Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 6Pages 6382–6397https://doi.org/10.1109/TNSM.2024.3449699Nowadays, Remote Direct Memory Access (RDMA) is gaining popularity in data centers for low CPU overhead, high throughput, and ultra-low latency. As one of the state-of-the-art RDMA Congestion Control (CC) mechanisms, HPCC leverages the In-band Network ...
- research-articleApril 2024
Context-aware graph embedding with gate and attention for session-based recommendation
AbstractPrior solutions on session-based recommendation (SBR) are mainly limited by two major issues: (1) the sequence and transition relationships of items need further integration; (2) the context clues from the neighboring sessions remain largely ...
Graphical abstractDisplay Omitted
- research-articleJanuary 2024
Anomaly Detection of Small Time Series Data Based on Improved Generative Adversarial Networks
AAIA '23: Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and ApplicationsPages 90–95https://doi.org/10.1145/3603273.3635670Small sample time series anomaly detection, as an important part of time series research, has attracted extensive attention and research in both academia and industry. The superior performance of deep learning for time series anomaly detection is largely ...
- research-articleFebruary 2022
Resource Allocation for Uplink NOMA-Based D2D Communication in Energy Harvesting Scenario: A Two-Stage Game Approach
IEEE Transactions on Wireless Communications (TWC), Volume 21, Issue 2Pages 976–990https://doi.org/10.1109/TWC.2021.3100567Energy harvesting (EH) endows device-to-device (D2D) communication and cellular equipment with the ability of continuous communication to provide internet-of-things (IoT) services in natural areas. While the available energy, which relies on EH, becomes ...
- research-articleJanuary 2022
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 19, Issue 1Pages 635–646https://doi.org/10.1109/TDSC.2020.2987903Under the assumption of honest-but-curious cloud service provider, various cryptographic techniques have been used to address the issues of data access control and confidentiality in public cloud storage. Among which, attribute-based encryption (ABE) has ...
-
- research-articleDecember 2021
Flow-level Adaptive Routing Scheme for RDMA enabled Dragonfly Network
2021 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM46510.2021.9685963To minimize the number of expensive global links, Dragonfly topology is developed greatly in today's data centers. However, deploying Remote Direct Memory Access (RDMA) applications inside Dragonfly requires the network to provide a routing scheme ...
- research-articleSeptember 2021
Transparent Multipath: Using Double MPTCP Proxies to Enhance Transport Performance for Traditional TCP
IEEE Network: The Magazine of Global Internetworking (IEEENETW), Volume 35, Issue 5Pages 181–187https://doi.org/10.1109/MNET.112.1900648Multipath TCP (MPTCP) proxy is a way to provide multipath transmissions for current Internet hosts. However, previous works on MPTCP mainly focus on the scenario where one end of the connection is MPTCP-capable, which is not the case in current networks. ...
- research-articleApril 2020
Shared Bottleneck-Based Congestion Control and Packet Scheduling for Multipath TCP
IEEE/ACM Transactions on Networking (TON), Volume 28, Issue 2Pages 653–666https://doi.org/10.1109/TNET.2020.2970032In order to be TCP-friendly, the original Multipath TCP (MPTCP) congestion control algorithm is always restricted to gain no better throughput than a traditional single-path TCP on the best path. However, it is unable to maximize the throughput over all ...
- research-articleJanuary 2020
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities
IEEE Transactions on Information Forensics and Security (TIFS), Volume 15Pages 1318–1330https://doi.org/10.1109/TIFS.2019.2938875Smart grid adopts two-way communication and rich functionalities to gain a positive impact on the sustainability and efficiency of power usage, but on the other hand, also poses serious challenges to customers’ privacy. Existing solutions in smart ...
- short-paperAugust 2019
Measurement and Redesign of BBR-based MPTCP
SIGCOMM Posters and Demos '19: Proceedings of the ACM SIGCOMM 2019 Conference Posters and DemosPages 75–77https://doi.org/10.1145/3342280.3342312BBR is a congestion-based congestion control algorithm proposed to promote the performance of TCP. The interesting and vital question is thus: How would MPTCP perform on BBR? We first conduct extensive experimental evaluation of BBR-based MPTCP, and show ...
- research-articleApril 2019
Virtual network function placement and resource optimization in NFV and edge computing enabled networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 152, Issue CPages 12–24https://doi.org/10.1016/j.comnet.2019.01.036AbstractNetwork function virtualization (NFV) and edge computing (EC) are two promising and innovative technologies to accelerate 5G networks. However, placing the service function chains (SFC), each of which consists of a series of ordered ...
- research-articleJuly 2018
Virtual Network Function Placement Considering Resource Optimization and SFC Requests in Cloud Datacenter
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 29, Issue 7Pages 1664–1677https://doi.org/10.1109/TPDS.2018.2802518Network function virtualization (NFV) brings great conveniences and benefits for the enterprises to outsource their network functions to the cloud datacenter. In this paper, we address the virtual network function (VNF) placement problem in cloud ...
- research-articleFebruary 2018
Smooth orientation interpolation using parametric quintic-polynomial-based quaternion spline curve
Journal of Computational and Applied Mathematics (JCAM), Volume 329, Issue CPages 256–267https://doi.org/10.1016/j.cam.2017.07.007In this paper, a G2continuous quintic-polynomial-based unit quaternion interpolation spline curve with tension parameters is presented to interpolate a given sequence of solid orientations. The curve in unit quaternion space S3 is an extension of the ...
- research-articleDecember 2017
Coupled Slow-Start: Improving the Efficiency and Friendliness of MPTCP's Slow-Start
GLOBECOM 2017 - 2017 IEEE Global Communications ConferencePages 1–6https://doi.org/10.1109/GLOCOM.2017.8254446Multipath TCP (MPTCP) is designed to offer higher throughput than single-path TCP, and meanwhile MPTCP flow is fair to concurrent TCP flows at the bottleneck. Although the coupled congestion control in current MPTCP can achieve the goals by coupling ...
- research-articleDecember 2017
Energy-Efficient Scheduling and Power Allocation for Energy Harvesting-Based D2D Communication
GLOBECOM 2017 - 2017 IEEE Global Communications ConferencePages 1–6https://doi.org/10.1109/GLOCOM.2017.8254193Energy Harvesting (EH)-based Device-to-Device (D2D) communication brings some challenges in resources management due to the joint influence of the volatility of available energy and the interference between cellular and D2D users. In this paper, we focus ...
- research-articleDecember 2017
FADM: DDoS Flooding Attack Detection and Mitigation System in Software-Defined Networking
GLOBECOM 2017 - 2017 IEEE Global Communications ConferencePages 1–7https://doi.org/10.1109/GLOCOM.2017.8254023Distributed Denial-of-Service (DDoS) flooding attack is one of the most serious threats to network security. Software-Defined Networking (SDN) has recently emerged as a new network management platform, and its centralized control architecture brings many ...
- research-articleSeptember 2017
CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding
IEEE Transactions on Computers (ITCO), Volume 66, Issue 9Pages 1491–1503https://doi.org/10.1109/TC.2017.2693265Attribute-based encryption (ABE) has opened up a popular research topic in cryptography over the past few years. It can be used in various circumstances, as it provides a flexible way to conduct fine-grained data access control. Despite its great ...
- research-articleJuly 2017
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving
IEEE Transactions on Information Forensics and Security (TIFS), Volume 12, Issue 7Pages 1596–1608https://doi.org/10.1109/TIFS.2017.2675864Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are ...
- research-articleDecember 2016
LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage
2016 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOCOM.2016.7841945Data access control is a challenging issue in cloud storage. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a potential cryptographic technique to address the above issue, which is able to enforce data access control based on users' permanent ...
- research-articleDecember 2016
Energy-Aware Service Function Placement for Service Function Chaining in Data Centers
2016 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOCOM.2016.7841805Nowadays, data centers deploy a large number of servers and network devices to provide various service functions (e.g. firewalls, deep packet inspection, content caches, WAN optimizers, etc.) and sufficient network connection. Most traffic in data centers ...