Search Results - "Dongxiao Yu"

Refine Results
  1. 1

    Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks by Yu, Jiguo, Wan, Shengli, Cheng, Xiuzhen, Yu, Dongxiao

    Published in IEEE transactions on vehicular technology (01-09-2017)
    “…Coverage is a primary metric for ensuring the quality of services provided by a wireless sensor network (WSN). In this paper, we focus on the k-coverage…”
    Get full text
    Journal Article
  2. 2

    Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey by Li, Feng, Yu, Dongxiao, Yang, Huan, Yu, Jiguo, Karl, Holger, Cheng, Xiuzhen

    Published in IEEE wireless communications (01-02-2020)
    “…Assigning bands of the wireless spectrum as resources to users is a common problem in wireless networks. Typically, frequency bands were assumed to be…”
    Get full text
    Journal Article
  3. 3

    Path model for an extremal weight module over the quantized hyperbolic Kac-Moody algebra of rank 2 by Sagaki, Daisuke, Yu, Dongxiao

    Published in Communications in algebra (01-02-2021)
    “…Let be a hyperbolic Kac-Moody algebra of rank 2, and set where are the fundamental weights. Denote by the extremal weight module of extremal weight λ with the…”
    Get full text
    Journal Article
  4. 4

    Connected dominating sets in wireless ad hoc and sensor networks – A comprehensive survey by Yu, Jiguo, Wang, Nannan, Wang, Guanghui, Yu, Dongxiao

    Published in Computer communications (01-01-2013)
    “…Topology control is a fundamental issue in wireless ad hoc and sensor networks. Due to intrinsic characteristic of flatness, hierarchical topology can achieve…”
    Get full text
    Journal Article
  5. 5

    Mining Hard Samples Globally and Efficiently for Person Reidentification by Sheng, Hao, Zheng, Yanwei, Ke, Wei, Yu, Dongxiao, Cheng, Xiuzhen, Lyu, Weifeng, Xiong, Zhang

    Published in IEEE internet of things journal (01-10-2020)
    “…Person reidentification (ReID) is an important application of Internet of Things (IoT). ReID recognizes pedestrians across camera views at different locations…”
    Get full text
    Journal Article
  6. 6

    Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness by Dongxiao Yu, Li Ning, Yifei Zou, Jiguo Yu, Xiuzhen Cheng, Lau, Francis C. M.

    Published in IEEE/ACM transactions on networking (01-08-2017)
    “…This paper presents the first distributed algorithm to construct a spanner for arbitrary ad hoc networks under the physical…”
    Get full text
    Journal Article
  7. 7

    SoK: Privacy-preserving smart contract by Qi, Huayi, Xu, Minghui, Yu, Dongxiao, Cheng, Xiuzhen

    Published in High-Confidence Computing (01-03-2024)
    “…The privacy concern in smart contract applications continues to grow, leading to the proposal of various schemes aimed at developing comprehensive and…”
    Get full text
    Journal Article
  8. 8

    Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption by Dong, Yueyan, Li, Yifang, Cheng, Ye, Yu, Dongxiao

    Published in High-Confidence Computing (01-03-2024)
    “…A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information…”
    Get full text
    Journal Article
  9. 9

    A local energy consumption prediction-based clustering protocol for wireless sensor networks by Yu, Jiguo, Feng, Li, Jia, Lili, Gu, Xin, Yu, Dongxiao

    Published in Sensors (Basel, Switzerland) (03-12-2014)
    “…Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this…”
    Get full text
    Journal Article
  10. 10

    A trustless architecture of blockchain-enabled metaverse by Xu, Minghui, Guo, Yihao, Hu, Qin, Xiong, Zehui, Yu, Dongxiao, Cheng, Xiuzhen

    Published in High-Confidence Computing (01-03-2023)
    “…Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats…”
    Get full text
    Journal Article
  11. 11

    CCM-FL: Covert communication mechanisms for federated learning in crowd sensing IoT by Zhang, Hongruo, Zou, Yifei, Yin, Haofei, Yu, Dongxiao, Cheng, Xiuzhen

    Published in Digital communications and networks (01-06-2024)
    “…The past decades have witnessed a wide application of federated learning in crowd sensing, to handle the numerous data collected by the sensors and provide the…”
    Get full text
    Journal Article
  12. 12

    Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT by Chen, Shuzhen, Tao, Youming, Yu, Dongxiao, Li, Feng, Gong, Bei, Cheng, Xiuzhen

    Published in IEEE internet of things journal (01-03-2021)
    “…This article studies privacy-preserving collaborative learning in decentralized Internet-of-Things (IoT) networks, where the agents exchange information…”
    Get full text
    Journal Article
  13. 13

    Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR by Zhang, Xiujuan, Yu, Jiguo, Li, Wei, Cheng, Xiuzhen, Yu, Dongxiao, Zhao, Feng

    Published in IEEE/ACM transactions on networking (01-08-2017)
    “…Spanner construction is one of the most important techniques for topology control in wireless networks. A spanner can help not only to decrease the number of…”
    Get full text
    Journal Article
  14. 14

    A survey of fault tolerant consensus in wireless networks by Zou, Yifei, Yang, Li, Jing, Guanlin, Zhang, Ruirui, Xie, Zhenzhen, Li, Huiqun, Yu, Dongxiao

    Published in High-Confidence Computing (01-06-2024)
    “…Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However,…”
    Get full text
    Journal Article
  15. 15

    Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit by Zou, Yifei, Qi, Senmao, Xu, Cong'An, Yu, Dongxiao

    Published in Ji suan ji ke xue (01-02-2023)
    “…As a combination of edge computing and artificial intelligence, edge intelligence has become a promising technique and provided its users with a series of…”
    Get full text
    Journal Article
  16. 16

    Incremental Data Stream Classification with Adaptive Multi-Task Multi-View Learning by Wang, Jun, Shi, Maiwang, Zhang, Xiao, Li, Yan, Yuan, Yunsheng, Yang, Chenglei, Yu, Dongxiao

    Published in Big Data Mining and Analytics (01-03-2024)
    “…With the enhancement of data collection capabilities, massive streaming data have been accumulated in numerous application scenarios. Specifically, the issue…”
    Get full text
    Journal Article
  17. 17

    Fast skyline community search in multi-valued networks by Yu, Dongxiao, Zhang, Lifang, Luo, Qi, Cheng, Xiuzhen, Yu, Jiguo, Cai, Zhipeng

    Published in Big Data Mining and Analytics (01-09-2020)
    “…Community search has been extensively studied in large networks, such as Protein-Protein Interaction (PPI) networks, citation graphs, and collaboration…”
    Get full text
    Journal Article
  18. 18

    Network representation learning based on social similarities by Mo, Ziwei, Xie, Zhenzhen, Zhang, Xilian, Luo, Qi, Zheng, Yanwei, Yu, Dongxiao

    Published in Frontiers in environmental science (30-08-2022)
    “…Analysis of large-scale networks generally requires mapping high-dimensional network data to a low-dimensional space. We thus need to represent the node and…”
    Get full text
    Journal Article
  19. 19

    Single Variable-Constrained NDT Matching in Traffic Data Collection Using a Laser-Based Detector by Qiu, Haiyang, Li, Xiangdi, Zhang, Jun, Yu, Dongxiao, Yu, Lei, Wang, Hui, Zhu, Sicong

    Published in IEEE access (2021)
    “…As indispensable components of intelligent transportation systems, traffic detection and surveillance technologies deliver speed monitoring, traffic counting,…”
    Get full text
    Journal Article
  20. 20

    Trustworthy decentralized collaborative learning for edge intelligence: A survey by Yu, Dongxiao, Xie, Zhenzhen, Yuan, Yuan, Chen, Shuzhen, Qiao, Jing, Wang, Yangyang, Yu, Yong, Zou, Yifei, Zhang, Xiao

    Published in High-Confidence Computing (01-09-2023)
    “…Edge intelligence is an emerging technology that enables artificial intelligence on connected systems and devices in close proximity to the data sources…”
    Get full text
    Journal Article