Dong Yuan

ORCID: 0000-0003-1130-0888
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Scientific Computing and Data Management
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Smart Grid Security and Resilience
  • Text and Document Classification Technologies
  • Caching and Content Delivery
  • Cloud Data Security Solutions
  • Natural Language Processing Techniques
  • Advanced Neural Network Applications
  • Topic Modeling
  • Cryptography and Data Security
  • Parallel Computing and Optimization Techniques
  • Stochastic Gradient Optimization Techniques
  • Advanced Authentication Protocols Security
  • Advanced Manufacturing and Logistics Optimization
  • Advanced Image and Video Retrieval Techniques
  • Adversarial Robustness in Machine Learning
  • Big Data and Business Intelligence
  • Mobile Crowdsensing and Crowdsourcing
  • Cryptographic Implementations and Security

The University of Sydney
2016-2025

South China Normal University
2025

Shaanxi Polytechnic Institute
2025

Xihua University
2025

Chang'an University
2016-2024

Shandong University
2017-2024

Peking University
2017-2024

Zhejiang Gongshang University
2024

Xinjiang University
2023

Hohai University
2023

10.1016/j.future.2010.02.004 article EN Future Generation Computer Systems 2010-02-19

The concept of cloud computing continues to spread widely, as it has been accepted recently. Cloud many unique advantages which can be utilized facilitate workflow execution. Instance-intensive cost-constrained workflows are with a large number instances (i.e. instance intensive) bounded by certain budget for execution cost constrained) on platform workflows). However, there are, so far, no dedicated scheduling algorithms instance-intensive workflows. This paper presents novel...

10.1177/1094342010369114 article EN The International Journal of High Performance Computing Applications 2010-05-24

Equipped with easy-to-access micro computation access points, the fog computing architecture provides low-latency and ubiquitously available offloading services to many simple cheap Internet of Things devices limited energy resources. One obstacle, however, is how seamlessly hand over mobile IoT among different points when in action so that service not interrupted -- especially for time-sensitive applications. In this article, we propose Follow Me Fog (FMF), a framework supporting new...

10.1109/mcom.2017.1700363 article EN IEEE Communications Magazine 2017-11-01

Directional distribution analysis has long served as a fundamental functionality in abstracting dispersion and orientation of spatial datasets. Spatial datasets that describe sensitive information individuals such health status home addresses must be used shared cautiously to protect individuals' privacy. There is an inherent tension between the need accurate directional result requirement location Plenty excellent privacy protection approaches geo-indistinguishability can provide...

10.1109/tkde.2022.3192360 article EN IEEE Transactions on Knowledge and Data Engineering 2022-01-01

Nowadays, large-scale Cloud-based applications have put forward higher demand for storage ability of data centres. Data in the Cloud need to be stored with high efficiency and cost effectiveness while meeting requirement reliability. While current systems, typical 3-replicas replication strategies are applied reliability, this paper we propose a novel cost-effective dynamic strategy which facilitates an incremental method reduce meet reliability at same time. This works very well especially...

10.1109/dasc.2011.95 article EN 2011-12-01

Nowadays, smart environments (e.g., home, city) are built heavily relying on Cloud computing for the coordination and collaboration among objects. is typically centralized but objects ubiquitously distributed, thus, data transmission latency (i.e., end-to-end delay or response time) between a critical issue especially to applications that have strict requirements. To address concern, new Fog paradigm recently proposed by industry, while detailed platform yet be developed. The key idea bring...

10.1109/atnac.2015.7366831 article EN 2015-11-01

Massive computation power and storage capacity of cloud computing systems allow scientists to deploy data intensive applications without infrastructure investment, where large application sets can be stored in the cloud. Based on pay-as-you-go model, strategies benchmarking approaches have been developed for cost-effectively storing volume generated However, they are either insufficiently cost-effective or impractical used at runtime. In this paper, toward achieving minimum cost benchmark,...

10.1109/tpds.2013.20 article EN IEEE Transactions on Parallel and Distributed Systems 2013-01-14

Cloud computing is a promising distributed platform for big data applications, e.g., scientific since excessive resources can be obtained from cloud services processing and storing both existing generated application datasets. However, when tasks process stored in centers, the inevitable movements will cause huge bandwidth cost execution delay. In this paper, we construct tripartite graph based model to formulate replica placement problem propose genetic algorithm strategy applications...

10.1109/tsc.2015.2481421 article EN IEEE Transactions on Services Computing 2015-09-23

The prosperity of Internet Things (IoT) and the success rich Cloud services have expedited emergence a new computing paradigm called Fog computing, which promotes processing data at proximity their sources. Complementary to Cloud, promises offer many appealing features, such as low latency, cost, high multitenancy, scalability, consolidate IoT ecosystem. Although concept has been widely adopted in areas, comprehensive realization yet adequately researched. To address all these issues, this...

10.1109/jiot.2017.2774286 article EN IEEE Internet of Things Journal 2017-11-16

Online social networks are plagued by fake information. In particu- lar, using massive accounts (also called Sybils), an attacker can disrupt the security and privacy of benign users spreading spam, malware, disinformation. Existing Sybil detection methods rely on rich content, behavior, and/or graphs generated Sybils. The key limitation these is that they incur significant delays in catching Sybils, i.e., Sybils may have already performed many malicious activities when being detected. this...

10.1145/3319535.3363198 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Today, artificial intelligence and deep neural networks have been successfully used in many applications that fundamentally changed people’s lives areas. However, very limited research has done the meteorology area, where meteorological forecasts still rely on simulations via extensive computing resources. In this paper, we propose an approach to using network forecast future temperature according past values. Specifically, design a convolutional recurrent (CRNN) model is composed of...

10.1155/2020/3536572 article EN cc-by Complexity 2020-03-20

Data outsourcing to cloud has been a common IT practice nowadays due its significant benefits. Meanwhile, security and privacy concerns are critical obstacles hinder the further adoption of cloud. Although data encryption can mitigate problem, it reduces functionality query processing, e.g., disabling SQL queries. Several schemes have proposed enable one-dimensional on encrypted data, but multi-dimensional range not well addressed. In this paper, we propose secure scalable scheme that...

10.1109/icde.2019.00062 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2019-04-01

This research explores the application of machine learning (ML) in domain electrochromic (EC) technology, focusing specifically on liquid-state devices (ECDs). Unlike traditional solid-state ECDs, liquid offer a simpler structure, reducing manufacturing variables and potentially improving prediction accuracy with minimal input data. Two types ECDs were developed using solutions ammonium metatungstate-iron(II) chloride sulfate, resulting 20 different varying concentration gradients....

10.1063/5.0247775 article EN cc-by-nc AIP Advances 2025-02-01

Many scientific workflows are data intensive where a large volume of intermediate is generated during their execution. Some valuable need to be stored for sharing or reuse. Traditionally, they selectively according the system storage capacity, determined manually. As doing science on cloud has become popular nowadays, more can in based pay-for-use model. In this paper, we build an Intermediate Dependency Graph (IDG) from provenances workflows. Based IDG, develop novel strategy that reduce...

10.1109/ipdps.2010.5470453 article EN 2010-01-01

SUMMARY Many scientific workflows are data intensive where large volumes of intermediate generated during their execution. Some valuable need to be stored for sharing or reuse. Traditionally, they selectively according the system storage capacity, determined manually. As doing science in cloud has become popular nowadays, more can based on a pay‐for‐use model. In this paper, we build an dependency graph (IDG) from provenance workflows. With IDG, deleted regenerated, and as such develop novel...

10.1002/cpe.1636 article EN Concurrency and Computation Practice and Experience 2010-08-27

In current Cloud computing environments, management of data reliability has become a challenge. For data-intensive scientific applications, storing in the with typical 3-replica replication strategy for managing would incur huge storage cost. To address this issue, paper we present novel cost-effective mechanism named PRCR, which proactively checks availability replicas maintaining reliability. Our simulation indicates that, comparing strategy, PRCR can reduce space consumption by one-third...

10.1109/ccgrid.2012.33 article EN 2012-05-01
Coming Soon ...