Jianwei Niu

ORCID: 0000-0003-3946-5107
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Advanced Neural Network Applications
  • Privacy-Preserving Technologies in Data
  • Complex Network Analysis Techniques
  • Topic Modeling
  • User Authentication and Security Systems
  • Energy Harvesting in Wireless Networks
  • Opinion Dynamics and Social Influence
  • Advanced Authentication Protocols Security
  • Advanced Image and Video Retrieval Techniques
  • Video Analysis and Summarization
  • Autonomous Vehicle Technology and Safety
  • Natural Language Processing Techniques
  • Cloud Computing and Resource Management
  • Indoor and Outdoor Localization Technologies
  • Context-Aware Activity Recognition Systems
  • Sentiment Analysis and Opinion Mining
  • Domain Adaptation and Few-Shot Learning
  • Parallel Computing and Optimization Techniques
  • Peer-to-Peer Network Technologies
  • Advanced Text Analysis Techniques

Beihang University
2016-2025

State Key Laboratory of Virtual Reality Technology and Systems
2017-2024

Zhengzhou University
2020-2024

Zhengzhou University of Industrial Technology
2020-2023

Ji Hua Laboratory
2022-2023

Horizon Robotics (China)
2022

ITRI International
2021

Informa (Sweden)
2021

Virtual Reality Medical Center
2018-2021

Chinese Institute for Brain Research
2021

Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used many fields to gather data monitoring area. However, due open nature wireless channel resource-constrained feature nodes, how guarantee that sensitive can only be accessed by a valid user becomes key challenge IIoT environment. Some authentication protocols for WSNs proposed address this issue. previous works more or less their own weaknesses, such as not providing...

10.1109/tii.2017.2773666 article EN IEEE Transactions on Industrial Informatics 2017-11-15

10.1016/j.jnca.2018.01.005 article EN Journal of Network and Computer Applications 2018-01-31

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation delay constraints WSNs, traditional mechanisms cannot be used. Trust management models have been recently suggested as an effective mechanism for WSNs. Considerable research has done on modeling managing trust. In this paper, we present a detailed survey various trust that geared towards Then, analyze applications models. They malicious attack detection, secure routing, data...

10.1016/j.jcss.2013.06.014 article EN publisher-specific-oa Journal of Computer and System Sciences 2013-07-04

The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic the IoT, wireless sensor networks (WSNs) can be used collect required environment parameters specific applications. Due resource limitation node open nature channel, security has become enormous challenge in WSN. Authentication as service guarantee legality data access Recently, Chang Le proposed two authentication protocols WSN different requirements. However,...

10.1109/jiot.2017.2787800 article EN IEEE Internet of Things Journal 2017-12-28

The past year has witnessed the rapid development of applying Transformer module to vision problems. While some researchers have demonstrated that Transformer-based models enjoy a favorable ability fitting data, there are still growing number evidences showing these suffer over-fitting especially when training data is limited. This paper offers an empirical study by performing step-by-step operations gradually transit model convolution-based model. results we obtain during transition process...

10.1109/iccv48922.2021.00063 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

Twitter sentiment analysis has become a hot research topic in recent years. Most of existing solutions to basically only consider textual information messages, and struggle perform well when facing short ambiguous messages. Recent studies show that diffusion patterns on have close relationships with polarities Therefore, this paper, we focus how fuse messages obtain better performance data. To end, first analyze by investigating phenomenon called reversal, find some interesting properties...

10.1109/tkde.2019.2913641 article EN IEEE Transactions on Knowledge and Data Engineering 2019-04-27

Can Transformer perform 2D object- and region-level recognition from a pure sequence-to-sequence perspective with minimal knowledge about the spatial structure? To answer this question, we present You Only Look at One Sequence (YOLOS), series of object detection models based on vanilla Vision fewest possible modifications, region priors, as well inductive biases target task. We find that YOLOS pre-trained mid-sized ImageNet-1k dataset only can already achieve quite competitive performance...

10.48550/arxiv.2106.00666 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Modern power grid is the most complex human-made system, which monitored by wide-area monitoring system (WAMS). Providing time-synchronized data of operating states, WAMS will play a crucial role in next generation smart protection and control. helps secure efficient energy transmission as well reliable optimal management. As key enabler grid, numerous sensors such PMU current transmit real-time dynamic data, usually protected encryption algorithm from malicious attacks, over...

10.1109/tsg.2011.2160298 article EN IEEE Transactions on Smart Grid 2011-08-16

QoS routing is an important research issue in wireless sensor networks (WSNs), especially for mission-critical monitoring and surveillance systems which requires timely reliable data delivery. Existing work exploits multipath to guarantee both reliability delay constraints WSNs. However, the approach suffers from a significant energy cost. In this work, we exploit geographic opportunistic (GOR) provisioning with end-to-end GOR protocols are not efficient WSNs, terms of efficiency computation...

10.1109/tpds.2013.240 article EN IEEE Transactions on Parallel and Distributed Systems 2013-09-20

ABSTRACT With the development and maturation of wireless communication technologies, sensor networks have been widely applied in different environments to acquire specific information. The medical (WMSNs), as a professional application medicine, attracted more attention because its potential improving quality healthcare services. Through WMSNs, parameters patients' vital signs can be gathered from nodes equipped on body patients then accessed by professionals using mobile device. By reason...

10.1002/sec.1214 article EN Security and Communication Networks 2015-02-16

Resource scheduling is one of the most important issues in mobile cloud computing due to constraints memory, CPU, and bandwidth. High energy consumption low performance memory accesses have become overwhelming obstacles for chip multiprocessor (CMP) systems used systems. In order address daunting "memory wall" problem, hybrid on-chip architecture has been widely investigated recently. Due its advantages size, real-time predictability, power, software controllability, scratchpad (SPM) a...

10.1109/jsyst.2014.2345733 article EN publisher-specific-oa IEEE Systems Journal 2014-09-10

Due to the unavailability of Vehicle-to-Infrastructure (V2I) communication in current transportation systems, Traffic Light Detection (TLD) is still considered an important module autonomous vehicles and Driver Assistance Systems (DAS). To overcome low flexibility accuracy vision-based heuristic algorithms high power consumption deep learning-based methods, we propose a lightweight real-time traffic light detector for vehicle platform. Our model consists candidate region selection identify...

10.1109/tmc.2019.2892451 article EN IEEE Transactions on Mobile Computing 2019-01-14

In cloud computing, computational resources are provided to remote users in the form of leases. For a user, he/she can request multiple services simultaneously. this case, parallel processing system improve performance. When applying it is necessary implement mechanism allocate resource and schedule tasks execution order. Furthermore, allocation with preemptable task increase utilization clouds. paper, we propose an adaptive algorithm for tasks. Our algorithms adjust adaptively based on...

10.1109/isda.2010.5687294 article EN 2010-11-01

In existing WiFi-based localization methods, smart mobile devices consume quite a lot of power as WiFi interfaces need to be used for frequent AP scanning during the process. this work, we design an energy-efficient indoor system called ZigBee assisted (ZIL) based on fingerprints via interference signatures. ZIL uses collect mixed signals, which include non-periodic data and periodic beacon signals. However, APs cannot identified from these signals by directly. To address issue, propose...

10.1109/jsac.2015.2430171 article EN IEEE Journal on Selected Areas in Communications 2015-05-06

Numerous research efforts have been conducted to simulate the crowd movements, while relatively few of them are specifically focused on multihazard situations. In this paper, we propose a novel simulation method by modeling generation and contagion panic emotion under circumstances. order depict effect from hazards other agents movement, first classify into different types (transient persistent, concurrent nonconcurrent, static dynamic) based their inherent characteristics. Second, introduce...

10.1109/tsmc.2019.2899047 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2019-01-01

Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless sensor networks (WSNs), especially industrial WSNs (IWSNs) with dynamic harsh environments. In this work, we present Reliable Reactive Routing Enhancement (R3E) to increase resilience link dynamics for WSNs/IWSNs. R3E designed enhance existing reactive routing protocols provide energy-efficient packet delivery against unreliable links by utilizing local path diversity....

10.1109/tii.2013.2261082 article EN IEEE Transactions on Industrial Informatics 2013-05-02

The gradually widening speed disparity between CPU and memory has become an overwhelming bottleneck for the development of chip multiprocessor systems. In addition, increasing penalties caused by frequent on-chip accesses have raised critical challenges in delivering high access performance with tight power latency budgets. To overcome daunting wall energy issues, this paper focuses on proposing a new heterogeneous scratchpad architecture, which is configured from SRAM, MRAM, Z-RAM. Based we...

10.1109/tetc.2015.2398824 article EN IEEE Transactions on Emerging Topics in Computing 2015-02-05

Wireless sensor networks (WSNs) are integrated as a pillar of collaborative Internet Things (IoT) technologies for the creation pervasive smart environments. Generally, IoT end nodes (or WSN sensors) can be mobile or static. In this kind hybrid WSNs, sinks move to predetermined sink locations gather data sensed by static sensors. Scheduling energy-efficiently while prolonging network lifetime is challenge. To remedy issue, we propose three-phase energy-balanced heuristic. Specifically,...

10.1109/tii.2015.2489160 article EN IEEE Transactions on Industrial Informatics 2015-10-09
Coming Soon ...