Kui Wu

ORCID: 0000-0002-2069-0032
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Energy Harvesting in Wireless Networks
  • Opportunistic and Delay-Tolerant Networks
  • Anomaly Detection Techniques and Applications
  • Cloud Computing and Resource Management
  • Indoor and Outdoor Localization Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Cooperative Communication and Network Coding
  • Green IT and Sustainability
  • Software-Defined Networks and 5G
  • Security in Wireless Sensor Networks
  • Peer-to-Peer Network Technologies
  • Wireless Networks and Protocols
  • Topic Modeling
  • Advanced Steganography and Watermarking Techniques
  • Privacy-Preserving Technologies in Data
  • Autonomous Vehicle Technology and Safety
  • Natural Language Processing Techniques
  • Smart Grid Energy Management
  • Chaos-based Image/Signal Encryption

University of Victoria
2016-2025

Huazhong University of Science and Technology
2022-2024

Southeast University
2024

BGI Group (China)
2023

Beijing Jiaotong University
2023

Institute for Infocomm Research
2015-2021

Nanjing University of Science and Technology
2009-2020

Hefei University
2020

Green Valley High School
2019

National University of Singapore
2019

With the rapid development of Internet Things, more and small devices are connected into for monitoring control purposes. One such type devices, smart plugs, have been extensively deployed worldwide in millions homes home automation. These however, would pose serious security problems if their vulnerabilities were not carefully investigated. Indeed, we discovered that some popular plugs severe which could be fixed but unfortunately left open. In this paper, case study a plug system known...

10.1109/jiot.2017.2707465 article EN publisher-specific-oa IEEE Internet of Things Journal 2017-05-23

Accurately predicting the future motions of surrounding traffic agents is critical for safety autonomous ve-hicles. Recently, vectorized approaches have dominated motion prediction community due to their capability capturing complex interactions in scenes. How-ever, existing methods neglect symmetries prob-lem and suffer from expensive computational cost, facing challenge making real-time multi-agent without sacrificing performance. To tackle this challenge, we propose Hierarchical Vector...

10.1109/cvpr52688.2022.00862 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

Limited energy supply is one of the major constraints in wireless sensor networks. A feasible strategy to aggressively reduce spatial sampling rate sensors, that is, density measure points a field. By properly scheduling, we want retain high fidelity data collection. In this paper, propose collection method based on careful analysis surveillance reported by sensors. exploring correlation sensing data, dynamically partition nodes into clusters so sensors same cluster have similar time series....

10.1109/tpds.2007.1046 article EN IEEE Transactions on Parallel and Distributed Systems 2007-06-07

Sensor scheduling plays a critical role for energy efficiency of wireless sensor networks. Traditional methods use either sensing coverage or network connectivity, but rarely both. In this paper, we deal with challenging task: without accurate location information, how do schedule nodes to save and meet both constraints connectivity? Our approach utilizes an integrated method that provides statistical guaranteed connectivity. We random then turn on extra nodes, if necessary, is totally...

10.1109/tpds.2006.77 article EN IEEE Transactions on Parallel and Distributed Systems 2006-05-03

10.1007/s11036-005-4442-8 article EN Mobile Networks and Applications 2005-10-24

Sensor localization has become an essential requirement for realistic applications over wireless sensor networks (WSN). Radio propagation irregularity and the stringent constraint on hardware cost, however, make in WSN very challenging. Range-free localizations are more appealing than range-based ones, since they do not depend received signal strength to estimate distance thus need simple cheap only. In this paper, we propose a ring-overlapping, range-free approach using Ring Overlapping...

10.1109/mahss.2004.1392193 article EN 2005-02-22

We initiate a systematic study to help distinguish special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On Internet, posters represent new type job opportunities. They get for posting comments articles on different communities and websites purposes, e.g., influence opinion other people towards certain social events business markets. While being an interesting strategy marketing, may create significant negative effect...

10.1145/2492517.2492637 article EN 2013-08-25

The cloud resource management belongs to the category of combinatorial optimization problems, most which have been proven be NP-hard. In recent years, reinforcement learning (RL), as a special paradigm machine learning, has used tackle these NP-hard problems. this article, we present deep RL-based solution, called DeepRM_Plus, efficiently solve different We use convolutional neural network capture model and utilize imitation in process reduce training time optimal policy. Compared with...

10.1109/jiot.2020.3025015 article EN IEEE Internet of Things Journal 2020-09-18

Non-intrusive load monitoring (NILM) helps disaggregate a household's main electricity consumption to energy usages of individual appliances, greatly cutting down the cost fine-grained towards green home vision. To address privacy concern in NILM applications, federated learning (FL) could be leveraged for model training and sharing. When applying FL paradigm real-world however, we are faced with challenges edge resource restriction, personalization, data scarcity. We present FedNILM,...

10.1109/tgcn.2022.3167392 article EN IEEE Transactions on Green Communications and Networking 2022-04-14

UAV-based air-ground integrated computing networks (AGIN) have gained significant traction in remote areas for the Power Internet of Things (PIoT). This paper considers an AGIN-PIoT, where tasks generated by ground PIoT devices are offloaded to aerial UAVs that perform edge computing. Jointly optimizing task offloading and UAV trajectory poses challenges such as many decision variables, information uncertainty, long-term queue delay constraints. Due limited battery capacity UAVs, our...

10.1109/tcomm.2023.3274165 article EN IEEE Transactions on Communications 2023-05-10

Wireless sensor networks consist of a large number tiny sensors that have only limited energy supply. One the major challenges in constructing such is to maintain long network lifetime as well sufficient sensing area. To achieve this goal, broadly-used method turn off redundant sensors. In paper, problem estimating areas among neighbouring wireless analysed. We present an interesting observation concerning minimum and maximum neighbours are required provide complete redundancy introduce...

10.1145/941350.941366 article EN 2003-09-19

Secure in-network aggregation in wireless sensor networks (WSNs) is a necessary and challenging task. In this paper, we first propose integration of system monitoring modules intrusion detection the context WSNs. We an extended Kalman filter (EKF) based mechanism to detect false injected data. Specifically, by behaviors its neighbors using EKF predict their future states (actual aggregated values), each node aims at setting up normal range neighbors' transmitted values. This task because...

10.1109/jsyst.2012.2223531 article EN IEEE Systems Journal 2012-11-16

Discretionary lane change (DLC) is a basic but complex maneuver in driving, which aims at reaching faster speed or better driving conditions, e.g., further line of sight ride quality. Although modeling DLC decision-making has been studied for years, the impact human factors, crucial accurately modelling strategies, largely ignored existing literature. In this paper, we integrate factors that are represented by styles to design new model. Specifically, our proposed model takes not only...

10.1109/tits.2022.3217673 article EN IEEE Transactions on Intelligent Transportation Systems 2022-11-09

10.1016/j.trc.2022.103926 article EN Transportation Research Part C Emerging Technologies 2022-11-05

Efficient Internet-wide scanning plays a vital role in network measurement and cybersecurity analysis. While IPv4 is solved problem, for IPv6 still mission yet to be accomplished due its vast address space. To tackle this challenge, generally needs use pre-defined seed addresses guide further directions. Under general principle, various solutions have been developed, but all suffer from two primary pitfalls, low hit rate probing speed, caused by the inherent sparse distribution of active...

10.1109/tnet.2023.3233953 article EN IEEE/ACM Transactions on Networking 2023-01-09

Clustered federated learning (CFL) is a promising solution to address the non-IID problem in spatial domain for (FL). However, existing CFL solutions overlook issue temporal and lack consideration of time efficiency. In this work, we propose novel approach, called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ClusterFLADS</i> , which takes advantage false predictions inappropriate global models, together with knowledge temperature scaling...

10.1109/tpds.2024.3379905 article EN IEEE Transactions on Parallel and Distributed Systems 2024-03-21

A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile computers forming temporary network without any existing wire line infrastructure. Due to the dynamic nature topology and resource constraints, routing in MANETs challenging task. Multipath can increase end-to-end throughput provide load balancing wired networks. However, its advantage not obvious because traffic along multiple paths may interfere with each other . In addition, accurate knowledge topology, finding disjoint...

10.1109/mascot.2001.948858 article EN 2002-11-13

We study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. prove that minimum energy path (MECP) problem, i.e., using radio transmission to find best route with cost from a source node destination node, is NP-complete. thus propose shortest (CSP) algorithm uses Dijkstra's as basic building block and reflects properties in relaxation procedure. Simulation results show more nodes added network, our approach achieves saving compared traditional...

10.1109/.2006.1629410 article EN IEEE International Performance, Computing, and Communications Conference 2006-05-25

In wireless sensor networks, some nodes are put in sleep mode while other active for sensing and communication tasks order to reduce energy consumption extend network lifetime. This approach is a special case (k=2) of randomized scheduling algorithm, which k subsets sensors work alternatively. this paper, we first study the algorithm via both analysis simulations terms coverage intensity, detection delay, probability. We further asymptotic properties. Finally, analyze problem maximizing...

10.1109/tc.2009.170 article EN IEEE Transactions on Computers 2009-11-13

Infrastructure as a service (IaaS) allows users to rent resources from the Cloud meet their various computing requirements.The pay-as-you-use model, however, poses nontrivial technical challenge IaaS cloud providers: how fast provision large number of virtual machines (VMs) users' dynamic requests?We address this with VMThunder, new VM provisioning tool, which downloads data blockson demand during booting process and speeds up image streaming by strategically integrating peer-to-peer (P2P)...

10.1109/tpds.2014.7 article EN IEEE Transactions on Parallel and Distributed Systems 2014-01-31

Due to the high-measuring cost, monitoring of power quality (PQ) is nontrivial. This paper aimed at reducing cost PQ in network. Using a real-world dataset, this adopts learn-from-data approach obtain device latent feature model, which captures behavior as transition function. With network could be modeled, analogy, data-driven network, presents opportunity use well-investigated and data estimation algorithms solve problem grid. Based on are proposed intelligently place measurement devices...

10.1109/tsg.2015.2442837 article EN IEEE Transactions on Smart Grid 2015-07-08

WiFi-based human activity recognition explores the correlations between body movement and reflected WiFi signals to classify different activities. State-of-the-art solutions mostly work on a single channel hence are quite sensitive quality of particular channel. Co-channel interference in an indoor environment can seriously undermine accuracy. In this paper, we for first time explore wideband information with advanced deep learning toward more accurate robust recognition. We present...

10.1109/tnse.2018.2825144 article EN IEEE Transactions on Network Science and Engineering 2018-04-10

This paper tackles a recent challenge in identifying culprit actors, who try to hide confidential payload with steganography, among many innocent actors social media networks. The problem is called steganographer detection and significantly different from the traditional stego that classifies an individual object as cover or stego. To solve over large-scale networks, this proposes method uses high-order joint features clustering ensembles. It employs 250-D calculated matrices of Discrete...

10.1109/tifs.2015.2496910 article EN IEEE Transactions on Information Forensics and Security 2015-11-02
Coming Soon ...