- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Indoor and Outdoor Localization Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Privacy-Preserving Technologies in Data
- Opportunistic and Delay-Tolerant Networks
- Age of Information Optimization
- Wireless Signal Modulation Classification
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- Underwater Vehicles and Communication Systems
- Antibiotic Resistance in Bacteria
- Satellite Communication Systems
- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Vibrio bacteria research studies
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Complex Network Analysis Techniques
- IoT Networks and Protocols
- Transportation and Mobility Innovations
- Image Processing and 3D Reconstruction
Beijing University of Posts and Telecommunications
2016-2025
China Centre for Resources Satellite Data and Application
2024
Ministry of Natural Resources
2020-2024
Tianjin Research Institute of Electric Science (China)
2020-2024
Fudan University
2020-2024
Linyi University
2010-2024
Huashan Hospital
2020-2024
First Hospital of Shijiazhuang
2024
Network Technologies (United States)
2022-2024
Qingdao University
2024
The deployment of cloud and edge computing forms a three-tier mobile network, where each task can be processed locally, by the nodes, or remote server. In this paper, we consider cooperative network leveraging vertical cooperation among devices, nodes servers, as well horizontal between nodes. jointly optimize offloading decision computation resource allocation to minimize average duration subject limited battery capacity devices. However, formulated problem is large-scale mixed integer...
In recent years, the privacy issue in Vehicular Edge Computing (VEC) has gained a lot of concern. The problem is even more severe autonomous driving business than other businesses VEC such as ordinary navigation. Federated learning (FL), which privacy-preserved strategy proposed by Google, become hot trend to solve many fields including VEC. Therefore, we introduce FL into preserve vehicular keeping original data local vehicle and sharing training model parameter only with help MEC server....
The demand for lithium resources is increasing sharply with the rapid development of electric vehicles. It great economic significance to expand geological and improve utilization rate lithium-containing salt lakes. In this paper, hydrochemical types lakes in Tibet Plateau were classified according a large amount data obtained from recent investigation on Plateau. addition, extraction methods used within each type area analyzed summarized, which provided reference selection processes same...
Facing the dramatic increase of mobile devices and scarcity spectrum resources, grant-free nonorthogonal multiple access (NOMA) emerges as an enabling technology for massive access, which also reduces signaling overhead latency effectively. However, in NOMA systems, collisions resulting from uncoordinated resource selection can cause severe interference reduce system throughput. In this article, we apply deep reinforcement learning (DRL) decision making to mitigate improve throughput unknown...
Low latency/delay is one of the most critical requirements for application vehicular networks. However, frequent real-time information update caused by vehicles high mobility liable to aggravate delay. Meanwhile, task migration between different edge computing (VEC) servers results in an amount delay if cannot be completed before vehicle moves out coverage current VEC server. In this paper, problem concluded as when and whom offload VEC, which formulated a finite horizon Markov decision...
To alleviate the backhaul burden and reduce user-perceived latency, content caching at base stations has been identified as a key technology. However, strategy design wireless edge is challenging, especially when both wired condition channel quality are considered in optimization. In this paper, taking into account conditions of terms delay quality, joint optimization user association policy to minimize average download studied cache-enabled heterogeneous network. We first prove problem...
Purpose . To investigate the activity of antioxidative enzymes and products oxidative stress in patients with age-related cataracts compare findings those healthy control subjects. Method Sixty cataract sixty controls matched age gender were included this study. Serum samples obtained to detect superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GSH-Px), oxidation degradation malondialdehyde (MDA), 4-hydroxynonenal (4-HNE), conjugated diene (CD), advanced protein (AOPP),...
In a cache-enabled D2D underlaid cellular network, cooperation of BS caching and can further exploit the limited storage capacity achieve more efficient wireless resource utilization. this complex network scenario, closed form expression for successful transmission probability is firstly derived using stochastic geometry, to measure proportion users satisfying delay guarantee. On basis, cooperative placement problem formulated maximize probability. We prove it be transformed equivalently...
This article investigates the prominent dilemma between capacity and reliability in heterogeneous ultra-dense distributed networks, advocates a new measure of effective to quantify maximum sustainable data rate link while preserving quality service such networks. Recent breakthroughs are brought forth developing theory Potential applications demonstrated on admission control, power resource allocation with substantial gains revealed over existing technologies. is particular interest...
In heterogeneous Internet of Things (IoT) networks, various communication technologies lead to different transmission ranges nodes, and they can cooperatively provide seamless communication. Unfortunately, the flexible mode offers more chances for malware invade IoT devices. To maintain its cyber security, two key issues, i.e. critical threshold onset propagation lowest-cost defense strategy after it occurs, need be addressed. solve first challenge, we construct a dynamics model by using...
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT). Two SWIPT relaying strategies, namely, splitting (SPS) time switching (STS), are studied objective of secrecy rate (SR) energy efficiency (SEE) maximization. First, high signal-to-noise ratio approximations SR SEE established, based on which non-convex SPS-based convex STS-based maximization problems formulated to...
Grant-free transmission is considered as a promising technology to support sporadic data in massive machine-type communications (mMTC). Due the distributed manner, high collision probability an inherent drawback of grant-free access techniques. Non-orthogonal multiple (NOMA) expected be used uplink transmission, multiplying connection opportunities by exploiting power domain resources. However, it usually applied for coordinated transmissions where base station performs coordination with...
Ultra-low latency communication for mobile intelligent machines, such as autonomous vehicles and robots, is a central technology in Internet of Things (IoT) to achieve system reliability. Proactive network association has been suggested ultra-low under the assistance edge computing. Highly dynamic stochastic nature IoT machines suggests applying machine learning methodology effectively enhance proactive association. In this paper, an online proposed distributed computing networking scenario,...
In the emerging Internet-of-Things (IoT) paradigm, freshness of sensory information plays a crucial role in online data-analyzing and application-level decision-making. As tailor-made performance metric freshness, age (AoI) depends on data transmission efficiency update frequency, which are energy demanding for IoT devices with limited battery capacity. To alleviate constraints low-power devices, we propose an AoI-oriented unmanned aerial vehicle (UAVs)-enabled wireless power scheme, where...
End-to-end semantic communications (ESC) rely on deep neural networks (DNN) to boost communication efficiency by only transmitting the semantics of data, showing great potential for high-demand mobile applications. We argue that central success ESC is robust interpretation conveyed at receiver side, especially security-critical applications such as automatic driving and smart healthcare. However, robustifying challenging extremely vulnerable physical-layer adversarial attacks due openness...
In this paper, we study the coverage probability and average data rate of user pairing in cooperative non-orthogonal multiple access (NOMA) networks. With fixed locations source typical user, candidate users for follow homogeneous Poisson point process. Considering geometric distance between nodes, close-to-user (CUP) close-to-source (CSP) schemes are investigated with near acting as half-duplex relay or full-duplex (FD) relay. Lower bounds on approximately obtained using stochastic geometry...
To balance the contradiction between rapid growth of data service demands and limited spectrum resources, wireless network virtualization (WNV) has been proposed as a promising technology by isolating sharing resources among different virtual networks in future networks. In this paper, two-dimension-time-scale hierarchical resource allocation scheme is multi-service virtualized network, which consists three 5G generic scenarios. The slicing problem decomposed into two time scales including...
Consensus is one of the most important issues a blockchain system because it necessary process to reach an agreement between group separated nodes that do not trust each other in decentralized framework. Most existing consensus works assume time block propagation among during ignorable, i.e., always successfully reaches every participating node period far shorter than mining time. However, when used vehicular <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...