Yifei Zou

ORCID: 0000-0003-4579-5380
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • Distributed systems and fault tolerance
  • Age of Information Optimization
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Cryptography and Data Security
  • Energy Efficient Wireless Sensor Networks
  • Mobile Crowdsensing and Crowdsourcing
  • Optimization and Search Problems
  • Security in Wireless Sensor Networks
  • Adversarial Robustness in Machine Learning
  • Advanced Clustering Algorithms Research
  • Software-Defined Networks and 5G
  • Data Management and Algorithms
  • Advanced Neural Network Applications
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Communication Security Techniques
  • Face and Expression Recognition
  • Wireless Networks and Protocols
  • Distributed Control Multi-Agent Systems
  • Stochastic Gradient Optimization Techniques

Shandong University of Science and Technology
2020-2025

Shandong University
2021-2025

Second Affiliated Hospital of Jilin University
2022-2024

Zhejiang University of Technology
2024

Guizhou Academy of Agricultural Sciences
2023-2024

University of Michigan
2024

Tongji University
2024

Harbin Engineering University
2020-2023

Qingdao Binhai University
2023

Wuhan University
2022

Recent years have witnessed that the new mobility Intelligent Transportation System is booming, especially development of Vehicular Ad Hoc Networks (VANETs). It brings convenience and a good experience for drivers. Unfortunately, VANETs are suffering from potential security privacy issues due to inherent openness VANETs. In past few years, address privacy-preserving problems, many identity-based authentication schemes been proposed by researchers. However, we found these fail meet...

10.1109/access.2019.2911924 article EN cc-by-nc-nd IEEE Access 2019-01-01

This article studies decentralized federated learning algorithms in wireless IoT networks. The traditional parameter server architecture for faces some problems such as low fault tolerance, large communication overhead and inaccessibility of private data. To solve these problems, we propose a algorithm called DWFL. works system where the workers are organized peer-to-peer server-less manner, exchange their privacy preserving data with analog transmission scheme over channels parallel. With...

10.1109/tii.2022.3145010 article EN IEEE Transactions on Industrial Informatics 2022-01-25

Dynamicity is one of the most challenging, yet, key aspects wireless networks. It can come in many guises, such as churn (node insertion/deletion) and node mobility. Although study dynamic networks has been popular distributed computing domain, previous works considered only partial factors causing dynamicity. In this work, we propose a model that comprehensive to include crucial on nodes links. Our defines dynamicity terms localized topological changes vicinity each node, rather than global...

10.1109/tmc.2020.2971599 article EN IEEE Transactions on Mobile Computing 2020-02-04

This paper presents <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$\mathit {wChain}$ </tex-math></inline-formula> , a blockchain protocol specifically designed for multihop wireless networks that deeply integrates communication properties and technologies under the realistic SINR model. We adopt hierarchical spanner as backbone to address medium contention achieve fast data aggregation within...

10.1109/twc.2021.3078639 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2021-06-03

Known as a distributed ledger technology (DLT), blockchain has attracted much attention due to its properties such decentralization, security, immutability and transparency, potential of servicing an infrastructure for various applications. Blockchain can empower wireless networks with identity management, data integrity, access control, high-level security. However, previous studies on blockchain-enabled mostly focus proposing architectures or building systems popular protocols....

10.1109/tmc.2022.3162117 article EN IEEE Transactions on Mobile Computing 2022-03-28

In recent years, due to the wide implementation of mobile agents, Internet-of-Things (IoT) networks have been applied in several real-life scenarios, servicing applications areas public safety, proximity-based services, and fog computing. Meanwhile, when more complex tasks are processed IoT networks, demands on identity authentication, certifiable traceability, privacy protection for services increase. Building a blockchain system can greatly satisfy such demands. However, building brings...

10.26599/tst.2021.9010065 article EN Tsinghua Science & Technology 2022-03-17

In many edge computing applications, devices are required to reach fault-tolerant consensus in order provide collaborative services outdoor environments. this paper, we study a comprehensive <inline-formula><tex-math notation="LaTeX">$(a,b)$</tex-math></inline-formula> -majority problem based on novel failure model, which takes notation="LaTeX">$a$</tex-math></inline-formula> distinct opinions as inputs and outputs notation="LaTeX">$b$</tex-math></inline-formula> opinion the final agreement....

10.1109/tc.2023.3238138 article EN IEEE Transactions on Computers 2023-01-19

We present a distributed stable protocol for local broadcast in multi-hop wireless networks, where packets are injected to the nodes continuously, and each node needs quickly disseminate all its neighbors within given communication range R. investigate maximum packet injection rate minimum latency that can be achieved protocol. This paper assumes signal-to-interference-plus-noise-ratio (SINR) interference model, which reflects more accurately physical characteristics of interference, such as...

10.1109/tnet.2018.2829712 article EN IEEE/ACM Transactions on Networking 2018-05-15

This paper presents the first distributed algorithm to construct a spanner for arbitrary ad hoc networks under physical signal-to-interference-and-noise-ratio (SINR) interference model. Spanner construction is one of most important techniques topology control in wireless networks, which intends find sparse only small number links need be maintained, without substantially degrading path connecting any pair nodes network. Due non-local property interference, constructing challenging SINR...

10.1109/tnet.2017.2684831 article EN IEEE/ACM Transactions on Networking 2017-03-31

Federated edge learning (FEEL) is a novel paradigm that enables privacy-preserving and distributed machine on end devices. However, FEEL faces challenges from data/system heterogeneity among the participating clients resource constraints of networks, which affect efficiency accuracy process. In this paper, we propose comprehensive framework for client selection in based concept Value-of-Information (VoI), measures how valuable global model aggregation. Our consists two independent...

10.1109/tc.2024.3355777 article EN IEEE Transactions on Computers 2024-01-18

Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad applications. However, inherent characteristics wireless channels, such as fading, interference, and openness, pose significant challenges achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, critical aspect distributed ensures that network nodes collectively agree on consistent value even in presence faulty or compromised...

10.1016/j.hcc.2024.100202 article EN cc-by-nc-nd High-Confidence Computing 2024-01-09

Intercropping systems can improve soil fertility and health, however, microbial communities functional genes related to carbon, nitrogen phosphorus cycling under the intercropping system of mesquite perilla have not been studied. Therefore, in present study, different planting densities varieties Perilla frutescens (L.) Britt kiwifruit were used for intercropping, changes nitrogen, inter-roots inter-cropping conditions investigated by macro-genome sequencing technology. The results showed...

10.3389/fmicb.2024.1349305 article EN cc-by Frontiers in Microbiology 2024-06-03

Visual object navigation, a classical problem in embodied intelligence tasks, requires agents to find specified target using only the first-person view of visual information. A number methods that search for an same category are known as navigation. This is different from real world where objects labelled “whose”. Then, navigation task distinguishing by attributes closer practicality, which called instance-level However, current approaches have some limitations. Firstly, attribute...

10.1145/3706423 article EN Journal of Data and Information Quality 2025-01-04

This study employs transcriptomics and single-cell analysis to delve into the mechanisms by which damage-associated molecular patterns (DAMPs) trigger immune activation in coronary artery disease (CAD). We obtained RNA-seq data from GSE202625 GSE242046 datasets, as well GSE159677 dataset, all sourced GEO database. Through differential expression analysis, we identified 821 differentially expressed genes (DEGs), comprising 389 upregulated 432 downregulated genes, are likely closely associated...

10.1016/j.cyto.2025.156952 article EN cc-by-nc-nd Cytokine 2025-04-28

In the era of big data, sensor networks have been pervasively deployed, producing a large amount data for various applications. However, because are usually placed in hostile environments, managing huge volume is very challenging issue. this study, we mainly focus on storage reliability problem heterogeneous wireless where robust nodes deployed and redundancy utilized through coding techniques. To minimize delivery costs, design an algorithm to jointly optimize routing node deployment. The...

10.26599/tst.2019.9010061 article EN Tsinghua Science & Technology 2020-07-24

This paper studies jamming-resilient distributed backbone construction in multi-hop wireless networks. Specifically, a strong adversarial jamming model is proposed that captures the general phenomena suffered by communications. The based on realistic Signal-to-Interference-plus-Noise-Ratio (SINR) interference model, and featured local-uniformity, unrestricted energy budget reactivity, which covers more scenarios much closer to reality than existing models. Under we propose randomized...

10.1109/infocom.2019.8737477 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols wireless networks assume reliable communications and do not consider the jamming behavior nodes. Such jamming, however, very critical realistic be considered modern In this paper, for first time, we integrate nodes into network setting. We show that, much more comprehensive harsh model, efficient distributed communication can still devised with elaborate...

10.1109/tnet.2021.3069324 article EN IEEE/ACM Transactions on Networking 2021-04-02
Coming Soon ...