About
186
Publications
60,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,562
Citations
Introduction
Additional affiliations
March 2014 - June 2015
January 2010 - March 2015
Publications
Publications (186)
Within the field of human-computer interaction, data gloves play an essential role in establishing a connection between virtual and physical environments for the realization of digital human. To enhance the credibility of human-virtual hand interactions, we aim to develop a system incorporating a data glove-embedded technology. Our proposed system...
Within the field of human–computer interaction, data gloves play an essential role in establishing a connection between virtual and physical environments for the realization of digital human. To enhance the credibility of human‐virtual hand interactions, we aim to develop a system incorporating a data glove‐embedded technology. Our proposed system...
Internet of Things (IoT) with edge computing capability enhances efficiency, availability and improves latency of an industrial automation system. However, to provide dynamic services at the resource-constrained edge device, reconfiguration of services is necessary. This paper proposes a programmable edge network to (re)configure different services...
In the Industrial Internet of Things (IIoT), a significant amount of perceived data is generated from massive IoT devices, which requires timely computing for value maximization. Multi-access edge computing (MEC), which deploys computing nodes close to the data source, is a promising computing paradigm for IIoT applications. However, due to the lim...
Industrial Internet of Things (IIoT) generates a massive of mixed traffic, which shares the same bottlenecked network resource. The burst of flows having heavy-tailed property imposes a challenge in provisioning stringent quality of services (QoS) to light-tailed flows and fair QoS among flows. Furthermore, the flows following the same tail distrib...
The growing development of the Internet of Things (IoT) is accelerating the emergence and growth of new IoT services and applications, which will result in massive amounts of data being generated, transmitted and processed in wireless communication networks. Mobile Edge Computing (MEC) is a desired paradigm to timely process the data from IoT for v...
paper title "A Joint Filter and Spectrum Shifting Architecture for Low Complexity Flexible UFMC in 5G" - Page 4 corrected typos
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers’ efficiency to a great extent as it detects the threat on a pas...
With the growing popularity of immersive interaction applications, e.g., industrial teleoperation and remote-surgery, the service demand of communication network is switching from packet delivery to remote control-based communication. The Tactile Internet (TI) is a promising paradigm of remote control-based wireless communication service, which ena...
The IEEE 802.15.4 standard is one of the widely adopted specifications for realizing different applications of the Internet of Things. It defines several physical layer options and Medium Access Control (MAC) sub-layer for devices with low-power operating at low data rates. As devices implementing this standard are primarily battery-powered, minimi...
The core objective of the Wireless Sensor Networks (WSNs) in livestock industry is monitoring the state and activities of different animals for their well-being. Being energy-constrained, the consumption of these tiny devices needs to be optimized. Several techniques have been developed for making clusters in WSNs. The sensor nodes attached to the...
In recent days, due to the emergence of communicable infectious diseases, healthcare, and medical technologies are expected to play a critical role. The advancement of communication and sensor network technologies has accelerated mass screening systems to combat the disease. Human temperature detection is one of the measurements for crowd screening...
Existing object detection algorithms rely excessively on instance-level labels, which are both time-consuming and expensive. In particular, for remote sensing images (RSI) with small and dense objects, the labeling cost is much higher than that of general images. Moreover, the propagation process of the labels over the noisy channel results in blur...
Average-consensus protocol is one of the ways to develop distributed time-synchronization algorithms in Internet of Things (IoT) networks. However, the large number of iteration leads to a common time notion issue in nodes. This poses a critical challenge in the convergence of the time-synchronization algorithm and resulting asymptotic convergence...
This special section solicits original research and practical contributions which advance the security and privacy of federated learning solutions for industrial IoT applications.
Internet of Things (IoT) with edge computation enhances efficiency, safety, and availability of an industrial automation system. However, there is a continued effort to increase the reliability of the system with minimal downtime. This can be achieved through a modular, re-configurable, and integrable system design approach. In this paper, we propo...
Internet of Things (IoT) with edge computation enhances efficiency, safety, and availability of an industrial automation system. However, there is a continued effort to increase the reliability of the system with minimal downtime. This can be achieved through a modular, re-configurable, and integrable system design approach. In this paper, we propo...
Multiple object tracking (MOT) has gained increasing attention due to its academic and commercial interests in computer vision tasks. Most of the existing state-of-the-art MOT methods consider the tracking-by-detection (TBD) framework, which localizes the pedestrian in each frame and connects these object hypotheses into the trajectories without an...
In this paper, we study the deadline-aware task data offloading in edge-cloud computing systems. The hard-deadline tasks strictly demand to be processed within their delay deadline, whereas the deadline can be relaxed for the soft-deadline tasks. Generally, edge computing aims to shorten the transmission delay between the remote cloud and the end-u...
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
Semantic segmentation of remote sensing images (RSI) plays a significant role in urban management and land cover classification. Due to the richer spatial information in the RSI, existing convolutional neural network (CNN)-based methods cannot segment images accurately and lose some edge information of objects. In addition, recent studies have show...
With the emergence of multi-view data, many multi-view clustering methods have been developed due to the effectiveness of exploiting the complementary information of multi-view data. However, most existing multi-view clustering methods have the following two drawbacks: (1) they usually explore the relationships between samples in the original space...
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edg...
The IEEE 802.15.4 standard is one of the widely adopted networking specification for realizing different applications of Internet of Things (IoT). It defines several physical layer options and Medium Access Control (MAC) sub-layer protocols for low-power devices supporting low-data rates. One such MAC protocol is the Deterministic and Synchronous M...
Multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) cellular network is promising for supporting massive connectivity. This paper exploits low-latency machine learning in the MIMO-NOMA uplink transmission environment, where a substantial amount of data must be uploaded from multiple data sources to a one-hop away edge server f...
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time,...
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time,...
The Internet of Things (IoT) technology has been widely introduced to the existing medical system. An eHealth system based on IoT devices has gained widespread popularity. In this article, we propose an IoT eHealth framework to provide an autonomous solution for patients with interventional cardiovascular diseases. In this framework, wearable senso...
The hardware realization of Universal Filtered Multi-Carrier (UFMC) architecture has attracted significant attention in fifth generation (5G) and beyond. In addition to the flexibility in fast Fourier transform (FFT)-length, a flexible prototype filter in combination with multiplicative complex spectrum shifting co-efficients is required for realiz...
Password is one of the most well-known authentication methods in accessing many Internet of Things (IoT) devices. The usage of passwords, however, inherits several drawbacks and emerging vulnerabilities in the IoT platform. However, many solutions have been proposed to tackle these limitations. Most of these defense strategies suffer from a lack of...
Traditional multimedia forensics techniques inspect images to identify, localize forged regions and estimate forgery methods that have been applied. Provenance filtering is the research area that has been evolved recently to retrieve all the images that are involved in constructing a morphed image in order to analyze an image, completely forensical...
Due to the powerful capacity of exploring complementary and consistent information by generating a consensus affinity graph from multi-view data, multi-view graph clustering (MVGC) methods have attracted intensive attention. However, multi-view data is usually existed in high-dimensional space, where redundant and irrelevant features may result in...
A cooperative relaying system based on non-orthogonal multiple access (NOMA) is considered a promising technique in next-generation wireless communications. In this letter, we investigate the performance of a dual-hop decode-and-forward based on the NOMA relaying system in terms of achievable rate and power allocation coefficient over imperfect est...
Intelligent reflecting surface (IRS), which is composed of a large number of low-cost passive elements, has the ability to reflect the incident signal independently with an adjustable phase and amplitude shifts, has been regarded as a key and emerging technology for achieving the cost-effectively spectrum and addressing energy issues in the next ge...
High-resolution remote sensing (HRRS) images, when used for building detection, play a key role in urban planning and other fields. Compared with the deep learning methods, the method based on morphological attribute profiles (MAPs) exhibits good performance in the absence of massive annotated samples. MAPs have been proven to have a strong ability...
In this paper, we present an algorithm for capacity optimization in intelligent reflecting surface (IRS)-based multiple-input multiple-output (MIMO) communication systems. To maximize the capacity of elements in IRS, we use augmented Lagrange method with the equivalent transformations on the covariance matrix and reflection matrix constraints. This...
Channel models are vital for theoretical analysis, performance evaluation, and system deployment of the communication systems between the transmitter and receivers. For sixth-generation (6G) wireless networks, channel modeling and characteristics analysis should combine different technologies and disciplines, such as high-mobility, multiple mobilit...
Next-generation wireless networks are witnessing an increasing number of clustering applications, and produce a large amount of non-linear and unlabeled data. In some degree, single kernel methods face the challenging problem of kernel choice. To overcome this problem for non-linear data clustering, multiple kernel graph-based clustering (MKGC) has...
With the increasing popularity of multi-view data, multi-view subspace clustering (MVSC) has attracted intensive attention. However, the curse of dimensionality of the high-dimensional multi-view data constantly obsesses the development of multi-view method. Together with the curse of dimensionality, the existence of noise and outliers further obst...
Radio-frequency-energy-powered cognitive radio network (RF-CRN) is being taken seriously in Connected Vehicles, especially in 5G network, which can better address the challenges of energy limitation and spectrum scarcity. However, the energy efficiency (EE) of the RF-CRN wherein multiple secondary users (SUs) share the same channel is rarely presen...
Edge computing has already shown its potential benefits to support the delay-sensitive and computation-intensive service provisioning in the Internet-of-Things-based environments. Simultaneously, artificial intelligence is expected to enhance the cognizance and intelligence of edge computing, resulting in a new paradigm, intelligent edge computing....
With the recent advancement in wireless communication and networks, we are at the doorstep of the Tactile Internet. The Tactile Internet aims to enable the skill delivery and thereafter democratize the specialized skills for many emerging applications (e.g., remote medical, industrial machinery, remote robotics, autonomous driving). In this article...
Classical automated schemes in the Industrial Internet of Things (IIoT) are challenged by the problems related to huge record storage and the way they respond. To properly manage the manufacturing settings, cognitive systems aim to find a way to efficiently adapt their actions based on uncertainty management and sensory data. However, due to the la...
In the cognitive computing of intelligent Industrial Internet of Things (IIoT), clustering is a fundamental machine learning problem to exploit the latent data relationships. To overcome the challenge of kernel choice for non-linear clustering tasks, multiple kernel clustering (MKC) has attracted intensive attention. However, existing graph-based M...
Multiple pedestrian tracking (MPT) has gained significant attention due to its huge potential in a commercial application. It aims to predict multiple pedestrian trajectories and maintain their identities, given a video sequence. In the past decade, due to the advancement in pedestrian detection algorithms, Tracking-by-Detection (TBD) based algorit...
The IEEE 802.15.4 standard specifies two network topologies: star and cluster-tree. A cluster-tree network comprises of multiple clusters that allow the network to scale by connecting devices over multiple wireless hops. The role of a cluster-head (CH) is to aggregate data from all the devices in the cluster and then transmit it to the overall pers...
The use of quadrotors is proliferating across many civil applications, including those in the areas of the Internet of Things (IoT) and communications. Attitude control plays an important role in these applications, and designing a quadrotor attitude controller is a challenging task. Recently, several design methods for the attitude controller were...
In this letter, we study the computational offloading scheme for the delay-aware tasks of the end-users in the fog computing network. We consider a fog federation of different service providers where an individual fog node allocates its computing resources to the end-user in its proximity, while a fog manager coordinates the load balancing among th...
With the emergence of the Internet of Things (IoT), billions of heterogeneous physical objects are connected through a network for collecting and sharing information, which can improve various aspects of daily lives, including smart living and transportation, and smart ambient environment, including smart city, smart home, smart agriculture, smart...
As remote sensing (RS) images increase dramatically, the demand for remote sensing image retrieval (RSIR) is growing, and has received more and more attention. The characteristics of RS images, e.g., large volume, diversity and high complexity, make RSIR more challenging in terms of speed and accuracy. To reduce the retrieval complexity of RSIR, a...