- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Advanced Bandit Algorithms Research
- Complex Network Analysis Techniques
- Advanced Data Storage Technologies
- Network Traffic and Congestion Control
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Auction Theory and Applications
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- Optimization and Search Problems
- Advanced Graph Neural Networks
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- Data Stream Mining Techniques
- Mobile Ad Hoc Networks
- Software-Defined Networks and 5G
- Recommender Systems and Techniques
- Advanced Queuing Theory Analysis
- Advanced Malware Detection Techniques
- Mobile Crowdsensing and Crowdsourcing
- Advanced Wireless Network Optimization
- Game Theory and Applications
- Opinion Dynamics and Social Influence
Chinese University of Hong Kong
2016-2025
Harbin Electric Corporation (China)
2025
University of Wisconsin–Stout
2022
Tsinghua University
2020
Bell (Canada)
2018
University of Kentucky
2018
Purdue University West Lafayette
2018
Osaka University
2018
University of California, Riverside
2018
University of California, Santa Barbara
2018
P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...
P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...
We can now outsource data backups off-site to third-party cloud storage services so as reduce management costs. However, we must provide security guarantees for the outsourced data, which is maintained by third parties. design and implement FADE, a secure overlay system that achieves fine-grained, policy-based access control file assured deletion. It associates files with policies, assuredly deletes make them unrecoverable anyone upon revocations of policies. To achieve such goals, FADE...
Smartphones and mobile devices are rapidly becoming indispensable for many users. Unfortunately, they also become fertile grounds hackers to deploy malware. There is an urgent need have a "security analytic & forensic system" which can facilitate analysts examine, dissect, associate correlate large number of applications. An effective system needs address the following questions: How automatically collect manage high volume malware? analyze zero-day suspicious application, compare or it with...
Mobile edge computing (MEC) and device-to-device (D2D) offloading are two promising paradigms in the industrial Internet of Things (IIoT). In this article, we investigate task co-offloading, where computing-intensive tasks can be offloaded to MEC servers via cellular links or nearby IIoT devices D2D links. This co-offloading delivers small computation delay while avoiding network congestion. However, erratic movements, selfish nature incomplete information bring inherent challenges....
Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M contracts have been deployed on little is known about the characteristics of users, contracts, relationships among them. We conduct first systematic study Ethereum by leveraging graph analysis to characterize three major activities namely money transfer, contract creation, invocation. collect all transaction data, construct graphs from data via analysis, discover new insights....
In device to (D2D) aided mobile edge computing (MEC) networks, by implementing content caching and D2D links, the server nearby devices can provide task offloading platforms. For parallel tasks, proper decisions on help reduce delay energy consumption. However, what is often ignored in previous works joint optimization of caching. this paper, we aim find optimal strategies, so as minimize The minimization problem formulated a multi-objective problem, concerning both offloading. an integer...
Vehicular edge computing (VEC) provides an effective task offloading paradigm by pushing cloud resources to the vehicular network edges, e.g., road side units (RSUs). However, overloaded RSUs are likely occur especially in urban aggregation areas, possibly leading greatly compromised performance. Inspired this, this paper explores situation introducing unmanned aerial vehicle (UAV) address VEC overload problem. Specifically, we formulate a novel online UAV-assisted problem minimize delay...
As mobile shopping has gradually become the mainstream mode, recommendation systems are gaining an increasingly wide adoption. Existing mainly based on explicit and implicit user behaviors. However, these behaviors may not directly indicate users' inner feelings, causing erroneous preference estimation thus leading to inaccurate recommendations. Inspired by our key observation correlation between pupil size we consider using change of when browsing model preferences, so as achieve targeted...
Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is server under stress to install router throttle selected upstream routers. can be the leaky-bucket rate which forward packets destined Hence, before aggressive converge overwhelm server, participating routers proactively regulate contributing packet rates more moderate levels, thus forestalling impending attack....
Distributed virtual environment (DVE) systems model and simulate the activities of thousands entities interacting in a world over wide area network. Possible applications for DVE are multiplayer video games, military industrial trainings, collaborative engineering. In general, system is composed many servers each server responsible to manage multiple clients who want participate world. Each receives updates from different (such as current position orientation client) then delivers this...
Conventional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Therefore, users can easily obtain information without themselves contributing any or to a P2P community. This leads the well known free-riding problem. Consequently, most of requests are directed towards small number nodes which willing share service, causing "tragedy commons." The aim this paper is in network based on amount services each node has provided Since nodes' prior...
P2P streaming tries to achieve scalability (like file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well understood. In this paper, we describe simple stochastic model that can be used compare different data-driven downloading strategies based on two performance metrics: continuity (probability of continuous playback), startup latency (expected start playback). We first study strategies: rarest greedy. The former well-known...
Recently, there has been a growing interest of using network coding to improve the performance wireless networks, for example, authors proposed practical system called COPE, which demonstrated throughput gain achieved by coding. However, COPE two fundamental limitations: (1) opportunity is crucially dependent on established routes and (2) structure in limited within two-hop region only. The aim this paper overcome these limitations. In particular, we propose DCAR, distributed coding-aware...
While the practical coding scheme has been shown to be able improve throughput of wireless networks, there still lacks fundamental understanding on how works under realistic settings, namely, when it operates a physical layer and medium access is controlled by some random methods. In this paper, we provide formal analysis performance such settings. The key measure encoding number, i.e., number packets that can encoded node in each transmission. We an upper bound for general topology, derive...
Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize profit. Peering based on views and settlements, while expedient, encourage selfish routing strategies discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit stability of routes, discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing...
Mobile operating systems like Android failed to provide sufficient protection on personal data, and privacy leakage becomes a major concern. To understand the security risks leakage, analysts have carry out data-flow analysis. In 2014, upgraded with fundamentally new design known as RunTime (ART) environment in 5.0. ART adopts ahead-of-time compilation strategy replaces previous virtual-machine-based Dalvik. Unfortunately, many analysis TaintDroid were designed for legacy Dalvik environment....
Compared with executing Network Functions (NFs) on dedicated hardwares, the recent trend of Function Virtualization (NFV) holds promise for operators to flexibly deploy software-based NFs commodity servers. However, virtual (VNFs) are normally "chained" together provide a specific network service. Thus, an efficient scheme is needed place VNF chains across and effectively schedule requests service instances, which can maximize average resource utilization each node in simultaneously minimize...
Modern storage systems use thousands of inexpensive disks to meet the requirement applications. To enhance data availability, some form redundancy is used. For example, conventional RAID-5 provide availability for single disk failure only, while recent advanced coding techniques such as row-diagonal parity (RDP) can with up two failures. reduce probability unavailability, whenever a fails, recovery (or rebuild) will be carried out. We show that scheme RDP code inefficient and suboptimal. In...
Cloud storage is an emerging service model that enables individuals and enterprises to outsource the of data backups remote cloud providers at a low cost. However, clients must enforce security guarantees their outsourced backups. We present Fade Version, secure backup system serves as layer on top today's services. Version follows standard version-controlled design, which eliminates redundant across different versions On this, applies cryptographic protection Specifically, it fine-grained...
Android, the most popular mobile OS, has around 78% of market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered 1 million new samples per quarter, and was reported that over 98% these are in fact "derivatives" (or variants) from existing families. this paper, we first show runtime behaviors malware's core functionalities similar within a family. Hence, propose framework combine "runtime behavior" with "static structures" detect variants. We...