Bing Liu

ORCID: 0000-0002-6667-9250
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Constraint Satisfaction and Optimization
  • IoT and Edge/Fog Computing
  • AI-based Problem Solving and Planning
  • Software-Defined Networks and 5G
  • Data Management and Algorithms
  • Distributed and Parallel Computing Systems
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Cloud Computing and Resource Management
  • Cooperative Communication and Network Coding
  • Service-Oriented Architecture and Web Services
  • Distributed Control Multi-Agent Systems
  • Advanced Data Storage Technologies
  • Mobile Agent-Based Network Management
  • Peer-to-Peer Network Technologies
  • Speech and Audio Processing
  • Electric Power System Optimization
  • Sparse and Compressive Sensing Techniques
  • Hydraulic and Pneumatic Systems
  • Neural Networks Stability and Synchronization
  • Semantic Web and Ontologies
  • Optimal Power Flow Distribution
  • Context-Aware Activity Recognition Systems
  • Wireless Networks and Protocols
  • Distributed systems and fault tolerance

Wuhan University of Science and Technology
2019-2025

Chinese Institute for Brain Research
2024

Beijing Normal University
2023-2024

Wuhan Wudong Hospital
2024

Zhejiang Institute of Science and Technology Information
2024

United States Air Force Academy
2022

Air Force Communication NCO Academy
2022

Huawei Technologies (China)
2021

Changchun University
2021

Inner Mongolia University
2020

Choosing the appropriate antipsychotic drug (APD) treatment for patients with schizophrenia (SCZ) can be challenging, as response to APD is highly variable and difficult predict due lack of effective biomarkers. Previous studies have indicated association between genetic epigenetic factors, but no biomarkers been identified. Hence, further research imperative enhance precision medicine in SCZ treatment.Participants were recruited from two randomized trials. The discovery cohort was CAPOC...

10.1186/s40779-023-00459-7 article EN cc-by Military Medical Research 2023-06-02

With the rapid development of distributed energy resources, an increasing number residential and commercial users have been switched from pure electricity consumers to prosumers who can both consume produce energy. To properly manage these emerging prosumers, peer-to-peer (P2P) market has explored extensively studied. In this article, a scalable management mechanism is proposed for P2P market. First, multibilateral economic dispatch problem that maximizes social welfare formulated,...

10.1109/tii.2024.3383523 article EN IEEE Transactions on Industrial Informatics 2024-07-01

Antipsychotic drug treatment for schizophrenia (SZ) can alter brain structure and function, but it is unclear if specific regional changes are associated with outcome. Therefore, we examined the effects of antipsychotic on grey matter (GM) density, white (WM) functional connectivity (FC) as well associations between efficacy. SZ patients (n = 163) health controls (HCs) 131) were by structural magnetic resonance imaging (sMRI) at baseline, a subset 77) re-examined after 8 weeks...

10.1016/j.nicl.2024.103603 article EN cc-by-nc-nd NeuroImage Clinical 2024-01-01

Multi-access Edge Computing (MEC) is a promising business paradigm in the 5G network. The principle "the nearest best" may not apply some cases. How to break boundaries among individual MEC sites and leverage computing resources as an integrity, key improve user experience usage efficiency of network resources. This paper proposes CFN-dyncast, distributed technique that dispatches clients' demands optimal site according load each status. also introduces related design considerations,...

10.1109/wcncw49093.2021.9420028 article EN 2021-03-29

The rapid and widespread adoption of Internet Thing-related services drives the advancement Fog Computing, which is proposed to extend Cloud Computing paradigm run geo-distributed applications throughout network. could be provisioned tenants by applying container-based virtualization or system technology. Within a container/VM (virtual machine), an application can configured run. This paper aims evaluate performance under different physical resource types, such as core memory. For each type...

10.1109/dsa.2017.26 article EN 2017-10-01

Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks.Due resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks.This leads the misreporting normal data, which will impact operation IoT.To mitigate caused by rate ADS, this paper proposes an ADS management scheme clustered IoT.First, we model data transmission and in IoT.Then, strategy formulated as running probabilities all ADSs deployed on every device.In...

10.32604/cmc.2024.048099 article EN Computers, materials & continua/Computers, materials & continua (Print) 2024-01-01

ASP(alkali surfactant polymer) flood was initiated on March 15, 1997 in N-1DX block Daqing oilfield; its main slug completed June 12, 1999. By September 23, 1998 pump malfunction occurred with a scale thickness of 1cm over well bore. the end 1999, serious found surface gathering and delivery system, 0.3cm single pipes, pipes as heating furnace, this unfavorably affected current production.In terms problem, we performed study removal inhibition. Analytical content, forming mechanism...

10.2523/87469-ms article EN 2004-05-01

The Naïve Bayesian classifier has been suggested as an effective method to construct anti-spam filters for its strong categorization and high precision. Artificial immune system become a new embranchment in computing intelligence good self-learning, self-adaptability robustness. This paper proposes spam filtering means based on Bayes AIS, analyses the key problems of algorithm. accuracy rate is compared with naïve classifier-Bogofilter it shown that proposed algorithm performs well great...

10.1109/iccis.2010.43 article EN International Conference on Computational and Information Sciences 2010-12-01

In this paper, the homotopy analysis method (HAM) is extended to deal with nonlinear aeroelastic problem of a two degree-of-freedom (DOF) airfoil. To avoid determination parameter for complicated high-order minimization problem, new modified HAM proposed based on idea minimizing squared residual. Using method, convergence-control determined by low order residual governing equations, and then solved in way similar basic HAM. The used solve behavior supersonic airfoil, unsteady aerodynamic...

10.1142/s0219455415200011 article EN International Journal of Structural Stability and Dynamics 2015-10-07

A new low-complexity symbol-flipping algorithm based on majority decision to decode nonbinary low-density parity-check (LDPC) codes is proposed. The decoding procedure updates iteratively the hard-decision received symbol vector in search of a valid codeword space. Only one changed each iteration, and flipping function combines number failed checks reliability bits calculated symbols. Flipped position determined by flipped value channel output. And an optional mechanism avoid infinite loops...

10.1109/icfcc.2010.5497659 article EN 2010-01-01

10.1007/s10255-014-0435-3 article EN Acta Mathematicae Applicatae Sinica English Series 2014-10-01

ConstraintLisp is an object-oriented constraint programming language. It based on the satisfaction problem (CSP) model in Artificial Intelligence and technology. This integration provides both declarative representation efficiency of solving programming, powerful modelling capability, maintainability, reusability extensibility aimed at providing practical solutions to real life constrained search problems such as scheduling, resource allocation, etc. also designed implemented approach.

10.1145/141018.141026 article EN ACM SIGPLAN Notices 1992-11-01

This paper is concerned with the finite-time stochastic synchronization of a chaotic system without linear term and its application in secure communication based on synchrosqueezed wavelet transform (SWT). In order to improve anti-jamming ability systems forecast time, proper controllers are designed achieve for random perturbation. Based proposed systems, we present scheme about secondary encryption enhance level security. Moreover, novel SWT algorithm introduced correctly recover...

10.1109/access.2021.3087236 article EN cc-by IEEE Access 2021-01-01

10.1109/tase.2024.3481009 article EN IEEE Transactions on Automation Science and Engineering 2024-01-01

For the centralized optimization, it is well known that adding one momentum term (also called heavy-ball method) can obtain a faster convergence rate than gradient method. However, for distributed counterpart, there quite few results about effect of added terms on rate. This article aimed at studying issue in setup, where <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$N$ </tex-math></inline-formula>...

10.1109/tcyb.2022.3218663 article EN IEEE Transactions on Cybernetics 2022-11-10

Aiming at the problem of two-dimensional direction arrival (2D-DOA) estimation frequency hopping (FH) signals, this paper proposes a 2D-DOA algorithm for FH signals based on improved reduced dimension MUSIC (IRD-MUSIC). Firstly, receiving model uniform array antenna is established, and snapshot data signal established. Secondly, effective hop extracted from time domain spatial-time-frequency distribution matrix Finally, transforming DOA into two stage one dimensional problems by using...

10.1109/iccasit55263.2022.9987125 article EN 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) 2022-10-12

Mobile edge computing has been recently considered as a promising paradigm to satisfy the ever-increasing computation requirements from mobile applications. Although may provide users with high-quality services by executing tasks at network edge, due complexity of service requests and limited resources servers, it is still major challenge for how select appropriate so minimize interaction delay energy consumption devices. The selection problem classic NP-hard problem. In this paper, we...

10.1109/icct50939.2020.9295887 article EN 2020-10-28
Coming Soon ...