- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- Wireless Communication Networks Research
- Anomaly Detection Techniques and Applications
- Wireless Networks and Protocols
- Quantum Information and Cryptography
- Advanced Wireless Communication Technologies
- Cognitive Radio Networks and Spectrum Sensing
- IPv6, Mobility, Handover, Networks, Security
- Mobile Agent-Based Network Management
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- Distributed and Parallel Computing Systems
- Quantum Computing Algorithms and Architecture
- Traffic Prediction and Management Techniques
- Advanced Computational Techniques and Applications
- Quantum and electron transport phenomena
- Energy Efficient Wireless Sensor Networks
- Network Traffic and Congestion Control
Beijing University of Posts and Telecommunications
2016-2025
Xi'an Jiaotong University
2007-2025
Huaiyin Normal University
2025
Cell Technology (China)
2024
Northeast Petroleum University
2021-2024
Energy Research Institute
2024
Beijing Jiaotong University
2020-2024
National Engineering Research Center of Electromagnetic Radiation Control Materials
2024
Anhui Jianzhu University
2024
RWTH Aachen University
2023
Driven by the explosive data traffic and new quality of service requirement mobile users, communication industry has been experiencing a evolution means network infrastructure densification. With increase density as well variety access points (APs), benefits from proximal transmissions increased spatial reuse system resources, thus introducing paradigm named ultra-dense networks (UDNs). Since limited available resources are shared ubiquitous APs in UDNs, demand for efficient resource...
We present an entanglement purification protocol and concentration for electron-spin entangled states, resorting to quantum-dot spin optical-microcavity-coupled systems. The parity-check gates (PCGs) constructed by the cavity-spin-coupling system provide a different method of states. This can efficiently purify electron ensemble in mixed state. PCGs also concentrate pairs less-entangled pure states efficiently. proposed methods are more flexible as only single-photon detection single-electron needed.
Network attack behavior detection using deep learning is an important research topic in the field of network security. Currently, there are still many challenges detecting multi-class imbalanced abnormal traffic data. This paper proposed a new intrusion based on learning, named parallel cross convolutional neural (PCCN), to improve performance flows. By fusing flow features learned from two branch networks (CNN), PCCN can better learn with fewer samples, results We improved feature...
Traditional human activity recognition (HAR) based on a motion sensor adopts sliding window labeling and prediction. This method faces the multi-class problem, which mistakenly labels different classes of sampling points within as class. In this paper, we propose novel HAR U-Net to overcome performing prediction each point. The data collected from wearable sensors are mapped into an image with single-pixel column multi-channel, then, it is input network complete pixel-level function. We...
This paper proposes a method for vehicle driving behavior recognition based on six-axis motion processor. uses deep-learning technology to learn the sample data collected by on-board sensor. To solve problem of small size and easy overfitting, we propose joint augmentation (JDA) scheme, design new multi-view convolutional neural network model (MV-CNN). The JDA includes multi-axis weighted fusion algorithm, background noise random cropping algorithm construct dataset that is more in line with...
This paper investigates the network slicing in virtualized wireless network. We consider a downlink orthogonal frequency division multiple access system which physical resources of base stations are and divided into enhanced mobile broadband (eMBB) ultrareliable low latency communication (URLLC) slices. take technology to solve problems spectral efficiency URLLC reliability. A mixed-integer programming problem is formulated by maximizing constraint users’ requirements for two slices, i.e.,...
<div class="section abstract"><div class="htmlview paragraph">Nowadays, the rapidly developing Connected and Autonomous Vehicle (CAV) provides a new mode of intersection vehicle cooperative control, which can optimize trajectories signal phases in real time reduce delays through advantages vehicle-road information interaction high controllability CAV. In this paper, Jintong West Road Guanghua Beijing is taken as research object, trajectory constraints, acceleration speed safe...
Cloud Storage is an important part of Computing, and it provides a way to achieve large scale storage architecture. And virtual strategy for Storage. A load balancing (LBVS) proposed in this paper. The contribution that, net data model as Service based on Three layers architecture used virtualization, two modules are balance systems load. This paper describes details LBVS strategy, the well how implement with iRODS algorithms.
We theoretically investigate an entanglement purification protocol with photon and electron hybrid entangled state resorting to quantum-dot spin microcavity coupled system. The present system is used construct the parity check gate which allows a quantum non-demolition measurement on parity. cavity-spin provides novel experimental platform of information processing solid qubit.
Abstract With the technical support of 5G, drone network plays a critical role in autonomous and digital era. However, due to wireless autonomy characteristics, is prone diverse malicious attacks, so it's vital deploy intrusion detection system detect attacks. For real open environment, unknown attacks will occur constantly, but existing methods are usually designed for static closed‐set scenario fail recognize correctly, threatening security network. Therefore, we design an Based on...
The rapid development of the Internet Things has led to a series security and privacy issues. Although existing network intrusion detection technologies can identify abnormal traffic, they are mostly focused on detecting in closed sets. For real open environment, when an unknown attack occurs, system cannot recognize it correctly, which will severely threaten security. In order solve this problem, paper investigates how Extreme Value Theory (EVT) is applied proposes method based set...