Chen Junliang

Chen Junliang
Shantou University | STU · colleage of science

master

About

257
Publications
39,768
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,319
Citations

Publications

Publications (257)
Article
The local parts of the target are vitally important for robust object tracking. Nevertheless, existing excellent context regression methods involving siamese networks and discrimination correlation filters mostly represent the target appearance from the holistic model, showing high sensitivity in scenarios with partial occlusion and drastic appeara...
Article
The fine-grained prediction of traffic anomalies is crucial for Traffic Management Bureau to alleviate congestion and avoid public safety incidents. While in practice, the fine-grained prediction is very challenging due to two issues. 1) Data sparsity . At the fine-grained setting, missing data is inevitable and widespread on spatial and temporal...
Article
Network function virtualization (NFV) is a promising technology that decouples network functions from hardware. Connecting virtual network functions (VNFs) in series to form a service function chain (SFC) can flexibly orchestrate and expand network functions. However, there are higher availability requirements for SFCs. This paper aims to solve the...
Article
The emergence of edge computing and 5G networks has fueled the growth of mobile Web AR. Although efforts have been made to improve the edge system efficiency for Web AR applications, efficient edge-assisted mobile Web AR services remain technically challenging. This paper presents EARNet, a distributed edge system orchestration approach for mobile...
Article
Security is critical to networks, but TCP/IP-based legacy networks are difficult to advance new security functions due to the use of costly inflexible hardware devices and error-prone network configurations. Recent literature explores the paradigm of consolidating security services with the forwarding functionality using Software-defined Networki...
Article
Sensors have been playing an increasingly important role in smart cities. Using small roadside magnetic sensors provides a cost-efficient method for monitoring vehicle traffic. However, there are significant challenges associated with vehicle data misalignment due to the timing-offsets between sensors and missed or increased data because of vehicle...
Article
Nowadays, network softwareization is an emerging techno-economic transformation trend that significantly impacts how enterprises deploy their network services. As an essential technology in this trend, Network Function Virtualization (NFV) enables scalable and inexpensive network services by flexibly instantiating Virtualized Network Functions (VNF...
Article
Network Function Virtualization (NFV) is a promising paradigm that separates network functions from proprietary devices. Network service in NFV-enabled networks is achieved as a Service Function Chain (SFC), consisting of a series of ordered Virtual Network Functions (VNFs). However, migration of VNFs for more flexible services within dynamic netwo...
Article
Context-aware QoS management is a new research field dealing with methods by which traditional QoS management algorithms in mobile and fixed networking systems can have more intelligent decision-making mechanisms by fully exploiting all context information being available in their network environment. Motivated by addressing the critical problem, w...
Article
Since the advent of network function virtualization (NFV), cloud service providers (CSPs) can implement traditional dedicated network devices as software and flexibly instantiate network functions (NFs) on common off-the-shelf servers. NFV technology enables CSPs to deploy their NFs to a cloud data center in the form of virtual network functions (V...
Article
With the evolution of web technologies, various services have become available in a pervasive network environment. Combining simple atomic services into sophisticated applications with a quality-of-service (QoS) guarantee has become a widely studied problem. Given the increasing number of QoS attributes to be considered, conventional service compos...
Article
Network Function Virtualization (NFV) brings flexible provisioning and great convenience for enterprises outsource their network functions to the Data Center Networks (DCNs). Network service in NFV is deployed as a Service Function Chain (SFC), which includes an ordered set of Virtual Network Functions (VNFs). However, in one SFC, the SFC delay inc...
Article
Software-Defined Networking (SDN) is becoming prevalently in recent years. Practical SDN (e.g., production Software-defined Wide Area Network) deployments leverage multiple commercial controllers, which partitions the network into multiple domains, and each domain uses a dedicated controller. Commercial controllers are usually used for reliability...
Article
Enabling deep learning technology on the mobile web can improve user's experience for achieving web artificial intelligence in various fields. However, heavy DNN models and limited computing resource of the mobile web are now unable to support executing computationally intensive DNNs when deploying in a cloud computing platform. With the help of pr...
Article
Combining image segmentation with web technology lays a good foundation for lightweight, cross-platform and pervasive Web AI applications, and further improves the capability of Web of Things (WoT) applications. However, no matter whether we use a WebRTC media server for advanced processing that views camera inputs as a video stream, or transfer co...
Article
Recently, following the rapid commercial deployment of 5G networks, next-generation mobile communication technology (6G) has been attracting increasing attention from global researchers and engineers. 6G is envisioned as a distributed, decentralized, and intelligent innovative network. However, existing application provisioning is still based on a...
Article
Both siamese network and correlation filter (CF)-based trackers have exhibited superior performance by formulating tracking as a similarity measure problem, where a similarity map is learned by the correlation between a target template and a region of interest (ROI) with a cosine window. Nevertheless, this window function is usually fixed for vario...
Article
Scientific workflow scheduling is one of the most challenging problems in cloud computing because of the large-scale computing tasks and massive data volumes involved. A cloud system is a distributed system that follows the on-demand resource provisioning and pay-per-use billing model. Therefore, practical scheduling approaches are essential for go...
Preprint
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the reserved area used for avoiding data loss, and...
Article
Dynamic Voltage and Frequency Scaling, and Adaptive Body Biasing are increasingly adopted hardware techniques to improve energy efficiency of multi-core servers by adjusting reconfigurable supply and body bias voltages. Existing algorithms cannot fulfill the potential of the techniques because random variations of workload and background traffic ca...
Article
Nowadays Telecom service providers are seeking new paradigms of service creation and execution platform to reduce new services' time to market and increase profitability. However, the existing static services orchestration approaches cannot meet the dynamic complicated business demands. This paper proposes a hybrid service orchestration platform fo...
Article
Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the “reserved area” used for avoiding data loss, a...
Article
Both siamese network and correlation filter (CF) based trackers have recently achieved superior performance in tracking scenarios with various challenging factors. For the challenging scale variations, most of these state-of-the-art trackers usually employ multiple patches with different bounding boxes to estimate the target size. However, these pa...
Article
Content-Centric Networking (CCN) employs a completely different request/response pull communication model of Interest/Content packets and provides the pervasive in-network caching. Although this communication model effectively satisfy most of the popular static Web content requests, it may bring some new challenges for the dynamic Web request servi...
Article
For deploying a traditional centralized business process to distributed systems, how to properly partition the process is a key issue. If closely related sub-process fragments are assigned into many different servers, the frequent interactions of the sub-processes will result in large server communication costs. However, most of the current works i...
Article
Full-text available
With the progress of web technologies, web services with abundant functionalities, such as video transmission, location, navigation, etc., are becoming more and more pervasive. Automatic web service composition aims to automatically combine selected elementary web services from a finite service set by matching the input and output parameters given...
Article
Full-text available
The rapid progress of the mobile internet has been promoting the popularity of mobile devices, and mobile application development is getting more pervasive. However, the state of the art development environments has a high learning barrier for users' lack of programming experience. In this paper, instead of traditional programming environments, we...
Conference Paper
Network security is of paramount importance. However, "legacy" networks fail to provide security mechanisms to protect the network. Recent years have seen the prevalent in Software-defined Networking (SDN), and its programmability simplifies network management and provides possibilities to enhance security. Unfortunately, the full SDN deployment is...
Article
Cloud and fog computing are two emerging Internet-based collaborative technologies for big data analytics. An interesting question arising is whether the two technologies can resonate with significant gains of energy efficiency, especially in the case where advanced cloud platforms with Dynamic Voltage and Frequency Scaling (DVFS) are considered. T...
Article
Full-text available
The popularity of wearable devices and smartphones has fueled the development of Mobile Augmented Reality (MAR), which provides immersive experiences over the real world using techniques, such as computer vision and deep learning. However, the hardware-specific MAR is costly and heavy, and the App-based MAR requires an additional download and insta...
Article
As a named data-based clean-slate future Internet architecture, Content-Centric Networking (CCN) uses entirely different protocols and communication patterns from the host-to-host IP network. In CCN, communication is wholly driven by the data consumer. Consumers must send Interest packets with the content name and not by the host's network address....
Conference Paper
Full-text available
With the explosive growth of large scale services, traditional mobile networks have become increasingly unable to guarantee the efficient operation of services. However in the fifth generation (5G), supported by Software Defined Network (SDN) and Network Function Virtualization (NFV), network slicing technology [1] makes mobile networks more intell...
Article
Full-text available
Mobile augmented reality (Mobile AR) is gaining increasing attention from both academia and industry. Hardware-based Mobile AR and App-based Mobile AR are the two dominant platforms for Mobile AR applications. However, hardware-based Mobile AR implementation is known to be costly and lacks flexibility, while the App-based one requires additional do...
Article
Full-text available
The publish/subscribe paradigm provides a loosely-coupled and scalable communication model for large-scale IoT service systems, such as supervisory control and data acquisition (SCADA). Data confidentiality and service privacy are two crucial security issues for the publish/subscribe model deployed in different domains. Existing access control sche...
Article
Full-text available
The ever changing traffic and Quality-of-Service (QoS) requirements of different traffic classes in multimedia applications impose tremendous challenges to the routing algorithm design. To address these challenges, a novel priority-based dynamic multi-path routing algorithm (PDMR) over Software Defined Network (SDN) is proposed in this paper. PDMR...
Article
Full-text available
The concept of the Internet of Things (IoT) is an important part of the next generation of information. Wireless sensor networks are composed of independent distributed smart sensor nodes and gateways. These discrete sensors constantly gather external physical information, such as temperature, sound, and vibration. Owing to the diversity of sensor...
Article
Particle filter algorithms are a very important branch for visual object tracking in the past decades, showing strong robustness to challenging scenarios with partial occlusion and large-scale variations. However, since a large number of particles need to be extracted for the accurate target state estimation, their tracking efficiency typically suf...
Article
Full-text available
Android platform is increasingly targeted by attackers due to its popularity and openness. Traditional defenses to malware are largely reliant on expert analysis to design the discriminative features manually, which are easy to bypass with the use of sophisticated detection avoidance techniques. Therefore, more effective and easy-to-use approaches...
Conference Paper
With the advances in wireless communication and the growing popularity of mobile devices, it has become rather normal to watch videos using mobile devices. However, there are severely challenges to using video codec on mobile devices, because: 1) insufficient computing resources, there is poor performance using mobile device ; 2) the limited batter...
Conference Paper
Full-text available
With the emergency of IoT, there are many IoT network slices with different network requirements. Most of the current IoT system are specific and non-programmable and therefore their slices are difficult to reuse. It is difficult to meet different QoS requirements especially in IoT system because there are plenty of IoT sensors in IoT system. In th...
Article
Named Data Networking (NDN) is a promising future network architecture. It greatly facilitates static Web content distribution due to its information-centric communication paradigm, novel in-network caching, and name-based routing features. However, NDN still lacks efficient support for dynamic Web applications. Specifically, the inefficient commun...
Article
Full-text available
The rapid development of Internet of Things (IoT) attracts growing attention from both industry and academia. IoT seamlessly connects the real world and cyberspace via various business process applications hosted on the IoT devices, especially on smart sensors. Due to the discrete distribution and complex sensing environment, multiple coordination...
Article
Full-text available
With the rapid development of the Android platform, numerous applications (apps) are developed to provide new or enhanced services using resources on mobile devices. On the one hand, these apps can bring convenience for users in context which has little privacy risk. On the other hand, misuse of these resources by apps may result in privacy leakage...
Article
The concurrent presence of different types of traffic in multimedia applications might aggravate a burden on the underlying data network, which is bound to affect the transmission quality of the specified traffic. Recently, several proposals for fulfilling the quality of service (QoS) guarantees have been presented. However, they can only support c...
Article
Full-text available
Particle-filter-based methods have made significant contributions to achieving robust visual tracking over the past few years. Although these tracking algorithms achieve superior performance, their real-time application has typically been hindered by the high computational burden attributed to the sampling process of the particle filter. In this pa...
Article
Web services, as an effective realization technology of SOA, have been deployed largely on the Internet. Comparing with the traditional Web pages, the information island problem existing in Web services field is more serious. Web services with specific functions not only submerge in the Web services library, but also submerge in the traditional Web...
Article
As more and more mobile smart devices (MSDs) are equipped with multiple wireless network interfaces (e.g. WiFi, cellular, etc.), MultiPath TCP (MPTCP) can enable MSDs to send data over several interfaces or paths and can achieve better throughput and robust data transfers. MPTCP thus attracts an increasing interest from both academia and industry....
Article
Full-text available
At present, most mainstream workflow systems adopt client/server architecture where the workflow system server (WSS) runs on a server in a fixed network or cloud and the workflow system client (WSC) runs on a PC or a mobile smart device (MSD), such as a smartphone. However, in special circumstances (e.g., battlefields, earthquakes, tsunamis and flo...
Article
Full-text available
To make experiments more convenient and then quickly deploy theoretical research results to practical systems, e.g. porting Multipath TCP (MPTCP) to Android, or testing real network protocols or network applications in real mobile operating systems (MOS) in mobile networks, we propose and design High Fidelity Experiment Platform for Mobile Networks...
Article
Cloud-assisted video streaming has emerged as a new paradigm to optimize multimedia content distribution over the Internet. This article investigates the problem of streaming cloud-assisted real-time video to multiple destinations (e.g., cloud video conferencing, multi-player cloud gaming, etc.) over lossy communication networks. The user diversity...
Article
Full-text available
With the rapid development of Intelligent Transportation System, automotive vehicles have become increasingly popular. Correspondingly, automotive aftermarket becomes significant substantially. However, it still faces a strong limitation: inappropriate services (such as vehicles rescue and mechanical help) are supported to drivers if there are any...
Article
With the development of medical sensors and IoT, personalized service assisted elder and patient living is a critical service in IoT-based healthcare application. However, the scale and complexity of personalized service is increasing because of ubiquitous deployment of various kinds of medical sensors, which cause response time increase and resour...
Conference Paper
The rapid development of mobile internet attracts end-users to creating mobile applications. The traditional development process cannot meet their needs. In this paper, we present a cross-platform mobile development environment, EasyApp. It provides a highly-integrated, UI-friendly and easily-operating environment. The architecture of this environm...
Conference Paper
With the rapid growth of cloud computing and mobile computing, it is commonplace for users to request cloud services from mobile devices. Mobile edge clouds (MECs) allow the users to access the cloud services seamlessly. Although cloudlets provide a promising technique to reduce the service access latency, how to place the data-intensive service in...
Article
With the growing popularity of data-intensive services on the Internet, the traditional process-centric model for business process meets challenges due to the lack of abilities to describe data semantics and dependencies, resulting in the inflexibility of the design and implement for the processes. This paper proposes a novel data-aware business pr...
Article
Full-text available
The Internet of Things (IoT) infrastructure with numerous diverse physical devices are growing up rapidly, which need a dynamic services coordination approach that can integrate those heterogeneous physical devices into the context-aware IoT infrastructure. This paper proposes a situation-aware dynamic IoT services coordination approach. First, foc...
Article
Full-text available
As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users’ requirements or replacing the...
Article
Full-text available
Modern Internet of Things (IoT)-aware business processes include various geographically dispersed sensor devices. Large amounts of raw data acquired from sensors need to be regularly transmitted to the targeted processes in enterprise data centers, resulting in a significant increase in network load and latency. It is necessary to execute such proc...
Article
When modelling secure business processes, business analysts firstly specify security constraints and compliance properties that design-time processes should satisfy. Thus, it is a critical task to check whether the process model under security constraints complies with prospective security compliance properties. For some special tasks within a proc...
Article
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP (AliPay)...