- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Cognitive Radio Networks and Spectrum Sensing
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- IoT and Edge/Fog Computing
- Wireless Communication Networks Research
- Opportunistic and Delay-Tolerant Networks
- Age of Information Optimization
- Mobile Ad Hoc Networks
- Cloud Computing and Resource Management
- Energy Harvesting in Wireless Networks
- IoT Networks and Protocols
- Advanced Wireless Communication Technologies
- Distributed and Parallel Computing Systems
- Privacy-Preserving Technologies in Data
- Distributed Sensor Networks and Detection Algorithms
- Metaheuristic Optimization Algorithms Research
- Energy Efficient Wireless Sensor Networks
- Advanced Data Storage Technologies
- Mobile Agent-Based Network Management
- Peer-to-Peer Network Technologies
- Software-Defined Networks and 5G
- Blockchain Technology Applications and Security
- Wireless Communication Security Techniques
Zhejiang University
2016-2025
China Information Technology Security Evaluation Center
2021-2025
Communication University of Zhejiang
2016-2024
Nanjing University of Aeronautics and Astronautics
2021-2024
Xidian University
2012-2024
State Grid Corporation of China (China)
2021-2024
Seventh People's Hospital of Shanghai
2024
Beijing University of Posts and Telecommunications
2006-2023
Yalong Hydro (China)
2023
Dalian Neusoft University of Information
2020-2023
During the past decade, Internet of Things (IoT) has revolutionized ubiquitous computing with multitude applications built around various types sensors. A vast amount activity is seen in IoT based product-lines and this expected to grow years come projections as high billions devices on average 6-7 per person by year 2020. With most issues at device protocol levels solved during there now a growing trend integration sensors sensor systems cyber physical device-to-device (D2D) communications....
Mobile edge caching is a promising technique to reduce network traffic and improve the quality of experience mobile users. However, challenging decision making problem with unknown future content popularity complex characteristics. In this article, we advocate use DRL solve problems by presenting an overview recent works on DRL. We first examine key issues in review existing learning- based solutions proposed literature. also discuss unique features application caching, illustrate example...
To satisfy the delay constraint, computation tasks can be offloaded to some computing servers, referred as offloading destinations. Different most of existing works which usually consider only a single type destinations, in this paper, we study hybrid problem considering diverse and communication capabilities two types i.e., cloud servers fog servers. The aim is minimize total energy consumption for both while completing within given constraint. It quite challenging because cannot easily...
Content caching at network edge nodes, such as base stations (BSs) and user equipments (UEs), can significantly reduce the traffic load in future cellular networks. Considering limited space, contents cached BSs should be selected carefully for improving efficiency. In this paper, we study to minimize transmission cost by considering offloading via device-to-device (D2D) communications. The reduces thus changes utility achieved content BSs. We model problem a Markov decision process propose...
With 5G on the verge of being adopted as next mobile network, there is a need to analyze its impact landscape computing and data management. In this paper, we both traditional emerging technologies project our view future research challenges opportunities. predicted increase 10-100× in bandwidth 5-10x decrease latency, expected be main enabler for smart cities, IoT efficient healthcare, where machine learning conducted at edge. context, investigate how can help development federated...
The conventional federated learning (FL) framework usually assumes synchronous reception and fusion of all the local models at central aggregator updating training global model agents as well. However, in a wireless network, due to limited radio resource, inevitable transmission failures heterogeneous computing capacity, it is very hard realize strict synchronization among involved user equipments (UEs). In this paper, we propose novel asynchronous FL framework, which well adapts...
Distributive service data storage at the caching-enabled base stations (BSs) can reduce traffic load in future cellular networks. Taking limited caching space into account, it is necessary for BSs to adjust their based on popularity order achieve better efficiency. In this paper, we investigate cache replacement strategy minimize transmission cost between The problem modelled as a Markov Decision Process (MDP). Without extra information exchange about BSs, propose distributed Q-learning....
Multicast routing that meets multiple quality of service constraints is important for supporting multimedia communications in the Internet Things (IoT). Existing multicast technologies IoT mainly focus on ad hoc sensor networking scenarios; thus, are not responsive and robust enough applications an environment. In order to tackle challenging problem IoT, this paper, we propose two algorithms establishing tree data transmissions. The proposed leverage entropy-based process aggregate all...
In cognitive radio network, the interference of unlicensed users to licensed should be limited under temperature constraints. this paper, optimal power control scheme a network is analyzed without constraints firstly. Based on this, considering constraints, in modeled as concave minimization problem. Some useful properties optimization problem are exploited. According these properties, an improved branch and bound algorithm which more efficient than general proposed for network.
The influence of social interactions among mobile devices and network components in wireless networks has attracted substantial attention due to its potential impact on resource allocation spectrum power particular. We present an organized graphical view then extend multi-objective networks. subsequently consider taking advantage multi-dimensional resources, including radio resource, user behavior, content characteristics, such that we can successfully integrate caching capability, interest...
In this paper, we consider the dynamic power control for delay-aware D2D communications. The stochastic optimization problem is formulated as an infinite horizon average cost Markov decision process. To deal with curse of dimensionality, utilize interference filtering property CSMA-like MAC protocol and derive a closed-form approximate priority function associated error bound using perturbation analysis. Based on function, propose low-complexity algorithm solving per-stage problem. proposed...
Mobile edge computing (MEC) has recently emerged as a promising technology to release the tension between computation-intensive applications and resource-limited mobile terminals (MTs). In this paper, we study delay-optimal computation offloading in computation-constrained MEC systems. We consider task queue at server due its constrained capability. case, MT that are strongly coupled cascade manner, which creates complex interdependences brings new technical challenges. model problem an...
This paper considers the problem of computing optimal trajectories multiple mobile elements (e.g. robots, vehicles, etc.) to minimize data collection latency in wireless sensor networks (WSNs). By relying on slightly different assumption, we define two interesting problems, k-traveling salesperson with neighborhood (k-TSPN) and k-rooted path cover (k-PCPN). Since both problems are NP-hard, propose constant factor approximation algorithms for them. Our simulation results indicate our...
Information-centric networking (ICN) is designed to decouple contents from hosts at the network layer, using in-network caching as a key feature improve overall performance. However, en-route strategy used in many ICN implementations generally yields redundancies cached across different routers. There are also some recent works focusing on cache optimization by respectively exploiting either application layer or which we think not sufficient increase hit rate and reduce traffic. In this...
Sensing falsification is a key security threat in cooperative spectrum sensing cognitive radio networks. Intelligent malicious users (IMUs) adjust their behaviors according to objectives and the network's defense schemes. Without long-term collection of information on users' reputation, existing schemes fail thwart such behaviors. In this paper, we construct joint access framework both rational irrational IMUs. Lack reputation makes behavior resistance degrade performance since honest may be...
Intelligent reflecting surface (IRS) is a promising solution for enabling the control of wireless environments. Most existing works consider that an IRS consists large number reconfigurable passive elements and each them can reflect signal independently. However, it difficult costly in practice to manufacture this kind large-scale IRS. In paper, we propose practical electromagnetic-compliant reflection coefficient model element-grouping IRS, which configures <italic...
In this paper, we investigate the resource allocation problem in a single-user relay-aided cognitive radio (CR) underlay network. Both CR network and primary operate under orthogonal frequency-division multiplexing (OFDM) scheme. Different from conventional problem, relay node here is capable of performing subcarrier permutation over two hops such that signal received particular forwarded via different subcarrier. The objective to maximize throughput subject limited power budget at secondary...
For protocol and system design in cognitive radio networks (CRNs), it is essential to identify which settings or environmental conditions have great impacts on the quality-of-service (QoS) performance for secondary users (SUs) how they influence it, are still open issues. In this paper, an analytical framework quantify queue dynamics of a multi-SU multichannel CRN developed. framework, we consider important lower-layer mechanisms settings, including spectrum sensing errors, medium-access...
Wireless information and energy transfer (WIET) is a prominent technology to prolong the lifetime of battery-charging wireless networks. In this paper, we exploit benefit massive MIMO for WIET under external interference, propose antenna partition decoding harvesting. Considering effects i.e., interfering reception benefiting harvesting, analyze tradeoff between data rate harvested energy, obtain achievable rate-energy (R-E) region. Then, low-complexity receive algoritinterference...
Content popularity prediction plays an important role on proactive content caching. Different to most of the existing works which focus improving accuracy, in this article, we consider caching oriented through a weighted clustering approach order improve performance. We formulate loss cache hit ratio as system regret indicate performance, and construct clustering-based framework for overcoming user request sparsity with considering similarity evolution trends. For depicting explicit...
An edge computing environment features multiple servers and service clients. In this environment, mobile providers can offload client-side computation tasks from clients' devices onto to reduce latency power consumption experienced by the A critical issue that has yet be properly addressed is how allocate resources achieve two optimization objectives: 1) minimize cost measured clients; 2) maximize capacity number of clients their in long term. This paper formulates long-term problem as a...
Caching at the wireless edge is recognized as a promising solution to accommodate explosive growth of traffic demand. However, gain caching only pronounced given homogeneous user preference. To reap full potential caching, recommendation mechanism has emerged an attractive technology due its capability reshaping users' request distribution. In this work, we propose joint user-side and device-to-device (D2D)-assisted offloading strategy, aiming maximize operator's utility. Specifically,...
Distributed Source Coding (DSC) is an effective means in reducing data redundancy Wireless Sensor Networks (WSNs). However, the issues on designing multirate DSC with transmission WSNs have not been well addressed literature. In this paper, we propose a cross-layer approach to achieve optimal quality while assuring energy efficiency and latency requirement through adjusting dependencies network parameters jointly. Specifically, coding dependency among source sensors are fine-tuned balance...