Huawei Huang

Huawei Huang
Sun Yat-Sen University | SYSU · School of Software Engineering

PhD.
Associate Professor, Sun Yat-Sen University

About

84
Publications
54,517
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,886
Citations
Introduction
Huawei Huang earned his Ph.D. degree in Computer Science and Engineering from the University of Aizu, Japan, in 2016. He is currently an Associate Professor at Sun Yat-Sen University, China. His research interests include Blockchains and Distributed Computing. He has served as a research fellow of JSPS, a visiting scholar with Hong Kong Polytechnic University, a Program-specific Assistant Professor with Kyoto University, Japan. He is an IEEE senior member. Homepage: http://xintelligence.pro
Additional affiliations
April 2018 - March 2019
Kyoto University
Position
  • Program-specific Assistant Professor
May 2017 - March 2018
The Hong Kong Polytechnic University
Position
  • Researcher
October 2016 - March 2018
The University of Aizu
Position
  • PostDoc Position
Description
  • I have served a JSPS Post-Doctoral Research Fellow, on the JSPS-sponsored project titled "Joint Optimization of Routing and Protection for Software-Defined Networking". URL: https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16J07062/

Publications

Publications (84)
Preprint
Full-text available
To draw a roadmap of current research activities of the blockchain community, we first conduct a brief overview of state-of-the-art blockchain surveys published in the recent 5 years. We found that those surveys are basically studying the blockchain-based applications, such as blockchain-assisted Internet of Things (IoT), business applications, sec...
Conference Paper
Full-text available
In a large-scale sharded blockchain, transactions are processed by a number of parallel committees collaboratively. Thus, the blockchain throughput can be strongly boosted. A problem is that some groups of blockchain nodes consume large latency to form committees at the beginning of each epoch. Furthermore, the heterogeneous processing capabilities...
Conference Paper
Full-text available
Bitcoin is currently the cryptocurrency with the largest market share. Many previous studies have explored the security of Bitcoin from the perspective of blockchain mining. Especially on the double-spending attacks (DSA), some state-of-the-art studies have proposed various analytical models, aiming to understand the insights behind the double-spen...
Conference Paper
Full-text available
State-of-the-art blockchain sharding solutions, say Monoxide, can induce imbalanced transaction (TX) distributions among all blockchain shards due to their account deployment mechanisms. Imbalanced TX distributions can then cause hot shards, in which the cross-shard TXs may experience an unlimited length of confirmation latency. Thus, how to addres...
Article
This paper studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may possibly receive imbalanced transactions or even bursty-TX injection attacks. An imba...
Conference Paper
Full-text available
Federated Learning (FL) suffers from Low-quality model training in mobile edge computing, due to the dynamic environment of mobile clients. To the best of our knowledge, most FL frameworks follow the \textit{reactive} client scheduling, in which the FL parameter server selects participants according to the currently-observed state of clients. Thus,...
Preprint
Full-text available
(Please download the latest version of this survey article from arXiv: https://arxiv.org/abs/2201.03201 ) As the latest buzzword, Metaverse has attracted great attention from both industry and academia. Metaverse seamlessly integrates the real world with the virtual world and allows avatars to carry out rich activities including creation, display,...
Article
Full-text available
Decentralized Autonomous Organization (DAO) is believed to play a significant role in our future society governed in a decentralized way. In this article, we first explain the definitions and preliminaries of DAO. Then, we conduct a literature review of the existing studies of DAO published in the recent few years. Through the literature review, we...
Article
As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, the P2P and pseudonymous nature of Bitcoin make transactions on this platform very difficult to track, thus triggering the emergence of various illegal activities...
Article
Full-text available
To draw a roadmap of current research activities of the blockchain community, we first conduct a brief overview of state-of-the-art blockchain surveys published in the recent 5 years. We found that those surveys are basically studying the blockchain-based applications, such as blockchain-assisted Internet of Things (IoT), business applications, sec...
Preprint
Full-text available
Decentralized Autonomous Organization (DAO) is believed to play a significant role in our future society governed in a decentralized way. In this article, we first explain the definitions and preliminaries of DAO. Then, we conduct a literature review of the existing studies of DAO published in the recent few years. Through the literature review, we...
Article
With the advancements of wireless network transmission technology, 2D video is hard to satisfy people's requirement for multimedia. Therefore, the high-definition 3D video that can bring a whole new viewing experience is starting to enter people's vision. However, when a tremendously large number of users play 3D video, it puts enormous computation...
Chapter
Federated Learning (FL) advocates training a global model using a large-scale of distributed devices such that the collaborative model training can be benefited from the rich local datasets, while preserving the privacy of local training dataset in each participant. This is because only the training results, i.e., the updated model parameters and m...
Article
Full-text available
in fifth-generation (5G) networks and beyond, communication latency and network bandwidth will be no longer be bottlenecks to mobile users. Thus, almost every mobile device can participate in distributed learning. That is, the availability issue of distributed learning can be eliminated. However, model safety will become a challenge. This is becaus...
Conference Paper
Full-text available
Network Function Virtualization (NFV) technology is viewed as a significant component of both the fifth-generation (5G) communication networks and edge computing. In this paper, through reviewing the state-of-the-art work on applying NFV to edge computing, we identify that an urgent research challenge is to provide the proactive failure recovery me...
Chapter
Emergency communication networks (ECNs) are designed to provide reliable communications under emergent scenarios. Recently, smartphone based networks have attracted remarkable attentions on the management of ECNs. In this topic, we first review the state-of-the-art research efforts devoted to the establishment and management of smartphone based ECN...
Article
Full-text available
Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL has spawned extensive applications in IoT environment, such as intrusion detection, mobile robot localization, and location-based services. Current DFL-related machine learnin...
Conference Paper
Full-text available
In isolated network domains, the global trustworthiness (e.g., consistent network views, etc) is critical to the multiple-party business partners who aim to perform the trusted corporations depending on each isolated network view. However, to achieve such global trustworthiness over distributed network domains is a challenge. This is because when m...
Article
As urban traffic condition is diverse and complicated, applying reinforcement learning to reduce traffic congestion becomes one of the hot and promising topics. Especially, how to coordinate the traffic light controllers of multiple intersections is a key challenge for multi-agent reinforcement learning (MARL). Most existing MARL studies are based...
Article
Unmanned Aerial Vehicle (UAV) swarms are widely applied for service provisioning in many domains such as topographic mapping and traffic monitoring. These UAV applications are complicated as they demand not only huge computational resources but also strict latency requirements. However, due to the limited onboard resources of UAVs as well as variou...
Article
In MENs, the task offloading services are expected to free MUs from complex tasks, which contributes to reduce the service latency and thus improves the QoS. Although the well-proven cooperative task offloading proposals effectively address such requirements by encouraging the cooperation among MUs and edges, the QoE from MUs' perspective still rem...
Preprint
Full-text available
Federated learning has been widely studied and applied to various scenarios. In mobile computing scenarios, federated learning protects users from exposing their private data, while cooperatively training the global model for a variety of real-world applications. However, the security of federated learning is increasingly being questioned, due to t...
Preprint
Full-text available
Constructing globally distributed file systems (DFS) has received great attention. Traditional Peer-to-Peer (P2P) distributed file systems have inevitable drawbacks such as instability, lacking auditing and incentive mechanisms. Thus, Inter-Planetary File System (IPFS) and Swarm, as the representative DFSs which integrate with blockchain technologi...
Article
Recent decades have seen a significant increase in the frequency, intensity, and impact of natural disasters and other emergencies, forcing the governments around the world to make emergency response and disaster management national priorities. The growth of extremely large and complex datasets — commonly referred to as big data — and various advan...
Data
This dataset and processing-code are free to download for your experiments. The related papers are: #1. ``Machine Fault Detection for Intelligent Self-Driving Networks"; #2. ``Real-Time Fault-Detection for IIoT Facilities using GBRBM-based DNN". ------------------------------------------------------ Please feel free to download the dataset and th...
Chapter
Full-text available
In distributed networks, the consistent network views (e.g., network events, network topology, and device information, etc) are critical to the network operators and service providers who aim to perform the global network/service optimizations depending on the overall network views. However, to achieve the consensus over distributed networks is a c...
Preprint
Full-text available
Blockchain-based decentralized cryptocurrencies have drawn much attention and been widely-deployed in recent years. Bitcoin, the first application of blockchain, achieves great success and promotes more development in this field. However, Bitcoin encounters performance problems of low throughput and high transaction latency. Other cryptocurrencies...
Preprint
As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, the P2P and pseudonymous nature of Bitcoin make transactions on this platform very difficult to track, thus triggering the emergence of various illegal activities...
Preprint
Full-text available
In the fifth-generation (5G) networks and the beyond, communication latency and network bandwidth will be no more bottleneck to mobile users. Thus, almost every mobile device can participate in the distributed learning. That is, the availability issue of distributed learning can be eliminated. However, the model safety will become a challenge. This...
Article
Instead of deploying network functions on proprietary and dedicated hardware, Network Function Virtualization (NFV) enables to deploy network functions on virtual instances, such as virtual machines and containers. With the advance of 5G technologies, recent studies [1, 2] have shown that NFV has great potential to provide low-cost as well as ultra...
Article
Full-text available
To build the mechanism of a Self-Driving Network (SelfDN) is becoming an emerging direction for the future Internet of Things (IoT). The detection of device status, such as fault or normal, is a very fundamental module in SelfDN. In this article, we first review recent studies devoted to applying fault detection techniques in IoT networks. Taking t...
Article
Full-text available
Fault-detection is a fundamental requirement for industrial Internet-of-Things (IIoT), such as the process industry sammaknejad2019review. This paper first reviews recent studies focusing on applying fault-detection techniques to IIoT networks. However, we find out that numerous studies focus on resource utilization and workload allocation. The fau...
Article
Full-text available
As a critical supplementary to terrestrial communication networks, low-earth-orbit (LEO) satellite based communication networks have been gaining growing attention in recent years. In this paper, we focus on data collection from geo-distributed Internet-of-Things (IoT) networks via LEO satellites. Normally, the power supply in IoT data-gathering ga...
Article
Full-text available
Satellite-based communication technology regains much attention in the past few years, where satellites play mainly the supplementary roles as relay devices to terrestrial communication networks. Unlike previous work, we treat the low-earth-orbit (LEO) satellites as secure data storage mediums [1]. We focus on data acquisition from an LEO satellite...
Article
Full-text available
The concept of the industrial Internet of things (IIoT) is being widely applied to service provisioning in many domains, including smart healthcare, intelligent transportation, autopilot, and the smart grid. However, because of the IIoT devices' limited onboard resources, supporting resource-intensive applications, such as 3D sensing, navigation, A...
Article
(FullText-Download: https://authors.elsevier.com/c/1ZTYC4xsUrvgGQ ) Network Function Virtualization (NFV) allows to deploy network functions at low cost and high flexibility. Usually traffic needs to pass through several network functions in a particular order, which is known as network function chaining. Due to capacity limitation, one instance of...
Article
Deploying NFV technologies to the edge networks has attracted growing attention in the state-of-the-art studies. In this article, we first review the most recent work on the topic of applying NFV to edge networks. Then, we identify that an urgent research challenge is to provide proactive failure recovery (shorten as failover hereafter) mechanism f...
Article
In this article, we propose a hybrid computing model, UAV-Edge-Cloud, bringing edge/cloud computing and UAV swarm together to achieve high quality of service (QoS) guarantees. First, we design this novel hybrid computing framework to provide powerful resources to support resource-intensive applications and real-time tasks at edge networks. Next, we...
Article
Full-text available
Computation offloading is a promising solution to extend the capacity of robot swarms for computation-intensive applications because it allows robot swarms to benefit from the powerful computing resources of modern data centers. However, the existing computation-offloading approaches still face challenges: 1) multi-hop cooperative computation offlo...
Conference Paper
Full-text available
With the widely adoption of innovative Software-defined Networking (SDN) and Network Function Virtualiza-tion (NFV) technologies, wireless network management is much simplified and network resources are possibly allocated in an optimal manner. In software-defined NFV networks, when unicast session flows are required to get across multiple instances...
Article
In the last decade, network data communication has experienced a rapid growth, which has led to explosive congestion in heterogeneous networks. Moreover, the emerging industrial applications such as automatic driving put forward higher requirements on both networks and devices. On the contrary, running computation-intensive industrial applications...
Conference Paper
Full-text available
As the critical supplementary to terrestrial communication networks, the low-earth-orbit (LEO) satellite based communication networks regain growing attentions in recent few years. In this paper, we focus on data gathering for geo-distributed Internet-of-Things (IoT) networks via LEO satellites. Normally, the power supply in IoT data-gathering gate...
Article
In September 2015, the United Nations General Assembly accepted the 2030 Development Agenda, which has included 92 paragraphs, and the Paragraph 91 defined 17 sustainable development goals (SDGs) and 169 associated targets. The goal of this paper is to discover the correlations among SDGs and information and communications technologies (ICTs). This...
Article
Full-text available
Satellite-based communication technology regains much attention in the past few years, where the satellites mainly play the role as relay devices to the communication networks. In this article, we focus on the data storage leveraging the low-earth-orbit (LEO) satellite based datacenter (also called space based cloud), which has been considered as a...
Article
In the era of information, the green services of content-centric IoT are expected to offer users the better satisfaction of Quality of Experience (QoE) than that in a conventional IoT. Nevertheless, the network traffic and new demands from IoT users increase along with the promising of the content-centric computing system. Therefore, the satisfacti...
Article
In the era of big data, the applications/services of the smart city are expected to offer end users better QoE than in a conventional smart city. Nevertheless, various types of sensors will produce an increasing volume of big data along with the implementation of a smart city, where we face redundant and diverse data. Therefore, providing satisfact...
Article
Full-text available
A modern Network Function Virtualization (NFV) service is usually expressed in a service chain that contains a list of ordered network functions, each can run in one or multiple virtual machines. Although lots of efforts have been devoted to service chain deployment, the researchers normally consider a simple model of network functions where differ...
Article
Full-text available
To characterize the delivery performance of message dissemination in Disruption/Delay Tolerant Networks, a number of approaches have been proposed. However, the existing studies typically share a common simplification that the pairwise meeting rate between any two mobile nodes is exponentially distributed and supposed to be known in advance. In thi...
Article
Full-text available
Deep packet inspection (DPI) is important for network security. In this paper, we consider a software-defined network where several DPI proxy nodes are available for serving flows from ingress switches. These DPI proxy nodes can be implemented in either software or hardware. We study an integrated proxy allocation and routing determining problem wi...
Article
Full-text available
In the Service-Function-Chaining (SFC) enabled networks, various sophisticated policy-aware network functions, such as intrusion detection, access control and unified threat management, can be realized in either physical middleboxes or virtualized network function (VNF) appliances. In this paper, we study the service chaining towards the hybrid SFC...
Conference Paper
Full-text available
Software-Defined Networking (SDN) allows controlling applications to install fine-grained forwarding policies in the underlying switches. Ternary Content Addressable Memory (TCAM) enables fast lookups in hardware switches with flexible wildcard rule patterns. However, the performance of packet processing is severely constrained by the capacity of T...
Article
Full-text available
Software-Defined Networking (SDN) allows controlling applications to install fine-grained forwarding policies in the underlying switches. Ternary Content Addressable Memory (TCAM) enables fast lookups in hardware switches with flexible wildcard rule patterns. However, the performance of packet processing is severely constrained by the capacity of T...
Conference Paper
Full-text available
Cloudlet based network provides a platform to offloading the traffic workload generated by mobile devices. It can significantly reduce the access delay for mobile application users. However, the high dynamic mobility of users brings significant challenges to the service provisioning for mobile applications, especially for the delay-sensitive big da...
Article
Full-text available
Mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices. It can significantly reduce the access delay for mobile application users. However, the high user mobility brings significant challenges to the service provisioning for mobile users, especially for the delay-sensitive mobile applications...
Article
Full-text available
Ternary Content Addressable Memories (TCAMs) based flow table is a power-hungry hardware that can provide high-speed lookup operations for packet-switching networks. A number of energy-efficient TCAM usage approaches have been proposed in the recent literature, but this topic still has not been well studied in the context of traffic engineering for...
Conference Paper
Full-text available
Cloudlet provides a platform to offloading the work-load generated by mobile devices, and it can significantly decrease the access delay performance of mobile applications. Due to the mobility of mobile users, various costs (e.g., access delay and server resource consumption) exist in the service provisioning for mobile applications, such as the da...