Yunzhao Li

ORCID: 0000-0003-4268-9494
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Network Packet Processing and Optimization
  • Peer-to-Peer Network Technologies
  • Privacy-Preserving Technologies in Data
  • Cooperative Communication and Network Coding
  • Policing Practices and Perceptions
  • Network Security and Intrusion Detection
  • Environmental Changes in China
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Coastal wetland ecosystem dynamics
  • Network Traffic and Congestion Control
  • Water Resources and Management
  • Cryptography and Data Security
  • Advanced Data Storage Technologies
  • Wireless Networks and Protocols
  • German Security and Defense Policies
  • Global Security and Public Health
  • Cognitive Radio Networks and Spectrum Sensing
  • Martial Arts: Techniques, Psychology, and Education
  • Mobile Ad Hoc Networks
  • Smart Cities and Technologies
  • PAPR reduction in OFDM
  • Geographic Information Systems Studies
  • Big Data Technologies and Applications

Ludong University
2024

State Grid Corporation of China (China)
2023-2024

Beijing University of Posts and Telecommunications
2020

Inner Mongolia Electric Power (China)
2019

Beijing Jiaotong University
2015

Yantai Institute of Coastal Zone Research
2013-2014

Kansas State University
2010-2014

University of Chinese Academy of Sciences
2014

Chinese Academy of Sciences
2013

Yunnan Academy of Forestry
2011

Routing in multi-hop cognitive radio net- works(CRN) should consider how to dynamically switch frequency band for either per flow throughput guarantee or global spectrum utilization. Previous research have offered both centralized and distributed solutions on combining the two, but since different nodes may sense availability, efficiently sharing this information dynamic environment still remains challenging. In paper, we propose an approach reactively initiate route computing selection. We...

10.1109/dyspan.2007.80 article EN 2007-04-01

In coastal area, salinization is a common and serious problem for crop cultivation ecological restoration of degraded wetlands. Therefore, the soil salinity has attracted increasing attention from farmers, government environmental scientists. The factors controlling distribution have become hot point in saline studies. this study, statistics geostatistics were used to explore Yellow River Delta (YRD) based on 150 samples that collected June 2010. Besides experimental work, geographical...

10.1007/s12665-013-2980-0 article EN cc-by Environmental Earth Sciences 2013-12-05

As a mode of processing task request, edge computing paradigm can reduce delay and effectively alleviate network congestion caused by the proliferation Internet things(IoT) devices compared with cloud computing. However, in actual construction network, there are various autonomous subnets adjacent areas, which leads to possibility unbalance server load among during peak period request. In this paper, deep reinforcement learning algorithm is proposed solve complex computation offloading...

10.1109/access.2020.2991773 article EN cc-by IEEE Access 2020-01-01

10.1016/j.jss.2017.01.003 article EN Journal of Systems and Software 2017-01-10

The ecological problems caused by dry and wet deposition of atmospheric nitrogen have been widespread concern in the world. In this study, depositions were monitored plant growing season coastal zone Yellow River Delta (YRD) using automatic sampling equipment. results showed that<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:msup><mml:mrow><mml:msub><mml:mrow><mml:mtext>SO</mml:mtext></mml:mrow><mml:mrow><mml:mn...

10.1155/2014/949213 article EN cc-by The Scientific World JOURNAL 2014-01-01

In this paper, a new initial radius (IR) selection method of Sphere Decoding (SD), called IR-ZF-OSUC, for MIMO system is proposed. An significant merit that utilizes the result ofQR decomposition which inherent in SD to obtain suboptimal solution, and selects distance between received signal lattice point mapped by solution as IR, makes procedure can be embedded body SD. Unlike other approaches, it needs no extra processing, so lower computational complexity achieved. Additionally, includes...

10.1109/iscc.2007.4381481 article EN Proceedings - IEEE Symposium on Computers and Communications/IEEE Symposium on Computers and Communications 2007-07-01

Bloom filter is a fast and simple structure for string matching, but it allows false positives. Longest prefix matching bloom filters (LPM) with counter extended hash table can eliminate positives at the expense of double memory none wire-speed. Faster searching speed be achieved parallel LPMs (PLPM), using more memory. We present an algorithm named efficient (MEPBF) which will save (q-1)/(2q) reach nearly same performance compared PLPM q LPMs. With this new algorithm, either faster given...

10.1109/nswctc.2009.280 article EN 2009-04-01

Energy-constrained wireless sensor networks require robust and energy-efficient communication protocols to minimize the energy consumption as much possible. Cooperative MIMO transmission is one of new solutions this problem. In paper, we first analyze efficiency cooperative with consideration channel training overhead. Then, an cluster-based scheme (ECCM) proposed. An end-to-end optimization model developed find optimum number nodes, clusters rates. Simulation results show that tremendous...

10.1109/iccs.2006.301370 article EN 2006-01-01

Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, intrusion detection, viruses, worms other malicious code detection filtering. Collisions exist in common hash tables, which can critically affect the worst-case throughput an application, since number memory accesses required for each lookup vary. A non-collision scheme was presented, assuring at most one access lookup. Using Bloom filter (BF) CAM, this new algorithm is...

10.1109/wmwa.2009.64 article EN 2009-06-01

Privacy preserving computing (PPC) allows participants with different local data to do computations without revealing their sensitive data. Hence, ensuring security and privacy is essential for PPC. SM9 a Chinese national standard international identity-based encryption (IBE). Compared other IBE schemes, has better performance. At present, there no proxy re-encryption scheme based on available sharing scenarios in cloud environments. In this paper, we introduce novel framework called...

10.1145/3661725.3661761 article EN 2024-04-12

With the acceleration of data opening and sharing process in power industry, risk sensitive leakage is also gradually increasing. Privacy protection one hot issues privacy control technology research release, k-anonymity topic recent years. In this paper, we propose a hierarchical DP-K anonymous release model based on binary tree clustering for existing scheme minimizing amount information loss. A tree-based algorithm (BTCA) proposed to classify similar records into same equivalent class,...

10.23919/icact56868.2023.10079551 article EN 2022 24th International Conference on Advanced Communication Technology (ICACT) 2023-02-19

Deep packet inspection has become extremely important due to network security. In deep inspection, the payload is compared against a set of patterns specified as regular expressions. Regular expressions are often implemented deterministic finite automaton (DFA) for matching in linear time at high link rates. We proposed predict DFA which can accelerate processing speed DFA. A uses additional information several next transitions. tested our proposal on Layer7 rule-set and validated it real...

10.1016/j.proeng.2012.01.279 article EN Procedia Engineering 2012-01-01

Poor data locality in high-speed networks leads to more memory accesses of connection management, which limits the throughput performance. In view above problem, this paper analyzed process management and access detail, put forward efficient solution improve on FPGA platform. This takes full advantage structural characteristics SDRAM. By controlling requests, it can make adjacent requests different banks, reduce hardware resource conflicts, shorten time interval between throughput. order...

10.1109/iceiec.2015.7284499 article EN 2015-05-01

Fairness is an important management issue for peer-to-peer file sharing systems. In this paper, we study the credit system of P2P network eMule (http://www.emule-project.net) through a simple queueing model. Numerical analysis and experimental results show that local strategy could effectively deal with free riders provide fairness during single exchange. Using model, also investigate different strategies dealing newcomer issue. We propose simple, private history-based scheme to balance...

10.1109/noms.2010.5488441 article EN 2010-01-01

IEEE 802.11 MAC standard and model are well researched. Although it supports multiple channels in physical layer, how to provide multi-channel support layer is still challenging. Most of current work on only evaluate by simulations. In this paper, we propose a simple but general scheme describe channel switching process. With its help, extend the into MAC, present three-dimensional Markov chain it. This analytical both access methods: basic RTS/CTS. Simulation results show that our can...

10.1109/iscc.2007.4381568 article EN Proceedings - IEEE Symposium on Computers and Communications/IEEE Symposium on Computers and Communications 2007-07-01

Demand response business is becoming more and complicated under the opening of retail side. It involves a large number capital flow operations in subsidy settlement, penalty for breach contract so on. needs kind technical means effective management protection. Based on possible problems multi-agent participation demand business, this paper analyzes matching point between blockchain technology finally designs mechanism. Finally, prospect future research proposed.

10.1109/aiam48774.2019.00008 article EN 2019-10-01

10.1007/s11036-013-0492-5 article EN Mobile Networks and Applications 2014-01-10
Coming Soon ...