- IPv6, Mobility, Handover, Networks, Security
- Network Security and Intrusion Detection
- Wireless Networks and Protocols
- Indoor and Outdoor Localization Technologies
- Mobile Ad Hoc Networks
- Network Packet Processing and Optimization
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Distributed Control Multi-Agent Systems
- Robotics and Sensor-Based Localization
- Network Traffic and Congestion Control
- Mobile Agent-Based Network Management
- Software-Defined Networks and 5G
- Spacecraft and Cryogenic Technologies
- Neural Networks and Reservoir Computing
- Strong Light-Matter Interactions
- IoT-based Smart Home Systems
- Advanced Memory and Neural Computing
- Caching and Content Delivery
- Orbital Angular Momentum in Optics
- CO2 Sequestration and Geologic Interactions
- Optical Wireless Communication Technologies
- Optimal Power Flow Distribution
- Nonlinear Photonic Systems
- Web Applications and Data Management
Aerospace Information Research Institute
2023
Chinese Academy of Sciences
2009-2023
State Key Laboratory of Transducer Technology
2019-2023
UNSW Sydney
2021
Institute for Infocomm Research
2021
Institute of Electronics
2019
Xi'an Jiaotong University
2017
Computer Network Information Center
2011-2014
Shenyang Institute of Automation
2009
The overlay approach has been widely used by many service providers for traffic engineering in large Internet backbones. In the approach, logical connections are set up between edge nodes to form a full mesh virtual network on top of physical topology. IP routing is then run over network. Traffic objectives achieved through carefully links. Although implemented operational networks, it number well-known scaling issues. This paper proposes new which we call integrated achieve without...
This paper proposes a novel method to detect anomalies in large datasets under fully unsupervised setting. The key idea behind our algorithm is learn the representation underlying normal data. To this end, we leverage latest clustering technique suitable for handling high dimensional hypothesis provides reliable starting point data selection. We train an autoencoder from subset, and iterate between hypothesizing candidate subset based on learning. reconstruction error learned autoen-coder...
This paper studies the DNS cache effects that occur on query distribution at CN top‐level domain (TLD) server. We first filter out malformed queries to purify log data pollution according six categories. A model for resolution, more specifically caching, is presented. demonstrate presence and magnitude of sharing request through analytic simulation. TLD results are provided analyzed based model. The approximate TTL name inferred quantificationally.
With the advent of IoT era, demand for position information is increasing constantly. In outdoor cases, satellite navigation solution like Global Positioning System (GPS) well established and has been widely used. indoor there are positioning solutions Wi-Fi, BLE, etc., but their respective defects have limited practical development. Visible light (VLP) a more promising method in cases because its high accuracy, cost efficiency, easy to accomplish compared other technologies. However, some...
A scheme that supports a fast handover effectively in hierarchical mobile IPv6 networks (HMIPv6) is presented. In HMIPv6 when node (MN) moves from MAP domain to another, it can experience disruption of connection as well packet loss due long latency. To cope with these problems, the FMIPv6 adopted optimize performance inter-MAP handover. The latency for various protocols compared proposed analytical model. results show better approach handle nodepsilas movement than other protocols.
Anomaly detection systems and many other applications are frequently confronted with the problem of finding largest knee point in sorted curve for a set unsorted points. This paper proposes an efficient search algorithm minimized time complexity using cascading top‐ k sorting when priori probability distribution is known. First, sort proposed based on quicksort variation. We divide into multiple steps. And each step optimization selection number solved, where objective function defined as...
Distributed Denial-of-Service (DDoS) attacks towards name servers of the Domain Name System (DNS) have threaten to disrupt this critical service.This paper studies vulnerability cache server flooding DNS query traffic.As resolution service provided by server, incoming requests, even massive attacking traffic, are maintained in waiting queue.The sojourn requests lasts until corresponding responses returned from authoritative or time out.The victim is thus overloaded pounding traffic and...
In this paper, a new simultaneous locating and calibrating algorithm for the pseudolites based mobile robot navigation system is proposed. First, of are modeled as nonlinear filtering problem. Subsequently, an Unscented Kalman Filter (UKF) which effective to deal with uncertainties nonlinearities in observation process model suggested solve Finally, simulation results respect systems composed three one verifies feasible validity algorithm.
Major network events can be reflected on domain name system (DNS) traffic at the top level server DNS hierarchical structure. This paper pursues a novel approach to detect anomaly of 5.19 in China CN using covariance analysis. We normalize, expand and average changes for different length time slice enhance robustness detection. Feature is detected based clustering analysis change anomaly. To improve accuracy reduce complexity k –means algorithm, an initial cluster selection...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
The Domain Name System (DNS) resolution is usually served by multiple geographically distant servers. In planning and optimizing DNS server number, placement, capacity, it important to predict load distribution given some knowledge about the network locations query rates of active caching resolvers. This poster proposes an analytical model for predicting distribution. identifies dependencies among distribution, selection behavior, response RTT, request processing delay propagation delay....
The Domain Name System (DNS) resolution is increasingly relied on for replica server selection. However, the prevailing usage of remote DNS causes source address mismatch between clients and resolvers, thus suboptimal performance. We propose a simple lightweight stub-resolver-based solution, named "Name Concatenation", which can obtain performance improvements without requiring support service providers or EDNS0.
Abstract With the development of multi-robot cluster system, research multi-node relative pose estimation is in ascendant. However, for environment without GNSS or fixed anchors, problem still challenging. In this paper, a general algorithm and system framework based on graph optimization proposed to fuse inter- intra-robot measurements, as well mobility models with sliding windows attitude estimation. order verify feasibility universality algorithm, has used design positioning UWB...
Domain name system (DNS) resolution service is usually provisioned by multiple authoritative servers for performance and robustness. Estimating the query load distribution among one of key issues arising with DNS server balancing optimization. We propose an analytical model Round-Trip-Time (RTT)-sensitive selections consisting cache servers, clients, which makes it possible to infer accurately. A fingerprint approach then proposed identify RTT-sensitive from BIND’s. Finally, we present...
The popular IP-based resolution service is subject to the source address confusion especially for remote recursive resolver. Moreover, current practice does not provide as an optional service. paper proposes a scheme extends EDNS0 flags field introduce non-soliciting indicator and uses option include client IP information in DNS messages. This extension helps enhance user experience well overall performance.
<title>Abstract</title> Reservoir computing (RC) is a bio-inspired neural network structure which can be implemented in hardware with ease. It has been applied across various fields such as memristors, and electrochemical reactions, among the micro-electro-mechanical systems (MEMS) supposed to closest integrate sensing computing. This paper introduces novel MEMS reservoir system based on stiffness modulation, where natural signals directly influence input. Under this innovative concept,...