Tian Song

ORCID: 0000-0003-3275-6593
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Network Packet Processing and Optimization
  • Network Security and Intrusion Detection
  • Algorithms and Data Compression
  • Internet Traffic Analysis and Secure E-voting
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Advanced Optical Network Technologies
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Simulation and Modeling Applications
  • Carbon and Quantum Dots Applications
  • Network Traffic and Congestion Control
  • Industrial Technology and Control Systems
  • Covalent Organic Framework Applications
  • Interconnection Networks and Systems
  • Peer-to-Peer Network Technologies
  • Advanced Computational Techniques and Applications
  • Educational Technology and Assessment
  • Multimodal Machine Learning Applications
  • Natural Language Processing Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Traffic Prediction and Management Techniques
  • Radiomics and Machine Learning in Medical Imaging

Philips (China)
2022-2025

Beijing Institute of Technology
2014-2024

Beijing Institute of Education
2024

Shanghai Jiao Tong University
2024

Chongqing University
2021-2023

Civil Aviation Administration of China
2022

Beijing University of Posts and Telecommunications
2022

Beijing Institute of Big Data Research
2022

Qiqihar Medical University
2022

Beijing Haidian Hospital
2020

Named-based packet forwarding represents a core characteristic of many information-centric networking architectures. IP-inspired methods are not suitable because a) name-based must support variable-length keys unbounded length, and b) namespaces for data substantially larger than the global address prefix rulesets used in today's Internet. In this paper, we introduce evaluate an approach that can realistically scale name to billions prefixes. Our driven by two key insights. First, show that,...

10.1145/2810156.2810166 article EN 2015-09-22

Vehicular named data networking (VNDN) is a architecture candidate to support various kinds of content-oriented applications in high dynamic topology environment. Its inherent in-network caching facilitates content delivery and the communication efficiency vehicular network. However, during process delivery, fast varying vehicle mobility changes position relay routers, which makes packet delivered through reverse path difficult. Furthermore, frequent link disruption retransmission lead...

10.1109/access.2019.2897747 article EN cc-by-nc-nd IEEE Access 2019-01-01

Pattern matching is one of the most important components for content inspection based applications network security, and it requires well designed algorithms architectures to keep up with increasing speed. For solutions, AC its derivative are widely used. They on DFA model but utilize large amount memory because so many transition rules. An algorithm, called ACC, presented in this paper multiple pattern matching. It uses a novel model, namely cached deterministic finite automate (CDFA). In...

10.1109/infocom.2008.42 article EN 2008-04-01

Although information-centric networking (ICN) can boost the performance of sensor data delivery in wireless networks (WSNs), its energy efficiency may be significantly impaired due to receiver-driven request-response transmission model. ICN sensors have keep long-time active mode wait for requests that arrive at any time, resulting nontrivial waste energy-constrained WSNs. An intuitive method conserve is schedule partial nodes fall asleep, but cost extra fetching delay. In this work, we...

10.1109/jiot.2021.3088847 article EN IEEE Internet of Things Journal 2021-06-14

URL filtering systems provide a simple and effective way to prevent people from browsing undesirable or malicious Websites. These require well-designed lookup method as the core operation. A high-performance engine is proposed in this paper for systems. It combines compression algorithm with multiple string matching based (Wu-Manber-like) algorithm. Using method, can achieve high performance efficient memory utilization storing ever-increasing blacklist ability of prefix matching....

10.1109/icc.2010.5501982 article EN IEEE International Conference on Communications 2010-05-01

Partial domain adaptation (PDA) attempts to learn transferable models from a large-scale labeled source small unlabeled target with fewer classes, which has attracted recent surge of interest in transfer learning. Most conventional PDA approaches endeavor design delicate weighting schemes by leveraging predictions align cross-domain distributions the shared class space. Accordingly, two crucial issues are overlooked these methods. First, prediction is double-edged sword, and inaccurate will...

10.1109/tcyb.2022.3163432 article EN IEEE Transactions on Cybernetics 2022-04-13

Vehicular Named Data Networking (VNDN) is a promising information-centric network architecture to achieve efficient data delivery among vehicles. With subscription-based communication paradigm, it can disseminate event-triggered like traffic updates or road accident notifications in timely way. However, due vehicle mobility and dynamics, the subscription path normally fragile consequently dissemination efficiency would be diminished. To address this problem, we propose SegSub, an adaptive...

10.1109/tnsm.2024.3403683 article EN IEEE Transactions on Network and Service Management 2024-05-21

Vehicular named data networking (VNDN) is a potential candidate to be deployed in information rich applications of vehicular communication. Due vehicle mobility, it difficult construct stable and reliable connections between nodes. Consequently, VNDN suffering low quality experience heavy network load transmission. In order solve these problems improve performance, we propose Cluster-based Selective Cooperative Caching (CSCoC) strategy VNDN. The main idea CSCoC cache popular at set vehicles...

10.1109/hoticn.2018.8605950 article EN 2018-08-01

Efficient automatic segmentation of multi-level (i.e. main and branch) pulmonary arteries (PA) in CTPA images plays a significant role clinical applications. However, most existing methods concentrate only on PA or branch separately ignore efficiency. Besides, there is no public large-scale dataset focused segmentation, which makes it highly challenging to compare the different methods. To benchmark algorithms, we organized first \textbf{P}ulmonary \textbf{AR}tery \textbf{SE}gmentation...

10.48550/arxiv.2304.03708 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Existing communication protocols for mobile ad hoc networks (MANETs) mis-fit flying (FANETs) due to their exclusive design challenges on the typical long distance and high mobility degree of nodes. To tackle them, we introduce a hybrid omnidirectional multi-beam directional antenna structure gradient-elastic control-data separation. Based dual antennas, further propose novel strategy, which combines location prediction with target tracing, catch trace targets by adaptively exchanging...

10.1109/lcomm.2019.2908153 article EN IEEE Communications Letters 2019-03-28

Space–air–ground Internet of Vehicle networks is a promising network paradigm to support diverse vehicular services. Exploiting the unique advantages spatial, aerial, and terrestrial segments, Quality Service (QoS) different services can be met by smart access selection. However, integrated inevitably has face many challenges, such as dynamic topology, heterogeneous resources, long propagation latency, which seriously degrade QoS performance. In order provide guarantee vehicles, we propose...

10.1109/jiot.2021.3064322 article EN IEEE Internet of Things Journal 2021-03-08

Segmentation ambiguity in generative linguistic steganography could induce decoding errors. One existing dis-ambiguating way is removing the tokens whose mapping words are prefixes of others each candidate pool. However, it neglects probability distribution candidates and degrades imperceptibility. To enhance steganographic security, meanwhile addressing segmentation ambiguity, we propose a secure disambiguating approach for steganography. In this letter, focus on two questions: (1) Which...

10.1109/lsp.2023.3302749 article EN IEEE Signal Processing Letters 2023-01-01

Abstract Wind-induced vibration (WIV) and power extraction performances of a circular cylinder with symmetrically installed fin-shaped rods (FSR) were experimentally numerically investigated under different coverages. The FSR coverage which is expressed as an angle ( α ) measured from the upstream edge to downstream rod. effect installation θ stagnation point rod was also considered in this work. exposed uniform wind allowed vibrate cross-flow direction. output electric realized by...

10.1088/1361-665x/abf753 article EN Smart Materials and Structures 2021-04-14

Heterogeneous domain adaptation (HDA) is expected to achieve effective knowledge transfer from a label-rich source heterogeneous target with scarce labeled data. Most prior HDA methods strive align the cross-domain feature distributions by learning invariant representations without considering intrinsic semantic correlations among categories, which inevitably results in suboptimal performance across domains. Therefore, address this issue, we propose novel <italic...

10.1109/tnnls.2022.3199619 article EN IEEE Transactions on Neural Networks and Learning Systems 2022-08-25

With the rapid expansion of customer population and link bandwidth, energy expenditures Internet have been rising dramatically. To gain efficiency, we propose a novel router architecture, which allows each its modules to adjust frequency according traffic loads. Several modulation strategies are also discussed ensure dwell time on low states reduce blind switches. Our preliminary results show that adjustment could save up 40% total consumption.

10.1145/2342356.2342383 article EN 2012-08-13

The theoretical and computational aspects of weighted Voronoi diagrams have been widely researched applied, but few algorithms are implemented in combination with the geographic information system software for practical use. A general vector-based approach is proposed to generate multiplicatively diagrams, additively power points by using methods region division union based on ArcGIS Engine, aiming establish a kind spatial data model used boundary division, urban centricity expression force...

10.1109/icma.2015.7237612 article EN 2022 IEEE International Conference on Mechatronics and Automation (ICMA) 2015-08-01

Energy efficient routers are important and promising devices in the roadmap toward green networking. In this paper, we explore topic with a traffic aware design that can automatically adapt router's energy consumption to network real time transitions at scale from microseconds nanoseconds. make three contributions. First, propose an router architecture using frequency scaling, which is extended contemporary line card of router. Second, prototype our on gigabit NetFPGA platform, extends...

10.1109/jsac.2016.2600063 article EN IEEE Journal on Selected Areas in Communications 2016-08-12

Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate attacks and propagate malwares, posing serious threats cybersecurity. Current normally conduct small-volume transmission under the covers of various disguising techniques, making them hard detect especially when a detector has little priori knowledge their traffic features. In this article, we propose generic sensitive detection approach, which simultaneously (i) identify types without (ii) maintain...

10.1109/tdsc.2022.3207573 article EN IEEE Transactions on Dependable and Secure Computing 2022-09-19
Coming Soon ...