- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Caching and Content Delivery
- Network Traffic and Congestion Control
- Optical Network Technologies
- Advanced Photonic Communication Systems
- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Mobile Agent-Based Network Management
- Mobile Ad Hoc Networks
- Advanced Wireless Communication Technologies
- Network Security and Intrusion Detection
- Peer-to-Peer Network Technologies
- Recommender Systems and Techniques
- IPv6, Mobility, Handover, Networks, Security
- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Wireless Networks and Protocols
- Advanced MIMO Systems Optimization
- Blockchain Technology Applications and Security
- Opinion Dynamics and Social Influence
- Satellite Communication Systems
- Interconnection Networks and Systems
Northeastern University
2016-2025
Universidad del Noreste
2005-2025
Ningbo University
2024
Air Force Institute of Aviation Medicine Affiliated Hospital
2016-2024
Air Force Medical University
2024
State Key Laboratory of Synthetical Automation for Process Industries
2014-2023
Northeastern University
2006-2023
Agricultural Genomics Institute at Shenzhen
2022-2023
Chinese Academy of Agricultural Sciences
2022-2023
Ministry of Agriculture and Rural Affairs
2022-2023
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as core part of Things (IoT) or Cyber Physical System (CPS), it necessary consider various security challenges that come with IoT/CPS, such the detection malicious attacks. Sensors sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model recognized an important approach defend distributed networks in IoT/CPS against node...
This article proposes an adaptive localized decision variable analysis approach under the decomposition-based framework to solve large-scale multiobjective and many-objective optimization problems (MaOPs). Its main idea is incorporate guidance of reference vectors into control optimize variables using strategy. Especially, in analysis, for each search direction, convergence relevance degree measured by a projection-based detection method. In optimization, grouped are optimized with...
The performance of decomposition-based algorithms is sensitive to the Pareto front shapes since their reference vectors preset in advance are not always adaptable various problem characteristics with no a priori knowledge. For this issue, article proposes an adaptive vector reinforcement learning (RVRL) approach for industrial copper burdening optimization. proposed involves two main operations, that is: 1) (RL) operation and 2) point sampling operation. Given fact states interact landscape...
Mobile edge computing (MEC) emerges as an appealing paradigm to provide time-sensitive services for industrial Internet of Things (IIoT) applications. How guarantee truthfulness and budget-balance under locality constraints is important issue the allocation pricing design MEC system. In this paper, we propose a truthful combinatorial double auction mechanism, which integrates padding concept efficient strategy desirable properties in constrained environments. This mechanism takes into...
With the widespread popularity of Internet Things and various intelligent medical devices, amount data is rising sharply, thus processing has become increasingly challenging. Mobile edge computing technology allows power to be allocated at closer users, which enables efficient offloading for healthcare systems. However, existing studies on seldom guarantee effective privacy security. Moreover, research equipping architectures with Blockchain neglect delay energy consumption costs incurred in...
In multi-objective evolutionary neural architecture search (NAS), existing predictor-based methods commonly suffer from the rank disorder issue that a candidate high-performance may have poor ranking compared with worse in terms of trained predictor.To alleviate above issue, we aim to train Pareto-wise end-to-end classifier simplify process by transforming complex NAS task into simple classification task. To this end, classifier-based Pareto evolution approach is proposed, where an online...
Cloud computing is still in its infancy spite of gaining tremendous momentum recently, high security one the major obstacles for opening up new era long dreamed vision as a utility. As sensitive applications and data are moved into cloud centers, run on virtual resources form machine. This unique attributes, however, poses many novel tangible intangible challenges. It might be difficult to track issue environments. So this paper primarily aims highlight security, privacy trust issues current...
Traditional satellite networks depend on the closed and planned architecture. Thus, there are many challenges such as configuration update, new communication networking technologies introduction, truly-differentiated services provision, network device interoperability, integration of terrestrial networks. Software-defined (SDN) has features flexibility, programmability, logical centralization, which increases resource utilization, simplifies management, reduces operating cost, promotes...
A space and terrestrial integrated network (STIN) converges satellite communication networks, mobile wireless networking, the Internet, has greatly extended scope of cyberspace. The STIN is composed diverse elements supports various access technologies, coordinations in hybrid networks can better support complex changeable tasks. Furthermore, takes advantage merits low delay large bandwidth achieves global coverage without limitation geographic conditions, which positioning navigation,...
Security through trust presents a viable solution for threat management in the Internet of Things (IoT). Currently, well-defined framework collaborative applications on IoT platform does not exist. In order to estimate reliably values nodes within system, should be measured by suitable parameters that are based nodes' functional properties application context. Existing models do clearly outline parametrization trust. Also, decay is inadequately modeled most current models. addition,...
Smartphone-based indoor localization has attracted considerable attentions in both research and industrial areas. However, the accuracy robustness are still challenging problems due to low-cost noisy devices, especially those complicated environments. Considering that pedestrian dead-reckoning (PDR) devices widely equipped recent smartphones, we propose a novel fusing algorithm integrates wireless fidelity (WiFi) features PDR features. By formulating as recursive function approximation...
Non-orthogonal multiple access (NOMA) assisted semi-grant-free (SGF) transmission has been viewed as one of the promising technologies to meet massive connectivity requirements next-generation networks. A novel intelligent reconfigurable surface (IRS) SGF NOMA system is proposed, where IRS employed satisfy channel gain for grant-based users (GBUs) and grant-free (GFUs). The dynamic optimization on sub-carrier assignment power allocation roaming GFUs, amplitude control phase shift design...
Sequential recommendation is an important task to predict the next-item access based on a sequence of interacted items. Most existing works learn user preference as transition pattern from previous item next one, ignoring time interval between these two However, we observe that in may vary significantly different, and thus result ineffectiveness modeling due issue drift. In fact, conducted empirical study validate this observation, found with uniformly distributed (denoted uniform sequence)...
Traditional routing algorithms cannot dynamically change network environments due to the limited information for decisions. Meanwhile, they are prone performance bottlenecks in face of increasingly complex business requirements. Some approaches, such as deep reinforcement learning (DRL) have been proposed address problems. However, hardly utilize about environment fully. The Knowledge Defined Networking (KDN) architecture inspires us develop new mechanisms adapted dynamic characteristics...
Due to the outstanding merits such as mobility, high maneuverability, and flexibility, Unmanned Aerial Vehicles (UAVs) are viable mobile power transmitters that can be rapidly deployed in geographically constrained regions. They good candidates for supplying energy-limited Sensor Nodes (SNs) with Wireless Power Transfer (WPT) technology. In this paper, we investigate a UAV-enabled WPT system transmits set of SNs at unknown positions. A key challenge is how efficiently gather locations design...
Competitive opinion maximization (COM) aims to determine some individuals (i.e., seed nodes) from social networks, propagating the desired opinions toward a target entity their neighbors through relationships when facing with its competitors (components) and maximize spread after specific time. Current studies on COM are still in infancy, while only work merely considers scenario that strategy of is known but ignores unknown scenario. In addition, previous cannot easily address situation...
Information centric networking (ICN) and software-defined (SDN) are two emerging paradigms that promise to solve different aspects of problems. ICN is a clean-slate design for accommodating the ever increasing growth Internet traffic by regarding content as network primitive, adopting in-network caching, name-based routing, while SDN focuses on agile flexible management decoupling control logic from data forwarding. have gained significant research attention separately in most previous work....