Zichuan Xu

ORCID: 0000-0001-5438-1468
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Software-Defined Networks and 5G
  • Cloud Computing and Resource Management
  • Age of Information Optimization
  • Multimodal Machine Learning Applications
  • Human Pose and Action Recognition
  • IoT Networks and Protocols
  • UAV Applications and Optimization
  • Video Analysis and Summarization
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Cooperative Communication and Network Coding
  • Energy Harvesting in Wireless Networks
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • Blockchain Technology Applications and Security
  • Video Surveillance and Tracking Methods
  • Distributed Control Multi-Agent Systems
  • Advanced Bandit Algorithms Research
  • Advanced Optical Network Technologies
  • Interconnection Networks and Systems
  • Digital Transformation in Industry
  • Advanced Neural Network Applications

Dalian University of Technology
2011-2025

Dalian University of Foreign Languages
2023

Australian National University
2012-2017

University College London
2016-2017

Sichuan University
2013

Beijing Jiaotong University
2012

Hunan Provincial Center for Disease Control and Prevention
2009

Meiji University
2003

Mobile cloud computing is emerging as a main ubiquitous platform to provide rich resources for various applications of mobile devices. Although most existing studies in focus on energy savings devices by offloading computing-intensive jobs from remote clouds, the access delays between users and clouds usually are long sometimes unbearable. Cloudlet new technology capable bridge this gap, can enhance performance significantly while meeting crisp response time requirements users. In paper, we...

10.1109/tpds.2015.2510638 article EN IEEE Transactions on Parallel and Distributed Systems 2015-12-22

With advances in wireless communication technology, more and people depend heavily on portable mobile devices for businesses, entertainments social interactions. Although such can offer various promising applications, their computing resources remain limited due to size. This however be overcome by remotely executing computation-intensive tasks clusters of near computers known as cloudlets. As increasing numbers access the Internet via devices, it is reasonable envision future that cloudlet...

10.1109/infocom.2016.7524411 article EN 2016-04-01

This paper addresses the problem of temporal sentence grounding (TSG), which aims to identify boundary a specific segment from an untrimmed video by query. Previous works either compare pre-defined candidate segments with query and select best one ranking, or directly regress timestamps target segment. In this paper, we propose novel localization framework that scores all pairs start end indices within simultaneously biaffine mechanism. particular, present Context-aware Biaffine Localizing...

10.1109/cvpr46437.2021.01108 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021-06-01

With the development of cloud computing, virtual machine migration is emerging as a promising technique to save energy, enhance resource utilizations, and guarantee Quality Service (QoS) in datacenters. Most existing studies on migration, however are based single migration. Although there some researches multiple machines author usually does not consider correlation among these machines. In practice, order energy maintain system performance, providers need migrate correlated or entire...

10.1109/tsc.2015.2477825 article EN IEEE Transactions on Services Computing 2015-09-11

Wireless energy transfer has emerged as a promising technology for wireless sensor networks to power sensors with controllable yet perpetual energy. In this paper, we study replenishment by employing mobile charger (charging vehicle) charge wirelessly in rechargeable network, so that the sum of charging rewards collected from all charged per tour is maximized, subject capacity charger, where amount reward received proportional sensor. The will be spent on both its mechanical movement and...

10.1109/tnet.2017.2723605 article EN IEEE/ACM Transactions on Networking 2017-08-01

Wireless energy transfer technology based on magnetic resonant coupling has emerged as a promising for wireless sensor networks, by providing controllable yet continual to sensors. In this paper, we study the use of mobile charger wirelessly charge sensors in rechargeable network so that sum lifetimes is maximized while travel distance minimized. Unlike existing studies assumed must its full capacity before moving next sensor, here assume each can be partially charged more their depletions....

10.1109/tmc.2018.2813376 article EN IEEE Transactions on Mobile Computing 2018-03-08

Mobile edge-cloud (MEC) aims to support low latency mobile services by bringing remote cloud nearer users. However, in order deal with dynamic workloads, MEC is deployed a large number of fixed-location micro-clouds, leading resource wastage during stable/low workload periods. Limiting the micro-clouds improves utilization and saves operational costs, but faces service performance degradations due insufficient physical capacity peak time from nearby micro-clouds. To efficiently requirement...

10.1109/tnsm.2018.2790081 article EN IEEE Transactions on Network and Service Management 2018-01-05

Query-based moment localization is a new task that localizes the best matched segment in an untrimmed video according to given sentence query. In this task, one should pay more attention thoroughly mine visual and linguistic information. To end, we propose novel Cross- Self-Modal Graph Attention Network (CSMGAN) recasts as process of iterative messages passing over joint graph. Specifically, graph consists Cross-Modal interaction (CMG) relation (SMG), where frames words are represented...

10.1145/3394171.3414026 article EN Proceedings of the 30th ACM International Conference on Multimedia 2020-10-12

Pushing the cloud frontier to network edge close mobile users has attracted tremendous interest not only from operators but also service providers. In particular, deployment of cloudlets in metropolitan area networks enables providers provide low-latency services through implementing their specified virtualized functions (VNFs) while meeting Quality-of-Service (QoS) requirements. this paper, we formulate a novel task offloading problem edge-cloud network, where each requests function with...

10.1109/tmc.2018.2877623 article EN IEEE Transactions on Mobile Computing 2018-10-24

With increasing focus on Artificial Intelligence (AI) applications, Deep Neural Networks (DNNs) have been successfully used in a number of application areas. As the layers and neurons DNNs increases rapidly, significant computational resources are needed to execute learned DNN model. This ever-increasing resource demand is currently met by large-scale data centers with state-of-the-art GPUs. However, availability mobile edge computing 5G technologies provide new possibilities for DNN-driven...

10.1109/tpds.2020.3032443 article EN IEEE Transactions on Parallel and Distributed Systems 2020-10-21

Temporal language localization in videos aims to ground one video segment an untrimmed based on a given sentence query. To tackle this task, designing effective model extract ground-ing information from both visual and textual modalities is crucial. However, most previous attempts field only focus unidirectional interactions query, which emphasizes words listen attends via vanilla soft attention, but clues query-by-video implying where look are not taken into consideration. In paper, we...

10.1145/3394171.3414053 article EN Proceedings of the 30th ACM International Conference on Multimedia 2020-10-12

With the development of 5G technology, mobile edge computing is emerging as an enabling technique to promote Quality Service (QoS) network services. In particular, response latency services can be significantly reduced by deploying cloudlets at base stations in clouds. Network service providers that usually deploy their remote clouds now shift from proximity users. However, permanent placement into may not economic, since and bandwidth resources are limited relatively expensive. A smart way...

10.1109/infocom41043.2020.9155365 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory is stored while may or not be within transmission range each other. We formulate two novel problems to fully partially collect from UAV, by finding closed tour for UAV that consists hovering locations and sojourn duration at such accumulative volume collected maximized, subject energy capacity on consumes both flying one...

10.1109/tmc.2021.3084972 article EN IEEE Transactions on Mobile Computing 2021-05-31

Internet-of-Things-enabled E-health system, which could monitor and collect the personal health information (PHI), has gradually transformed clinical treatment to a more personalized way with in-home monitoring smart devices. Then, collected PHI, decision support systems (CDSSs), are based on data mining techniques historical electronic medical records (EMRs) help clinicians make proper decisions, have attracted considerable attention. To address issues, such as network congestion low rate...

10.1109/jiot.2021.3057653 article EN IEEE Internet of Things Journal 2021-02-09

Temporal sentence grounding (TSG) is crucial and fundamental for video understanding. Although existing methods train well-designed deep networks with large amount of data, we find that they can easily forget the rarely appeared cases during training due to off-balance data distribution, which influences model generalization leads unsatisfactory performance. To tackle this issue, propose a memory-augmented network, called Memory-Guided Semantic Learning Network (MGSL-Net), learns memorizes...

10.1609/aaai.v36i2.20058 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

Mobile-edge computing (MEC) is a new paradigm that enables cloud and information technology (IT) services to be delivered at the network's edge. By shifting load of individual local servers, MEC helps meet requirements ultralow latency, localized data processing, extends potential Internet Things (IoT) for end-users. However, crosscutting nature multidisciplinary components necessary its deployment have presented additional security privacy concerns. Fortunately, artificial intelligence (AI)...

10.1109/jiot.2023.3304318 article EN IEEE Internet of Things Journal 2023-08-11

In this paper we study the cloudlet placement problem in a large-scale Wireless Metropolitan Area Network (WMAN) that consists of many wireless Access Points (APs). Although most existing studies mobile cloud computing mainly focus on energy savings devices by offloading computing-intensive jobs from them to remote clouds, access delay between users and clouds usually is large sometimes unbearable. Cloudlet as new technology capable bridge gap, has been demonstrated enhance performance...

10.1109/lcn.2015.7366372 article EN 2015-10-01

Stringent delay requirements of many mobile applications have led to the development edge clouds, offer low latency network services at edges. Most conventional are implemented via hardware-based functions, including firewalls and load balancers, guarantee service security performance. However, implementing functions usually incurs both a high capital expenditure (CAPEX) operating (OPEX). Network Function Virtualization (NFV) exhibits potential reduce CAPEX OPEX significantly, by deploying...

10.1109/tpds.2020.2983918 article EN IEEE Transactions on Parallel and Distributed Systems 2020-03-30

Multicasting is a fundamental functionality of many network applications, including online conferencing, event monitoring, video streaming, and so on. To ensure reliable, secure, scalable multicasting, service chain that consists functions (e.g., firewalls, intrusion detection systems, transcoders) usually associated with each multicast request. We refer to such request requirement as an function virtualization (NFV)-enabled In this paper, we study NFV-enabled multicasting in...

10.1109/tcomm.2018.2881438 article EN IEEE Transactions on Communications 2018-11-15

The Internet of Things (IoT) technology provisions unprecedented opportunities to evolve the interconnection among human beings. However, latency brought by unstable wireless networks and computation failures caused limited resources on IoT devices prevents users from experiencing high efficiency seamless user experience. To address these shortcomings, integrated Mobile Edge Computing (MEC) with remote clouds is a promising platform enable delay-sensitive service provisioning for...

10.1109/tpds.2021.3107137 article EN IEEE Transactions on Parallel and Distributed Systems 2021-08-24

Mobile Edge Computing (MEC) has emerged as a promising paradigm catering to overwhelming explosions of mobile applications, by offloading compute-intensive tasks MEC networks for processing. The surging deep learning brings new vigor and vitality shape the prospect intelligent Internet Things (IoT), edge intelligence arises provision real-time neural network (DNN) inference services users. To accelerate processing DNN user request in an network, model usually can be partitioned into two...

10.1109/tmc.2021.3125949 article EN IEEE Transactions on Mobile Computing 2021-11-08

In this paper, we study the deployment of Unmanned Aerial Vehicles (UAVs) to collect data from IoT devices, by finding a collection tour for each UAV. To ensure &#x2018;freshness&#x2019; collected data, total time spent in UAV that consists flying and must be no greater than given delay <inline-formula> <tex-math notation="LaTeX">$B$ </tex-math></inline-formula>, e.g., 20 minutes. consider problem deploying minimum number UAVs their tours, subject constraint any is...

10.1109/tnet.2021.3123606 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2021-11-05

Mobile Edge Computing (MEC) has been identified as a desirable computing paradigm that provides efficient and effective services for various applications, while meeting stringent service delay requirements. Orthogonal to the MEC paradigm, Network Function Virtualization (NFV) technology is another enabling network resource management with great flexibility scalability, where instances of Virtual Functions (VNFs) are deployed in edge servers Service Chains (SFCs) SFC-enabled services....

10.1109/tmc.2022.3227248 article EN IEEE Transactions on Mobile Computing 2022-12-07

Temporal video grounding (TVG) aims to localize a target segment in according given sentence query. Though respectable works have made decent achievements this task, they severely rely on abundant video-query paired data, which is expensive collect real-world scenarios. In paper, we explore whether model can be learned without any annotations. To the best of our knowledge, paper first work trying address TVG an unsupervised setting. Considering there no supervision, propose novel Deep...

10.1609/aaai.v36i2.20060 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

Serverless computing is emerging as an enabling technology for elastic and low-cost AI applications in the edge of core networks. It allows developers to decompose a complex training time-sensitive inference task into multiple functions with dependency, upload Multi-access Edge Computing platform (MEC) execution. adopts popular design principle: disaggregation storage computation, making 'stateless'. However, most are 'stateful' rely on external service manage their states (ephemeral data)....

10.1109/tc.2023.3262947 article EN IEEE Transactions on Computers 2023-03-29
Coming Soon ...