Jinsong Wu

Jinsong Wu
  • PhD
  • Professor (Associate) at University of Chile

About

288
Publications
87,444
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,824
Citations
Introduction
He was Founding Chair (2011-2017), IEEE Technical Committee on Green Communications and Computing (TCGCC), and founding Vice-Chair (2014-2022) of IEEE Technical Committee on Big Data (TCBD). He received 2017, 2021, 2019 IEEE Systems Journal Best Paper Awards. He received 2020 IEEE TCGCC Distinguished Technical Achievement Recognition Award, for his outstanding technical leadership and achievement in green wireless communications
Current institution
University of Chile
Current position
  • Professor (Associate)
Additional affiliations
March 2015 - present
University of Chile
Position
  • Professor (Associate)

Publications

Publications (288)
Book
Full-text available
Nowadays energy crisis and global warming problems are hanging over everyone's head, urging much research work on energy saving. In the ICT industry, which is becoming a major consumer of global energy triggered by the telecommunication network operators experiencing energy cost as a significant factor in profit calculations, researchers have start...
Article
This paper first provides a brief survey on existing traffic offloading techniques in wireless networks. Particularly as a case study, we put forwards an on-line reinforcement learning framework for the problem of traffic offloading in a stochastic heterogeneous cellular network (HCN), where the time-varying traffic in the network can be offloaded...
Article
Nowadays, there are two significant tendencies, how to process the enormous amount of data, big data, and how to deal with the green issues related to sustainability and environmental concerns. An interesting question is whether there are inherent correlations between the two tendencies in general. To answer this question, this paper firstly makes...
Article
In September 2015, the United Nations General Assembly accepted the 2030 Development Agenda, which has included 92 paragraphs, and the Paragraph 91 defined 17 sustainable development goals (SDGs) and 169 associated targets. The goal of this paper is to discover the correlations among SDGs and information and communications technologies (ICTs). This...
Conference Paper
Compared with conventional Human to Human (H2H) communications, Machine to Machine (M2M) communications have to confront much more challenges. In this paper, we focus on solutions to provide longer battery lifetime. To obtain better power saving for M2M devices, this paper proposes improved mechanisms for M2M devices, radio access networks and core...
Chapter
Exploring the intersection of transparency and security in autonomous systems, this chapter examines the dynamic landscape of industrial robots and intelligent drones. Advanced technologies such as machine learning, AI, robotics, and deep learning shape this intricate domain. As autonomous systems gain prominence across sectors, a focus lies on und...
Chapter
This chapter explores the synergistic integration of the internet of things (IoT) with robotics and drones, highlighting how this convergence is revolutionizing industrial operations and capabilities. It delves into the mechanisms through which IoT devices and sensors enhance the autonomy, efficiency, and intelligence of robotic systems and drones,...
Article
Full-text available
This paper investigates physical layer security (PLS) in wireless interference networks. Specifically, we consider confidential transmission from a legitimate transmitter (Alice) to a legitimate receiver (Bob), in the presence of non-colluding passive eavesdroppers (Eves), as well as multiple legitimate transceivers. To mitigate interference at leg...
Article
Full-text available
To enhance physical layer security (PLS) and mitigate interference at legitimate receivers, artificial noise (AN) assisted interference alignment (IA) is explored in cooperative multiple-input multiple-output (MIMO) systems. The feasibility of traditional leakage minimization (LM) based IA is analyzed. We show that there exist two drawbacks which a...
Article
With the further development of Unmanned Aerial Vehicle (UAV) technologies, research on multi-UAV formations have also received more attention. Unmanned Aerial Vehicles (UAVs) cooperate with each other to form a formation group, which can give full play to the advantages that a single UAV does not have, and more capable of working in multi-task sce...
Article
Green buildings are designed and constructed according to the principles of sustainable development and are an inevitable trend in future architectural development. Nowadays, many works have studied the application of intelligence or intelligent technology in green intelligent buildings, but there is still insufficient discussion on how to integrat...
Chapter
This chapter provides insights into the complex domain of regulatory and policy issues in artificial intelligence. It covers critical global aspects of AI regulation before diving into the thin line of innovation and ethics. First, the chapter reviews the most important international and global players and how they frame the regulatory context. Sou...
Article
With the increasing rates of interconnected Internet of Things (IoT) devices within Software-Defined Networking (SDN) environments, distributed denial of service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification methods must be developed based on the unique characteristics of SDN-suppo...
Chapter
Homomorphic encryption is like a secret code that allows us to do calculations on private information without actually seeing the details. This is super important for keeping things private while still getting useful insights. This chapter discusses how homomorphic encryption can be implemented into smart city infrastructure. Furthermore, the resea...
Article
Video understanding and content boundary detection are vital stages in video recommendation. However, previous content boundary detection methods require collecting information, including location, cast, action, and audio, and if any of these elements are missing, the results may be adversely affected. To address this issue and effectively detect t...
Article
Full-text available
Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive industry’s move towards automation and the integration of vehicles into the digital ecosystem has revolutionized wireless network communications. N...
Article
With the wide application of unmanned aerial vehicles (UAVs), performing search and rescue missions autonomously in unknown environment has become an increasingly concerning issue. In this paper, we propose an adaptive conversion speed Q-Learning algorithm (ACSQL). Performing UAV missions autonomously is divided into two stages: rescue mission sear...
Article
Full-text available
To effectively extract and classify the information from reports or documents and protect the privacy of the extracted results, we propose a privacy classification named Word Embedding Combination Privacy-preserving Support Vector Machine (WECPPSVM) model to classify the text. In addition, this paper also proposes the Privacy-preserving Distributio...
Article
With the proliferation of connected devices in the Internet of Things (IoT), cybersecurity threats have increased. Identifying malicious attacks in IoT requires advanced techniques tailored to this ecosystem. Existing algorithms have limited effectiveness in detecting obfuscated IoT malware. This study proposes the Elucidating Cybersecurity-promulg...
Article
Full-text available
The deep integration of edge computing and Artificial Intelligence (AI) in IoT (Internet of Things)-enabled smart cities has given rise to new edge AI paradigms that are more vulnerable to attacks such as data and model poisoning and evasion of attacks. This work proposes an online poisoning attack framework based on the edge AI environment of IoT-...
Article
As various software bots are widely used in open source software repositories, some drawbacks are coming to light, such as giving newcomers non-positive feedback and misleading empirical studies of software engineering researchers. Several techniques have been proposed by researchers to perform bot detection, but most of them are limited to identif...
Article
Recently, many steganalysis approaches improve their feature extraction ability through adding convolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling, which makes it challenging to extract weak steganographic signals accurately. To address this issue, this paper proposes a multi-resolution s...
Article
Full-text available
Multicast transmissions in coded wireless packet networks can be affected by uncertain factors such as the distance between nodes. We develop a robust optimization method to minimize the energy consumption of such multicasts. We therefore consider the distances to belong to closed convex uncertainty sets. As solution, we select the optimum in the w...
Article
Offloading tasks in smart devices (SDs) to an edge intelligence-empowered service centre (EISC) is a promising solution to support burgeoning intelligent applications in large-scale intelligent urban rail transits (URTs). However, dynamic computation resource allocation is still a crucial challenge, facing that various large-scale SDs share the EIS...
Article
Full-text available
With computation offloading widely used in the computation-intensive vehicular applications, vehicular edge computing (VEC) faces the resource shortage of VEC servers. In this paper, the idle resources in the parked vehicles are aggregated to process the offloaded computing tasks, and the incentive schemes are proposed to encourage the parked vehic...
Article
Full-text available
Recurrent Neural Networks (RNNs) and their variants have been demonstrated tremendous successes in modeling sequential data such as audio processing, video processing, time series analysis, and text mining. Inspired by these facts, we propose human activity recognition technique to proceed visual data via utilizing convolution neural network (CNN)...
Article
Full-text available
Context features are mostly used to determine the boundary of a target, which allows one to better locate an object. In this paper, we propose the fusion of the spatial attention mechanism and contextual features to simulate the recognition of objects based on the human eye, thereby improving the detection accuracy of detectors. We chose the PASCAL...
Article
Smart video surveillance plays a significant role in public security via storing a huge amount of continual stream data, evaluates them, and generates warns where undesirable human activities are performed. Recognition of human activities in video surveillance has faced many challenges such as optimal evaluation of human activities under growing vo...
Article
We investigate the physical layer security (PLS) in multi-user interference networks. In particular, we consider secure transmission from a legitimate source (Alice) to a legitimate destination (Bob), coexisting with multiple passive eavesdroppers (Eves), as well as multiple legitimate transceivers. By assuming that only statistical channel state i...
Article
With the explosive growth of various connected devices and the supported services, the satellite-aerial-terrestrial network (SATN) can fulfill the requirements of the increasing data traffic with enlarged coverage and enhanced capacity. In particular, utilizing multiple unmanned aerial vehicles (UAVs) as relays in SATN holds great promise for bring...
Article
Sensors in wireless sensor network (WSN) are usually deployed in the wild or even hostile circumstance. What is worse, most of the sensors have limited communication bandwidth, computation resources and energy. Therefore, it is challenging to ensure the security of WSN without decreasing its network performance. Network coding (NC) is a promising w...
Article
Full-text available
Intelligent buildings play a fundamental role in achieving efficient energy management in the building sector in many countries worldwide. Improving energy consumption within a building can represent significant financial savings and reduce carbon emissions. However, intelligent buildings may impose additional burdens and challenges in their energy...
Article
Edge computing supported vehicle networks have attracted considerable attention in recent years both from industry and academia due to their extensive applications in urban traffic control systems. We present a general overview of Artificial Intelligence (AI)-based traffic control approaches which focuses mainly on dynamic traffic control via edge...
Article
Full-text available
New Zealand government's Rural Broadband Initiative (RBI) aims to invest 400 million New Zealand dollar to provide 99% of New Zealanders with access to 50 Mbps peak broadband speed, with the remaining 1% at 10 Mbps by 2025. By 2017, stage 1 of the RBI has been completed, and research is needed to find out the level of usage, proficiency, and produc...
Article
Federated learning (FL) is a popular edge learning approach that utilizes local data and computing resources of network edge devices to train machine learning (ML) models while preserving users' privacy. Nevertheless, performing efficient learning tasks on the devices and achieving longer battery life are primary challenges faced by federated learn...
Article
Mobile edge computing (MEC) has been recognized as a viable technology to satisfy low-delay computation requirements for resource-constrained Internet of things (IoT) devices. Nevertheless, the broadcast feature of wireless electromagnetic communications may lead to the security threats to IoT devices. In order to enhance the task offloading securi...
Article
Matrix polynomial expansion (MPE) based detector incurs either complicated computation of polynomial coefficients or slow convergence in uplink large-scale multiple-input and multiple-output (LS-MIMO) systems. To solve these issues, an improved MPE (IMPE) detector is proposed, which can speed up the convergence significantly with uncomplicated poly...
Article
In vehicular edge computing (VEC), the execution of offloading task needs not only the task data uploaded by the requesting vehicle, but also the additional data to support the task to be executed successfully, and how to efficiently cache and access these supporting data becomes the key issue for task offloading in VEC. In this paper, we study the...
Article
Multi-UAV is a complete system represented by multiple unmanned aerial vehicles (UAV) through collaborative technology. Besides, the UAV group has the advantages in the number and functions that a single UAV does not have. In a complex environment, a single UAV cannot complete a large number of material transportations and escort functions. This pa...
Preprint
Full-text available
In this paper, an LSTM-aided hybrid random access scheme (LSTMH-RA) is proposed to support diverse quality of service (QoS) requirements in 6G machine-type communication (MTC) networks, where massive MTC (mMTC) devices and ultra-reliable low latency communications (URLLC) devices coexist. In the proposed LSTMH-RA scheme, mMTC devices access the net...
Article
Full-text available
Vehicular Edge Computing (VEC) is a new paradigm which improves the quality of service (QoS) of vehicular applications. However, in VEC networks, the computation resources of each VEC server are limited, and there are mismatches between the resources requested by vehicles and the resources that can be allocated by VEC servers, which increase the de...
Article
The satellite–terrestrial integrated network (STIN) has been envisioned as an emerging architecture to provide global anytime anywhere network access, and satisfy transmission requirements of high-capacity backhaul data. However, the integration of satellite and terrestrial networks will aggravate the diversity of base stations (BSs) in backhaul de...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) are widely used in many fields, such as regular marine monitoring and disaster warning. However, UWSNs are still subject to various limitations and challenges: ocean interferences and noises are high, bandwidths are narrow, and propagation delays are high. Sensor batteries have limited energy and are diff...
Article
The combination of wireless energy transfer (WET) and mobile edge computing (MEC) has been proposed to satisfy the energy supply and computation requirements of resource-constrained Internet of Things (IoT) devices. However, the energy transfer efficiency and task offloading rate cannot be guaranteed when wireless links between the hybrid access po...
Article
Recent years have witnessed considerable progress in the application of Internet of Things (IoT) technology in smart transportation systems. The wider presence of Wi-Fi networks in subway gates allows passengers to use the Quick Response (QR) code of mobile phone applications for entrance. The network established by gates has become a medium which...
Article
Mobile-edge computing (MEC) is a promising technology, which allows reducing latency and energy consumption, thereby making the user experience better. Although MEC can support various types of services, differentiated Quality-of-Service (QoS) requirements bring difficulties and challenges to the allocation of radio resources and computing resource...
Article
Full-text available
Fog computing is a new computing paradigm for meeting ubiquitous massive access and latency-critical applications by moving the processing capability closer to end users. The geographical distribution/floating features with potential autonomy requirements introduce new challenges to the traditional methodology of network access control. In this pap...
Article
Full-text available
Residing in the proximity of end devices, edge computing (EC) holds great potential to provide low-latency, energy-efficient, and secure services, which has become an essential part of the Industrial Internet of Things (IIoT). To future accelerate task processing and reduce service latency, this work proposes an online incentive-driven task allocat...
Article
Full-text available
Advanced communication and information technologies enable smart grids to be more intelligent and automated, although many security issues are emerging. Security situational awareness (SSA) has been envisioned as a potential approach to provide safe services for power systems’ operation. However, in the power cloud master station mode, massive hete...
Article
Rescue assignments strategy are crucial for multiple Autonomous Underwater Vehicle (multi-AUV) systems in three dimensional (3-D) complex underwater environments. Considering the requirements of rescue missions, multi-AUV systems need to be cost-effective, fast-rescuing, and less concerned about the relationship between rescue missions. The real-ti...
Article
Full-text available
Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we propose a new vehicle edge computing framework based on software defined networks, which introduces the reputation to measure the contribution...
Article
This Editorial has been withdrawn as it has been accidentally submitted twice. The Publisher apologizes for any inconvenience this may cause. The full Elsevier Policy on Article Withdrawal can be found at https://www.elsevier.com/about/our-business/policies/article-withdrawal.
Article
Space-aerial-assisted computation offloading has been recognized as a promising technique to provide ubiquitous computing services for remote Internet of Things (IoT) applications, such as forest fire monitoring and disaster rescue. This article considers a space-aerial-assisted mixed cloud-edge computing framework, where the flying unmanned aerial...
Article
In this article, we present a wireless powered mobile-edge computing system consisting of a hybrid access point and multiple cooperative fogs, where the users in each cooperative fog can share communication and computation resources to improve their computation performance. Based on the classic time-division-multiple-access protocol, we propose a h...
Article
Currently, there is a very large volume of Covid-19 related medical data that have been stored in cloud based systems and made available for studing the disease dynamics. without any privacy-preservation. In order to reduce possible privacy leakage and also accommodate massive medical reports with high efficiencies, we proposed a privacy preserving...
Conference Paper
It is foreseeable the popularity of the mobile edge computing enabled infrastructure for wireless networks in the incoming fifth generation (5G) and future sixth generation (6G) wireless networks. Especially after a 'hard' disaster such as earthquakes or a 'soft' disaster such as COVID-19 pandemic, the existing telecommunication infrastructure, inc...
Article
Full-text available
Available charging information exchanges between mobile electric vehicles (EVs) and charging stations are significantly critical in spatio-temporal coordinated charging services introduced by smart girds. In this paper, we propose an efficient information transmission strategy for intelligent charging navigations of enormous moving EVs in large-sca...
Article
The satellite–terrestrial integrated networks (STINs) have gradually become a new class of effective ways to satisfy the requirements of a higher capacity and stronger connection in the future communications. In contrast with terrestrial networks, the fast periodic motion of satellites results in the dynamic time-varying features of STIN, which fur...
Article
Full-text available
In this paper, we propose intelligent reflecting surfaces (IRS) assisted secure wireless communications with multi-input and multi-output antennas (IRS-MIMOME). The considered scenario is an access point (AP) equipped with multiple antennas communicates with a multi-antenna enabled legitimate user in the downlink at the present of an eavesdropper c...
Article
Word of Mouth Mode (WoM), as a new mode of task sensing in crowdsourcing, shows high efficiency in building contributor groups. To better tap the potential of WoM mobile crowdsourcing, the underlying rationale of interactions among contributors needs to be well understood. In this paper, we analyse the behaviour of contributors based on Stackelberg...
Article
Full-text available
The edge-based computing paradigm (ECP) becomes one of the most innovative modes of processing distributed Interneit of Things (IoT) sensor data. However, the edge nodes in ECP are usually resource-constrained. When more services are executed on an edge node, the resources required by these services may exceed the edge node’s, so as to fail to main...
Article
Full-text available
Pull Request (PR) is a major contributor to external developers of open-source projects in GitHub. PR reviewing is an important part of open-source software developments to ensure the quality of project. Recommending suitable candidates of reviewer to the new PRs will make the PR reviewing more efficient. However, there is not a mechanism of automa...
Article
As a promising new paradigm, Vehicular Edge Computing (VEC) can improve the QoS of vehicular applications by computation offloading. However, with more and more computation-intensive vehicular applications, VEC servers face the challenges of limited resources. In this paper, we study how to effectively and economically utilize the idle resources in...
Article
The explosive growth of wireless devices motivates the development of the internet-of-things (IoT), which is capable of interconnecting massive and diverse "things" via wireless communications. This is also called massive machine type communications (mMTC) as a part of the undergoing fifth generation (5G) mobile networks. It is envisioned that more...
Conference Paper
This paper proposes a battery discharge emulator to simulate the discharge behavior of a commercial Li-ion battery. The emulator is based on a power electronics circuit that allows the ripple levels of its voltage output to be reduced. A system based on three-phase interleaved DC-DC boost converter in combination with an electric equivalent circuit...
Preprint
In this paper, we propose intelligent reflecting surfaces (IRS) assisted secure wireless communications with multi-input and multi-output antennas (IRS-MIMOME). The considered scenario is an access point (AP) equipped with multiple antennas communicates with a multi-antenna enabled legitimate user in the downlink at the present of an eavesdropper c...
Article
Full-text available
We investigate the energy-efficient channel estimation in wireless networks, where one pilot is inserted for every several data slots to estimate the channel coefficients. Both the channel state information estimation error and the time-varying model are considered. We first formulate the energy-efficient channel estimation problem into a mixed int...
Book
Full-text available
The book “Green, Energy-Efficient and Sustainable Networks” represents a collection of 18 high-quality papers published as a Special Issue of Sensors. The published papers are self-contained peer-reviewed scientific works corresponding to the work of more than 80 authors from academia and industry. Among the published papers, there is one editorial...
Article
The papers in this special section examines the deployment of Big Data and artificial intelligence for network technologies. The eneration of huge amounts of data, called big data, is creating the need for efficient tools to manage those data. Artificial intelligence (AI) has become the powerful tool in dealing with big data with recent breakthroug...
Article
The articles in this special section focus on situation awareness in intelligent human-computer interaction for critical decision making (HCI). HCI is recognized as an ctive field that focuses on the various interactions of human with machines. The HCI has been widely applied in multiple domains, such as artificial intelligence, computer vision, im...
Article
Full-text available
The past decade has witnessed the rapid advancements of geological data analysis techniques, which facilitates the development of modern agricultural systems. However, there remains some technical challenges that should be addressed to fully exploit the potential of those geological big data, while gathering massive amounts of data in this applicat...
Article
Full-text available
A direct vehicle-to-vehicle (V2V) charging scheme supplies flexible and fast energy exchange way for electric vehicles (EVs) without the supports of charging stations. Main technical challenges in cooperative V2V charging may include the efficient charging navigation structure designs with low communication loads and computational complexities, the...
Article
In this paper, a convolution neural network (CNN) enhanced radio frequency fingerprinting (RFF) authentication scheme is presented for Internet of things. RFF is a non-cryptographic authentication technology, identifies devices through the waveforms of the RF transient signals by processing received RF signals on the edge server, which places no co...

Questions

Question (1)
Question
1. Are there relations important and profound?
2. How could people work towards relations?
3. How long those efforts would take?

Network

Cited By