Chih-Yu Wang

Chih-Yu Wang
  • Ph.D
  • Fellow at Academia Sinica

About

88
Publications
9,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,284
Citations
Current institution
Academia Sinica
Current position
  • Fellow
Additional affiliations
August 2012 - July 2013
Academia Sinica
Position
  • Research Assistant
April 2011 - March 2012
University of Maryland, College Park
Position
  • Visiting Student
September 2007 - June 2013
National Taiwan University
Position
  • PhD Student
Education
September 2007 - June 2013
National Taiwan University
Field of study
  • Communication Engineering
September 2003 - July 2007
National Taiwan University
Field of study
  • Electrical Engineering

Publications

Publications (88)
Conference Paper
Full-text available
The Discontinuous Reception (DRX) plays a vitalrole in user equipment (UE) power saving with a tradeoff ofadditional latency. Heterogeneous UEs may have specific DRXparameters that best suit their communication and hardwarerequirements. As 3GPP improved the signaling process of UEassistance information, UE can now send requests for theirpreferred D...
Article
With the advances of machine learning, edge computing, and wireless communications, split inference has tracked more and more attention as a versatile inference paradigm. Split inference is essential to accelerate large-scale deep neural network (DNN) inference on resource-limited edge devices through partitioning a DNN between the edge device and...
Article
Full-text available
Distributed Denial-of-Service (DDoS) attack is critical to latency-critical systems such as Multi-Access Edge Computing (MEC) as it significantly increases the response delay of the victim service. An intrusion prevention system (IPS) is a promising solution to defend against such attacks. Still, there will be a trade-off between IPS deployment and...
Article
Full-text available
Federated learning (FL) emerges to mitigate the privacy concerns in machine learning-based services and applications, and personalized federated learning (PFL) evolves to alleviate the issue of data heterogeneity. However, FL and PFL usually rest on two assumptions: the users' data is well-labeled, or the personalized goals align with sufficient lo...
Article
Reconfigurable intelligent surface (RIS) is a revolutionary passive radio technique to facilitate capacity enhancement beyond the current massive multiple-input multiple-output (MIMO) transmission. However, the potential hardware impairment (HWI) of the RIS usually causes inevitable performance degradation and the amplification of imperfect CSI. Th...
Article
Mobile/multi-access edge computing (MEC) is developed to support the upcoming AI-aware mobile services, which require low latency and intensive computation resources at the edge of the network. One of the most challenging issues in MEC is service provision with mobility consideration. It has been known that the offloading decision and resource allo...
Article
Beam-based wireless power transfer and Fog/edge computing are promising dual technologies for realizing wireless powered Fog computing networks to support the upcoming B5G/6G IoT applications, which require latency-aware and intensive computing, with a limited energy supply. In such systems, IoT devices can either offload their computing tasks to t...
Article
Full-text available
Competitive influence maximization (CIM) is a key problem that seeks highly influential users to maximize the party’s reward than the competitor. Heuristic and game theory-based approaches are proposed to tackle the CIM problem. However, these approaches consider a selection of key influential users at the first round after knowing the competitor’s...
Article
Vehicle-to-everything (V2X) communication is one of the key technologies of 5G New Radio to support emerging applications such as autonomous driving. Due to the high density of vehicles, Remote Radio Heads (RRHs) will be deployed as Road Side Units to support V2X. Nevertheless, activation of all RRHs during low-traffic off-peak hours may cause ener...
Article
Mobile Edge Computing (MEC) is a promising technique in the 5G Era to improve the Quality of Experience (QoE) for online video streaming due to its ability to reduce the backhaul transmission by caching certain content. However, it still takes effort to address the user association and video quality selection problem under the limited resource of M...
Article
Mobile live video streaming is expected to become mainstream in the fifth generation (5G) mobile networks. To boost the Quality of Experience (QoE) of streaming services, the integration of Scalable Video Coding (SVC) with Mobile Edge Computing (MEC) becomes a natural candidate due to its scalability and the reliable transmission supports for real-...
Article
Mobile Edge Computing (MEC) is a promising paradigm to ease the computation burden of Internet-of-Things (IoT) devices by leveraging computing capabilities at the network edge. With the yearning needs for resource provision from IoT devices, the queueing delay at the edge nodes not only poses a colossal impediment to achieving satisfactory quality...
Article
Live video streaming has become one of the key applications in mobile wireless networks. To offload the bandwidth requirement in both backhaul and radio access networks, the integration of Mobile Edge Computing (MEC) and multicasting have become a natural candidate. However, less attention has been paid to the user Quality of Experience-driven (QoE...
Article
With the rapid development of deep learning technology, the modern internet-of-things (IoT) cameras have very high demands on communication, computing, and memory resources so as to achieve low latency and high accuracy live video analytics. Thanks to mobile edge computing (MEC), intelligent offloading to the MEC nodes can bring a lot of benefits,...
Article
Full-duplex techniques improve spectral efficiency in cellular networks by allowing a transceiver to simultaneously transmit and receive data with the same radio resource. To minimize self-interference and inter-node interference due to the deployment of full-duplex radio, users have to feed back their measurements of interference to allow the base...
Article
To meet the needs of many IoT applications with low-latency requirement, fog computing has been proposed for next-generation mobile networks to migrate the computing from the cloud to the edge of the network. In this paper, we study the fog computing service deployment problem, where the operator allocates and deploys the required computing and net...
Article
The live video streaming services have been suffered from the limited backhaul capacity of the cellular core network and occasional congestions due to the cloud-based architecture. Mobile Edge Computing (MEC) brings the services from the centralized cloud to nearby network edge to improve the Quality of Experience (QoE) of cloud services, such as l...
Article
Vehicular fog computing (VFC) is a promising approach to provide ultra-low-latency service to vehicles and end users by extending the fog computing to conventional vehicular networks. Parked vehicle assistance (PVA), as a critical technique in VFC, can be integrated with smart parking in order to exploit its full potentials. In this paper, we propo...
Article
Full-text available
Time plays a critical role in competitive influence maximization. Companies aim to promote their products before certain events, such as Christmas Eve or music concerts, to gain more benefit under competitions from other companies. Besides, these companies have a limited budget to spend on these product promotions. Therefore, in this work, we exami...
Article
Full-text available
Mobile social networks (MSNs) enable users to discover and share contents with each other, especially at ephemeral events such as exhibitions and conferences where users could be strangers. Nevertheless, the incentive of users to actively share their contents in MSNs may be lacking if the corresponding cost is high. Besides, as users in MSN share c...
Article
With the large expected demand of wireless communication, Device-to-Device (D2D) communication has been proposed as a promising technology to enhance network performance. Nevertheless, the selfish nature of potential D2D users may impale the performance of D2D-enabled network. In this paper, we propose a D2D-enabled cellular network framework, whic...
Article
Deal selection on Groupon is a typical social learning and decision making process, where the quality of a deal is usually unknown to the customers. The customers must acquire this knowledge through social learning from other social medias such as reviews on Yelp. Additionally, the quality of a deal depends on both the state of the vendor and decis...
Article
Most existing or currently developing IoT communication standards are based on the assumption that IoT services only require low data rate transmission and therefore can be supported by limited resources such as narrow-band channels. This assumption rules out those IoT services with burst traffic, critical missions, and low latency requirements. In...
Chapter
Improving capacity and coverage is one of the main issues in next-generation wireless communication. Heterogeneous networks (HetNets), which is currently investigated in LTE-Advanced standard, is a promising solution to enhance capacity and eliminate coverage holes in a cost-efficient manner. A HetNet is composed of existing macrocells and various...
Conference Paper
Most existing or developing IoT communication standards are based on the assumption that IoT services only require low data rate transmission and therefore can be supported by limited resources such as narrow-band channels. This assumption rules out those IoT services with burst traffic, critical tasks, and low latency requirements. In this paper,...
Article
Agents in networks often encounter circumstances requiring them to make decisions. Nevertheless, the effectiveness of the decisions may be uncertain due to the unknown system state and the uncontrollable externality. The uncertainty can be eliminated through learning from information sources, such as user-generated contents or revealed actions. Nev...
Article
Carrier aggregation is introduced in LTE-Advanced to aggregate multiple bands of spectrum into a virtual carrier. User equipment (UE) with carrier aggregation capability can increase peak data rates by transmitting through an aggregated virtual carrier that provides greater transmission bandwidth. Nevertheless, further study is needed to determine...
Article
Device-to-device (D2D) communication could improve the efficiency of resource utilization in cellular networks by allowing nearby devices to communicate directly with each other. Nevertheless, one main challenge in D2D communication is resource allocation. We observed that the transmission quality in D2D communications can be significantly improved...
Conference Paper
Full-text available
Agents in a network often face situations requiring them to make decisions without sufficient information. In such situations, they may postpone their decisions in order to observe and collect more information through learning from other agents. In this paper, we discuss the advantages of the postponement strategy from a game- theoretic perspective...
Article
With the increasing ubiquity and power of mobile devices as well as the prevalence of social systems, more activities in our daily life are being recorded, tracked, and shared, creating the notion of social media. Such abundant and still growing real-life data, known as big data, provide a tremendous research opportunity in many fields. To analyze,...
Article
Device-to-device (D2D) communication has been proposed to improve the resource efficiency and lighten the heavy load of the base station (BS) in Long-Term Evolution (LTE)-Advanced systems. In a D2D-enabled LTE-A system, the resource efficiency is primarily determined by D2D/cellular mode selection and resource allocation. However, the D2D channel q...
Article
In cognitive radio networks, secondary users (SUs) are allowed to opportunistically exploit the licensed channels. Once finding the spectrum holes, SUs need to share the available licensed channels. Therefore, one of the critical challenges for fully utilizing the spectrum resources is how the SUs obtain accurate information about the primary users...
Conference Paper
Since uplink (UL) and downlink (DL) traffic loads are time-variant in femtocells, it is essential to adopt dynamic time-division duplexing (TDD) to effectively adjust the uplink and downlink transmission resources. However, the cross-link interference between dynamic TDD femtocells decreases the throughput gain of dynamic TDD. In this paper, we prop...
Article
Heterogeneous multimedia content delivery over wireless networks is an important yet challenging issue. One of the challenges is maintaining the quality of service due to scarce resources in wireless communications and heavy loadings from heterogeneous demands. A promising solution is combining multicasting and scalable video coding (SVC) technique...
Chapter
Improving capacity and coverage is one of the main issues in next-generation wireless communication. Heterogeneous networks (HetNets), which is currently investigated in LTE-Advanced standard, is a promising solution to enhance capacity and eliminate coverage holes in a cost-efficient manner. A HetNet is composed of existing macrocells and various...
Article
An overlay macrocell-femtocell system aims to increase the system capacity with a low-cost infrastructure. To construct such an infrastructure, we need to solve some existing problems. First, there is a tradeoff between femtocell coverage and overall system throughput, which we defined as the cell-breathing phenomenon. In light of this, we propose...
Conference Paper
D2D communication has been proposed as a transmission approach to improve the resource efficiency and lighten the heavy load of the base station(BS) in LTE-Advanced system. In D2D communication, resource efficiency is seriously influenced by the resource allocation scheme. Additionally, the selfish behaviors of user equipment(UE), such as Unknown C...
Conference Paper
The privacy issue of online social networks (OSNs) has been getting attention from the public, especially when data privacy has caused the disagreement between users and OSN providers. While the providers utilize users' data as a commercial usage to make profit; on the other hand, users feel their privacy has been violated by such behavior. In this...
Article
Full-text available
Users in a social network are usually confronted with decision making under uncertain network state. While there are some works in the social learning literature on how to construct belief on an uncertain network state, few study has been made on integrating learning with decision making for the scenario where users are uncertain about the network...
Article
Full-text available
Network service acquisition in a wireless environment requires the selection of a wireless access network. A key problem in wireless access network selection is to study the rational strategy considering the negative network externality, i.e, the influence of subsequent users' decisions on an individual's throughput due to the limited available res...
Article
Full-text available
Download Citation Email Print Request Permissions Save to Project Most service providers offer an unlimited data service plan under a flat, fixed-rate contract to meet the huge demand. However, because service quality and user experience can vary dramatically in wireless communications, such a contract design is unable to provide equal service qua...
Conference Paper
Full-text available
Heterogeneous multimedia content delivery over wireless networks is an important yet challenging issue. A promis-ing solution is combining multicasting and scalable video coding (SVC) techniques via cross-layer design which has been shown to be effectively solution in the literature. Nevertheless, most existing works on SVC multicasting system focu...
Conference Paper
Full-text available
With the foreseeable large scale deployment of electric vehicles (EVs) and the development of vehicle-to-grid (V2G) technologies, it is possible to provide ancillary services to the power grid in a cost efficient way, i.e., through the bidirectional power flow of EVs. A key issue in such kind of schemes is how to stimulate a large number of EVs to...
Conference Paper
Full-text available
In a cognitive radio network with mobility, secondary users can arrive at and leave the primary users' licensed networks at any time. After arrival, secondary users are confronted with channel access under the uncertain primary channel state. On one hand, they have to estimate the channel state, i.e., the primary users' activities, through performi...
Article
Full-text available
In a social network, agents are intelligent and have the capability to make decisions to maximize their utilities. They can either make wise decisions by taking advantages of other agents' experiences through learning, or make decisions earlier to avoid competitions from huge crowds. Both these two effects, social learning and negative network exte...
Article
Full-text available
In this letter, by introducing the strategic decision making into the Chinese restaurant process, we propose a new game, called Chinese Restaurant Game, as a new general framework for analyzing the individual decision problem in a network with negative network externality. Our analysis shows that a balance in utilities among the customers in the ga...
Conference Paper
Full-text available
In cognitive radio networks, secondary users (SUs) are allowed to opportunistically exploit the licensed channels by sensing primary users' (PUs) activities. Once finding the spectrum holes, SUs generally need to share the available licensed channels. Therefore, one of the critical challenges for fully utilizing the spectrum resources is how the SU...
Conference Paper
Full-text available
With the foreseeable large scale deployment of electric vehicles (EVs) and the development of vehicle-to-grid (V2G) technologies, it is possible to provide ancillary services to the power grid in a cost efficient way, i.e., through the bidirectional power flow of EVs. A key issue in such kind of schemes is how to stimulate a large number of EVs to...
Article
Full-text available
In Part I of this two-part paper [1], we proposed a new game, called Chinese restaurant game, to analyze the social learning problem with negative network externality. The best responses of agents in the Chinese restaurant game with imperfect signals are constructed through a recursive method, and the influence of both learning and network external...
Article
Full-text available
In a social network, agents are intelligent and have the capability to make decisions to maximize their utilities. They can either make wise decisions by taking advantages of other agents' experiences through learning, or make decisions earlier to avoid competitions from huge crowds. Both these two effects, social learning and negative network exte...
Article
The emergence of online social network platforms enable users to exchange and diffuse information in a more complex way. Different from being just a relay as in traditional diffusion systems, online social network users can even append their ideas on the original message and share to other people when they decide to join the diffusion process. As a...
Conference Paper
Full-text available
Multi-player online gaming is one of the most popular applications on the Internet nowadays. Due to the mobility requirements and the growing popularity of WiFi services, a significant number of users access the Internet through IEEE 802.11 Wireless LAN. Hence, the performance of highly interactive real-time online game under wireless environment i...
Article
Full-text available
Due to people's eagerness for interactions with others, online social network has been one of the most popular Internet services in the world. However, the most frustrating element is the overwhelming information users facing while using these applications on social networks. In this work, we investigate the effect of overloaded information on user...
Article
Full-text available
High-throughput data traffic has gained prominence in the mobile telecommunications. But the service quality is never a grantee due to the nature of wireless communication. This not only degrades the utility of customers but also reduces the revenue of service provider. To overcome such predicament, the overlay macrocell-femtocell system is introdu...
Article
Full-text available
Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord Peer-to-Peer (P2P) overlay could be applied. Most P2P protocols, including Chord, are designed for wired-line network, and might perform poorly in mobile networks. Mobile Chord (MChord) is p...
Article
Full-text available
The femtocell system is an efficient solution to increase the wireless systems coverage. However, femtocells may experience spatially diverse interferences. A proper exchange on the channels between femtocells can improve the transmission experience. We proposed game-theoretical DANCE mechanism to derive the optimal allocation in the femtocell chan...
Conference Paper
Full-text available
Game theory has been applied to model power control in wireless systems for years. Conventional power con- trol games tend to consider unlimited backlogged user traffic. Different from the conventional methodology, this paper aims to investigate limited backlogged data traffic and construct a game-theoretic model tackling both one-shot and repeated...
Article
Full-text available
The IEEE 802.11-based WiFi wireless technology is one of the most promising technologies to provide ubiquitous networking access. The IEEE 802.11 working group has always strived to improve this wireless technology through creating new amendments to the base 802.11 standard. Recently, IEEE 802.11n amendment was created to enhance 802.11 for higher...
Conference Paper
Full-text available
Chord is a popular structured peer-to-peer (P2P) protocol. To provide P2P application service on vehicular wireless networks, chord overlay on vehicular ad hoc network (VANET) is applied. Most P2P protocols, including Chord, are designed for wired-line network, and might perform poorly in mobile networks. We propose Mobile Chord (MChord) enhancemen...
Article
Full-text available
Cognitive Radio provides enhanced wireless communication performance through context-aware sensing and adaptation. Cooperative relay enhances network connection quality and improved system throughput. Applying cooperative relay communication technique on Cognitive Radio networks enables Cognitive Radio to opportunistically exploit cooperation betwe...
Conference Paper
Full-text available
Interference in unlicensed band is a severe problem due to sharing of the limited spectrum resource and uncoordinated power transmission of wireless access points. To solve this problem, we aim for minimizing interference among Access Points'coverage while preserving throughput fairness. We investigate this problem by modelling the spectrum sharing...

Network

Cited By