Search Results - "Dongxiao Yu"
-
1
Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks
Published in IEEE transactions on vehicular technology (01-09-2017)“…Coverage is a primary metric for ensuring the quality of services provided by a wireless sensor network (WSN). In this paper, we focus on the k-coverage…”
Get full text
Journal Article -
2
Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey
Published in IEEE wireless communications (01-02-2020)“…Assigning bands of the wireless spectrum as resources to users is a common problem in wireless networks. Typically, frequency bands were assumed to be…”
Get full text
Journal Article -
3
Path model for an extremal weight module over the quantized hyperbolic Kac-Moody algebra of rank 2
Published in Communications in algebra (01-02-2021)“…Let be a hyperbolic Kac-Moody algebra of rank 2, and set where are the fundamental weights. Denote by the extremal weight module of extremal weight λ with the…”
Get full text
Journal Article -
4
Connected dominating sets in wireless ad hoc and sensor networks – A comprehensive survey
Published in Computer communications (01-01-2013)“…Topology control is a fundamental issue in wireless ad hoc and sensor networks. Due to intrinsic characteristic of flatness, hierarchical topology can achieve…”
Get full text
Journal Article -
5
Mining Hard Samples Globally and Efficiently for Person Reidentification
Published in IEEE internet of things journal (01-10-2020)“…Person reidentification (ReID) is an important application of Internet of Things (IoT). ReID recognizes pedestrians across camera views at different locations…”
Get full text
Journal Article -
6
Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness
Published in IEEE/ACM transactions on networking (01-08-2017)“…This paper presents the first distributed algorithm to construct a spanner for arbitrary ad hoc networks under the physical…”
Get full text
Journal Article -
7
SoK: Privacy-preserving smart contract
Published in High-Confidence Computing (01-03-2024)“…The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and…”
Get full text
Journal Article -
8
Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption
Published in High-Confidence Computing (01-03-2024)“…A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information…”
Get full text
Journal Article -
9
A local energy consumption prediction-based clustering protocol for wireless sensor networks
Published in Sensors (Basel, Switzerland) (03-12-2014)“…Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this…”
Get full text
Journal Article -
10
A trustless architecture of blockchain-enabled metaverse
Published in High-Confidence Computing (01-03-2023)“…Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats…”
Get full text
Journal Article -
11
CCM-FL: Covert communication mechanisms for federated learning in crowd sensing IoT
Published in Digital communications and networks (01-06-2024)“…The past decades have witnessed a wide application of federated learning in crowd sensing, to handle the numerous data collected by the sensors and provide the…”
Get full text
Journal Article -
12
Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT
Published in IEEE internet of things journal (01-03-2021)“…This article studies privacy-preserving collaborative learning in decentralized Internet-of-Things (IoT) networks, where the agents exchange information…”
Get full text
Journal Article -
13
Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR
Published in IEEE/ACM transactions on networking (01-08-2017)“…Spanner construction is one of the most important techniques for topology control in wireless networks. A spanner can help not only to decrease the number of…”
Get full text
Journal Article -
14
A survey of fault tolerant consensus in wireless networks
Published in High-Confidence Computing (01-06-2024)“…Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However,…”
Get full text
Journal Article -
15
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit
Published in Ji suan ji ke xue (01-02-2023)“…As a combination of edge computing and artificial intelligence, edge intelligence has become a promising technique and provided its users with a series of…”
Get full text
Journal Article -
16
Incremental Data Stream Classification with Adaptive Multi-Task Multi-View Learning
Published in Big Data Mining and Analytics (01-03-2024)“…With the enhancement of data collection capabilities, massive streaming data have been accumulated in numerous application scenarios. Specifically, the issue…”
Get full text
Journal Article -
17
Fast skyline community search in multi-valued networks
Published in Big Data Mining and Analytics (01-09-2020)“…Community search has been extensively studied in large networks, such as Protein-Protein Interaction (PPI) networks, citation graphs, and collaboration…”
Get full text
Journal Article -
18
Network representation learning based on social similarities
Published in Frontiers in environmental science (30-08-2022)“…Analysis of large-scale networks generally requires mapping high-dimensional network data to a low-dimensional space. We thus need to represent the node and…”
Get full text
Journal Article -
19
Single Variable-Constrained NDT Matching in Traffic Data Collection Using a Laser-Based Detector
Published in IEEE access (2021)“…As indispensable components of intelligent transportation systems, traffic detection and surveillance technologies deliver speed monitoring, traffic counting,…”
Get full text
Journal Article -
20
Trustworthy decentralized collaborative learning for edge intelligence: A survey
Published in High-Confidence Computing (01-09-2023)“…Edge intelligence is an emerging technology that enables artificial intelligence on connected systems and devices in close proximity to the data sources…”
Get full text
Journal Article