Di Wang

ORCID: 0000-0003-0104-3136
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Vehicular Ad Hoc Networks (VANETs)
  • Blockchain Technology Applications and Security
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Recommender Systems and Techniques
  • Educational Technology and Assessment
  • Technology and Security Systems
  • Smart Grid Energy Management
  • Software Testing and Debugging Techniques
  • Parallel Computing and Optimization Techniques
  • Advanced Bandit Algorithms Research
  • Distributed systems and fault tolerance
  • Big Data Technologies and Applications
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • Advanced Authentication Protocols Security
  • Software-Defined Networks and 5G
  • Image and Video Quality Assessment
  • Wireless Communication Security Techniques
  • Security in Wireless Sensor Networks
  • Electric Vehicles and Infrastructure
  • Educational Practices and Challenges
  • Cryptography and Data Security
  • Cloud Data Security Solutions

Wuhan University
2022-2025

University of Canterbury
2023

Microsoft (United States)
2016-2022

Alibaba Group (China)
2022

Shanghai Jiao Tong University
2022

Wenhua College
2021

Wuhan College
2021

Jiangxi University of Science and Technology
2019-2020

University of Jinan
2019

Sichuan University
2018

For unmanned aerial vehicles (UAVs)-assisted post-disaster emergency communication networks, UAVs serves as relay nodes of air-based backup network to support transmission rescue messages (ECVs), while ECVs provide on-site ground and connectivity the command center (CC) operation. Existing works seldom emphasize security such authenticity communicating parties integrity message content. In this connection, authentication key agreement (AKA) protocols are promising solutions for achieving...

10.1109/jiot.2024.3371101 article EN IEEE Internet of Things Journal 2024-02-28

In order to match shoppers with desired products and provide personalized promotions, whether in online or offline shopping worlds, it is critical model both consumer preferences price sensitivities simultaneously. Personalized have been thoroughly studied the field of recommender systems, though (and sensitivity) has received relatively little attention. At same time, sensitivity richly explored area economics, typically not context developing scalable, working systems generate...

10.1145/3038912.3052568 article EN 2017-04-03

In view of the security risks and centralized structure traditional intelligent transportation system, we propose a novel scheme secure data sharing customized services based on consortium blockchain (DSCSCB). The ciphertext-policy attribute-based proxy re-encryption algorithm has function keyword searching by dividing key into an attribute search key, which not only solves problem that cannot retrieve data, but also realizes forwarding. Moreover, effectively controls access permission...

10.1109/access.2020.2981945 article EN cc-by IEEE Access 2020-01-01

The development of vehicular ad-hoc networks (VANETs) has facilitated adaptive traffic signal control for intelligent transportation. In this paper, we proposed the mechanism based on a consortium blockchain, which saved plenty financial and material resources. It solved centralization problems minimized high degree human intervention in process light management. As road is congested, vehicle forwards condition messages. department (TD) adjusts duration to allow synergistic optimization...

10.1109/access.2019.2929259 article EN cc-by IEEE Access 2019-01-01

Due to poor traffic conditions and the high costs of traveling by private cars, ride sharing has become a popular means trip. In view security threats centralization existing in current ride-sharing service, we propose secure scheme based on consortium blockchain, which can guarantee security, confidentiality, privacy data interaction via attribute-based proxy re-encryption algorithm. First, passenger presets access structure encrypts using encryption. The ciphertext is then sent roadside...

10.1109/jiot.2020.3023920 article EN IEEE Internet of Things Journal 2020-09-15

Energy storage in data centers has mainly been used as devices to backup generators during power outages. Recently there a growing interest using energy actively shape consumption reduce their skyrocketing electricity bills. In this paper, we consider for two applications joint fashion: reducing peak demand charges and enabling participate regulation markets. We develop an optimization framework that captures the cost of degradation devices, well benefit from Under framework, real Microsoft...

10.1145/2934328.2934346 article EN 2016-06-16

This brief paper optimizes power management for datacenters employing lithium-ion battery storage, with the specific goal of addressing tradeoff between: 1) cost saving achievable through peak demand shaving and 2) corresponding aging. To best authors' knowledge, this has never been addressed using physics-based models performance degradation combined stochastic datacenter demand. We build: a Markov chain model demand; second-order diffusion/reaction dynamics; 3) aging via solid electrolyte...

10.1109/tcst.2016.2643569 article EN publisher-specific-oa IEEE Transactions on Control Systems Technology 2017-01-10

Memory reliability is a key factor in the design of warehouse-scale computers. Prior work has focused on performance overheads memory fault-tolerance schemes when errors do not occur at all, and detected but uncorrectable occur, which result machine downtime loss availability. We focus common third scenario, namely, situations hard correctable faults exist memory; these may cause an "avalanche" to affected hardware. expose how hardware/software mechanisms for managing reporting can severe...

10.1109/lca.2016.2599513 article EN publisher-specific-oa IEEE Computer Architecture Letters 2016-08-11

With advantages of convenience and flexibility, Unmanned Aerial Vehicles (UAVs) are widely applied in various fields, such as inspection, agriculture, transportation, so on. However, due to characteristics Flying Ad Hoc Network (FANET) consisting UAVs, dynamic topology limited bandwidth, the security messages is threatened by cyber attacks. A Tri-Phases Message Oriented Trust Model for FANET proposed, called TPMOTM, secure messages. In proposed work, message collection process divided into...

10.1109/tnse.2024.3374733 article EN IEEE Transactions on Network Science and Engineering 2024-03-12

Fuel cells are a promising power source for future data centers, offering high energy efficiency, low greenhouse gas emissions, and reliability. However, due to mechanical limitations related fuel delivery, slow adjust sudden increases in center demands, which can result temporary shortfalls. To mitigate the impact of shortfalls, prior work has proposed either perform capping by throttling servers, or leverage storage devices (ESDs) that temporarily provide enough make up shortfall while...

10.1109/hpca.2016.7446085 article EN 2016-03-01

Peak power management of datacenters has tremendous cost implications. While numerous mechanisms have been proposed to cap consumption, real datacenter consumption data is scarce. To address this gap, we collect demands at multiple spatial and fine-grained temporal resolutions from the load geo-distributed Microsoft over 6 months. We conduct aggregate analysis data, study its statistical properties. With workload characterization a key ingredient for systems design evaluation, note...

10.1145/2465529.2465536 article EN 2013-06-17

Long-range autonomous valet parking (LAVP) is a current trend, partly due to traffic congestion and headache. For large-scale demands, reservation introduced effectively manage parking. However, existing schemes focus on request verification check-in, which aren't applicable LAVP because they ignore identity legitimacy communication security in the phase of picking up as well dropping off passengers. One viable solution authentication key agreement (AKA) protocol. Generally, low entropy...

10.1109/tvt.2022.3217371 article EN IEEE Transactions on Vehicular Technology 2022-11-03

Identifying the root cause of a software bug and fixing it is challenging. One reason for this that many bugs are not reproducible during fixing. We aim to provide an overview existing works on reproduction localization. ask four research questions: RQ1: What types problems have been studied in area localization? RQ2: How previous research? RQ3: main findings outcomes studies? RQ4: gaps challenges identified conducted systematic mapping study analyzing literature published between 2011 2021....

10.1016/j.infsof.2023.107338 article EN cc-by Information and Software Technology 2023-10-06

Long-separated research has been conducted on two highly correlated tracks: traffic and incidents. Traffic track witnesses complicating deep learning models, e.g., to push the prediction a few percent more accurate, incident only studies incidents alone, infer risk. We, for first time, spatiotemporally aligned tracks in large-scale region (16,972 nodes) over whole year of 2023: our XTraffic dataset includes traffic, i.e., time-series indexes flow, lane occupancy, average vehicle speed,...

10.48550/arxiv.2407.11477 preprint EN arXiv (Cornell University) 2024-07-16

Energy storage in data centers has mainly been used as devices to backup generators during power outages. Recently, there a growing interest using energy actively shape consumption reduce their skyrocketing electricity bills. In this paper, we consider for two applications joint fashion: reducing peak demand charges and enabling participate regulation markets. We develop an optimization framework that captures the cost of electricity, degradation devices, well benefit from Under frame- work,...

10.48550/arxiv.1606.01536 preprint EN other-oa arXiv (Cornell University) 2016-01-01

While there has been prior work to underprovision the power distribution infrastructure for a datacenter save costs, ability backup infrastructure, which contributes significantly capital is little explored. There are two main components in - Diesel Generators (DGs) and UPS units can both be underprovisioned (or even removed) terms of their and/or energy capacities. However, embarking on such underprovisioning mandates studying several ramifications resulting cost savings, lower...

10.1145/2644865.2541966 article EN ACM SIGPLAN Notices 2014-02-24

For large-scale battery-swapping demands, reserva- tions are utilized to effectively manage battery swapping. To achieve data security, one promising solution is heterogeneous signcryption (i.e. signature + encryption). However, existing cannot simultaneously support aggre- gation, batch verification, conditional privacy-preserving, bidirec- tional communication, and availability. Besides, reduce the end-to-end delays, mobile edge computing (MEC) introduced reservations, so other challenge...

10.1109/tvt.2023.3281592 article EN IEEE Transactions on Vehicular Technology 2023-01-01

Click-through rate (CTR) prediction is one of the core tasks in industrial applications such as online advertising and recommender systems. However, performance existing CTR models hampered by cold-start users who have very few historical behavior data, given that these often rely on enough sequential data to learn embedding vectors. In this paper, we propose a novel framework dubbed GF2 alleviate problem deep learning based prediction. augments embeddings after layer model Generative...

10.1145/3511808.3557684 article EN Proceedings of the 31st ACM International Conference on Information & Knowledge Management 2022-10-15

With the continuous emergence of massive distributed resources, blockchain technology provides a new solution to trust problem in energy field. However, some existing researches only use record data and currency transactions, resulting limited application scenarios. This paper analyzes consensus mechanism detail, designs hybrid that integrates multiple algorithms. On this basis, based on convex optimization is proposed, which deeply with scheduling problem. Experiments show has better...

10.1109/ei256261.2022.10116511 article EN 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2) 2022-11-11

In this paper, the concept of consistently semicontinuous dcpo is given,then some properties them are discussed, especially, equivalent characterizations between and smallest semi-prime set given. Finally mapping given, connection on base

10.1051/matecconf/20164402048 article EN cc-by MATEC Web of Conferences 2016-01-01
Coming Soon ...