Yong Zhang

ORCID: 0000-0003-4997-698X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Anomaly Detection Techniques and Applications
  • Wireless Networks and Protocols
  • Quantum Information and Cryptography
  • Advanced Wireless Communication Technologies
  • Cognitive Radio Networks and Spectrum Sensing
  • IPv6, Mobility, Handover, Networks, Security
  • Mobile Agent-Based Network Management
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Distributed and Parallel Computing Systems
  • Quantum Computing Algorithms and Architecture
  • Traffic Prediction and Management Techniques
  • Advanced Computational Techniques and Applications
  • Quantum and electron transport phenomena
  • Energy Efficient Wireless Sensor Networks
  • Network Traffic and Congestion Control

Beijing University of Posts and Telecommunications
2016-2025

Xi'an Jiaotong University
2007-2025

Huaiyin Normal University
2025

Cell Technology (China)
2024

Northeast Petroleum University
2021-2024

Energy Research Institute
2024

Beijing Jiaotong University
2020-2024

National Engineering Research Center of Electromagnetic Radiation Control Materials
2024

Anhui Jianzhu University
2024

RWTH Aachen University
2023

10.1016/j.jisa.2019.02.008 article EN Journal of Information Security and Applications 2019-03-03

Driven by the explosive data traffic and new quality of service requirement mobile users, communication industry has been experiencing a evolution means network infrastructure densification. With increase density as well variety access points (APs), benefits from proximal transmissions increased spatial reuse system resources, thus introducing paradigm named ultra-dense networks (UDNs). Since limited available resources are shared ubiquitous APs in UDNs, demand for efficient resource...

10.1109/comst.2018.2867268 article EN IEEE Communications Surveys & Tutorials 2018-08-28

We present an entanglement purification protocol and concentration for electron-spin entangled states, resorting to quantum-dot spin optical-microcavity-coupled systems. The parity-check gates (PCGs) constructed by the cavity-spin-coupling system provide a different method of states. This can efficiently purify electron ensemble in mixed state. PCGs also concentrate pairs less-entangled pure states efficiently. proposed methods are more flexible as only single-photon detection single-electron needed.

10.1103/physreva.84.032307 article EN Physical Review A 2011-09-08

Network attack behavior detection using deep learning is an important research topic in the field of network security. Currently, there are still many challenges detecting multi-class imbalanced abnormal traffic data. This paper proposed a new intrusion based on learning, named parallel cross convolutional neural (PCCN), to improve performance flows. By fusing flow features learned from two branch networks (CNN), PCCN can better learn with fewer samples, results We improved feature...

10.1109/access.2019.2933165 article EN cc-by IEEE Access 2019-01-01

Traditional human activity recognition (HAR) based on a motion sensor adopts sliding window labeling and prediction. This method faces the multi-class problem, which mistakenly labels different classes of sampling points within as class. In this paper, we propose novel HAR U-Net to overcome performing prediction each point. The data collected from wearable sensors are mapped into an image with single-pixel column multi-channel, then, it is input network complete pixel-level function. We...

10.1109/access.2019.2920969 article EN cc-by-nc-nd IEEE Access 2019-01-01

This paper proposes a method for vehicle driving behavior recognition based on six-axis motion processor. uses deep-learning technology to learn the sample data collected by on-board sensor. To solve problem of small size and easy overfitting, we propose joint augmentation (JDA) scheme, design new multi-view convolutional neural network model (MV-CNN). The JDA includes multi-axis weighted fusion algorithm, background noise random cropping algorithm construct dataset that is more in line with...

10.1109/tvt.2019.2903110 article EN IEEE Transactions on Vehicular Technology 2019-03-05

This paper investigates the network slicing in virtualized wireless network. We consider a downlink orthogonal frequency division multiple access system which physical resources of base stations are and divided into enhanced mobile broadband (eMBB) ultrareliable low latency communication (URLLC) slices. take technology to solve problems spectral efficiency URLLC reliability. A mixed-integer programming problem is formulated by maximizing constraint users’ requirements for two slices, i.e.,...

10.1155/2020/6290375 article EN Wireless Communications and Mobile Computing 2020-01-31

<div class="section abstract"><div class="htmlview paragraph">Nowadays, the rapidly developing Connected and Autonomous Vehicle (CAV) provides a new mode of intersection vehicle cooperative control, which can optimize trajectories signal phases in real time reduce delays through advantages vehicle-road information interaction high controllability CAV. In this paper, Jintong West Road Guanghua Beijing is taken as research object, trajectory constraints, acceleration speed safe...

10.4271/2025-01-7194 article EN SAE technical papers on CD-ROM/SAE technical paper series 2025-02-21

10.1109/csnt64827.2025.10968822 article EN 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) 2025-03-07

Cloud Storage is an important part of Computing, and it provides a way to achieve large scale storage architecture. And virtual strategy for Storage. A load balancing (LBVS) proposed in this paper. The contribution that, net data model as Service based on Three layers architecture used virtualization, two modules are balance systems load. This paper describes details LBVS strategy, the well how implement with iRODS algorithms.

10.1109/icss.2010.27 article EN International Conference on Service Sciences 2010-01-01

We theoretically investigate an entanglement purification protocol with photon and electron hybrid entangled state resorting to quantum-dot spin microcavity coupled system. The present system is used construct the parity check gate which allows a quantum non-demolition measurement on parity. cavity-spin provides novel experimental platform of information processing solid qubit.

10.1364/oe.19.025685 article EN cc-by Optics Express 2011-12-01

Abstract With the technical support of 5G, drone network plays a critical role in autonomous and digital era. However, due to wireless autonomy characteristics, is prone diverse malicious attacks, so it's vital deploy intrusion detection system detect attacks. For real open environment, unknown attacks will occur constantly, but existing methods are usually designed for static closed‐set scenario fail recognize correctly, threatening security network. Therefore, we design an Based on...

10.1002/ett.4212 article EN Transactions on Emerging Telecommunications Technologies 2021-01-05

The rapid development of the Internet Things has led to a series security and privacy issues. Although existing network intrusion detection technologies can identify abnormal traffic, they are mostly focused on detecting in closed sets. For real open environment, when an unknown attack occurs, system cannot recognize it correctly, which will severely threaten security. In order solve this problem, paper investigates how Extreme Value Theory (EVT) is applied proposes method based set...

10.1016/j.procs.2020.06.104 article EN Procedia Computer Science 2020-01-01
Coming Soon ...