Loading [MathJax]/extensions/MathZoom.js
Zhuocheng Xu - IEEE Xplore Author Profile

Showing 1-4 of 4 results

Filter Results

Show

Results

Contact tracing, as an effective method to slow the spread of epidemics, is traditionally performed with manual surveys on positive cases to acquire information about close contacts, which induces an unbearably long tracing duration. In this paper, we propose a cloud-edge computing-aided contact tracing system where multi-access edge computing (MEC) servers are introduced to collaborate with the c...Show More
Zero-trust architecture (ZTA) has been viewed as a powerful security framework to deal with the increasingly complex network environment and connection exposure in high-risk environments. Since the standard ZTA was established in 2020, a large amount of research works have been carried out on ZTA. However, the centralized ZTA established by companies such as Huawei has the problem of single point ...Show More
Edge computing has been viewed as a powerful technology to realize the vision of network services. However, due to the limited capabilities and insufficient security systems, edge computing is vulnerable to distributed denial of service (DDoS) attacks which may exhaust the resources of edge servers with excessive requests and degrade their service capabilities. Setting detection thresholds for DDo...Show More
The study of wireless channel propagation characteristics is important to channel availability analysis and wireless network optimization. The existing deterministic channel models are greatly restricted by the high complexity. This paper proposes a deep learning (DL) method for path loss (PL) prediction in mobile communication systems, which uses satellite images and neural network (NN) to achiev...Show More