong, Shenzhen Research Institute
2022-2025

Xinjiang University
2021-2023

Al Maarif University College
2023

Jinchuan (China)
2022

University of Massachusetts Boston
2016

Boston University
2016

Yichun University
2012

Changsha University of Science and Technology
2011

Hunan Normal University
2007-2010

The sixth-generation network (6G) is expected to achieve a fully connected world, which makes full use of large amount sensitive data. Federated Learning (FL) an emerging distributed computing paradigm. In Vehicular Edge Computing (VEC), FL used protect consumer data privacy. However, using in VEC will lead expensive communication overheads, thereby occupying regular resources. the traditional FL, massive rounds before convergence enormous costs. Furthermore, each round, many clients upload...

10.1109/tits.2021.3099368 article EN IEEE Transactions on Intelligent Transportation Systems 2021-08-03

The development of Industrial Internet Things (IIoT) and Industry 4.0 has completely changed the traditional manufacturing industry. Intelligent IIoT technology usually involves a large number intensive computing tasks. Resource-constrained devices often cannot meet real-time requirements these As promising paradigm, mobile-edge (MEC) system migrates computation tasks from resource-constrained to nearby MEC servers, thereby obtaining lower delay energy consumption. However, considering...

10.1109/jiot.2021.3123406 article EN IEEE Internet of Things Journal 2021-10-27

In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding designed by using the map. The mathematical model of system combines sine fraction operation. Compared with some traditional systems, has larger range parameters better characteristics, which makes it more suitable for applications in information encryption. addition, algorithm proposed, overcomes shortcoming common coding-based algorithms. Parallel computing...

10.3390/math11010231 article EN cc-by Mathematics 2023-01-02

10.1109/tcad.2024.3429410 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024-01-01

Energy harvesting (EH) from ambient energy sources can potentially reduce the dependence on supply of grid or battery energy, providing many benefits to green communications. In this paper, we investigate device-to-device (D2D) user equipments (DUEs) multiplexing cellular (CUEs) downlink spectrum resources problem for EH-based D2D communication heterogeneous networks (EH-DHNs). Our goal is maximize average efficiency all links, in case guaranteeing quality service CUEs and EH constraints...

10.1109/jiot.2018.2842738 article EN IEEE Internet of Things Journal 2018-06-01

Remote clouds are gradually unable to achieve ultra-low latency meet the requirements of mobile users because intolerable long distance between remote and network congestion caused by tremendous number users. Mobile edge computing, a new paradigm, has been proposed mitigate aforementioned effects. Existing studies mostly assume servers have deployed properly they just pay attention how minimize delay In this paper, considering practical environment, we investigate deploy effectively...

10.3390/s19010032 article EN cc-by Sensors 2018-12-21

Geographic routing is a research hotspot of the Internet Vehicles (IoV) and intelligent traffic system (ITS). In practice, vehicle movement not only affected by its characteristics relationship between position but also some implicit factors. Pointing to this problem, we combine moving probability matrix, association factors study influence potential features propose algorithm based on (RAVP) analysis, which can obtain more accurate prediction trajectory. Then, distance obtained By...

10.1109/jiot.2020.2999469 article EN IEEE Internet of Things Journal 2020-06-02

The number of smart devices newly connected to the Internet has grown exponentially in recent years. These are interwoven into huge Things. There is a contradiction between mass data transmission and communication bandwidth, distance supercomputing power processing object, demand frequent interaction real-time response. As new computing paradigm, edge processes tasks on resources close sources. Considering limited energy mobile terminal user's for low delay, making decisions about executed...

10.1109/jiot.2021.3057694 article EN IEEE Internet of Things Journal 2021-02-09

As the demand for Internet of Things (IoT) technologies continues to grow, IoT devices have been viable targets malware infections. Although deep learning-based detection has achieved great success, models are usually trained based on collected user records, thereby leading significant privacy risks. One promising solution is leverage federated learning (FL) enable distributed on-device training without centralizing private records. However, it non-trivial users label these where quality and...

10.1109/tdsc.2022.3173664 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-01

The integration of Mobile Edge Computing (MEC) and microservice architecture drives the implementation sustainable Internet Vehicles (IoV). enables decomposition a service into multiple independent, fine-grained microservices working independently. With MEC, can be placed on Service Providers (ESPs) dynamically, responding quickly reducing latency resource consumption. However, burgeoning IoV leads to high computation overheads, making requirements an imminent issue. What's more, due limited...

10.1109/tits.2023.3274307 article EN IEEE Transactions on Intelligent Transportation Systems 2023-05-17

10.1016/j.sysarc.2020.101778 article EN publisher-specific-oa Journal of Systems Architecture 2020-04-08

Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and one key application is intelligence data collection from billions IoT devices. However, many AI based approaches lack security considerations leading availability restricted. In this paper, an Intelligent Trust Collaboration Network System (ITCN) established collect through collaboration with mobile vehicles Unmanned Aerial Vehicle (UAV) for IoT. The first, a deadline-aware network framework...

10.1109/tnse.2021.3057881 article EN IEEE Transactions on Network Science and Engineering 2021-02-13

The energy harvesting cognitive wireless sensor network (EHCWSN) introduces technology and radio into the traditional (WSN), which significantly prolongs working life of node effectively alleviates congestion problem unlicensed spectrum. Due to uncertainty process behavior primary user (PU), how allocate manage limited resources is a crucial in EHCWSN. In this work, new Q-learning-based channel selection method proposed for randomness PU's network. By continuously interacting learning with...

10.1109/tnse.2021.3076485 article EN IEEE Transactions on Network Science and Engineering 2021-04-01

Multi-modal fusion is a promising approach to boost the autonomous driving performance and has already received large amount of attention. Meanwhile, increase reliability under distinct scenarios, it important handle unforeseen weather events in training dataset, which known as an Out-Of-Distribution (OOD) problem, for algorithms. In this paper, we consider those two aspects propose end-to-end multi-modal domain-enhanced framework, namely CrossFuser, meet safety orientated requirements....

10.1109/tits.2023.3307589 article EN IEEE Transactions on Intelligent Transportation Systems 2023-10-02

The Internet of Things (IoT) mainly consists a large number Internet-connected devices. proliferation untrusted third-party IoT applications has led to an increase in IoT-based malware attacks. In addition, it is infeasible for the devices support sophisticated detection systems due restricted resources. Edge computing considered be promising. It provides solutions data security and privacy leakage brought by applications. this article, intelligent trusted secure edge (ITEC) system proposed...

10.1109/tii.2023.3245681 article EN IEEE Transactions on Industrial Informatics 2023-05-17

Camouflaged object detection has been considered a challenging task due to its inherent similarity and interference from background noise. It requires accurate identification of targets that blend seamlessly with the environment at pixel level. Although existing methods have achieved considerable success, they still face two key problems. The first one is difficulty in removing texture noise thus obtaining edge frequency domain information, leading poor performance when dealing complex...

10.1109/tcsvt.2024.3404005 article EN IEEE Transactions on Circuits and Systems for Video Technology 2024-05-22

Heterogeneous communication environments and broadcast feature of safety-critical messages bring great challenges to mode selection resource allocation problem. In this paper, we propose a federated multi-agent deep reinforcement learning (DRL) scheme with action awareness solve problem for ensuring quality service (QoS) in heterogeneous V2X environments. The proposed includes an action-observation-based DRL model parameter aggregation algorithm considering local historical parameters. By...

10.1109/tnet.2024.3364161 article EN IEEE/ACM Transactions on Networking 2024-02-14

Task offloading is a widely used technology in Edge Computing (EC), which declines the makespan of user task with aid resourceful edge servers. How to solve competition for computation and communication resources among tasks fundamental issue offloading. Besides, real-life often comprise multiple interdependent subtasks. Dependencies subtasks significantly raises complexity offloading, makes it difficult propose generalized approaches scenarios different size. In this paper, we study...

10.1109/jiot.2024.3374969 article EN IEEE Internet of Things Journal 2024-03-12
Coming Soon ...