Loading [MathJax]/extensions/MathMenu.js
Jing Wu - IEEE Xplore Author Profile

Showing 1-25 of 33 results

Filter Results

Show

Results

Metaverse has emerged as a revolutionary technique for transforming the way people interact with digital content, which relies on a distributed computing and communication infrastructure, encompassing terminal users, edge servers, and cloud servers. However, the rapid evolution of the Metaverse presents challenges that surpass the capabilities of existing communication and network infrastructures,...Show More
A distributed cloud, connecting multiple smaller and geographically distributed data centers, can provide a significant alternative to the traditional model of massive and centralized data centers. Erasure coding is a key solution for improving the efficiency of storage resources in a distributed cloud. However, current end-side based erasure coding systems require significant computing resources ...Show More
Random Linear Network Coding holds great potential for enhancing the performance of mega-constellation networks. However, its implementation brings several challenges such as complexity in matrix operations, bandwidth limitations, and increased latency. Although some CPU- and GPU-based solutions have achieved sufficient coding throughput, the gateway stations of satellites require processing rates...Show More
To provide low-latency broadband Internet globally, SpaceX, Amazon, and other companies plan to launch thousands of satellites into low Earth orbit. The proposed constellations hold great promise, but they also present new networking challenges. It is crucial that mega-constellation networks discover their topology accurately and in a timely manner. Due to the mobility of LEO satellites, it is par...Show More
Given the increasing need of avionics communications and ship electromechanical communications for reliability and real-time transmission, current scheduling schemes waste bandwidth resources. They increase delay because of the low concurrency and the inefficiency of data transmissions in FC-AE-1553 multi-level switching networks. In this study, we first analyze the characteristics of different ta...Show More
Mobile edge network has been recognized as a promising technology for future wireless communications. However, mobile edge networks usually gathering large amounts of data, which makes it difficult to explore data science efficiently. Currently, federated learning has been proposed as an appealing approach to allow users to cooperatively reap the benefits from trained participants. In this paper, ...Show More
Enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC) are two major expected services in the fifth-generation mobile communication systems (5G). Specifically, eMBB applications support extremely high data rate communications, while URLLC services aim to provide stringent latency with high reliability communications. Due to their differentiated quality-of-servic...Show More
With the rapid growth of Internet of Things (IoT), smart home develops rapidly in these years, which could assist people who need family medical support. It could integrate healthcare with ambient assisted living (AAL) technologies and provide activities of daily life (ADLs) to the people who need care. This article proposes a smart home and cross-cloud-and-edge computing-based nursing system (NS)...Show More
Internet of Drones (IoD) is a critical paradigm of future networks used for complex cooperative tasks. Due to its heterogeneity, high mobility, and exposed connectivity, it inevitably suffers from the crucial security threats of nodes failure, malicious tampering, and anonymous attacks. Specifically, federated transfer learning (FTL) and blockchain are seen as promising technologies for network se...Show More
Vehicular ad hoc network (VANET) has become an accessible technology for improving road safety and driving experience, the problems of heterogeneity and lack of resources it faces have also attracted widespread attention. With the development of software-defined networking (SDN) and multiaccess edge computing (MEC), a variety of resource allocation strategies in MEC-enabled software-defined networ...Show More
Ultra-dense low earth orbit (LEO) satellite networks (LEO-UDSNs) are becoming a foundational component of future 5G and beyond. LEO-UDSNs bring unprecedented high-speed mobility, broadband capacity, and ultra-density qualities, introducing a significant challenge to traditional user association (UA) methods. In this article, we first discuss the difficulties in sequential UA optimization for scala...Show More
With the development of data plane programmable Software-Defined Networking (SDN), Distributed Denial of Service (DDoS) attacks on the data plane increasingly become fatal. Currently, traditional attack detection methods are mainly used to detect whether a DDoS attack occurs and it is difficult to find the path that the attack flow traverses the network, which makes it difficult to accurately miti...Show More
With the development of information technology and the continuous increase of user demand, how to cope with the limitation of spectrum resources becomes a tough problem. Meanwhile, terahertz communication technology has become a key candidate technology to solve the above challenges. Taking advantage of the small propagation range and high bandwidth of terahertz, the coexistence network of millime...Show More
Blind zone is a long standing issue in microwave networks. THz communication is regarded as a promising technology in 6G era to cope with these problems due to its wide bandwidth and short transmission distances. However, THz band causes great loss of non-line-of-sight path due to its molecular absorption properties and the communication distance is limited. In order to reduce the communication bl...Show More
Traditional network traffic scheduling algorithms are difficult to accurately analyze and model. In the face of satellite networks with complex network structures, diverse transmission resources, and high dynamics, routing strategies lack flexibility. In order to reduce the possibility of network congestion in the multi-layer satellite network, a satellite network traffic scheduling algorithm base...Show More
The network security problem brought by the cloud computing has become an important issue to be dealt with in information construction. Since anomaly detection and attack detection in cloud environment need to find the vulnerability through the reverse analysis of data flow, it is of great significance to carry out the reverse analysis of unknown network protocol in the security application of clo...Show More
The Satellite-Terrestrial Integrated Network (STIN) is a new network structure that can adapt to various services. In this kind of network, the low orbit satellites could bring more comprehensive services to fast mobile terminals, and the services needed by fast mobile terminals often switch between multiple satellites. Hence, the service handoff problem of low orbit satellites has become a key po...Show More
The rapid development of internet of vehicles (IoV) has recently led to the emergence of diverse intelligent vehicular applications such as automatic driving, auto navigation, and advanced driver assistance, etc. However, the current vehicular communication framework, such as vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-roadside infrastructure (V2I), still remain challenging in...Show More
Protecting enterprise information security is a main task of Internet of Things system. The interaction between employees in same enterprise is based on level structures. So it is important to discover levels of employees for urban developers to protect enterprise information security. In this article, we propose a level discovery method for employees (LDME) from the records of employees using mob...Show More
In the naval battle circumstance, the satellite network consists of multi-controllers to form a cluster architecture. Frequent switching of the satellite network topology for ensuring consistency between the controller clusters gives rise to the excessive overhead of communication. To reduce the overhead, a new sparse method, SNS-TS (Sparse Network Snapshots based on Top-down and Sum-graphs), is p...Show More
While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks. In order to deal with the single point of failure on SDN controller caused by DDoS attacks, we propose a framework for detection and defense of DDoS attacks in the SDN environment. Firstly, we deploy a trigger mechanism of DDoS attack detection on...Show More
Large-scale data presents great challenges to data analysis due to the limited computer storage capacity and the heterogeneous data structure. In this article, we propose a distributed expectile regression model to resolve the challenges of large-scale data by designing a surrogate loss function and using the Iterative Local Alternating Direction Method of the Multipliers (IL-ADMM) algorithm, whic...Show More
The firewall service (FWaaS) is one of the key components of the cloud computing environment, it requires the ability to automatically open and flexibly adjust as needed. Current firewalls in the cloud are mainly based on static security rule configuration or simple rule matching, which makes them inflexible and cannot guarantee network security. In this paper, we propose a stateful firewall based...Show More
Within the 5G framework, the hybrid of satellite system and terrestrial system is promoted, forming a new hybrid network architecture. Handoff of heterogeneous network is becoming more important as a key to achieve the interconnection of satellite and terrestrial network and support the seamless handoff of different access modes. This paper summarizes the development prospects of satellite - terre...Show More
In the age of IoT, the heterogeneous network fusion becomes a tremendous issue, a dilemma in heterogeneous network is how to integrate the resource and allocate the multifarious services which is remarkable but seriously difficult to system-level model and quantify. Aiming at the representation of uncertainly systems design element distribution, combined with modeling and optimization, here we pro...Show More