Lei Yang

ORCID: 0000-0003-3256-4700
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • Distributed systems and fault tolerance
  • Peer-to-Peer Network Technologies
  • E-commerce and Technology Innovations
  • Cloud Data Security Solutions
  • Energy Harvesting in Wireless Networks
  • Wireless Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Biomedical Text Mining and Ontologies
  • Privacy-Preserving Technologies in Data
  • Advanced Wireless Network Optimization
  • Service-Oriented Architecture and Web Services
  • IoT and Edge/Fog Computing
  • Robotic Path Planning Algorithms
  • Wireless Power Transfer Systems
  • Full-Duplex Wireless Communications
  • Mobile Health and mHealth Applications
  • Network Security and Intrusion Detection
  • Advanced MIMO Systems Optimization
  • Access Control and Trust
  • Cloud Computing and Resource Management
  • Opportunistic and Delay-Tolerant Networks
  • DNA and Biological Computing
  • Machine Learning in Materials Science

Southwest Minzu University
2024

Yunnan Forestry Vocational and Technical College
2024

Massachusetts Institute of Technology
2018-2024

Hebrew University of Jerusalem
2024

IIT@MIT
2022

Tianjin University of Technology
2020

Xingtai University
2020

Moscow Institute of Thermal Technology
2019

Peking University
2017-2018

State Street (United States)
2017

Backscatter presents an emerging ultralow-power wireless communication paradigm. The ability to offer submilliwatt power consumption makes it a competitive core technology for Internet of Things (IoT) applications. In this article, we provide tutorial backscatter from the signal processing perspective as well survey recent research activities in domain, primarily focusing on bistatic systems. We also discuss unique real-world applications empowered by and identify open questions domain....

10.1109/msp.2018.2848361 article EN IEEE Signal Processing Magazine 2018-09-01

We introduce the design and implementation of BackCam, a low-power wireless camera sensor platform that supports continuous realtime vision applications, all using commodity radios. In lowest power mode, our board consumes only 9.7mW continuously transmits images for over one month on two AA batteries. novel management system incorporates input from itself to increase battery life up 62%. Using metadata as input, we designed feedback between gateway. This allows dynamic application...

10.1145/3302506.3310403 article EN 2019-04-04

Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of major blockchain, Solana. They cause congestion and excessive message delays in real network due to its bandwidth constraints. In contrast, longest chain (LC), an important family has previously only been proven secure assuming idealized model which all messages delivered within bounded delay. This model-reality mismatch is further aggravated Proof-of-Stake (PoS) LC where the adversary can spam...

10.1145/3558535.3559777 article EN 2022-09-19

The drawbacks of the traditional multi-hop structure wireless sensor networks (WSNS) are susceptible to reflection, scattering and diffraction, serious attenuation signal intensity phase deviation due various obstacles in cultivated land environment mountains. In this paper, is measured curve fitting done respectively both open obstacle-environment with sending receiving height 0 m, 1 2 m. It found out that packet loss probability too high when an obstacle exists. such a case, unmanned...

10.32604/cmc.2019.06062 article EN Computers, materials & continua/Computers, materials & continua (Print) 2019-01-01

The success of blockchains has sparked interest in large-scale deployments Byzantine fault tolerant (BFT) consensus protocols over wide area networks. A central feature such networks is variable communication bandwidth across nodes and time. We present DispersedLedger, an asynchronous BFT protocol that provides near-optimal throughput the presence network bandwidth. core idea DispersedLedger to enable propose, order, agree on blocks transactions without having download their full content. By...

10.48550/arxiv.2110.04371 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the they are missing from each other, is fundamental task in many distributed systems.We present Rateless Invertible Bloom Lookup Tables (Rateless IBLTs), first set reconciliation protocol, best of our knowledge, that achieves low computation cost near-optimal communication across wide range scenarios: differences one millions, few bytes megabytes, workloads injected by potential...

10.1145/3651890.3672219 article EN 2024-07-31

The integration of intelligent decision-making algorithms with urban cultural expression is becoming a hot topic in both academic and practical fields for exploring street landscapes. Exploring the application strategies regional landscape pattern recognition innovative design key step. single layout construction, deficiency, ecological imbalance, low resident participation seriously constrain overall quality improvement city. To address this dilemma, study delved into Kunming City selected...

10.3390/electronics13214183 article EN Electronics 2024-10-25

Recent advances in intelligent mobile terminal result the rapid development of wireless networks, which has inherently properties high access time, low bandwidth and other shortcoming that pull down Quality Service (QoS). Cache technologies are considered as most favorable tools for dealing with problems traffic flow, having attracted tremendous interest from both engineering academic fields. However, algorithms developed essentially based on descriptive models instead predictive models, not...

10.4304/jnw.9.9.2279-2288 article EN Journal of Networks 2014-09-07

Based on the Bayesian network trust model, an improved model is proposed in this paper. It includes two parts: one searching resource peers algorithm, which can reduce redundancy packages received by and enhance reliability of system; other computing updating method, applies logarithm for evaluation number services to compute update trust, so that it prevent malicious from attacking normal efficiently, meanwhile restrain increasing their respectively collusion its clique. The sketch maps...

10.1109/apscc.2006.31 article EN 2006-12-01

With the development of science and technology, application information technology in logistics industry is becoming more mature. At present, order to improve safety, punctuality speediness cargo transportation, people have higher requirements on transportation. Therefore, wireless sensor network tracking management system promotes freight strengthens smooth progress reduces cost In this paper, author analyzes hardware software design based networks explore goods networks.

10.1109/cis2018.2018.00112 article EN 2021 17th International Conference on Computational Intelligence and Security (CIS) 2018-11-01

In order to solve the problems of lines and equipment inspection for distribution network traditional way at present, such as low level information technology, insufficient state acquisition, high management cost efficiency, This paper proposes an intelligent diagnosis system based on technology internet things. According layers things, is divided into three , namely, perception layer, application which has developed a kind terminal layer. Intelligent can be real-time position personnel,...

10.1109/isgt-asia.2019.8881066 article EN 2019-05-01

Internet of things are increasingly being deployed over the cloud (also referred to as things) provide a broader range services. However, there serious challenges CoT in data protection and security provenance. This paper proposes privacy provenance model (DPSPM) based on CoT. It can protect users trace source leaked data. In detail, encryption watermarking algorithms proposed. Meanwhile, we use improved k-anonymity masking algorithm pseudo-row this scheme. Those carry out control whole...

10.1504/ijics.2020.10028757 article EN International Journal of Information and Computer Security 2020-01-01

10.3724/sp.j.1087.2012.03490 article EN Journal of Computer Applications 2013-05-30

Performance of WLANs (Wireless Local Area Network) has been investigated for many years. However, most the investigations have performed on a single cell scenario. Realistic WLANs' deployment scenario are based multi-cell configuration, throughput per is considerably reduced compared to case. This paper proposes new WLAN model consisting four non overlapping channels instead well known three channels, which increases cell. The impact ACI (Adjacent Channel Interference) downlink assessed....

10.1109/iis.2009.34 article EN International Conference on Industrial and Information Systems 2009-04-01

10.4156/jdcta.vol6.issue3.18 article EN International Journal of Digital Content Technology and its Applications 2012-02-29

Streaming media over Internet is becoming one of the main services, but limitation network and server resource makes existing systems bottleneck servicing. In this paper, we propose scalable servicing system based on P2P networks. Through constructing model PeerMsm FSM public host, meanwhile, utilizing a new caching cluster scheduling algorithm, our high QoS low cost so as to satisfy demands more users.

10.12783/dtcse/aice-ncs2016/5745 article EN DEStech Transactions on Computer Science and Engineering 2017-03-06
Coming Soon ...