- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Data Storage Technologies
- Image and Video Quality Assessment
- Software-Defined Networks and 5G
- Cloud Computing and Resource Management
- Security and Verification in Computing
- IoT and Edge/Fog Computing
- Green IT and Sustainability
- Distributed and Parallel Computing Systems
- Spam and Phishing Detection
- Multimedia Communication and Technology
- Virtual Reality Applications and Impacts
- Cloud Data Security Solutions
- Network Traffic and Congestion Control
- Augmented Reality Applications
- Web Application Security Vulnerabilities
- Blockchain Technology Applications and Security
- Visual Attention and Saliency Detection
- Information and Cyber Security
- Privacy-Preserving Technologies in Data
- Video Coding and Compression Technologies
George Mason University
2015-2024
Yangzhou University
2010-2024
National Taichung University of Science and Technology
2024
Grace Mission University
2022
University of Waterloo
2022
InterDigital (United States)
2022
China Telecom (China)
2022
Toronto Metropolitan University
2022
Huazhong University of Science and Technology
2022
Université d'Avignon et des Pays de Vaucluse
2022
Existing studies on BitTorrent systems are single-torrent based, while more than 85% of all peers participate in multiple torrents according to our trace analysis. In addition, these not sufficiently insightful and accurate even for models, due some unrealistic assumptions. Our analysis representative Bit-Torrent traffic provides several new findings regarding the limitations systems: (1) Due exponentially decreasing peer arrival rate reality, service availability such becomes poor quickly,...
Literature has indicated that accurate dietary assessment is very important for assessing the effectiveness of weight loss interventions. However, most existing methods rely on memory. With help pervasive mobile devices and rich cloud services, it now possible to develop new computer-aided food recognition system assessment. enabling this future Internet Things-based imposes several fundamental challenges algorithm development design. In paper, we set address these issues from following two...
Metaverse, with the combination of prefix “meta” (meaning transcending) and word “universe,” has been deemed as a hypothetical next-generation (NextG) Internet. It aims to create shared virtual space that connects all worlds via Internet, where users, represented digital avatars, can communicate collaborate if they are in physical world. Nevertheless, there is still no unified definition Metaverse. This article first reviews what heavily advocated by industry positions various high-tech...
Existing studies on BitTorrent systems are single-torrent based, while more than 85% of all peers participate in multiple torrents according to our trace analysis.In addition, these not sufficiently insightful and accurate even for models, due some unrealistic assumptions.Our analysis representative Bit-Torrent traffic provides several new findings regarding the limitations systems: (1) Due exponentially decreasing peer arrival rate reality, service availability such becomes poor quickly,...
Various online social networks (OSNs) have been developed rapidly on the Internet. Researchers analyzed different properties of such OSNs, mainly focusing formation and evolution as well information propagation over networks. In knowledge-sharing blogs question answering systems, issues how users participate in network "generate/contribute" knowledge are vital to sustained healthy growth However, related discussions not reported research literature.
Fog computing is a recently proposed paradigm that extends Cloud and services to the edge of network. The new features offered by fog (e.g., distributed analytics intelligence), if successfully applied for pervasive health monitoring applications, has great potential accelerate discovery early predictors novel biomarkers support smart care decision making in connected scenarios. While promising, how design develop real-word computing-based system still an open question. As first step answer...
Cloud computing has paved a way for resource-constrained mobile devices to speed up their tasks and expand storage capacity. However, cloud is not necessary panacea all applications. The high network latency data centers may be ideal delay-sensitive applications while storing everything on public clouds risks users' security privacy. In this paper, we discuss two preliminary ideas, one application offloading the other expansion, by leveraging edge intelligence offered fog help Preliminary...
360-degree videos are encoded for adaptive streaming by first projecting the spherical surface onto two-dimensional frames, then encoding these as standard video segments. During playback of videos, player renders portion in direction user's view. These user viewports typically cover only a small 360 degree surface, causing much downloaded bandwidth to be wasted. Tile-based approaches can reduce wasted cutting spatially into motion-constrained rectangles. Streaming logic needs download tiles...
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, partially due the volatility attacking methods and patterns used by attackers. Understanding latest DDoS can provide new insights for effective defense. But most existing understandings based on indirect traffic measures (e.g., backscatters) or seen locally. In this paper, we present an in-depth analysis 50 704 different directly observed in a seven-month period. These were launched 674 botnets...
Social virtual reality (VR) has the potential to gradually replace traditional online social media, thanks recent advances in consumer-grade VR devices and technology itself. As vital foundation for building Metaverse, been extensively examined by computer graphics HCI communities. However, there little systematic study dissecting network performance of VR, other than hype industry. To fill this critical gap, we conduct an in-depth measurement five popular platforms: AltspaceVR, Horizon...
The commonly agreed Zipf-like access pattern of Web workloads is mainly based on Internet measurements when text-based content dominated the traffic. However, with dramatic increase media traffic Internet, inconsistency between patterns objects and Zipf model has been observed in a number studies. An insightful understanding essential to guide system design management, including resource provisioning performance optimizations.
Software Defined Networks use logically centralized control due to its benefits in maintaining a global network view and simplifying programmability. However, the of controllers can affect performance if path between switches their associated becomes bottleneck. We find from measurements that software agents on some have very limited throughput. This cause degradation switch has handle high traffic load, as for instance flash crowds or DDoS attacks. occur even when data plane capacity is...
Social network spam increases explosively with the rapid development and wide usage of various social networks on Internet. To timely detect in large sites, it is desirable to discover unsupervised schemes that can save training cost supervised schemes. In this work, we first show several limitations existing detection The main reason behind heavily rely spamming patterns are constantly changing avoid detection. Motivated by our observations, propose a sybil defense based scheme SD2...
Fog computing could alleviate many of the Internet Things' unique challenges. This special issue explores fog computing's opportunities and challenges to form a distributed virtualized platform, supporting computation-intensive tasks distributing advanced computing, storage, networking, management services edge network. From reducing latency enhancing security, this delivers novel solutions an exciting frontier.
Metaverse has grasped the news headlines recently. While being heavily advocated by industry, there are great in-terests from academia as it demands various technological support both hardware and software research. There been an extensive visionary discussion of metaverse lately, but few studies on its technical challenges user experience in practice. To fill this critical gap, paper, we take a first look at Workrooms, arguably premature product released Meta (a.k.a. Face-book). The goal...
By focusing on immersive interaction among users, the burgeoning Metaverse can be viewed as a natural extension of existing social media. Similar to traditional online networks, there are numerous security and privacy issues in (e.g., attacks user authentication impersonation). In this paper, we develop holistic research agenda for zero-trust virtual reality (VR), an early prototype Metaverse. Our proposed includes four concrete steps: investigating biometrics-based that is suitable...
Abstract Electrochemical activation usually accompanies in situ atom rearrangement forming new catalytic sites with higher activity due to reconstructed atomic clusters or amorphous phases abundant dangling bonds, vacancies, and defects. By harnessing the pre‐catalytic process of reconstruction, a multilevel structure CuNi alloy nanoparticles encapsulated N‐doped carbon (CuNi nanoalloy@N/C) transforms into highly active compound Ni‐doped CuO nanocluster supported on (N/O‐C) co‐doped C. Both...
While the 802.11 power saving mode (PSM) and its enhancements can reduce consumption by putting wireless network interface (WNI) into sleep as much possible, they either require additional infrastructure support, or may degrade transmission throughput cause delay. These schemes are not suitable for long bulk data transmissions with strict QoS requirements on devices. With increasingly abundant bandwidth available Internet, we have observed that TCP congestion control is often a constraint of...
BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed implemented to improve the resource utilization by bridging application layer (overlay) network (underlay), these are largely dependent on infrastructures, such as ISPs CDNs. In addition, they also demand large-scale deployments their systems work effectively. Consequently, require multiefforts far beyond individual users' ability be widely...
Today, 360-degree video streaming has become a popular Internet service with the rise of affordable virtual reality (VR) technologies. However, videos suffers from prohibitive bandwidth demand. Existing bandwidth-efficient solutions mainly focus on exploiting inherent spatial adaptability videos, delivering only content (spatially-cut tiles) in viewer's region interest (ROI) higher quality. Temporal adaptability, which been widely leveraged HTTP streaming, not well exploited to select proper...
Edge computing is burgeoning along with the rapidly increasing adoption of Internet Things (IoT). While there are studies on various aspects edge computing, we find a lack network perspective. In this paper, we, thus, first present an overview how software-defined networking (SDN) and related technologies being investigated in computing. Our purpose to survey state art discuss potential (remaining) challenges for future research. For this, SDN integrated facilitate management operations...