Geyong Min

Geyong Min
  • University of Exeter

About

733
Publications
88,769
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17,966
Citations
Current institution
University of Exeter

Publications

Publications (733)
Preprint
Full-text available
The code of nature, embedded in DNA and RNA genomes since the origin of life, holds immense potential to impact both humans and ecosystems through genome modeling. Genomic Foundation Models (GFMs) have emerged as a transformative approach to decoding the genome. As GFMs scale up and reshape the landscape of AI-driven genomics, the field faces an ur...
Article
Workflow scheduling plays a critical role in optimizing completion time and throughput in distributed cloud environments, leveraging the parallelism of heterogeneous computing resources. However, existing workflow scheduling algorithms often fall short due to heuristic limitations and the challenges in adaptability within heterogeneous settings, le...
Article
Mobile Edge Computing (MEC) can accelerate computation-intensive applications and emerge as a promising technology for enabling Internet of Things (IoT). MEC improves the processing performance of tasks by assigning them to the edge nodes. However, with massive terminals contending for computation and communication resources simultaneously, how to...
Preprint
Mobile Edge Computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is hard to maintain uninterrupted and high-quality services without proper service migration among MEC servers. Existing solutions commonl...
Article
The Internet of Vehicles (IoV) significantly enhances the capabilities for road information collection and processing by enabling real-time connectivity between vehicles, infrastructure, and cloud systems. Leveraging these technological advantages, multi-vehicle collaborative real-time crack detection is expected to become a crucial method to guara...
Article
The emerging load prediction techniques support up-front and rational resource provisioning in edge systems to enhance system efficiency and Quality-of-Service (QoS). Classic prediction methods may handle loads with apparent trends, but they cannot achieve accurate prediction for highly-variable edge loads. With the advantage of sequential data ana...
Article
The growing complexity of the sixth-generation (6G) wireless networks has positioned artificial intelligence (AI) as a critical tool for radio resource management (RRM). However, the opacity of AI learning models undermines their trustworthiness, robustness, and interpretability, significantly impeding their application in network resource manageme...
Article
Anomaly traffic detection offers essential technical support for securing Mobile Edge Computing (MEC) networks. The emerging Large Model (LM) has attracted much attention for their excellent data generation and processing capabilities, but it is difficult to deploy LM-based detection models in resource-constrained MEC networks. Existing solutions u...
Article
The future 6G network will be able to connect massive and various unmanned vehicles (UxVs) into the network, bringing novel requirements toward UxV network security and data privacy. Deploying machine learning (ML)-based intrusion detection on UxVs can be one promising approach. The conventional approach can not fulfil security and privacy requirem...
Article
The rapid evolution of the Internet-of-Vehicles (IoV) has amplified the need for mobile computing resources, driving the shift toward offloading tasks to edge servers or vehicles with idle resources to optimize computational efficiency. To this end, an approach based on Deep Reinforcement Learning (DRL) is presented in this paper, termed DVTP, whic...
Article
The growth of Electric Vehicles (EVs) places an increasingly heavy burden on the limited charging infrastructure, necessitating an effective charging station recommendation strategy that assists EVs in finding the most suitable charging stations. Deep reinforcement learning is a promising technology that has been applied to optimize EVs' charging r...
Article
Machine learning has been a driving force in the evolution of tremendous computing services and applications in the past decade. Traditional learning systems rely on centralized training and inference, which poses serious privacy and security concerns. To solve this problem, distributed learning over wireless edge networks (DLWENs) emerges as a tre...
Article
Mobile Edge Computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is hard to maintain uninterrupted and high-quality services without proper service migration among MEC servers. Existing solutions commonl...
Article
With the advent of the sixth-generation (6G) wireless communications, transmission speeds are projected to exceed tenfold those of 5G, reaching theoretical peak download speeds of up to 1 Tbps. Data transmission capacity and speed will be significantly enhanced, enabling emerging applications such as mixed reality, federated learning, and digital t...
Article
Internet of Things (IoT) plays a vital role in various smart applications due to its cost-efficiency and good scalability. For safety and management of a large-scale IoT with many gateways, packet-level path reconstruction which exactly reveals the transmission path of each packet is desired. However, the existing path reconstruction schemes rely o...
Article
Recent years have witnessed the proliferation of wireless energy transfer for Wireless Sensor Networks (WSNs), which are mainly used for data gathering in real-world applications. A number of studies have investigated mobile vehicle scheduling to charge sensor nodes via wireless Mobile Chargers (MCs). Unfortunately, most of them cannot parallelly c...
Article
Full-text available
The reduction of energy consumption will be even more urgent in cloud data centers due to the explosive increase of application data. Virtual machine (VM) integration is a relatively standard technology currently applied for computing facilities of data centers. However, excessive VM consolidation can easily lead to local hot spots that lower the e...
Article
The integration of autonomous driving technologies with vehicular networks presents significant challenges in privacy preservation, communication efficiency, and resource allocation. This paper proposes a novel U-shaped split federated learning (U-SFL) framework to address these challenges on the way of realizing autonomous driving in vehicular edg...
Article
Trajectory synthesis with a series of fake locations has been deemed as a promising obfuscation technology to preserve the individual privacy of users in Location-Based Services (LBSs). However, a number of previous approaches fail to take into consideration the geographic distance and motion direction of the real locations to synthesize trajectori...
Article
Sliding window aggregation is a core operation in data stream analysis that extracts summaries from the most recent data stream. An evict or insert of the window can be handled in $O(1)$ for in-order data streams. However, real-world data streams are typically disordered due to network delays. To process out-of-order data streams, existing methods...
Article
Mobile Edge Computing (MEC) distributes resources such as computing, storage, and bandwidth to the side close to users, which can provide low-latency services to in-vehicle users, thus promising a more efficient and safer driving environment. However, due to the dynamic scale of vehicle and the variability of resource requirements, it is a signific...
Article
Network-assisted full-duplex (NAFD) cell-free (CF) massive MIMO systems enable simultaneous uplink and downlink transmissions, where interference suppression and beamforming are critical for improving spectral efficiency and system performance. However, the asymmetric time-varying properties of current network traffic, coupled with the interference...
Article
Cloud gaming represents a major part of contemporary gaming. To boost the Quality-of-Experience (QoE) of cloud gaming, the integration of Dynamic Adaptive Video Encoding (DAVE) with Multi-access Edge Computing (MEC) has become the natural candidate owing to its flexibility and reliable transmission support for real-time interactions. However, as mu...
Article
UAV swarms have attracted much attention due to their high potential to execute complex missions more robustly and effectively. Essential technologies for swarms are the family of algorithms that allow the individual agents to undertake tasks intelligently, localize their relative positions, perceive surroundings, and plan and track collision-free...
Article
Full-text available
Along with the rapid development of the fourth industrial revolution, industrial cyber-physical systems (ICPS) are anticipated to achieve precise mapping and management for the physical world by integrating digital sensing and automated control. However, the conflict between limited computing resources and extensive sampling data, combined with sev...
Article
Distributed Traffic Engineering (TE) adopts decentralized routing and offers natural merits over centralized TE in rapidly responding to dynamic network flows. However, based solely on local network observations, traditional distributed TE methods often lack sufficient routing evidence necessary for generating optimal policies. Furthermore, reinfor...
Article
Mobile Edge Computing (MEC)-enabled vehicular networks have emerged as a promising approach to enhancing the performance and efficiency of the Internet-of-Vehicles (IoV) applications. By leveraging some vehicles to act as transmission relays, multi-hop task offloading addresses the problem of intermittent connectivity between vehicles and edge serv...
Article
Cellular vehicle-to-everything (C-V2X) can provide ubiquitous mobile computing and communication services for vehicles, acting as a key technology to realize future urban intelligent transportation systems (ITS). Due to the lack of long-term insight into complex and dynamic urban road states, the existing historical road information-based strategie...
Article
Through deploying computing resources at the network edge, Mobile Edge Computing (MEC) alleviates the contradiction between the high requirements of intelligent mobile applications and the limited capacities of mobile End Devices (EDs) in smart communities. However, existing solutions of computation offloading and resource allocation commonly rely...
Article
Federated Learning (FL) has been widely used to facilitate distributed and privacy-preserving machine learning in recent years. Different from centralized training that usually has independent and identically distributed (IID) distribution of all users' data, FL suffers from significant communication cost and model performance degradation due to th...
Article
Vision-based real-time object detection has become a key fundamental service for smart-city applications such as auto-drive and digital twins. Due to the limited resource available at camera devices, edge-assisted object detection has attracted increasing research attention. The existing edge-assisted schemes often assume stable or averaged wireles...
Article
Vehicular Edge Computing (VEC) is a transportation-specific version of Mobile Edge Computing (MEC) designed for vehicular scenarios. Task offloading allows vehicles to send computational tasks to nearby Roadside Units (RSUs) in order to reduce the computation cost for the overall system. However, the state-of-the-art solutions have not fully addres...
Article
The emerging Space-Air-Ground Integrated Networks (SAGIN) empower Mobile Edge Computing (MEC) with wider communication coverage and more flexible network access. However, the fluctuating user traffic and constrained computing architecture seriously hinder the Quality-of-Service (QoS) and resource utilization in SAGIN. Existing solutions generally d...
Preprint
Full-text available
The term "Internet of Behaviors" (IoB) refers to the utilization of user behavior data to tailor experiences and interventions. It expands upon the Internet of Things (IoT) by incorporating technologies such as sensors, Artificial Intelligence (AI), and data analytics for data collection and analysis. Deep Learning (DL)-based joint offloading and r...
Article
Due to the maneuverability and cost-effectiveness, UAVs are visioned as a versatile assistant for networking in intelligent transportation systems. Per-packet path reconstruction that reveals the multi-hop forwarding path of each packet is a fundamental service for network management and optimization. Unfortunately, most existing reconstruction sch...
Article
In the digital divide regions, edge computing can improve the performance of application services for Internet of Things (IoT) devices. However, the lagging of information and communication technology (ICT) results in congested access spectrum and imbalanced computational load. Moreover, the mobility of IoT devices further exacerbates the fluctuati...
Article
Electric Vehicle-assisted Multi-access Edge Computing (EV-MEC) is a promising paradigm where EVs share their computation resources at the network edge to perform intensive computing tasks while charging. In EV-MEC, a fundamental problem is to jointly decide the charging power of EVs and computation task allocation to EVs, for meeting both the diver...
Article
Quantitative performance analysis plays a pivotal role in theoretically investigating the performance of Vehicular Edge Computing (VEC) systems. Although considerable research efforts have been devoted to VEC performance analysis, all of the existing analytical models were designed to derive the average system performance, paying insufficient atten...
Article
Multi-UAV systems rely on the communication network to exchange mission-critical data for their coordination and deployment, while communication delays could cause significant challenges to both tasks. The impact of the delays becomes even more severe if the delay, network structure and formation are all time-varying, a common challenge faced by re...
Article
Full-text available
Virtual machine (VM) consolidation strategies are widely used in cloud data centers (CDC) to optimize resource utilization and reduce total energy consumption. Although existing strategies consider current and future resource utilization, the impact of sudden bursts in historical resource utilization on the hosts has been underestimated in uncertai...
Article
The combination of 5G and edge computing has been envisioned as a promising paradigm to empower pervasive and intensive computing for the Internet-of-Things (IoT). High deployment cost is one of the major obstacles for realizing 5G edge computing. Most existing works tried to deploy the minimum number of edge servers to cover a target area by avoid...
Article
In elastic cloud service systems, it is a challenge to evaluate and match the fluctuating resource demand of workloads. Existing studies typically monitor workload characteristics and build models that map these characteristics to actual demand. However, workload characteristics are multidimensional, and the impact of each dimension on resource dem...
Article
Network Function Virtualization (NFV) introduces a new network architecture that offers different network services flexibly and dynamically in the form of Service Function Chains (SFCs), which refer to a set of Virtualization Network Functions (VNFs) chained in a specific order. However, the service latency often increases linearly with the length...
Article
A large number of distributed applications necessitate accurate network distance, for example, in the form of delay or latency, to ensure the Quality of Service (QoS). Due to high network measurement overhead and severe traffic congestion, network distance prediction has been introduced, instead of direct network measurements, to infer the unknown...
Preprint
Full-text available
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider the missing inter-client topology information in real-world scenarios, causing insufficient feature aggregation of multi-hop neighbo...
Article
Full-text available
The explosion of large-scale data has increased the scale and capacity of storage clusters in data centers, leading to huge power consumption issues. Cloud providers can effectively promote the energy efficiency of data centers by employing energy-aware data placement techniques, which primarily encompass storage cluster's power and cooling power....
Article
Full-text available
With the unprecedented scalability issues rising in vehicular edge computing (VEC), we argue in this paper that the scalability, along with the remarkable growth of demands for offloading, should be integrated into the modelling for effective offloading decision-making strategies requested by a large number of vehicles. A two-stage game-theory mode...
Article
Edge computing satisfies sudden demands of computation-intensive applications of Internet of Things (IoT) devices. Multi-hop task offloading has been a promising technology to provide edge services to areas with poor server coverage via multi-hop task forwarding. However, the existing multi-hop offloading approaches have primarily assumed that comp...
Article
One fundamental problem of content caching in edge computing is how to replace contents in edge servers with limited capacities to meet the dynamic requirements of users without knowing their preferences in advance. Recently, online deep reinforcement learning (DRL)-based caching methods have been developed to address this problem by learning an ed...
Article
As an effective technique to relieve the problem of resource constraints on mobile devices (MDs), the computation offloading utilizes powerful cloud and edge resources to process the computation-intensive tasks of mobile applications uploaded from MDs. In cloud-edge computing, the resources (e.g., cloud and edge servers) that can be accessed by mob...
Article
Federated Learning (FL) is a privacy-preserving machine learning paradigm that aims to train a global model using heterogeneous data across clients, which are typically consumer electronic devices such as smartphones, smart vehicles, and smart home appliances. As the global model may not be optimal for individual clients with unique behaviours, Per...
Article
The accurate prediction of required resources in terms of storage, computing and bandwidth is essential for 5G to host diverse services. The existing efforts illustrate that it is more promising to efficiently predict the unknown required resources with a thirdorder tensor compared to the 2D-matrix-based solutions. However, most of them fail to lev...
Article
Distributed microgrids are being deployed into our power grids to form large-scale multimicrogrid systems for utilizing growing renewable energy sources. An effective energy management strategy is fundamental to balancing energy supply and demand alongside maintaining the stability of multimicrogrid. In this article, we propose a scalable, privacy-...
Article
As a key technique for future networks, the performance of emerging multi-edge caching is often limited by inefficient collaboration among edge nodes and improper resource configuration. Meanwhile, achieving optimal cache hit rates poses substantive challenges without effectively capturing the potential relations between discrete user features and...
Article
Federated Learning (FL) stands as a privacy-preserving machine learning paradigm that enables collaborative training of a global model across multiple clients. However, the practical implementation of FL models often confronts challenges arising from data heterogeneity and limited communication resources. To address the aforementioned issues simult...
Article
This research explores a novel adaptive live video streaming transmission strategy over vehicular networks to solve the conundrum between resource-constrained environment and user demand on high Quality-of-Experience (QoE). With an exquisite design of resource types and channel variations, we propose a two-timescale transmission mechanism which all...
Article
Full-text available
Sliding window aggregation, which extracts summaries from data streams, is a core operation in streaming analysis. Though existing sliding window algorithms that perform single eviction and insertion operations can achieve a worst-case time complexity of $O(1)$ for in-order streams, real-world data streams often involve out-of-order data and exhi...
Article
In the realm of consumer electronics, the integration of knowledge graphs with causal inference significantly advances recommendation systems within the Artificial Intelligence of Things (AIoT). This paper introduces a novel method that addresses the limitations of traditional AIoT-based systems, which tend to prioritize correlation over causality...
Article
IoT devices have been widely utilized to detect state transition in the surrounding environment and transmit status updates to the base station for system operations. To guarantee the accuracy of system control, age of information (AoI) is introduced to quantify the freshness of the sensory data and meet the stringent timeliness requirement. Due to...
Article
Federated Learning (FL) has emerged as a privacy-preserving distributed Machine Learning paradigm, which collaboratively trains a shared global model across a number of end devices (clients) without exposing their raw data. However, FL typically assumes that all clients are benign and trust the coordinating central server, which is unrealistic for...
Article
Network Functions Virtualization (NFV), which decouples network functions from the underlying hardware, has been regarded as an emerging paradigm to provide flexible virtual resources for various applications through the ordered interconnection of Virtual Network Functions (VNFs), in the form of Service Function Chains (SFCs). In order to achieve t...
Article
This century has been a major avenue for revo- lutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on hu- man intervention, resulting in the fourth industrial revolution, Industry 4.0. That is why IoT has been the researcher’s arena for quite some time. With Industry 4.0 still in m...
Article
Mobile edge computing (MEC) relieves the latency and energy consumption of mobile applications by offloading computation-intensive tasks to nearby edges. In wireless metropolitan area networks (WMANs), edges can better provide computing services via advanced communication technologies. For improving the Quality-of-Service (QoS), edges need to be co...
Article
In the era of the Internet of Things (IoT), it is a promising way to improve system energy utility and better meet users’ requirements for quality of service (QoS) via integrating non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) technologies. In light of this idea, we investigate device access, sub-channel division, and transmi...
Article
Federated learning (FL) has shown its great potential for achieving distributed intelligence in privacy-sensitive IoT. However, popular FL approaches such as FedAvg and its variants share model parameters among clients during the training process and thus cause significant communication overhead in IoT. Moreover, non-independent and identically dis...
Article
In the real world, relationships between objects are often complex, involving multiple variables and modes. Hypergraph neural networks possess the capability to capture and represent such intricate relationships by deriving and inheriting their graph-based counterparts. Nevertheless, both graph and hypergraph neural networks suffer from the problem...
Article
With the explosive increase in mobile data traffic generated by various application services like video-on-demand and stringent quality of experience requirements of users, mobile edge caching is a promising paradigm to reduce delivery latency and network congestions by serving content requests locally. However, how to conduct cache replacement whe...
Article
Full-text available
Location recommendation is at the core of location-based service, while recommendation based on graph neural networks (GNNs) has recently flourished, and for location recommendation tasks, GNN-based approaches are equally applicable. To provide fair location recommendation services for multi-users, correlation information between non-adjacent locat...
Article
In Federated Learning (FL) client devices connected over the internet collaboratively train a machine learning model without sharing their private data with a central server or with other clients. The seminal Federated Averaging (FedAvg) algorithm trains a single global model by performing rounds of local training on clients followed by model avera...
Article
Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing algorithms have mainly considered simple routing metrics only, e.g., distance based on the local view of an individual vehicle. This consideration is insufficient for analysing dynamic and complica...
Article
Full-text available
Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC) in road scenarios. One key technology of VEC is task offloading, which allows vehicles to send their computation tasks to the surrounding Roadside Units (RSUs) or other vehicles for execution, thereby reducing computation delay and energy consumption. Howeve...
Article
Nowadays, face recognition technology has been dramatically boosted by the advances in deep learning and big data fields. However, this also poses grand challenges in protecting personal identity information in intelligent applications of the Internet of Things (IoT). Existing methods based on the $K$ -Same algorithm have low effectiveness for pr...
Article
Federated learning (FL) is a privacy-preserving distributed machine learning paradigm that enables collaborative training among geographically distributed and heterogeneous devices without gathering their data. Extending FL beyond the supervised learning models, federated reinforcement learning (FRL) was proposed to handle sequential decision-makin...
Article
Full-text available
With the mushrooming growth of data volumes, data replica placement plays a key role in promoting the energy efficiency and Quality-of-Service (QoS) of data-intensive data centers. The existing data placement strategies mainly focus on storage performance improvement or QoS enhancement in data centers, but ignore the indispensable factor-heat recir...
Article
The recent breakthrough in Wireless Power Transfer (WPT) provides a promising way to prolong network lifetime by employing a charging vehicle to replenish energy. Data transmissions from nodes typically happen in response to physical sensory events, leading to time-varying energy consumption. To improve charging efficiency, the existing schemes col...
Article
Full-text available
Generative adversarial networks (GANs) have been advancing and gaining tremendous interests from both academia and industry. With the development of wireless technologies, a huge amount of data generated at the network edge provides an unprecedented opportunity to develop GANs applications. However, due to the constraints such as bandwidth, privacy...
Article
With the emergence of the 5G/6G communications, edge computing has attracted increasing research interests in recent years. To provide pervasive 5G/6G edge computing services, numerous edge servers are required for service coverage, and the deployment cost can be $\gt$ 10000 times larger than the deployment cost of the 4G infrastructure. To addre...
Article
In mobile edge computing (MEC) systems, unmanned aerial vehicles (UAVs) facilitate edge service providers (ESPs) offering flexible resource provisioning with broader communication coverage and thus improving the Quality of Service (QoS). However, dynamic system states and various traffic patterns seriously hinder efficient cooperation among UAVs. E...
Article
Internet of Things (IoT) as a ubiquitous networking paradigm has been experiencing serious security and privacy challenges with the increasing data in diversified applications. Fortunately, this will be, to a great extent, alleviated with the emerging blockchain, which is a decentralized digital ledger based on cryptography and has offered potentia...
Article
Full-text available
With the rapid growth of cloud computing, frequent workload bursts show an increasing influence on the Quality of Service (QoS) and energy efficiency of cloud-based data centers. Existing virtual machine placement schemes are expected to optimize either QoS or energy efficiency for cloud data centers running under bursty workload conditions. To bri...
Article
Unmanned aerial vehicle (UAV)-assisted wireless communication systems are able to provide high-quality services and ubiquitous connectivity for massive Internet of Things (IoT) devices. In this paper, we study the Age of Information (AoI) and energy tradeoff in a system where an employed UAV performs data collection for multiple IoT nodes (INs). Be...

Network

Cited By