Yang Jing

ORCID: 0000-0003-3679-1433
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Computational Techniques and Applications
  • Advanced MIMO Systems Optimization
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Communication Networks Research
  • Advanced Sensor and Control Systems
  • Caching and Content Delivery
  • Chinese history and philosophy
  • Advanced Data Compression Techniques
  • Antenna Design and Analysis
  • Cooperative Communication and Network Coding
  • IoT and Edge/Fog Computing
  • Video Coding and Compression Technologies
  • Service-Oriented Architecture and Web Services
  • Optical Network Technologies
  • Image and Signal Denoising Methods
  • Evaluation and Optimization Models
  • Advanced Wireless Communication Techniques
  • Technology and Security Systems
  • Privacy-Preserving Technologies in Data
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Decision-Making Techniques
  • graph theory and CDMA systems
  • Access Control and Trust
  • Advanced Photonic Communication Systems
  • Ethics and Social Impacts of AI

University of Malaya
2023-2024

Chongqing University of Posts and Telecommunications
2008-2023

China Automotive Technology and Research Center
2022

Chongqing Science and Technology Commission
2021-2022

Inner Mongolia University of Science and Technology
2021

Shanghai Maritime University
2009-2013

Guangxi Agricultural Machinery Research Institute
2012

China National Institute of Standardization
2012

Tongren University
2007-2011

University of Finance and Economics
2011

Chatbots have become increasingly popular in recent years, but they also present security risks and vulnerabilities that need to be addressed. This systematic literature review examines the existing research relating information chatbots, identifying potential threats, proposed solutions, future directions for research. The finds chatbots face various including malicious input, user profiling, contextual attacks, data breaches, solutions such as blockchain technology, end-to-end encryption,...

10.3390/app13116355 article EN cc-by Applied Sciences 2023-05-23

The fifth generation (5G) mobile communication system is regard as a key enabler in promoting the deployment of Internet Things (IoT), which accompanied by increasing service demands such like high data rate, enormous connection, and low latency. To meet these demands, network slicing has been envisioned an efficient technology to customize infrastructures allocate resources for 5G IoT services. However, due various application backgrounds ubiquitous social interactions services,...

10.1109/jiot.2018.2888543 article EN IEEE Internet of Things Journal 2018-12-18

To investigate the epidemiology, risk factors, fungal spectrum and to test antifungal drug susceptibility of these isolates at a tertiary eye care referral centre in central China.The medical microbiology records 2064 culture-proven cases (2064 eyes) keratitis diagnosed Henan Eye Institute between January 2000 March 2009 was retrospectively reviewed. The were identified subgroup 103 subjected tests for amphotericin B, fluconazole ketoconazole by broth microdilution method.A total confirmed...

10.1111/j.1442-9071.2009.02155.x article EN Clinical and Experimental Ophthalmology 2009-09-18

As technology continues to evolve, the need for robust and user-friendly authentication methods becomes increasingly vital safeguarding sensitive information. Graphical passwords, a contemporary approach authentication, utilize images, patterns, or graphical elements as means of access control. This systematic literature review delves into dynamic realm focusing on myriad security attacks they face, diverse countermeasures devised mitigate these threats. The password scheme is one most...

10.1109/access.2024.3373662 article EN cc-by-nc-nd IEEE Access 2024-01-01

Abstract Optical surface measurement and characterization precision are significantly influenced by the performance of registration methods. Most existing optical methods suffer from poor efficiency or lower precision. To address these challenges, this investigation proposes a hierarchical method based on meta - heuristic algorithm, primarily targeting freeform grid surfaces(relatively simple non-rotationally symmetric surfaces) rotationally surfaces in applications. First, to enhance avoid...

10.1088/1361-6501/adc296 article EN Measurement Science and Technology 2025-03-19

SUMMARY Energy efficiency is a key requirement for the design of short‐range network. In order to alleviate energy consumption constraint, two‐layer communication architecture proposed in this paper. We designed an energy‐efficient scheme on basis joint mobile nodes (MNs) grouping and data packet fragmentation, analyzed corresponding different length group sizes, established appropriate model. Simulation results show that when MNs system are grouped by MN algorithm all each operating with...

10.1002/dac.2765 article EN International Journal of Communication Systems 2014-02-25

By collecting and processing smart healthcare data in real-time, mobile edge networks can bridge the gap between doctors patients, which is a representative consumer-level interaction scenario Industry 5.0. To improve flexibility timeliness of suchlike 5.0 services, microservices are deployed extensively on servers. The major challenge facing microservice deployment how to reduce cost. However, cost quality service (QoS) pair contradictory objectives, different scenarios have preferences for...

10.1109/tce.2023.3296534 article EN IEEE Transactions on Consumer Electronics 2023-07-18

A large number of participants are required to complete specific tasks sense data and obtain the sensing information in Mobile Crowdsensing. In order ensure real-time effectiveness comprehensiveness information, this paper proposes a participant service quality aware collecting mechanism with high coverage. Firstly, is measured by willingness regional preference analyze data. Then coverage evaluated according target points covered during execution tasks. Furthermore, efficiency determined...

10.1109/access.2020.2965734 article EN cc-by IEEE Access 2020-01-01

Device-to-device (D2D) cooperative communication is regarded as a technology which can significantly improve the spectrum efficiency and network capacity. However, high dependence of on user participation makes design incentive mechanism become an issue great concern. In this paper, contract-based benefit allocation firstly proposed to optimize benefits sending users users. such mechanism, contract principal agent, by formulating utility function both parties, maximum between them be...

10.1109/access.2018.2869534 article EN cc-by-nc-nd IEEE Access 2018-01-01

Cooperative multipoint transmission (CoMP) is one of the most promising paradigms for mitigating interference in cloud radio access networks (C-RAN). It allows multiple remote units (RRUs) to transmit same data flow a user further improve signal quality. However, CoMP may incur redundant over fronthaul network C-RAN. In C-RAN employing CoMP, key problem how coordinate heterogeneous resource allocation maximize cooperation gain while reducing load. this paper, based on multi-dimensional...

10.3390/s21010217 article EN cc-by Sensors 2020-12-31

Energy efficiency (EE) is a key requirement for the design of short-range communication network. In order to alleviate energy consumption (EC) constraint, novel layered heterogeneous mobile cloud architecture proposed in this paper. Based on architecture, we establish an appropriate model, and scheme based joint data packet fragmentation cooperative transmission analyze corresponding different sizes size. Simulation results show that, when all nodes are accessing same size fragmentation, can...

10.1109/cc.2014.6969798 article EN China Communications 2014-10-01

According to the idea, which application of smart multi-beam antennas in mobile communication systems should be blended well with cellular configuration, a novel circular layered configuration model is proposed, where region divided into zones by means vertical splitting radiation pattern antenna. All numerical simulation results illuminate an attractive one, including performance carrier interference ratio and covering optimization based on CIR resulting form users' position distribution.

10.1109/icmmt.2004.1411657 article EN 2005-05-24

Security has become an important issue in Web Services application, which been widely concerned. This paper introduces several security policy models that applied and analyzes the basic principles. And then a simple comparison was made for scope merits of these models, finally this points out research.

10.1109/mines.2010.223 article EN International Conference on Multimedia Information Networking and Security 2010-01-01

With the Web Services widely used in distributed systems, demand for cross-domain authentication is increasing day by day, its security issues become more and prominent. Aiming at disadvantages of authentication, this article presents a dynamic mechanism crossing domains based on SAML. It can achieve single sign-on improve interoperability Services. At same time it meets demands certificate under applications environmental.

10.1109/icfcc.2010.5497453 article EN 2010-01-01

In the face of global warming, air pollution, and other difficulties, electric vehicles have become an industry strongly supported by various countries due to their good environmental protection characteristics. context big data, people are exposed more information, convenience brought data is also increasing. Based on this background, development green intelligent getting faster faster. This paper aimed at studying application machine learning algorithms in consumption trends data. proposes...

10.1155/2022/4436016 article EN Wireless Communications and Mobile Computing 2022-07-27

With the rapid development of 5G and Internet Things, video has gained broad application space as a carrier information, codec technology can reduce storage space, save transmission bandwidth, provide possibility for promotion applications. Versatile Video Coding (VVC), latest generation coding standard today, still uses block-based coding, which inevitably introduces artifacts, deblocking filters effectively artifacts improve quality compressed video. The filter in VVC adopts method based...

10.1109/iccc49849.2020.9238791 article EN 2022 IEEE/CIC International Conference on Communications in China (ICCC) 2020-08-09

A new multi-cell cellular configuration networks is provided for analysis of handover initiation probability, which based on multi-beam base-station antenna splitting in the elevation-radiating plane. The sum mobile received signal power including desired and interference has been introduced into algorithm, along with idea, we present three models algorithm shadowing process Gaussian distribution. formulation probability those algorithms also analyzed. validity presented checked through a...

10.1109/icct.2003.1209679 article EN 2004-01-24

Based on the requirements of LTE-Advanced standardization, this paper provides an 8-Tx diversity scheme for downlink. The proposed considers complexity, compatibility, performance and etc. together. What's more, gives simulation results shows feasibility scheme.

10.1109/wicom.2010.5600742 article EN 2010-09-01

This paper proposed a hierarchical cellular system based on the adaptive multi-beam antenna along with channel assignment scheme. The is formed from mechanism that beams of radiate in vertical plane, to say, base station can generate cluster concentric circles. channels assigned vary layer varied according traffic density unit area. simulation results show scheme be fit for system.

10.1109/wicom.2009.5303164 article EN 2009-09-01

The security of optical code division multi-access (OCDMA) system was analyzed, and the results indicate hidden trouble security. A scheme multi-codes to be transmitted single-user information has been proposed, eavesdropping model simulated. soft platform simulation built by optisystem3.0 MATLAB. analysis accomplished on platform. brute-force searching a interception have studied. shown that this better

10.1109/icmmt.2008.4540885 article EN International Conference on Microwave and Millimeter Wave Technology 2008-04-01

To collect data efficiently and reliably in Mobile Crowd Sensing (MCS), a Participant Service Ability Aware (PSAA) collecting mechanism is proposed. First, participants select the best sensing task according to complexity desired reward multitasking scenario. Second, Stackelberg Game model established based on mutual choice of platform maximize their utilities evaluate service ability participants. Finally, transmit directly or indirectly through relay from with better selected complete...

10.3390/s18124219 article EN cc-by Sensors 2018-12-01
Coming Soon ...