- RFID technology advancements
- Indoor and Outdoor Localization Technologies
- Energy Harvesting in Wireless Networks
- Cloud Computing and Resource Management
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Mobile Crowdsensing and Crowdsourcing
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Robotics and Sensor-Based Localization
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Software-Defined Networks and 5G
- Anomaly Detection Techniques and Applications
- Cryptography and Data Security
- Age of Information Optimization
- Peer-to-Peer Network Technologies
- Underwater Vehicles and Communication Systems
- T-cell and B-cell Immunology
- Rough Sets and Fuzzy Logic
- Renal Transplantation Outcomes and Treatments
- Advanced Malware Detection Techniques
Tianjin University
2017-2025
Tianjin Medical University
2007-2024
Tianjin Tianhe Hospital
2024
Tianjin University of Science and Technology
2017-2022
Dalian University of Technology
2008-2020
Hong Kong Polytechnic University
2017
University of Bradford
2013
Dalian University
2011
Liaoning Normal University
2008
Dalian Maritime University
2006
Heterogeneous Internet of Things (HetIoT) is an emerging research field that has strong potential to transform both our understanding fundamental computer science principles and future living. HetIoT being employed in increasing number areas, such as smart home, city, intelligent transportation, environmental monitoring, security systems, advanced manufacturing. Therefore, relaying on application fields, will be filled life provide a variety convenient services for future. The network...
This paper studies the problem of tag localization using RFID-augmented robots, which is practically important for promising warehousing applications, e.g., automatic item fetching and misplacement detection. Existing RFID systems suffer from one or more following limitations: requiring specialized devices; only 2D enabled; having blind zone mobile localization; low scalability. In this paper, we use Commercial Off-The-Shelf (COTS) robot devices to implement a Mobile RF-robot Localization...
An industrial mobile network is crucial for production in the Internet of Things. It guarantees normal function machines and normalization production. However, this characteristic can be utilized by spammers to attack others influence Users who only share spams, such as links viruses advertisements, are called spammers. With growth membership, have organized into groups purpose benefit maximization, which has caused confusion heavy losses difficult distinguish from users owing...
In smart cities, the Internet of Things (IoT) consists many low-power nodes. Its robustness is essential for protection communication in data science against node failures caused by energy shortage or cyber-attacks. Scale-free networking topology, widely applied IoT, effectively resilient to random attacks but vulnerable malicious ones which high-degree nodes are made fail. The prohibitively high computational cost existing optimization algorithms an obstacle efficient topology...
The IoV enables drivers to obtain information on road conditions, accidents, and navigation. Applications in this framework collect through message exchanges among vehicles. However, existing routing protocols wireless sensor networks are not suitable for due the dynamically changing network topology. Furthermore, when density of vehicles is sparse, it difficult achieve long-distance transmission common protocols. In article, we present a novel scheme that incorporates community-aware...
With the increasing popularization of radio frequency identification (RFID) technology in retail and logistics industry, RFID privacy concern has attracted much attention, because a tag responds to queries from readers no matter they are authorized or not. An effective solution is use commercially available blocker that behaves as if set tags with known blocking IDs present. However, makes classical estimation problem more challenging, some genuine covered by In this paper, we propose scheme...
Environmentally persistent organic pollutant (POP) is the general term for refractory compounds that show long-range atmospheric transport, environmental persistence, and bioaccumulation. It has been reported accumulation of POPs could lead to cellular DNA damage adverse effects on metabolic health. To better understand mechanism health risks associated with POPs, we conducted an evidence-based cohort investigation (n = 5,955) at Jinghai e-waste disposal center in China from 2009 2016, where...
This paper studies the important sensory data collection problem in sensor-augmented RFID systems, which is to quickly and accurately collect from a predefined set of target tags with coexistence unexpected tags. The existing schemes suffer either low time-efficiency due tag-collisions or serious corruption issue interference To overcome these limitations, we propose hierarchical-hashing (HDC) protocol, can not only significantly improve utilization wireless communication channel by...
This paper studies the practically important problem of range query for sensor-augmented RFID systems, which is to classify target tags according ranges specified by user. The existing protocols that seem address this suffer from either low time-efficiency or information corruption issue. To overcome their limitations, we first propose a basic classification protocol called Range Query (RQ), in each tag pseudo-randomly chooses slot time frame and uses ON-OFF Keying modulation reply its...
A wide range of scenarios, such as warehousing, and smart manufacturing, have used RFID mobile robots for the localization tagged objects. The state-of-the-art RFID-robot based works are on premise stable speed. However, in reality this assumption can hardly be guaranteed because Commercial-Off-The-Shelf (COTS) typically inconsistent moving speeds, a small speed inconsistency will cause large error. To end, we propose Speed Inconsistency-Immune approach to robot Localization (SILoc) system,...
Internet attacks, such as distributed denial-of-service attacks and worm are increasing in severity frequency. Identifying mitigating realtime an important challenging task for network administrators. An infected host can make a large number of connections to distinct destinations during short time. Such is called superpoint. Detecting superpoints be utilized traffic engineering anomaly detection. This paper proposes novel data streaming method detecting proves guarantees on its accuracy...
In multi-access edge computing systems with energy harvesting (MEC-EH), the mobile devices are empowered unstable harvested from renewable sources. To prolong life of devices, as many computation-intensive tasks possible should be offloaded to MEC server. However, when system states device and server unstable, e.g. poor communication channel conditions, a great number will executed locally, leading long execution time. Even worse, some may dropped due low levels. address this problem, in...
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers no matter they are authorized or not. common solution is use commercially available blocker which behaves if set of with known blocking IDs present. makes estimation much more challenging some genuine covered by the and In this paper, we propose REB, first scheme presence tags. REB uses framed slotted Aloha protocol specified in C1G2 standard. For each round protocol, executes on tag, then...
Mobile edge computing (MEC) is a key enabler for ultra-low latency in heterogeneous dense cellular networks the 5G era and beyond, by deploying services at network edge. Due to high user mobility, are usually migrated follow users predicting trajectory achieve balance between energy consumption service latency. However, migration multi-user challenging because (1) prediction, which crucial migration, becomes intractable with large number of users, (2) making decisions each independently...
Multi-dimensional performance evaluation is crucial for blockchain systems as it enables appropriate choosing a given scenario and helps to pinpoint the bottleneck module of system optimize its performance. However, existing frameworks suffer from low generality, inefficient workload execution, incomprehensible metrics. In order overcome their limitations, we design implement Generalized Fine-grained Blockchain Evaluation (GFBE) framework. Specifically, abstract 3 types Universal Interface...
The widely used RFID systems are vulnerable to the denial-of-service (DoS) attacks launched by malicious blocker tags. This paper studies how quickly and completely identify valid tags that blocked. existing work can seemingly address this problem suffers from either low time-efficiency or serious false positives. proposes a hybrid approach consists of two complementary component protocols, namely <i xmlns:mml="http://www.w3.org/1998/Math/MathML"...
This paper studies the practically important problem of top-k queries, which is to find top k largest categories and their corresponding sizes. In this paper, we propose a Top-k Query (TKQ) protocol technique that call Segmented Perfect Hashing (SPH) for optimizing TKQ. Specifically, TKQ based on framed slotted Aloha protocol. Each tag responds reader with Single-One Geometric (SOG) string using ON-OFF Keying modulation. leverages length continuous leading 1s in combined signal estimate...
Wireless human sensing plays a crucially important role in the human-computer interaction context, which activities and even emotions can be recognized understood by computers. A batch of academic efforts have been proposed to use wireless techniques such as WiFi, RFID, Bluetooth, Radar, Zigbee address problem. Each kind technology has its own characteristics advantages thus is suitable for specific application scenarios. For example, WiFi-based solutions achieve non-intrusive sensing,...
Internet of Things (IoT) includes numerous sensing nodes that constitute a large scale-free network. Optimizing the network topology for increased resistance against malicious attacks is an NP-hard problem. Heuristic algorithms, particularly genetic can effectively cope with such problems. However, conventional algorithms are prone to falling into premature convergence owing lack global search ability caused by loss population diversity during evolution. Although this be alleviated...
For categorized RFID systems, this paper studies the practically important problem of top-k queries, which is to find smallest and (or) largest categories, as well sizes such categories. In paper, we propose a Top-k Query (TKQ) protocol two supplementary techniques called segmented perfect hashing (SPH) switching framed slotted aloha (STA) for optimizing TKQ. First, TKQ lets each tag choose time slot respond reader with single-one geometric string using ON-OFF Keying modulation. leverages...
In RFID-enabled applications, we may pay more attention to key tags instead of all tags. This paper studies the problem tag counting, which aims at estimating how many in a given set exist current RFID system. Previous work is slow solve this new because serious interference replies from large number ordinary (i.e., Nonkey) However, time-efficiency an important metric for fast cardinality estimation large-scale paper, propose singleton slot-based estimator, time-efficient reader only needs...