Kun Xie

ORCID: 0000-0003-4009-6601
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Meteorological Phenomena and Simulations
  • Climate variability and models
  • Interconnection Networks and Systems
  • Advanced Optical Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Computing and Algorithms
  • Cryospheric studies and observations
  • Hydrology and Watershed Management Studies
  • Network Security and Intrusion Detection
  • Text and Document Classification Technologies
  • Advanced Authentication Protocols Security
  • Iterative Learning Control Systems
  • Information Systems and Technology Applications
  • Advanced Data Processing Techniques
  • demographic modeling and climate adaptation
  • Sparse and Compressive Sensing Techniques
  • Innovative Educational Techniques
  • Climate Change and Environmental Impact
  • Maritime Transport Emissions and Efficiency
  • Science and Climate Studies

Beijing University of Posts and Telecommunications
2016-2024

Wuhan University
2024

State Key Laboratory of Networking and Switching Technology
2019

Hunan University
2017-2018

Qinghai Normal University
2004-2007

Brunel University of London
2001

Convection-permitting regional climate models (CPRCMs) are increasingly recognized for their ability to improve extreme precipitation predictions, yet application hydrological modeling in complex terrains remains uncertain. This study evaluates the performance of CPRCMs predicting extremes two basins Western Norway: Røykenes, dominated by rainfall-induced floods, and Bulken, characterized snowmelt-induced floods. We compare capabilities a high-resolution convection-permitting model...

10.5194/egusphere-egu25-13633 preprint EN 2025-03-15

An algorithm based on nonlinear interior point methods is developed for the dynamic optimal power flow (DOPF) problem in which both time-separated and time-related constraints are considered solved as a single optimisation problem. A border blocked system derived further decomposed into submatrices whose sizes merely rely network 4 × block structure same nodal admittance matrices. Thus, supersparsity technique of Newton OPF can be fully utilised. three-stage solution procedure proposed to...

10.1049/ip-gtd:20010026 article EN IEE Proceedings - Generation Transmission and Distribution 2001-01-01

Energy consumed by network constitutes a significant portion of the total power budget in modern data centers. Thus, it is critical to understand energy consumption and improve efficiency center networks (DCNs). In doing so, one straightforward effective way make size DCNs elastic along with traffic demands, i.e., turning off unnecessary components reduce consumption. Today, software defined networking (SDN), as most promising solutions for management, provides paradigm elastically control...

10.1109/access.2016.2617871 article EN cc-by-nc-nd IEEE Access 2016-01-01

Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding and opening capabilities. SDN brings great flexibility openness to the network, but original design phase of had not considered designing characteristics regarding security. For this reason, there are many potential vulnerabilities in Environments. One most critical security threats arise vulnerability trusting relationship due lack...

10.1109/wpmc.2017.8301788 article EN 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) 2017-12-01

The rapid development of 5G and Artificial Intelligence technologies has brought various applications with specific requirements in both computing performance network performance. At the same time, ubiquitous devices are interconnected to Internet Service Provider's network. Computing-aware networking, as integration networking computing, become a hot topic academia industries. Motivated by this new architecture, we present Bandwidth Allocation method based on utility optimization, called...

10.1109/iccsn52437.2021.9463597 article EN 2021-06-04

The emergence of Network Function Virtualization (NFV) greatly improves the convenience network layout, and at same time reduces service cost for operators. Currently, many studies on NFV layout focus one-to-one unicast communication cannot be extended to multicast. Therefore, in this paper, we are committed exploring joint problem Virtual (VNF) path selection multi-source In addition, take into account bandwidth latency constraints, they vital indices Quality Service (QoS). To solve...

10.1109/icc.2019.8761957 article EN 2019-05-01

10.1109/wcnc57260.2024.10571289 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2024-04-21

Energy efficiency in data center networks (DCNs) is critical to the operations of modern large-scale centers. One effective way make size DCNs elastic along with flow demands by centralized routing and scheduling, i.e., turning off idle network components reduce power consumption. As such, software-defined networking (SDN) widely used for achieving such elasticity conveniently. Meanwhile, scale structure get much larger more complex. Central control global computing become impractical due...

10.1109/access.2018.2791630 article EN cc-by-nc-nd IEEE Access 2018-01-01

Segment routing (SR) is a new network paradigm to optimize performance. Through leveraging source routing, SR able achieve more fine-grained control of data flow in the domain. However, it difficult introduce large-scale full into existing traditional due economic constraints and immature operation technology. Thus, incrementally deploying nodes an preferred, which forms hybrid IP/SR scenario. In network, with enabled devices, path can be dynamically adjusted. Network utility important...

10.1109/access.2019.2924672 article EN cc-by IEEE Access 2019-01-01

In the inter-domain network, route leaks can disrupt Internet traffic and cause large outages. The accurate detection of requires sharing AS business relationship information. However, information between ASes is confidential. are usually unwilling to reveal this other ASes, especially their competitors. paper, we propose a method named FL-RLD detect while maintaining privacy relationships by using blockchain-based federated learning framework, where collaboratively train global model...

10.1145/3561051 article EN ACM Transactions on Internet Technology 2022-09-01

The position accuracy of the third mirror's Z axis will directly affect measurement optical telescope, so it is necessary to improve accuracy. In order control performances Z-axis a large this paper proposes novel algorithm based on hyperbolic tangent function (tanh). proposed used replace traditional integral separated proportional-integral (IS-PI) controller which widely in industry servo system. Firstly, mathematical model established. Secondly, tanh proposed, and characteristics...

10.1109/access.2023.3315118 article EN cc-by-nc-nd IEEE Access 2023-01-01

Ensuring transmission survivability is a crucial problem for high-speed networks. Path protection fast and capacity-efficient approach increasing the availability of end to connections. The emerging SDN infrastructure makes it feasible provide diversity routing in practical network. For more robust path protection, desirable an alternative that does not share any risk resource with active path. We consider finding SRLG-Disjoint paths, where Shared Risk Link Group (SRLG) group network links...

10.1109/dsn.2018.00069 article EN 2018-06-01

Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN decoupled from data forwarding plane, hence it provides a new centralized flexible resource management. Although attracting much attention both industry and research, its advantage over traditional networks has not been fully utilized. Multicast designed to deliver content multiple destinations. current traffic engineering focuses mainly on unicast,...

10.3390/electronics7010010 article EN Electronics 2018-01-21

The path computation element (PCE) is used for the traffic engineering systems such as multi-protocol label switching (MPLS) and Generalized MPLS networks. It offers a good architecture centralized routing control. classic policy aims to select one "best" traffic, which may cause network congestion in best link. How adjust alleviate or avoid an important issue operating In this paper, according topology model of China Telecom's network, we propose practical control scheme with load balancing...

10.1109/access.2019.2902610 article EN cc-by-nc-nd IEEE Access 2019-01-01

The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods identify the malicious in rerouting, which is based on statistics. In these existing mechanisms, identification of depends IP address. However, address easy be changed attacks. Compared with address, certificate more challenging tampered or forged. Moreover, traffic trend network towards encryption. certificates popularly utilized IoT devices for authentication...

10.32604/cmes.2022.022462 article EN Computer Modeling in Engineering & Sciences 2022-08-16

Resource Public Key Infrastructure (RPKI) defends against BGP prefix hijacking by signing Route Origin Authorizations (ROAs) and filtering malicious routes with ROAs. However, RPKI's low deployment weakens its defense hijacking. In the absence of a large fraction Autonomous Systems (ASes) ROAs, incentive to use eliminate hijacked prefixes commensurately decreases. There is cyclic dependency here because reduced in turn lessens for non-adoptees become adoptees. Previous studies on RPKI are...

10.1109/tdsc.2024.3371644 article EN IEEE Transactions on Dependable and Secure Computing 2024-02-29

Abstract. Convection-permitting regional climate models (CPRCMs) have demonstrated enhanced capability in capturing extreme precipitation compared to (RCMs) with convection-parameterization schemes. Despite this, a comprehensive understanding of their added values daily or sub-daily extremes, especially at local scale, remains limited. In this study, we conduct thorough comparison and from HARMONIE-Climate model, cycle 38 3 km resolution (HCLIM3) 12 (HCLIM12) across Norway’s diverse...

10.5194/hess-2024-68 preprint EN cc-by 2024-03-05

Convection-permitting climate models (CPMs) have demonstrated enhanced capability in capturing extreme precipitation compared to convection-parameterization models. Despite this, a comprehensive understanding of their added values daily or sub-daily extremes, especially at local scale, remains limited. In this study, we conduct thorough comparison and from HCLIM3 HCLIM12 across Norway, divided into eight regions, using gridded in-suit observations. Our main focus is investigate the for...

10.5194/egusphere-egu24-16029 preprint EN 2024-03-09

Western Norway is one of the regions with most precipitation in Europe. Average amounts are about 3500 mm per year around and mountains near coast, up to 5000 mm peak years. The wet climate mainly caused by North Atlantic Current, which also gives this region a milder winter than other parts Norway, rain being more frequent snow.  Enhancement rainfall (intensity, frequency, duration) attendant flooding main physical risk for Norway.  As such, we...

10.5194/ems2024-822 preprint EN 2024-08-16
Coming Soon ...