Jinsong Wu

Jinsong Wu
University of Chile · Departamento de Ingeniería Eléctrica

PhD

About

240
Publications
66,623
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,661
Citations
Introduction
Jinsong Wu was Founding Chair of IEEE Technical Committee on Green Communications and Computing (TCGCC), is founding Vice-Chair of IEEE Technical Committee on Big Data (TCBD), is Vice-Chair, Technical Activities, IEEE Environmental Engineering Initiative. He received 2017, 2021, 2019 IEEE Systems Journal Best Paper Awards. He received 2020 IEEE TCGCC Distinguished Technical Achievement Recognition Award, for his outstanding technical leadership and achievement in green wireless communications
Additional affiliations
March 2015 - present
University of Chile
Position
  • Professor (Associate)

Publications

Publications (240)
Book
Full-text available
Nowadays energy crisis and global warming problems are hanging over everyone's head, urging much research work on energy saving. In the ICT industry, which is becoming a major consumer of global energy triggered by the telecommunication network operators experiencing energy cost as a significant factor in profit calculations, researchers have start...
Article
This paper first provides a brief survey on existing traffic offloading techniques in wireless networks. Particularly as a case study, we put forwards an on-line reinforcement learning framework for the problem of traffic offloading in a stochastic heterogeneous cellular network (HCN), where the time-varying traffic in the network can be offloaded...
Article
Nowadays, there are two significant tendencies, how to process the enormous amount of data, big data, and how to deal with the green issues related to sustainability and environmental concerns. An interesting question is whether there are inherent correlations between the two tendencies in general. To answer this question, this paper firstly makes...
Article
In September 2015, the United Nations General Assembly accepted the 2030 Development Agenda, which has included 92 paragraphs, and the Paragraph 91 defined 17 sustainable development goals (SDGs) and 169 associated targets. The goal of this paper is to discover the correlations among SDGs and information and communications technologies (ICTs). This...
Conference Paper
Compared with conventional Human to Human (H2H) communications, Machine to Machine (M2M) communications have to confront much more challenges. In this paper, we focus on solutions to provide longer battery lifetime. To obtain better power saving for M2M devices, this paper proposes improved mechanisms for M2M devices, radio access networks and core...
Article
Full-text available
Intelligent buildings play a fundamental role in achieving efficient energy management in the building sector in many countries worldwide. Improving energy consumption within a building can represent significant financial savings and reduce carbon emissions. However, intelligent buildings may impose additional burdens and challenges in their energy...
Article
Mobile edge computing (MEC) has been recognized as a viable technology to satisfy low-delay computation requirements for resource-constrained Internet of things (IoT) devices. Nevertheless, the broadcast feature of wireless electromagnetic communications may lead to the security threats to IoT devices. In order to enhance the task offloading securi...
Article
Multi-UAV is a complete system represented by multiple unmanned aerial vehicles (UAV) through collaborative technology. Besides, the UAV group has the advantages in the number and functions that a single UAV does not have. In a complex environment, a single UAV cannot complete a large number of material transportations and escort functions. This pa...
Preprint
Full-text available
In this paper, an LSTM-aided hybrid random access scheme (LSTMH-RA) is proposed to support diverse quality of service (QoS) requirements in 6G machine-type communication (MTC) networks, where massive MTC (mMTC) devices and ultra-reliable low latency communications (URLLC) devices coexist. In the proposed LSTMH-RA scheme, mMTC devices access the net...
Article
Full-text available
Vehicular Edge Computing (VEC) is a new paradigm which improves the quality of service (QoS) of vehicular applications. However, in VEC networks, the computation resources of each VEC server are limited, and there are mismatches between the resources requested by vehicles and the resources that can be allocated by VEC servers, which increase the de...
Article
The satellite–terrestrial integrated network (STIN) has been envisioned as an emerging architecture to provide global anytime anywhere network access, and satisfy transmission requirements of high-capacity backhaul data. However, the integration of satellite and terrestrial networks will aggravate the diversity of base stations (BSs) in backhaul de...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) are widely used in many fields, such as regular marine monitoring and disaster warning. However, UWSNs are still subject to various limitations and challenges: ocean interferences and noises are high, bandwidths are narrow, and propagation delays are high. Sensor batteries have limited energy and are diff...
Article
The combination of wireless energy transfer (WET) and mobile edge computing (MEC) has been proposed to satisfy the energy supply and computation requirements of resource-constrained Internet of Things (IoT) devices. However, the energy transfer efficiency and task offloading rate cannot be guaranteed when wireless links between the hybrid access po...
Article
Recent years have witnessed considerable progress in the application of Internet of Things (IoT) technology in smart transportation systems. The wider presence of Wi-Fi networks in subway gates allows passengers to use the Quick Response (QR) code of mobile phone applications for entrance. The network established by gates has become a medium which...
Article
Mobile-edge computing (MEC) is a promising technology, which allows reducing latency and energy consumption, thereby making the user experience better. Although MEC can support various types of services, differentiated Quality-of-Service (QoS) requirements bring difficulties and challenges to the allocation of radio resources and computing resource...
Article
Full-text available
Fog computing is a new computing paradigm for meeting ubiquitous massive access and latency-critical applications by moving the processing capability closer to end users. The geographical distribution/floating features with potential autonomy requirements introduce new challenges to the traditional methodology of network access control. In this pap...
Article
Full-text available
Residing in the proximity of end devices, edge computing (EC) holds great potential to provide low-latency, energy-efficient, and secure services, which has become an essential part of the Industrial Internet of Things (IIoT). To future accelerate task processing and reduce service latency, this work proposes an online incentive-driven task allocat...
Article
Full-text available
Advanced communication and information technologies enable smart grids to be more intelligent and automated, although many security issues are emerging. Security situational awareness (SSA) has been envisioned as a potential approach to provide safe services for power systems’ operation. However, in the power cloud master station mode, massive hete...
Article
Rescue assignments strategy are crucial for multiple Autonomous Underwater Vehicle (multi-AUV) systems in three dimensional (3-D) complex underwater environments. Considering the requirements of rescue missions, multi-AUV systems need to be cost-effective, fast-rescuing, and less concerned about the relationship between rescue missions. The real-ti...
Article
Full-text available
Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we propose a new vehicle edge computing framework based on software defined networks, which introduces the reputation to measure the contribution...
Article
This Editorial has been withdrawn as it has been accidentally submitted twice. The Publisher apologizes for any inconvenience this may cause. The full Elsevier Policy on Article Withdrawal can be found at https://www.elsevier.com/about/our-business/policies/article-withdrawal.
Article
Space-aerial-assisted computation offloading has been recognized as a promising technique to provide ubiquitous computing services for remote Internet of Things (IoT) applications, such as forest fire monitoring and disaster rescue. This article considers a space-aerial-assisted mixed cloud-edge computing framework, where the flying unmanned aerial...
Article
In this article, we present a wireless powered mobile-edge computing system consisting of a hybrid access point and multiple cooperative fogs, where the users in each cooperative fog can share communication and computation resources to improve their computation performance. Based on the classic time-division-multiple-access protocol, we propose a h...
Article
Currently, there is a very large volume of Covid-19 related medical data that have been stored in cloud based systems and made available for studing the disease dynamics. without any privacy-preservation. In order to reduce possible privacy leakage and also accommodate massive medical reports with high efficiencies, we proposed a privacy preserving...
Conference Paper
It is foreseeable the popularity of the mobile edge computing enabled infrastructure for wireless networks in the incoming fifth generation (5G) and future sixth generation (6G) wireless networks. Especially after a 'hard' disaster such as earthquakes or a 'soft' disaster such as COVID-19 pandemic, the existing telecommunication infrastructure, inc...
Article
Full-text available
Available charging information exchanges between mobile electric vehicles (EVs) and charging stations are significantly critical in spatio-temporal coordinated charging services introduced by smart girds. In this paper, we propose an efficient information transmission strategy for intelligent charging navigations of enormous moving EVs in large-sca...
Article
The satellite–terrestrial integrated networks (STINs) have gradually become a new class of effective ways to satisfy the requirements of a higher capacity and stronger connection in the future communications. In contrast with terrestrial networks, the fast periodic motion of satellites results in the dynamic time-varying features of STIN, which fur...
Article
In this paper, we propose intelligent reflecting surfaces (IRS) assisted secure wireless communications with multi-input and multi-output antennas (IRS-MIMOME). The considered scenario is an access point (AP) equipped with multiple antennas communicates with a multi-antenna enabled legitimate user in the downlink at the present of an eavesdropper c...
Article
Word of Mouth Mode (WoM), as a new mode of task sensing in crowdsourcing, shows high efficiency in building contributor groups. To better tap the potential of WoM mobile crowdsourcing, the underlying rationale of interactions among contributors needs to be well understood. In this paper, we analyse the behaviour of contributors based on Stackelberg...
Article
Full-text available
The edge-based computing paradigm (ECP) becomes one of the most innovative modes of processing distributed Interneit of Things (IoT) sensor data. However, the edge nodes in ECP are usually resource-constrained. When more services are executed on an edge node, the resources required by these services may exceed the edge node’s, so as to fail to main...
Article
Full-text available
Pull Request (PR) is a major contributor to external developers of open-source projects in GitHub. PR reviewing is an important part of open-source software developments to ensure the quality of project. Recommending suitable candidates of reviewer to the new PRs will make the PR reviewing more efficient. However, there is not a mechanism of automa...
Article
As a promising new paradigm, Vehicular Edge Computing (VEC) can improve the QoS of vehicular applications by computation offloading. However, with more and more computation-intensive vehicular applications, VEC servers face the challenges of limited resources. In this paper, we study how to effectively and economically utilize the idle resources in...
Article
The explosive growth of wireless devices motivates the development of the internet-of-things (IoT), which is capable of interconnecting massive and diverse "things" via wireless communications. This is also called massive machine type communications (mMTC) as a part of the undergoing fifth generation (5G) mobile networks. It is envisioned that more...
Conference Paper
This paper proposes a battery discharge emulator to simulate the discharge behavior of a commercial Li-ion battery. The emulator is based on a power electronics circuit that allows the ripple levels of its voltage output to be reduced. A system based on three-phase interleaved DC-DC boost converter in combination with an electric equivalent circuit...
Preprint
In this paper, we propose intelligent reflecting surfaces (IRS) assisted secure wireless communications with multi-input and multi-output antennas (IRS-MIMOME). The considered scenario is an access point (AP) equipped with multiple antennas communicates with a multi-antenna enabled legitimate user in the downlink at the present of an eavesdropper c...
Article
Full-text available
We investigate the energy-efficient channel estimation in wireless networks, where one pilot is inserted for every several data slots to estimate the channel coefficients. Both the channel state information estimation error and the time-varying model are considered. We first formulate the energy-efficient channel estimation problem into a mixed int...
Book
Full-text available
The book “Green, Energy-Efficient and Sustainable Networks” represents a collection of 18 high-quality papers published as a Special Issue of Sensors. The published papers are self-contained peer-reviewed scientific works corresponding to the work of more than 80 authors from academia and industry. Among the published papers, there is one editorial...
Article
The papers in this special section examines the deployment of Big Data and artificial intelligence for network technologies. The eneration of huge amounts of data, called big data, is creating the need for efficient tools to manage those data. Artificial intelligence (AI) has become the powerful tool in dealing with big data with recent breakthroug...
Article
The articles in this special section focus on situation awareness in intelligent human-computer interaction for critical decision making (HCI). HCI is recognized as an ctive field that focuses on the various interactions of human with machines. The HCI has been widely applied in multiple domains, such as artificial intelligence, computer vision, im...
Article
Full-text available
The past decade has witnessed the rapid advancements of geological data analysis techniques, which facilitates the development of modern agricultural systems. However, there remains some technical challenges that should be addressed to fully exploit the potential of those geological big data, while gathering massive amounts of data in this applicat...
Article
Full-text available
A direct vehicle-to-vehicle (V2V) charging scheme supplies flexible and fast energy exchange way for electric vehicles (EVs) without the supports of charging stations. Main technical challenges in cooperative V2V charging may include the efficient charging navigation structure designs with low communication loads and computational complexities, the...
Article
In this paper, a convolution neural network (CNN) enhanced radio frequency fingerprinting (RFF) authentication scheme is presented for Internet of things. RFF is a non-cryptographic authentication technology, identifies devices through the waveforms of the RF transient signals by processing received RF signals on the edge server, which places no co...
Article
Full-text available
Although information and communications technologies (ICTs) have the potential of enabling powerful social, economic and environmental benefits, ICT systems give a non-negligible contribution to world electricity consumption and carbon dioxide (CO2) footprint. This contribution will sustain since the increased demand for user′s connectivity and an...
Article
Radio frequency fingerprinting (RFF) is a lightweight access authentication method for the mobile terminal nodes. The classification accuracy of RFF is effectively improved by machine learning, of which the performance is deeply enhanced with the increasing training data. Data augmentation is the most frequently used method to get additional data a...
Article
Spiking neural networks have been widely used for supervised pattern recognition exploring the underlying spatio-temporal correlation. Meanwhile, spatio-temporal correlation manifests significantly between different components in a smart grid making the spiking neural network a desirable candidate for false data injection attack detection. In this...
Article
Full-text available
In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication scheme which exploits channel state information (CSI) to enhance the security of MEC system via detecting spoofing attacks in wireless networks. Moreover, three gradient...
Article
Full-text available
The relationship of friends in social networks can be strong or weak. Some research works have shown that a close relationship between friends conducts good community structure. Based on this result, we propose an effective method in detecting community structure in social networks based on the closeness of relations among neighbors. This method ca...
Article
Full-text available
In nature ecosystems, animal life-spans are determined by genes and some other biological characteristics. Similarly, the software project life-spans are related to some internal or external characteristics. Analyzing the relations between these characteristics and the project life-span, may help developers, investors, and contributors to control t...
Article
Full-text available
While the number of things is growing accompanied with an explosive increase in wireless traffic, network providers are facing a set of challenges, especially that the massive number of devices are expected to communicate over the current cellular networks. In an attempt to relieve network congestion and increase throughput, we turn toward cell shr...
Article
Full-text available
Currently, we have witnessed the rapid development of data‐driven machine learning methods, which have achieved very effective results in communication systems. Kernel learning is a typical nonlinear learning method in the machine learning community. This article proposes two novel correntropy‐based kernel learning algorithms to improve the accurac...
Article
Full-text available
Traditionally, cellular spectrum is allocated to operators (OPs) through auctions, as ideal mechanisms to discover market prices and allocate scarce resources. Even though spectrum is indeed scarce in sub-6 GHz bands, it becomes abundant in millimeter-wave (mmWave) bands. Interestingly, in that context it is base station (BS) density which is the l...