Hang Zhang

ORCID: 0000-0002-5499-7673
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Wireless Networks and Protocols
  • Wireless Communication Networks Research
  • IoT and Edge/Fog Computing
  • Advanced Wireless Network Optimization
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Game Theory and Applications
  • Advanced Data Storage Technologies
  • Molecular Communication and Nanonetworks
  • Network Traffic and Congestion Control
  • Advanced Wireless Communication Techniques
  • IoT Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Evolutionary Psychology and Human Behavior
  • Neural Networks Stability and Synchronization
  • Microwave Imaging and Scattering Analysis
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced SAR Imaging Techniques
  • Recommender Systems and Techniques

Institute of Information Engineering
2024

University of Chinese Academy of Sciences
2024

Changchun University of Science and Technology
2023

Shandong Normal University
2019-2023

Northwestern Polytechnical University
2018-2023

Qiqihar Medical University
2022

Huawei Technologies (Canada)
2014-2020

Chengdu University of Information Technology
2020

Hebei Science and Technology Department
2013-2018

Communications Technology Laboratory
2018

Software defined networking (SDN) decouples control plane functionality from the data and features presence of programmable dumb network devices, which have no or little intelligence take commands a central controller at plane. The is responsible for controlling hardware optimizing operation. Centralized optimization impractical infeasible when becomes too large in size loading. Distributed comes into play under this circumstance. Fully distributed requires local individual elements, against...

10.1109/noms.2014.6838414 article EN 2014-05-01

Future 5G wireless networks will face new challenges, including increasing demand on network capacity to support a large number of devices running applications requiring high data rates and always-on connectivity; immensely diverse service requirements characteristics; supporting the emerging business models in market be more open. New challenges drive solutions require different strategies deployment, management, operation future compared those current networks. One key objectives is...

10.1109/mnet.2015.7166186 article EN IEEE Network 2015-07-01

The overhead caused by broadcast schemes cannot be neglected in mobile ad hoc networks. It is known that the probabilistic scheme an effective approach to reduce overhead, which nodes forward packets with a probability redundant retransmissions. In hostile environments, malicious degrade network efficiency, and they should prevented from route discovery data transmission. this case, routing forwarded are redundant. This paper presents Trust-based Probabilistic Broadcast (TPB) focusing on...

10.1109/access.2020.2969447 article EN cc-by IEEE Access 2020-01-01

Cognitive systems are dynamical that adapt their behavior to achieve sophisticated outcomes in nonstationary environments. This paper considers two cognitive aspects regarding the problem of distributed caching with limited capacity a content distribution network serves YouTube users multiple edge servers: first, theory revealed preference from microeconomics is used estimate human utility maximization behavior. In particular, nonparametric learning algorithm provided request probability...

10.1109/tccn.2015.2488649 article EN IEEE Transactions on Cognitive Communications and Networking 2015-03-01

Machine to machine (M2M) traffic is characterized as low-rate, small-packet with correlated transmissions. In this paper, we propose a two-phase control mechanism (2PTC) for carrying M2M in the future fifth generation (5G) networks. mechanism, packets from each are directed virtual serving gateway associated machine, which receives and aggregates multiple machines forwards aggregate sink. The first communication phase takes place through simple single-path routing technique, while second...

10.1109/jiot.2015.2477039 article EN IEEE Internet of Things Journal 2015-09-07

MAC (Media Access Control) protocols for wireless Ad hoc networks with directional antennas have been studied to increase network capacity years, since can offer long-range communications and enhance the possibility of spatial multiplexing. This paper proposes a TDMA (Time Division Multiple Access)-based algorithm antennas, which is named SDVCS (Slotted Directional Virtual Carrier Sensing). The in this similar method DTRA [1], [2] while performing neighbor discovery, but defers quite lot...

10.1109/icct.2013.6820426 article EN 2013-11-01

A hybrid spectrum access strategy which is different from traditional underlay or overlay proposed. In this strategy, the secondary users cooperatively sense states of primary in sharing band. Based on sensing results and an additional requirement bit error rate, transmitter adapts its transmit power modulation level. Specifically, if user detected to be inactive, allocates subject a peak constraint. Else active, average interference constraint would also imposed protect transmission. To...

10.1049/iet-com.2013.0696 article EN IET Communications 2014-02-03

Due to the characteristics of mobile ad-hoc networks (MANETs) such as distributed self-organizing nature and multi-hops communication, bio-inspired approaches proposed address challenges in these networks. Like all communication networks, one major MANETs is security pro

10.4108/icst.bict.2014.258041 article EN 2015-01-01

In this paper, we formulate and study a capacity allocation game between set of receivers (players) that are interested in receiving multicast data (video/multimedia) being streamed from server through multihop network. We consider fractional streaming, where the stream source (origin-server) to any particular receiver (end-user) can be split over multiple paths. The selfish noncooperative, but must collaboratively purchase capacities links network, as necessary for delivery individual...

10.1109/tnet.2013.2255890 article EN IEEE/ACM Transactions on Networking 2013-10-02

Previous studies have found that P1 and P2 components were more sensitive to configural featural face processing, respectively, when attentional resources sufficient, suggesting processing follows a coarse-to-fine sequence. However, the role of working memory (WM) load in time course is poorly understood, especially whether it differs during encoding retrieval stages. This study employed delayed recognition task with varying WM spatial frequency (SF). Our behavioral ERP results showed...

10.3389/fpsyg.2022.853992 article EN cc-by Frontiers in Psychology 2022-05-20

As mobile ad hoc networks (MANETs) grow more popular and are deployed as solutions in various applications such road safety (vehicular networks), wildlife tracking (wireless sensor networks) device-to-device communications 5G, the need for efficient routing that is robust against malfunctioning or malicious network nodes increasing. We propose a security aware fuzzy enhanced ant colony optimization (SAFEACO) algorithm, which makes use of logic module to identify misbehaving exclude them from...

10.1109/wimob.2018.8589162 article EN 2018-10-01

In Mobile Ad hoc NETworks (MANETs), characteristics such as increased complexity with large scaled network, dynamic topology, absence of infrastructure and centralized control need for survivability unpredicted failures pose significant challenges to these environments. The presence unpredictable behavior in mobile ad environment makes the security provision a very challenging task. Therefore, self-organizing self-healing algorithms are appropriate autonomous operation Recently there has...

10.1109/wimob.2013.6673434 article EN 2013-10-01

Mobile Ad hoc NETtworks (MANETs) are infrastructureless and self-configuring networks which consist of wireless mobile devices. Due to these properties, routing in such is a challenging task. Developing highly efficient protocols for MANETs an important issue, with solutions havi

10.4108/eai.22-3-2017.152415 article EN 2017-01-01

In this work we focus on investigating the learning phase of an autonomous authentication mechanism. Through a series simulation, experimental best cutoff point and aggression threshold values for different network size were calculated. test phase, those found are proved by

10.4108/eai.3-12-2015.2262465 article EN cc-by 2016-01-01

MTC services are undergoing rapid increase; billions of connections can be anticipated in a few years. When supporting telecommunications networks, traffic characteristics and its unique service requirements should exploited order to optimize resource utilization offer satisfactory quality for all devices. In this paper, we present an Information-Centric Virtual Network Architecture (IC-VNA) that allows meticulously combine both the customer operator specific virtual functions along with...

10.1109/vtcfall.2016.7880928 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2016-09-01

It is known that a typical hyper-spectral image consists of sequence wavelength bands and each band illustrates two-dimensional image. This paper presents HSI classification method including two approaches. The first approach probabilistic algorithm for object based on the illustrated by single bands, respectively, which generate registered images. Since images (HSIs) obtained air-borne or satellite-borne remote sensors has limited size, may affect accuracy, especially small objects due to...

10.1109/access.2019.2936130 article EN cc-by IEEE Access 2019-01-01

Network coding (NC) is a promising method used to achieve the channel capacity and enhance reliability of multicast networks. However, general wireless networks based on NC are facing big problems such as long delays large computational complexities. We propose network Batched sparse (BATS) codes which can efficiently solve these problems. Since fountain also improve thoroughly compare performance BATS with that under our proposed Simulation findings indicate scheme results in much less...

10.1109/isce.2014.6884548 article EN 2014-06-01

Traffic identification is a vital technology in network security. Currently, the of mobile traffic based on downlink data air interface. This because it difficult to synchronize uplinks and obtain uplink real-world environments. We propose utilize communication sideband resource occupancy for identification. method captures IQ draws time-frequency map. In order reduce computational complexity, we only use portion map Based different colors reflected by users' transmitting power, distinguish...

10.1117/12.3031911 article EN 2024-06-08

We consider traffic engineering (TE) in networks where quality of service (QoS)-guaranteed as well best effort (BE) services are present. propose a joint TE optimization technique for both QoS and BE using multi-objective framework. show that results more efficient network resource usage compared to sequential methodology decision (finding paths splitting among paths) is made QoS-guaranteed first by assigning appropriate resources then according remaining resources. Furthermore, we demand...

10.1109/pimrc.2015.7343582 article EN 2015-08-01
Coming Soon ...