Rong Zheng

ORCID: 0000-0003-4070-075X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Indoor and Outdoor Localization Technologies
  • Energy Efficient Wireless Sensor Networks
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Speech and Audio Processing
  • Underwater Vehicles and Communication Systems
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Context-Aware Activity Recognition Systems
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Bandit Algorithms Research
  • Advanced Wireless Network Optimization
  • Human Pose and Action Recognition
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced MIMO Systems Optimization
  • Anomaly Detection Techniques and Applications
  • Caching and Content Delivery
  • Distributed Sensor Networks and Detection Algorithms
  • Video Surveillance and Tracking Methods
  • Energy Harvesting in Wireless Networks
  • Network Security and Intrusion Detection
  • Blind Source Separation Techniques
  • Bluetooth and Wireless Communication Technologies
  • Opportunistic and Delay-Tolerant Networks

McMaster University
2016-2025

Hebei Medical University
2022-2025

Ministry of Education of the People's Republic of China
2022-2025

Hospital of Hebei Province
2025

Lanzhou Jiaotong University
2024

Air Force Medical University
2021-2024

Sun Yat-sen University
2023-2024

First Affiliated Hospital of Xinxiang Medical University
2024

Sun Yat-sen University Cancer Center
2024

State Grid Corporation of China (China)
2024

Aging power industries, together with the increase in demand from industrial and residential customers, are main incentive for policy makers to define a road map next-generation system called smart grid. In grid, overall monitoring costs will be decreased, but at same time, risk of cyber attacks might increased. Recently, new type (called stealth attack) has been introduced, which cannot detected by traditional bad data detection using state estimation. this paper, we show how normal...

10.1109/jsyst.2014.2341597 article EN IEEE Systems Journal 2014-08-20

Due to the slow advancement of battery technology, power management in wireless networks remains be a critical issue. Asynchronous wakeup has merits not requiring global clock synchronization and being resilient network dynamics. This paper presents systematic approach designing implementing asynchronous mechanisms ad hoc networks. The optimal schedule design can formulated as block problem combinatorics. We propose neighbor discovery bookkeeping protocol that operate on derived. Two...

10.1145/778415.778420 article EN 2003-06-01

Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major security threat facing wireless networks. The fact that mobile devices prone to be compromised and reverse engineered significantly increases the risk of such attacks adversaries can obtain secret keys on trusted nodes impersonate node. One promising approach toward thwarting these is through extraction unique fingerprints provide a reliable robust means for device...

10.1109/comst.2015.2476338 article EN IEEE Communications Surveys & Tutorials 2015-09-03

Battery power is an important resource in ad hoc networks.It has been observed that networks, energy consumption does not reflect the communication activities network.Many existing conservation protocols based on electing a routing backbone for global connectivity are oblivious to traffic characteristics.In this paper, we propose extensible on-demand management framework networks adapts load.Nodes maintain soft-state timers determine transitions.By monitoring control messages and data...

10.1109/infcom.2003.1208699 article EN 2004-03-22

DNA repair capacity is central in maintaining normal cellular functions. Variants of several genes,including the nucleotide excision gene XPD, have been described recently. Because we previously reported that patients with squamous cell carcinoma head and neck (SCCHN) had lower than healthy controls, hypothesized inherited polymorphisms XPD may contribute to genetic susceptibility SCCHN, a tobacco-related cancer. To test this hypothesis, conducted hospital-based case-control study 189 SCCHN...

10.1093/carcin/21.12.2219 article EN Carcinogenesis 2000-12-01

In modern smart grid networks, the traditional power is empowered by technological advances in sensing, measurement, and control devices with two-way communications between suppliers consumers. The integration helps networks to be smarter, but it also increases risk of attacks because existing obsolete cyber-infrastructure. this article, we focus on bad data injection for grid. basic problem formulation presented, special type stealth attack discussed. Then investigate strategies defenders...

10.1109/mcom.2013.6400435 article EN IEEE Communications Magazine 2013-01-01

Each wireless device has its unique fingerprint, which can be utilized for identification and intrusion detection. Most existing literature employs supervised learning techniques assumes the number of devices is known. In this paper, based on device-dependent channel-invariant radio-metrics, we propose a non-parametric Bayesian method to detect as well classify multiple in unsupervised passive manner. Specifically, infinite Gaussian mixture model used modified collapsed Gibbs sampling...

10.1109/infcom.2011.5934926 article EN 2011-04-01

In this paper, the problem of uplink user association in small cell networks, which involves interactions between users, base stations, and macro-cell having often conflicting objectives, is considered. The formulated as a college admissions game with transfers number colleges, i.e., stations seek to recruit students, users. game, users access points (small cells macro-cells) rank one another based on preference functions that capture users' need optimize their utilities are packet success...

10.1109/infocom.2014.6848040 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

In smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to attacks. this paper, stealth false data attacks are investigated where attackers without prior knowledge of grid topology, try make inferences through phasor observations. We show that when system dynamics small can be approximated linearly, linear independent component analysis (ICA) applied estimate Jacobian matrix multiplied by eigenvectors covariance state variables. The inferred...

10.1109/smartgridcomm.2011.6102326 article EN 2011-10-01

In this paper, we present a framework for resource allocations multicast device-to-device (D2D) communications underlaying cellular network.The objective is to maximize the sum throughput of active users (CUs) and feasible D2D groups in cell, while meeting certain signal-to-interferenceplus-noise ratio (SINR) constraint both CUs groups.We formulate problem power channel allocation as mixed integer nonlinear programming (MINLP) where one group can reuse channels multiple each CU be reused by...

10.1109/tvt.2017.2691470 article EN IEEE Transactions on Vehicular Technology 2017-04-05

With the proliferation of Internet-of-Things (IoT) devices, acoustic sensing attracts significant attention in recent years. It exploits transceivers such as microphones and speakers beyond their primary functions, namely recording playing, to enable novel applications new user experiences. In this paper, we present first systematic survey on advances ubiquitous using commodity IoT hardware with a frequency range below 24 kHz. We propose general framework that categorizes main building...

10.1109/comst.2022.3145856 article EN IEEE Communications Surveys & Tutorials 2022-01-01

Enabling pervasive WiFi devices with non-contact sensing capability is an important topic in the field of integrated and communication. Doppler effect has been widely exploited to estimate targets' velocity from wireless signals. However, separation signal sources receivers complicates relationship between frequency shift (DFS) target WiFi-based systems. In contrast existing works that rely on either approximated relations or coarse-grained information such as whether a moving toward away...

10.1109/jsac.2022.3155523 article EN IEEE Journal on Selected Areas in Communications 2022-03-09

The gradual transition from cylindrical micelles to vesicles on increasing the temperature is demonstrated in cationic–anionic surfactant system of sodium dodecylsulfate/dodecyltriethylammonium bromide. has been studied by dynamic light scattering studies (see graph), a freeze-fracture technique with observation electron microscopy, and rheology measurements.

10.1002/anie.200350913 article EN Angewandte Chemie International Edition 2003-05-14

Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and access. Although each SU has incentive sense the primary user (PU) channels for locating holes, this exploration of can come at expense a shorter transmission time, and, hence, possibly smaller capacity data transmission. This paper investigates impact on cooperative strategies network SUs that seek cooperate order improve their view (sensing), reduce possibility...

10.1109/jstsp.2011.2175699 article EN IEEE Journal of Selected Topics in Signal Processing 2011-11-10

In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred the result of primary users' activity. Furthermore, each user pays cost transmission upon successful bidding for channel. Knowledge regarding other activity limited due distributed nature network. The resulting formulation thus dynamic with incomplete information. To solve such problem, Bayesian nonparametric...

10.1109/twc.2011.010411.100838 article EN IEEE Transactions on Wireless Communications 2011-01-21

Location-based services have experienced substantial growth in the last decade. However, despite extensive research efforts, sub-meter location accuracy with low-cost infrastructure continues to be elusive. In this paper, we propose IDyLL -- an indoor localization system using inertial measurement units (IMU) and photodiode sensors on smartphones. Using a novel illumination peak detection algorithm, augments IMU-based pedestrian dead reckoning fixes. We devise robust particle filter...

10.1145/2750858.2807540 article EN 2015-09-07

Mucositis is a common problem that results from cancer chemotherapy and cause of significant morbidity occasional mortality. Its prevention successful treatment can significantly enhance the quality life patients improve their survival. Sea cucumber traditional aquatic food has both nutritional medicinal value. The polysaccharide fucoidan sea (SC-FUC) various bioactivities. We examined protective effect different molecular weights (MWs 50 kDa-500 kDa) cucumber, Acaudina molpadioides, in...

10.1039/c4fo00567h article EN Food & Function 2014-11-03

We consider the problem of optimally assigning p sniffers to K channels monitor transmission activities in a multichannel wireless network with switching costs. The activity users is initially unknown and be learned along channel assignment decisions maximize benefits this assignment, resulting fundamental tradeoff between exploration exploitation. Switching costs are incurred when change their assignments. As result, frequent changes undesirable. formulate sniffer-channel as linear partial...

10.1109/tsp.2014.2357779 article EN IEEE Transactions on Signal Processing 2014-09-12
Coming Soon ...