- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Advanced Software Engineering Methodologies
- Business Process Modeling and Analysis
- Software System Performance and Reliability
- Recommender Systems and Techniques
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Advanced Neural Network Applications
- Software Reliability and Analysis Research
- Software Engineering Research
- Software Testing and Debugging Techniques
- Blockchain Technology Applications and Security
- Topic Modeling
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Distributed and Parallel Computing Systems
- Vehicular Ad Hoc Networks (VANETs)
- Formal Methods in Verification
- Advanced Image and Video Retrieval Techniques
- Anomaly Detection Techniques and Applications
- Big Data and Business Intelligence
- Human Mobility and Location-Based Analysis
- Mobile Crowdsensing and Crowdsourcing
- Data Management and Algorithms
Shanghai University of Engineering Science
2015-2025
Shanghai University
2015-2024
Gachon University
2020-2024
Hebei University of Technology
2023
Zhengzhou University of Aeronautics
2023
State Administration of Cultural Heritage
2023
Chinese PLA General Hospital
2022
Ministry of Education of the People's Republic of China
2019
Zhejiang University
2015-2018
Computing Center
2015-2018
Benefiting from the real-time processing ability of edge computing, computing tasks requested by smart devices in Internet Things are offloaded to (ECDs) for implementation. However, ECDs often overloaded or underloaded with disproportionate resource requests. In addition, during process task offloading, transmitted information is vulnerable, which can result data incompleteness. view this challenge, a blockchain-enabled computation offloading method, named BeCome, proposed article....
With the development of communication and information technologies, smart tourism is gradually changing industry. Internet Things (IoT) plays an important role in tourism. However, it a challenge to apply IoT for because need dealing with vast amount data low-latency communication. To this end, article, we outline 5G AI-empowered systems Efficient transmission based on technology processing AI are significant unlocking applications. demonstrate superior performance our proposed method,...
Vehicular ad hoc networks (VANETs) have been widely used in intelligent transportation systems (ITSs) for purposes such as the control of unmanned aerial vehicles (UAVs) and trajectory prediction. However, an efficient reliable data routing decision scheme is critical VANETs due to feature self-organizing wireless multi-hop communication. Compared with networks, which are unstable limited bandwidth, wired normally provide longer transmission distances, higher network speeds greater...
With the prevalent application of Internet Things (IoT) in real world, services have become a widely used means providing configurable resources. As number is large and also increasing fast, it an inevitable mission to determine suitability service user. Two typical tasks are needed, which recommendation selection. The prediction for Quality Service (QoS) important way accomplish two tasks, there been series methods proposed predict QoS values. However, few study IoT environments, where...
The explosive growth of massive data generation from Internet Things in industrial, agricultural and scientific communities has led to a rapid increase for analytics cloud centers. ubiquitous pervasive demand near-data processing urges the edge computing paradigm recent years. Edge is promising less network backbone bandwidth usage thus center side pressure, as well enhanced service responsiveness privacy protection. Computation offloading plays crucial role terms packets transmission system...
With the development of communication, Internet Things (IoT) has been widely deployed and used in industrial manufacturing, intelligent transportation, healthcare systems. The time-series feature IoT increases data density dimension, where anomaly detection is important to ensure hardware software security. However, for general methods, may be well-reconstructed with tiny differences that are hard discover. Measuring model complexity dataset space a long inefficient process. In this paper,...
Edge computing (EC) is now emerging as a key paradigm to handle the increasing Internet-of-Things (IoT) devices connected edge of network. By using services deployed on service provisioning system which made up servers nearby, these IoT are enabled fulfill complex tasks effectively. Nevertheless, it also brings challenges in trustworthiness management. The volatile environment will make difficult comply with service-level agreement (SLA), an important index declared by services. In this...
Cloud data centers provide services for an increasing number of applications. The virtual machines (VMs) that perform the corresponding application tasks need to be allocated physical (PMs). For VM allocation, cloud service consider both energy consumption and quality (QoS), while users are primarily concerned with their own needs, such as throughput reliability. This paper proposes allocation scheme optimization based on user requirements in a center. First, various requests from mobile...
Fully supervised semantic segmentation has performed well in many computer vision tasks. However, it is time-consuming because training a model requires large number of pixel-level annotated samples. Few-shot recently become popular approach to addressing this problem, as only handful samples generalize new categories. the full utilization limited remains an open problem. Thus, article, mutually few-shot network proposed. First, feature maps from intermediate convolution layers are fused...
AI-empowered 5G/6G networks play a substantial role in taking full advantage of the Internet Things (IoT) to perform complex computing by offloading tasks edge services deployed intelligent transport systems. However, behavior has certain regularity, and real-time location users can easily be inferred attackers who have historical user data during transmission process. To address this problem, privacy-oriented task method that resist attacks from privacy with prior knowledge is proposed....
The emergence of the Internet Vehicles (IoV) introduces challenges regarding computation-intensive and time-sensitive related services for data processing communication. Limited resource availability increases latency may cause application interruption due to mobility vehicles. To address real-time requirements users tasks, mobile edge computing (MEC), in which are processed at network edge, has been proposed collaborate with cloud provide better performance. However, offloading strategies...
In the wake of developments in consumer electronics, electric vehicles are gradually becoming representative carriers next-generation electronics. Electric incorporate 5G and artificial intelligence (AI) technologies, which significantly enhance driving experience. Autonomous driving, as a widely supported feature most vehicles, allows these to make decisions automatically, reducing safety hazards enhancing efficiency. There has been growing interest cost-effective monocular vision solutions...
The increasing need for communication capabilities in mobile devices has led to the recognition of edge computing (MEC) as a critical solution addressing computationally intensive and latency-sensitive tasks due its widespread distribution resources close devices. However, scenarios such disaster response emergency rescue, rapid deployment servers handle may be challenging. Therefore, unmanned aerial vehicle (UAV)-assisted MEC systems have garnered significant interest their ease high...
Brain tumors require AI-assisted, precise treatments. Methods based on healthcare electronics, such as magnetic resonance imaging (MRI), computed tomography (CT), and gastrointestinal endoscopy, are widely used in hospitals. Maximizing the functionality of these electronic devices is crucial for improving tumor lesion detection a challenge AI-assisted medical applications. Precise classification vital effectively planning brain treatments, accurate results offer insights that enable...
Abstract Large-scale applications of Internet things (IoT), which require considerable computing tasks and storage resources, are increasingly deployed in cloud environments. Compared with the traditional model, characteristics such as pay-as-you-go, unlimited expansion, dynamic acquisition represent different conveniences for these using IoT architecture. One major challenges is to satisfy quality service requirements while assigning resources tasks. In this paper, we propose a deadline...
Abstract Server workload in the form of cloud-end clusters is a key factor server maintenance and task scheduling. How to balance optimize hardware resources computation should thus receive more attention. However, we have observed that disordered execution running application batching seriously cuts down efficiency server. To improve prediction accuracy, this paper proposes an approach using long short-term memory (LSTM) encoder-decoder network with attention mechanism. First, extracts...
The industrial Internet of things (IIoT), a new computing mode in Industry 4.0, is deployed to connect IoT devices and use communication technology respond control commands handle data. IIoT typically employed improve the efficiency sensing can be used many scenarios, such as intelligent manufacturing video surveillance. To build an system, we need collection software manage monitor each system component when there are large-scale devices. Application programming interface (API) effective...
In recent years, deep neural networks have achieved exciting results in a variety of tasks, and many fields try to introduce network techniques. mobile edge computing, there are not attempts that build models service recommendation or QoS (quality-of-service) prediction. The method proposed this article is an attempt employ technique for Compared the pure use records, exploration context information prediction also still needs lot efforts. But increasing number features highly likely result...