Xiao Su

ORCID: 0009-0004-2351-8416
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Coding and Compression Technologies
  • Peer-to-Peer Network Technologies
  • Advanced Data Compression Techniques
  • Caching and Content Delivery
  • Image and Video Quality Assessment
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Computational Drug Discovery Methods
  • Image and Signal Denoising Methods
  • Multimedia Communication and Technology
  • Energy Efficient Wireless Sensor Networks
  • Cancer therapeutics and mechanisms
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Advanced Data Storage Technologies
  • Advanced Steganography and Watermarking Techniques
  • Advanced Vision and Imaging
  • IPv6, Mobility, Handover, Networks, Security
  • Energy Harvesting in Wireless Networks
  • Advanced Image Processing Techniques
  • Network Traffic and Congestion Control
  • Metal complexes synthesis and properties
  • Distributed and Parallel Computing Systems
  • Network Packet Processing and Optimization
  • Image Processing Techniques and Applications

Guangdong University of Finance
2023

University of Oxford
2022

Peking University
2021

San Jose State University
2006-2020

Tsinghua University
2019

University Town of Shenzhen
2019

Victoria University
2015

Huaibei Normal University
2011-2013

Hebei University of Technology
2011

Sify Technologies (India)
2006

Real-time audio and video data streamed over unreliable IP networks, such as the Internet, may encounter losses due to dropped packets or late arrivals. This paper reviews error-concealment schemes developed for streaming real-time Internet. Based on their interactions with (video audio) source coders, we classify existing techniques into coder-independent that treat underlying coders black boxes, coder-dependent exploit coder-specific characteristics perform reconstruction. Last, identify...

10.1109/mmse.2000.897185 article EN 2002-11-11

Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against networks. At same time, being fully automated makes their behavior repetitious predictable. This article presents a survey comparison of Internet worm detection containment schemes. We first identify characteristics through behavior, then classify algorithms based on parameters used in algorithms. Furthermore, we analyze...

10.1109/comst.2008.4483668 article EN IEEE Communications Surveys & Tutorials 2008-01-01

Abstract To improve the utilization of solar irradiance by a bifacial photovoltaic (PV) flat single-axis tracking system under complex weather conditions, dynamic optimization model for PV modules, hybrid algorithm was developed. Scattering coefficients is defined to differentiate conditions consistently so as select different algorithms tracking. The sun's position tracked using visual sun trajectory on sunny days, while maximum sum modules used angle setting principle high scattering...

10.1115/1.4068052 article EN Journal of energy resources technology. 2025-02-25

Free riding, whereby a peer utilizes network resources but doesn't contribute services, could have huge impact on the efficacy of peer-to-peer media streaming systems, leading to scalability issues and service degradation. Here, authors categorize, analyze, compare range incentive mechanisms proposed for P2P systems.

10.1109/mic.2010.119 article EN IEEE Internet Computing 2010-09-01

Media content has become the major traffic of Internet and will keep on increasing rapidly. Various innovative media applications, services, devices have emerged people tend to consume more contents. We are meeting a revolution. But processing requires great capacity capability computing resources. Meanwhile cloud as prosperous technology platform fundamental facility providing various power, massive storage bandwidth with modest cost. The integration is therefore natural choice for both...

10.1109/sose.2011.6139114 article EN 2011-12-01

Wireless sensor networks (WSN) are becoming popular in a wide variety of monitoring applications. Though recent MAC protocol designs for have focused on energy efficiency as the main criteria, mobility WSN presents interesting challenges and requires special algorithms. In this paper, we present hybrid mobile networks, using schedule-based slots static nodes contention-based nodes. This adapts to level network by adjusting ratio well frame time. A estimation algorithm based received signal...

10.1109/ccnc08.2007.159 article EN 2008-01-01

Abstract Wireless Sensor Networks (WSNs) are becoming popular in a wide variety of applications. In WSN, sensor nodes can be static or mobile, depending on Handling mobility network pose interesting challenges protocol design, and special algorithms needed to adapt the network. this paper, we survey current state art handling networks. We first study how affects design different layers architecture, then take closer look at MAC layer. also describe results simulations that conducted compare...

10.1002/wcm.613 article EN Wireless Communications and Mobile Computing 2008-03-19

Spit (Spam over Internet Telephony), known as unsolicited bulk calls sent via VoIP networks, is a major problem that undermines the usability of VoIP. Countermeasures against spit face challenges in identifying and filtering real time. A user behavior based on three parameters (interaction,historical, social ratio) used to design an anti-spit technique. The rationale for technique voice spammers behave significantly different from legitimate callers because their revenue-driven motivations....

10.1109/hpcc.2009.9 article EN 2009-01-01

This paper describes the core features of R package mmeta, which implements exact posterior inference odds ratio, relative risk, and risk difference given either a single 2 × table or multiple tables when risks within same study are independent correlated.

10.18637/jss.v056.i11 article EN cc-by Journal of Statistical Software 2014-01-01

In this paper, we describe the development of J-Honeypot, a Java-based network deception tool with Web-based monitoring interface and rule-based intrusion detection engine. Our J-Honeypot is based on Honeyd program by Niels Provos, but features important enhancements. First, since written in Java, it can potentially run various platforms, Windows or UNIX, workstations handheld devices. Second, has engine, whose design guided analysis real world attack data. The data was collected opening up...

10.1109/itcc.2004.1286568 article EN 2004-01-01

Signature-based detection is the most widely used technique for intrusion systems (IDS). One of major challenges signature-based IDS how to keep up with a large volume incoming traffic when each packet needs be compared every signature in database. When an cannot flood, all it can do drop packets, therefore, may miss potential attacks. In this paper, we propose dynamic model two-layer unequal database, which detect imminent threats very high success rate by automatically creating and using...

10.1109/itng.2007.80 article EN 2007-04-01

Packet and compression losses are two sources of quality when streaming compressed video over unreliable IP networks, such as the Internet. In this paper, we propose new approaches for concealing losses. First, present a joint sender-receiver approach designing transforms in multidescription coding (MDC). receiver, use simple interpolation-based reconstruction algorithm, sophisticated concealment techniques cannot be employed real time. sender design an optimized reconstruction-based...

10.1109/6046.909599 article EN IEEE Transactions on Multimedia 2001-03-01

In this article, we first review the evolution of Peer-to-Peer (P2P) file sharing and media streaming systems, then focus on one most popular P2P-based services - PPStream. We describe PPStream protocol discovered through reverse engineering efforts discuss our measurement study conducted to evaluate three aspects system: privacy, locality, availability. The experiments reveal that is vulnerable privacy exploits not locality-aware when selecting peers exchange packets. also finds fairly...

10.1109/chinacom.2008.4685232 article EN 2008-01-01

Real-time video streaming over the Internet requires robust delivery mechanisms with low overhead. Traditional error control schemes are not attractive because they either add redundant information that may worsen network traffic, or rely solely on inadequate capability of decoder to do concealment. As sophisticated concealment techniques cannot be employed in a real-time software playback scheme, we propose simple yet efficient transformation-based algorithm. The algorithm applies linear...

10.1109/mmcs.1999.779202 article EN 2003-01-20

In the face of high network loss and low voltage power supply problems caused by new energy access to rural distribution network, a distributed photovoltaic point capacity scheme was established improve loss. The PV investment cost, purchase cost operation maintenance are minimized as planning model. A generation determination method based on bacterial foraging optimization algorithm (BFOA) is proposed. optimal DG obtained using BFOA algorithm. An example given verify economy proposed model,...

10.1109/itnec56291.2023.10082168 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2023-02-24

VoIP applications have gained popularity due to largely reduced cost and wider range of advanced services, as compared traditional telephone networks. However, SPIT (spam over Internet telephony), known unsolicited bulk calls sent via networks, is becoming a major problem that would undermine the usability VoIP. Unlike detection filtering e-mail spam, countermeasures against face great challenges on how identify filter in real time. In this paper, user-behavior-aware anti-SPIT technique...

10.1109/icme.2009.5202597 article EN 2009-06-01

This paper highlights the need to curb free-riding in P2P media streaming systems and discusses mechanisms by which this could be accomplished.Free riding, whereby a peer utilizes network resources, but does not contribute services have huge impact on efficacy of blue systems, leading scalability issues service degradation.We discuss why BitTorrent-like tit-for-tat cannot simply tailored used streaming.Even though problem free riding is more severe than file sharing, deployed still lack...

10.1109/mic.2010.105 article EN IEEE Internet Computing 2010-07-26

The prediction of fatigue life is most difficult for short cracks, as their local conditions may differ from what predicted using the remote applied loading and crack geometry. Digital image correlation (DIC) can be utilized to analyze images an optical microscope (OM), which facilitates characterization field. This paper presents a Finite-Element-based approach that uses DIC-obtained displacement data retrieve field quantify driving force. With assumption linear anisotropic elasticity,...

10.1016/j.prostr.2022.03.139 article EN Procedia Structural Integrity 2022-01-01

Multiple reference frames and variable block sizes improve compression efficiency of H.264, however, they also increase the encoder complexity motion estimation time. This paper proposes a new algorithm, called local with early termination (LRET) to reduce H.264 time without adding complexity. The LERT algorithm rearranges search order based on selection probability in current frame. experimental results show that achieves up 59% reduction comparable video quality negligible bit-rate, as...

10.1109/icme.2007.4284667 article EN 2007-07-01

The emerging scalable video coding extension in H.264/AVC standard will enable the deployment of streaming and distribution applications heterogeneous environments, with different user bandwidth resources display capacities. In this paper, we study problem how to distribute coded media objects from a server peer-to-peer based IPTV applications. All layers are divided segments be exchanged by peers every playback interval. We formulate scheme as an optimization problem, so that time for...

10.1109/icme.2009.5202600 article EN 2009-06-01

Motion estimation is the most crucial and time-consuming part of H.264/AVC video compression standard. The introduction motion search variable block sizes in multiple reference frames has significantly increased computational complexity. This paper proposes a fast algorithm, used first (MURF), based on usage history frames. algorithm rearranges order selection probability coding current frame. experimental results show that proposed when compared to best H.264 software, achieves average 60%...

10.1109/apccas.2006.342476 article EN 2006-12-01

A wireless sensor network (WSN), a type of distributed ad-hoc network, is characterized by large amount sensors and low power supply. In WSN, it important for nodes to have transmission delay (due number nodes) consumption limited supply). this paper, we propose new routing MAC protocol $Cluster-Management Power Efficient (CuMPE) protocol, meet the above objectives. The part CuMPE cluster-based uses selective flooding algorithm propagate cost. Based on cost information, every in tries...

10.1109/itre.2005.1503067 article EN 2005-09-09
Coming Soon ...