- Privacy-Preserving Technologies in Data
- Video Surveillance and Tracking Methods
- Vehicular Ad Hoc Networks (VANETs)
- Human Pose and Action Recognition
- Image Retrieval and Classification Techniques
- Advanced Image and Video Retrieval Techniques
- Traffic Prediction and Management Techniques
- Recommender Systems and Techniques
- Wireless Communication Security Techniques
- Indoor and Outdoor Localization Technologies
- Infrared Target Detection Methodologies
- Transportation Planning and Optimization
- Advanced Neural Network Applications
- Blockchain Technology Applications and Security
- Human Mobility and Location-Based Analysis
- Internet Traffic Analysis and Secure E-voting
- Remote-Sensing Image Classification
- Advanced Text Analysis Techniques
- Electric Vehicles and Infrastructure
- Stochastic Gradient Optimization Techniques
- Vehicle License Plate Recognition
- Network Security and Intrusion Detection
- Advanced Wireless Communication Technologies
- Traffic control and management
- Advanced Image Fusion Techniques
The University of Sydney
2022-2025
Shandong University of Science and Technology
2024
Taizhou University
2019-2023
Illinois Institute of Technology
2021
Shanghai Public Security Bureau
2016
Consensus-based Speed Advisory System (CSAS) is used to recommend a consensus speed group of vehicles for specific application purposes, such as minimizing emissions or energy consumption. To remedy data privacy concerns advisory services, the latest works have investigated how get an optimal in privacy-preserving manner. However, almost all designs are based on centralized architecture, which could still meet service trust issues, that random be recommended when central server meets cyber...
The ultimate goal of Internet Things (IoT) technology is to evolve into the Everything. Two key elements IoT are artificial intelligence (AI) for smart devices and communication. Privacy protection has posed as a critical challenge next intelligent revolution rapid development communication big data. Federated learning (FL) combines privacy with machine data analytic it balances needs huge volume AI protection, which also makes leading position in field learning. However, way that adopted...
Now public transportation, included bus and subway occupies a greater role in city transport, the layout of traffic stations is most important part planning design. However, some unpredicted factors for construction results low utilization rate transportation resources, example, stops chaotic, there no clear scope, lack integration with residents' travel hotspots. Towards these challenges modern transport faces, we firstly analyze distribution to determine area range needs be optimized net...
In the last few years, intelligent industrial systems and consumer electronics are being developed extensively broadly. Fuzzy logic fuzzy techniques that integrate these approaches recognized as effective ways to realize such functions. These rely on control techniques, i.e., common sense rules describe system behavior instead of complex mathematical models. This work provides solutions uncertainties aids in relative decision-making processes. To this end, an innovative concept soft relation...
Federated learning still faces many problems from research to technology implementation and the most critical problem is that communication efficiency not high. Therefore, main task of this work improve efficiency, affected by devices, bandwidth, data distribution so on. Our focus on two aspects federated – updates strategy heterogeneity, propose a new framework called TKAGFL, which composed three key factors. Firstly, in response heterogeneity often occurs actual learning, generative...
Future worldwide 6G research will drive the evolution of emerging intelligent control technologies, such as speed advisory systems (ISA), to a more advanced generation. As special type ISA, consensus-based (CSAS) can be widely used recommend consensus for vehicle platoon, enabling minimizing energy consumption or emissions over planned route. Recently, recommendation services that protect data privacy (i.e., how obtain an optimal in privacy-preserving way) have drawn tremendous attention....
More robust intelligent transportation systems including autonomous driving are in full flourish with the revolution of deep learning and 6G wireless communication network. Vehicle Re-Identification, an indispensable branch system, aims to retrieve specific vehicles captured from non-overlapping cameras. However, this is fundamentally challenging substantial inter-class similarity intra-class divergence. Embedding semantic information into vehicle re-identification task has gained ample...
With the rapid development of information technology, image and text data have increased dramatically. Image matching techniques enable computers to understand from both visual modalities match them based on semantic content. Existing methods focus textual object co-occurrence statistics learning coarse-level associations. However, lack intramodal inference leads failure fine-level association between modalities. Scene graphs can capture interactions objects model associations, which are...
The Internet of Underwater Things (IoUT), as an emerging technology, plays important role in the development marine resources. With growth IoUT equipment, data from various sources has increased dramatically. Multiple challenges, such privacy, communication overhead, and heterogeneity, arise with application new underwater (IoT) scenarios. To solve these we propose framework called Fed-IoUT, which utilizes Federated Learning (FL) paradigm. FL, its advantages privacy protection, low balanced...
Digital Twins (DTs) can generate digital replicas for mobile networks (MNs) that accurately reflect the state of MN. Machine learning (ML) models trained in DT MN (DTMN) virtual environments be more robustly implemented This avoid training difficulties and runtime errors caused by instability multiple failures. However, when using data from various devices system, DTs must prioritize privacy. Federated (FL) enables construction without leaving to protect DTMN Nevertheless, FL's privacy...
Spectrum resources have become a strategic and scarce national resource, spectrum space has the sixth dimensional battle space. Drone-based 5G mobile communications very narrow bandwidth of available frequencies, are particularly scarce. With explosive growth drone-based users, is facing serious challenges. sensing new technology for rational allocation communication resources, improving utilization tapping into high-dimensional spatial resources. However, channel complex variable, network...
The outbreak of the coronavirus disease 2019 (COVID-19) represents an alert for epidemic prevention and control in public health. Offline anti-epidemic work is main battlefield control. However, online information cannot be ignored. aim this study was to identify reliable sources false information, as well early warnings opinion about that may affect social stability endanger people’s lives property. Based on analysis health medical big data, screening research were decomposed into two...
Based on particle swarm optimization (PSO) and queuing theory, this paper solves the problem of charging discharging management electric vehicles, obtain demand vehicles in 96 periods, afterwards establish profit expression with power as variables, (charging constraint is 0 to 50 kW) calculate maximum when light energy fully utilized it allowed there no light.
The proportion of the area occupied by cities is increasing with accelerated evolution urbanization. inevitable traffic and travel problems in city are put on table. In order to cater process urbanization, urban transportation network becoming larger larger. Although it has kept up pace development a certain extent, overly complicated makes difficult for residents make choices. this paper, we proposed novel recommendation algorithm choose an effective comfortable means huge complex from...
Vehicle to Grid (V2G) refers the optimal management of charging and discharging behavior electric vehicles through reasonable strategies advanced communication. In process interaction, there are three stakeholders: power grid, operators (charging stations), EV users. real life, impact peak‐valley difference caused a lot loss when charging. At same time, current is also for grid companies this paper, we propose multiobjective optimization method reduce determine relationship between...