Wei Bao

ORCID: 0000-0003-1874-1766
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Cooperative Communication and Network Coding
  • Advanced Wireless Network Optimization
  • Stochastic Gradient Optimization Techniques
  • Wireless Communication Networks Research
  • Power Systems and Renewable Energy
  • Microgrid Control and Optimization
  • Text and Document Classification Technologies
  • IoT Networks and Protocols
  • Advanced Vision and Imaging
  • Smart Grid and Power Systems
  • Advanced Neural Network Applications
  • Power Systems and Technologies
  • Age of Information Optimization
  • Islanding Detection in Power Systems
  • Advanced Wireless Communication Technologies
  • Optimization and Search Problems
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Advanced Image Processing Techniques
  • Optical measurement and interference techniques
  • Higher Education and Teaching Methods
  • Face and Expression Recognition

Ningxia University
2025

The University of Sydney
2016-2024

China Electronics Standardization Institute
2022-2024

Shanghai Electric (China)
2014-2024

Shanghai Jinyuan Senior High School
2024

Shanghai University of Electric Power
2024

State Nuclear Power Technology Company (China)
2015-2024

Zhejiang Science and Technology Information Institute
2024

Guangxi Normal University
2024

Xidian University
2024

There is an increasing interest in a new machine learning technique called Federated Learning, which the model training distributed over mobile user equipments (UEs), and each UE contributes to by independently computing gradient based on its local data. Learning has several benefits of data privacy potentially large amount participants with modern powerful processors low-delay mobile-edge networks. While most existing work focused designing algorithms provable convergence time, other issues...

10.1109/infocom.2019.8737464 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

There is an increasing interest in a fast-growing machine learning technique called Federated Learning (FL), which the model training distributed over mobile user equipment (UEs), exploiting UEs' local computation and data. Despite its advantages such as preserving data privacy, FL still has challenges of heterogeneity across physical resources. To address these challenges, we first propose FEDL, algorithm can handle heterogeneous UE without further assumptions except strongly convex smooth...

10.1109/tnet.2020.3035770 article EN IEEE/ACM Transactions on Networking 2020-11-17

Fifth-generation cellular mobile networks are expected to support mission critical URLLC services in addition enhanced broadband applications. This article first introduces three emerging applications of and identifies their requirements on end-to-end latency reliability. We then investigate the various sources delay current wireless by taking 4G LTE as an example. Then we propose evaluate several techniques reduce from perspectives error control coding, signal processing, radio resource...

10.1109/mcom.2018.1701178 article EN IEEE Communications Magazine 2018-09-24

Recent advances in deep neural networks (DNNs) have substantially improved the accuracy and speed of a variety intelligent applications. Nevertheless, one obstacle is that DNN inference imposes heavy computation burden to end devices, but offloading tasks cloud causes transmission large volume data. Motivated by fact data size some intermediate layers significantly smaller than raw input data, we design surgery, which allows partitioned processed at both edge while limiting transmission. The...

10.1109/infocom.2019.8737614 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

The joint user association and spectrum allocation problem is studied for multi-tier heterogeneous networks (HetNets) in both downlink uplink the interference-limited regime. Users are associated with base-stations (BSs) based on biased received power. Spectrum either shared or orthogonally partitioned among tiers. This paper models placement of BSs different tiers as spatial point processes adopts stochastic geometry to derive theoretical mean proportionally fair utility network coverage...

10.1109/jsac.2015.2417011 article EN IEEE Journal on Selected Areas in Communications 2015-03-29

Horizontal and vertical handoffs are important ramifications of user mobility in multitier heterogeneous wireless networks. They directly impact the signaling overhead quality calls. However, they difficult to analyze due irregularly shaped network topologies introduced by multiple tiers cells. In this paper, a stochastic geometric analysis framework on is proposed, capture spatial randomness various scales cell sizes different tiers. We derive theoretical expressions for rates all handoff...

10.1109/jsac.2015.2435451 article EN IEEE Journal on Selected Areas in Communications 2015-05-20

Cloud computing has become the de facto platform for application processing in era of Internet Things (IoT). However, limitations cloud model, such as high transmission latency and costs are giving birth to a new paradigm called edge (a.k.a fog computing). Fog aims move data close network so reduce traffic. since servers at layer not powerful ones cloud, there is need balance between cloud. Moreover, besides offloading issue, energy efficiency nodes an increasing concern. Densely deployed...

10.1109/access.2017.2766165 article EN cc-by-nc-nd IEEE Access 2017-01-01

10.1007/s12652-016-0406-z article EN Journal of Ambient Intelligence and Humanized Computing 2016-09-10

Equipped with easy-to-access micro computation access points, the fog computing architecture provides low-latency and ubiquitously available offloading services to many simple cheap Internet of Things devices limited energy resources. One obstacle, however, is how seamlessly hand over mobile IoT among different points when in action so that service not interrupted -- especially for time-sensitive applications. In this article, we propose Follow Me Fog (FMF), a framework supporting new...

10.1109/mcom.2017.1700363 article EN IEEE Communications Magazine 2017-11-01

This paper investigates the optimal resource allocation of a downlink non-orthogonal multiple access (NOMA) system consisting one base station and users. Unlike existing short-term NOMA designs that focused on for only current transmission timeslot, we aim to maximize long-term network utility by jointly optimizing data rate control at layer power among users physical layer, subject practical constraints both consumptions. To solve this problem, leverage recently developed Lyapunov...

10.1109/jsac.2017.2726357 article EN IEEE Journal on Selected Areas in Communications 2017-07-17

With the proliferation of Internet Things (IoT) and rising interconnectedness devices, network security faces significant challenges, especially from anomalous activities.While traditional machine learning-based intrusion detection systems (ML-IDS) effectively employ supervised learning methods, they possess limitations such as requirement for labeled data challenges with high dimensionality.Recent unsupervised ML-IDS approaches AutoEncoders Generative Adversarial Networks (GAN) offer...

10.1109/tnet.2024.3423780 article EN IEEE/ACM Transactions on Networking 2024-07-11

We study joint spectrum allocation and user association in heterogeneous cellular networks with multiple tiers of base stations. A stochastic geometric approach is applied as the basis to derive average downlink data rate a closed-form expression. Then, expression employed objective function jointly optimizing association, which non-convex programming nature. computationally efficient Structured Spectrum Allocation User Association (SSAUA) proposed, solving optimization problem optimally...

10.1109/infocom.2014.6848037 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

A promising solution to address the spectrum shortage in 5G cellular systems is deployment of millimeter wave (mmWave) heterogeneous networks (HetNets). However, a key challenge for mmWave HetNets manage user mobility and handovers among small cells exploiting highly directional antennas conventional microwave macro cells. In this paper, we propose new efficient handover decision algorithm based on Markov Decision Process (MDP) optimize overall service experience users HetNets. By utilizing...

10.1109/tcomm.2018.2877326 article EN IEEE Transactions on Communications 2018-10-25

The steep rise of Internet Things (IoT) applications along with the limitations Cloud Computing to address all IoT requirements promotes a new distributed computing paradigm called Fog Computing, which aims process data at edge network. With help transmission latency and monetary spending caused by can be effectively reduced. However, executing in fog nodes will increase average response time since processing capabilities is not as powerful cloud. A tradeoff issue needs addressed within such...

10.1109/nca.2016.7778612 article EN 2016-10-01

Federated learning (FL) is a fast-developing technique that allows multiple workers to train global model based on distributed dataset. Conventional FL (FedAvg) employs gradient descent algorithm, which may not be efficient enough. Momentum able improve the situation by adding an additional momentum step accelerate convergence and has demonstrated its benefits in both centralized environments. It well-known Nesterov Accelerated Gradient (NAG) more advantageous form of momentum, but it clear...

10.1109/tpds.2022.3206480 article EN IEEE Transactions on Parallel and Distributed Systems 2022-09-14

Recent advances in deep neural networks have substantially improved the accuracy and speed of various intelligent applications. Nevertheless, one obstacle is that DNN inference imposes a heavy computation burden on end devices, but offloading tasks to cloud causes large volume data transmission. Motivated by fact size some intermediate layers significantly smaller than raw input data, we designed surgery, which allows partitioned be processed at both edge while limiting The challenge...

10.1109/tcc.2023.3258982 article EN IEEE Transactions on Cloud Computing 2023-03-20

Federated Learning (FL) enables many clients to train a joint model without sharing the raw data. While byzantine-robust FL methods have been proposed, remains vulnerable security attacks such as poisoning and evasion due its distributed adversarial environment. Additionally, real-world training data used in are usually Non-Independent Identically Distributed (Non-IID), which further weakens robustness of existing (such Krum, Median, Trimmed-Mean, etc.), thereby making it possible for global...

10.1016/j.cose.2023.103319 article EN cc-by-nc-nd Computers & Security 2023-06-05

For transmission control protocol (TCP), CUBIC is a TCP-friendly high-speed variant, in which the window size cubic function of time since last loss event. TCP implemented Linux operating systems and performs well wired networks with large bandwidth-delay product. Most evaluations are conducted via simulations or experiments. Analytical models for few. In this paper, we propose Markovian model to determine steady state throughput wireless environment. The proposed considers both congestion...

10.1109/glocom.2010.5684172 article EN 2010-12-01

User-centric base station (BS) cooperation has been regarded as an effective solution for improving network coverage and throughput in next-generation wireless systems. However, it also introduces more complicated handoff patterns, which may potentially degrade user performance. In this paper, we aim to theoretically quantify the tradeoff between cost data rate. Two user-centric clustering modes are investigated: number-based (NBC), is easier implement, distance-based (DBC), gives higher...

10.1109/twc.2017.2771343 article EN IEEE Transactions on Wireless Communications 2017-11-14

As cyber attacks to Industrial Internet of Things (IIoT) remain a major challenge, blockchain has emerged as promising technology for IIoT security due its decentralization and immutability characteristics. Existing designs, however, introduce high computational complexity latency challenges which are unsuitable IIoT. This paper proposes Xyreum, new high-performance scalable enhanced privacy. Xyreum uses Time-based Zero-Knowledge Proof Knowledge (T-ZKPK) with authenticated encryption perform...

10.1109/icdcs.2019.00190 article EN 2019-07-01

There is growing interest in applying distributed machine learning to edge computing, forming <i>federated learning</i> . Federated faces non-i.i.d. and heterogeneous data, the communication between workers, possibly through distant locations with unstable wireless networks, more costly than their local computational overhead. In this work, we propose <inline-formula><tex-math notation="LaTeX">${{\sf DONE}}$</tex-math></inline-formula> , a approximate Newton-type algorithm fast convergence...

10.1109/tpds.2022.3146253 article EN publisher-specific-oa IEEE Transactions on Parallel and Distributed Systems 2022-01-01
Coming Soon ...