Xiangrong Tong

ORCID: 0000-0003-4855-3723
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Crowdsensing and Crowdsourcing
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Leech Biology and Applications
  • Recommender Systems and Techniques
  • Privacy, Security, and Data Protection
  • IoT and Edge/Fog Computing
  • Logic, Reasoning, and Knowledge
  • Multi-Agent Systems and Negotiation
  • Advanced Graph Neural Networks
  • Species Distribution and Climate Change
  • Auction Theory and Applications
  • Identification and Quantification in Food
  • Human Mobility and Location-Based Analysis
  • Network Security and Intrusion Detection
  • Advanced Image and Video Retrieval Techniques
  • Medical Imaging Techniques and Applications
  • Anomaly Detection Techniques and Applications
  • Metaheuristic Optimization Algorithms Research
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Cryptography and Data Security
  • Advanced Computational Techniques and Applications
  • Advanced Multi-Objective Optimization Algorithms
  • Video Surveillance and Tracking Methods

Yantai University
2016-2025

Kunming University
2008-2023

Yantai Institute of Coastal Zone Research
2022

State University "Kyiv Aviation Institute"
2022

Georgia State University
2022

John Wiley & Sons (United States)
2021

Hudson Institute
2021

South China University of Technology
2017-2018

Jilin University
2009

Beijing Jiaotong University
2008

Mobile crowdsourcing is an emerging paradigm, which generates large-scale sensing tasks and data. One of the major issues in mobile how to maximize social welfare through selecting appropriate for crowd workers such that it can improve effectiveness efficiency crowdsourcing. This paper proposes incentive mechanism and, respectively, investigates worker-centric task selection platform-centric worker selection. applies optimization algorithm systems. A discrete particle swarm (DPSO) designed...

10.1109/tcss.2019.2907059 article EN publisher-specific-oa IEEE Transactions on Computational Social Systems 2019-06-01

With the rise of Internet Things (IoT) and fifth-generation (5G) networks, which have led to a surge in data processing increased transfer time, traditional cloud computing could no longer meet needs workers, so edge has emerged. Edge demand for low time consumption by at network then transmitting it third-party platform. However, since credibility platform is unknown can easily leak privacy workers. For transparent mechanism blockchain, two-stage protection based on blockchain proposed...

10.1002/int.22371 article EN International Journal of Intelligent Systems 2021-01-23

With the rapid development of Industry 5.0 and mobile devices, research crowdsensing networks has become an important focus. Task allocation is content that can inspire crowd workers to participate in tasks provide truthful sensed data crowdsourcing systems. However, how still many challenges. In this article, based on Markov model collaborative filtering model, similarities, trajectory prediction, dwell time, trust degree are considered propose Collaborative filtering-based Recommendation...

10.1109/tcss.2020.2995760 article EN publisher-specific-oa IEEE Transactions on Computational Social Systems 2020-05-30

Deep learning based generative adversarial networks (GAN) can effectively perform image reconstruction with under-sampled MR data. In general, a large number of training samples are required to improve the performance certain model. However, in real clinical applications, it is difficult obtain tens thousands raw patient data train model since saving k-space not routine flow. Therefore, enhancing generalizability network on small urgently needed. this study, three novel applications were...

10.1016/j.compbiomed.2021.104504 article EN cc-by Computers in Biology and Medicine 2021-05-26

With the rapid development of Internet Things (IoT) and popularization 5 G networks, data that needs to be processed in Mobile Crowdsourcing (MCS) system is increasing every day. Traditional cloud computing can no longer meet crowdsourcing for real-time processing efficiency, thus, edge was born. Edge calculated at network so greatly improve efficiency performance processing. In addition, most existing privacy protection technologies are based on trusted third parties. Therefore, view...

10.1109/tmc.2022.3187047 article EN IEEE Transactions on Mobile Computing 2022-06-28

In the participatory sensing framework, privacy protection of Internet Things (IoT) is very important. this article, cryptography-based methods are utilized to protect participants' information in unsecured network channels for dynamic and real-time tasks. The edge computing paradigm introduced traditional framework reduce latency. Then, Rivest Cipher 4 stream cipher logistic mapping combined deal with problems limited resources untruthful third-party platforms. Finally, product algebra...

10.1109/jiot.2020.2990428 article EN publisher-specific-oa IEEE Internet of Things Journal 2020-04-28

With the development of mobile networks and intelligent equipment, as a new data sensing paradigm in large-scale sensor applications such industrial Internet Things, crowd (MCS) assigns tasks to workers for collection sharing, which has created bright future building strong system improving services. How design an effective worker selection mechanism maximize utility crowdsourcing is research hotspot technologies. This article studies problem least make large MCS perform more achieve certain...

10.1109/tii.2021.3076811 article EN IEEE Transactions on Industrial Informatics 2021-04-30

With the development of Internet Things (IoT), delay caused by network transmission has led to low data processing efficiency. At same time, limited computing power and available energy consumption IoT terminal devices are also important bottlenecks that would restrict application blockchain, but edge could solve this problem. The emergence can effectively reduce improve capacity. However, user in is usually stored processed some honest-but-curious authorized entities, which leads leakage...

10.23919/jcc.2020.09.005 article EN China Communications 2020-09-01

Internet of Things (IoT) devices are being used widely in the fields smart city, grid, environmental monitoring, Vehicles and other that need large-scale sensing data. However, research on storage computation power for IoT is still its early stages. The game theory converts interaction between two into a where conflict resolved by utilizing game's equilibrium conditions. Our goal with to maximize utility every device network. In this article, we review recent game-theory-based solutions...

10.1109/jiot.2021.3133669 article EN IEEE Internet of Things Journal 2021-12-10

With the advent of intelligent technology, users spatio-temporal crowdsourcing and their participation in tasks continue to increase exponentially. This poses new challenges field. One core research areas is task assignment. Most existing on assignment focused offline optimal assignment, where, platform has already learned all information about workers beforehand. However, these studies cannot obtain good results real-world situations. At same time, online problems often result local To...

10.1109/tsc.2022.3197676 article EN IEEE Transactions on Services Computing 2022-01-01

With the development of mobile devices, crowdsourcing has become research hotspot in crowd sensing networks (MCSS). How to protect location privacy user location-based services is a key problem MCSS. However, with increase privacy-preserving level, service quality will be influenced and decrease. In order prevent user's from being leaked, this paper proposes mechanism CKD through combining k-anonymity differential privacy-preserving. addition, tradeoff between protection solved based on...

10.1109/access.2017.2783322 article EN cc-by-nc-nd IEEE Access 2017-12-14

As a new paradigm to solve problems by gathering the intelligence of crowds, mobile crowdsourcing has become one hot spots in academic and industrial fields. Task requester, platform, crowd workers are stakeholders crowdsourcing, which inevitably leads conflicts interest. In order this problem, article constructs three-party evolutionary game model among task workers. This also considers collusion between platform make it more realistic. Then, replication dynamics method is utilized analyze...

10.1109/tcss.2021.3135427 article EN IEEE Transactions on Computational Social Systems 2021-12-28

In social networks, trust is a complex network. Participants in online networks want to share information and experiences with as many reliable users possible. However, the modeling of complicated application dependent. Modeling needs consider interaction history, recommendation, user behaviors so on. Therefore, an important focus for networks.We propose game theory-based measurement model networks. The degree calculated from three aspects, service reliability, feedback effectiveness,...

10.1186/s40649-016-0027-x article EN cc-by Computational Social Networks 2016-05-20

In order to avoid malicious competition and select high quality crowd workers improve the utility of crowdsourcing system, this paper proposes an incentive mechanism based on combination reverse auction multi-attribute in mobile crowdsourcing. The proposed online includes two algorithms. One is worker selection algorithm that adopts dynamic threshold make decision for whether accept a according its attributes. Another payment determination which determines reputation sensing data, is, can...

10.3390/s18103453 article EN cc-by Sensors 2018-10-14

With the rapid development of mobile devices, crowdsourcing has become an important research focus. According to task allocation, scholars have proposed many methods. However, few works discuss combining social networks and crowdsourcing. To maximize utilities system, this paper proposes a allocation model considering attributes for system. Starting from homogeneity human beings, relationship between friends in is applied A algorithm based on friend relationships proposed. The GeoHash coding...

10.3390/s19040921 article EN cc-by Sensors 2019-02-22

Magnetic resonance imaging (MRI) is an important medical modality, but its acquisition speed quite slow due to the physiological limitations. Recently, super-resolution methods have shown excellent performance in accelerating MRI. In some circumstances, it difficult obtain high-resolution images even with prolonged scan time. Therefore, we proposed a novel method that uses generative adversarial network cyclic loss and attention mechanism generate MR from low-resolution by upsampling factors...

10.1109/access.2021.3099695 article EN cc-by-nc-nd IEEE Access 2021-01-01
Coming Soon ...