Qiang Duan

Qiang Duan
Pennsylvania State University | Penn State · Information Sciences & Technology

Ph.D.

About

138
Publications
59,883
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,913
Citations
Additional affiliations
July 2019 - February 2021
Pennsylvania State University
Position
  • Professor
July 2014 - June 2019
Pennsylvania State University
Position
  • Professor (Associate)
August 2008 - June 2014
Pennsylvania State University
Position
  • Professor (Assistant)

Publications

Publications (138)
Article
Full-text available
Federated learning (FL) and split learning (SL) are two emerging collaborative learning methods that may greatly facilitate ubiquitous intelligence in the Internet of Things (IoT). Federated learning enables machine learning (ML) models locally trained using private data to be aggregated into a global model. Split learning allows different portions...
Preprint
Full-text available
Knowledge graph is the structural representation of the real-world facts, it mainly divides the knowledge into two forms of triples: (head entity, relation, tail entity) and (node, attribute, value). Thus, the attribute of entity is an indispensable part of knowledge graph, it plays an important role in enriching the concepts of entity and revealin...
Article
Full-text available
The widespread deployment of scientific applications and business services of various types on clouds requires the transfer of big data with different priorities between geographically distributed cloud-based data centers. As a result, Cloud Service Providers (CSP) face a significant challenge to fully utilize the expensive bandwidth resources of t...
Article
Full-text available
The advanced services provided by vehicle ad hoc network (VANET) often require vehicles to process complex computing tasks that may not be completed by individual vehicles within a required delay limit. Task offloading to road side units (RSUs) is a typical approach to enhancing service performance in VANET; however, RSUs may not always have suffic...
Article
Federated Learning (FL) offers a promising approach to efficient machine learning with privacy protection in distributed environments, such as Internet of Things (IoT) and Mobile Edge Computing (MEC). Effectiveness of FL relies on a group of participant nodes that contribute their data and computing capacities to the collaborative training of a glo...
Article
In recent years, mobile edge computing has attracted a considerable amount of attention from both academia and industry through its many advantages (such as low latency, computation efficiency and privacy) caused by its local model of providing storage and computation resources. In addition, machine learning has become the dominant approach in appl...
Article
Full-text available
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service provisioning. Intelligent and autonomous management is one of the most challenging issues in cloud-...
Article
Full-text available
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer’s trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity eff...
Article
Trends such as increasing mobile device ownership and faster and more affordable Internet speed have contributed to significant demands in media-based services on mobile devices. There has been an emphasis on content delivery networks to support media-based services. However, achieving high-performance content delivery in large-scale dynamic networ...
Article
Mobile edge computing provisions computing and storage resources by deploying edge servers (ESs) at the edge of the network to support ultra-low delay and high bandwidth services. To ensure QoS of latency-sensitive services in vehicular networks, service migration is required to migrate data of the ongoing services to the closest ES seamlessly when...
Article
Full-text available
The wide applications of virtualization and service-oriented principles in various emerging networking technologies introduce a trend of network cloudification that enables network systems to be realized based on cloud technologies and allows network services to be provisioned following the cloud service model. Network cloudification together with...
Chapter
Full-text available
Mobile Edge Computing (MEC) is a fast growing research area that may soon offer alternate service platforms to the clients over today’s Cloud Computing vendors (e.g., Amazon AWS, Google Cloud, or Microsoft Azure, etc.). And when the MEC services are ready and available, just like when Cloud Computing services were presented to the “On-Premises” ser...
Chapter
This paper reviews big data security analytics and looks into the big data lifecycle for assessments of big data security challenge in clouds. The paper justifies the reasons to develop big data security metrics. In this paper, we propose ten big data security metrics securing big data on cloud. This paper contributes new knowledge to big data secu...
Article
Full-text available
The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior of social network accounts also affects the SIoT, this paper studies the analysis and prediction of malicious behavior for SIoT...
Preprint
Full-text available
The recent developments in networking research leverage the principles of virtualization and service-orientation to enable fundamental changes in network architecture, which forms a trend of network cloudification that enables network systems to be realized using cloud technologies and network services to be provisioned following the cloud service...
Article
Full-text available
Service function chaining (SFC) in the SDN/NFV architecture offers a flexible approach to end-to-end service provisioning in future networks. Analysis on the quality of service (QoS) guaranteed by SFC becomes an important research topic. The resource abstraction and dynamic elastic service provisioning enabled by SDN/NFV bring in new challenges to...
Article
Full-text available
Data fusion in the Internet of Things (IoT) environment demands collecting and processing a wide variety of data with mixed time characteristics, both real-time and non-real-time data. Most of the previous research on data fusion was about the data processing aspect; however, successful data transmission is a prerequisite for high-performance data...
Article
In this paper, we propose an SDN-based multi-priority fork-join scheduling scheme for achieving high-performance data transmissions for mobile crowdsourcing. A network calculus-based modeling and analysis technique for evaluating the performance of the proposed scheme is developed. Through extensive simulations and investigations on the impacts of...
Article
The split-protocol theory was developed for load balancing and quicker data communication. Split-protocol computing paradigm uses web services on geographically distributed web servers on the cloud. A system of large split-servers that form the cloud to handle computing and storage task that would otherwise create a massive CPU utilisation if we wo...
Article
Empirical rules are among the most widely employed approaches for processing view abstraction for UML, which can support model simplification, consistency checking, and complexity reduction. However, empirical rules face challenges such as completeness validation, consistency among rules, and composition priority arrangement. The challenge of compo...
Article
Full-text available
Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive stra...
Article
Full-text available
Currently, different kinds of security devices are deployed in the cloud datacenter environment and tenants may choose their desired security services such as firewall and IDS (intrusion detection system). At the same time, tenants in cloud computing datacenters are dynamic and have different requirements. Therefore, security device deployment in c...
Conference Paper
In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recomm...
Article
Networking plays a crucial role in Cloud computing especially in an inter-Cloud environment, where data communications among data centers located at different geographical sites form the foundation of inter-Cloud federation. Data transmissions required for inter-Cloud federation in the complex inter-Cloud networking system are often point-to-multi...
Article
The IoT is one of the most significant recent innovations in information technologies, which has attracted extensive attention from both industry and academia due to its potential impact on various networking-related fields. The rapid development in IoT technologies has resulted in widespread application of this emerging networking paradigm in vari...
Article
Supporting diverse Quality of Service (QoS) performance for data flows generated by multimedia applications has been a challenging issue in Software Defined Network (SDN). However, the current available QoS provision mechanisms proposed for SDN have not fully considered the heterogeneity and performance diversity for multimedia data flows. To this...
Article
Multicast routing that meets multiple QoS constraints is important for supporting multimedia communications in the Internet of Things (IoT). Existing multicast routing technologies for IoT mainly focus on ad hoc sensor networking scenarios; thus are not responsive and robust enough for supporting multimedia applications in an IoT environment. In or...
Article
Full-text available
With rapid advancement of Cloud computing and networking technologies, a wide spectrum of Cloud services have been developed by various providers and utilized by numerous organizations as indispensable ingredients of their information systems. Cloud service performance has a significant impact on performance of the future information infrastructure...
Article
Full-text available
Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however don't provide guidance to and integrate directly with the IT side implementation to achieve coherent information coordination and robust adaptability which indicts maximization of business profitabi...
Article
Full-text available
SDN and NFV are two significant innovations in networking. The evolution of both SDN and NFV has shown strong synergy between these two paradigms. Recent research efforts have been made toward combining SDN and NFV to fully exploit the advantages of both technologies. However, integrating SDN and NFV is challenging due to the variety of intertwined...
Conference Paper
In this paper, we demonstrate a system for automated transformation rule application in mobile system development. Our application enables correctness and consistency of the automated transformation rules, by leveraging Egyed's work [2] on automated model transformation. Our approach is implemented via finite state automation generation, extending...
Article
Full-text available
Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker) is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such...
Article
Full-text available
Service composition has become a common approach to realising complex business processes. The large number of services developed and deployed independently by various providers can lead to undesirable interactions between properties of different services which are a serious obstacle for service composition to meet users' requirements. While some pr...
Article
The crucial role of networking in cloud service provisioning calls for federated selection of network and cloud services in order to guarantee the service performance required by diverse applications. In order to address the new challenges brought in by the software-defined cloud environment (SDCE) to service selection, we develop an approach for p...
Conference Paper
Split-protocol computing paradigm uses web services on geographically distributed Web servers. A network of large Split-servers that form the cloud to handles computing and storage task that would otherwise create a heavy CPU utilization for the individual traditional server. The split-protocol concept was devised for load balancing and faster data...
Conference Paper
Full-text available
Supporting diverse Quality of Service (QoS) performance for heterogeneous data flows generated by multimedia applications has been a challenging issue that is not fully addressed in the Internet. Software Defined Network, which decouples data forwarding and network control, offers a promising approach to QoS guarantee of multimedia flows in the fut...
Conference Paper
Full-text available
Context-aware Cloud services, which may significantly enhance usability of the future Internet-based information infrastructure, also brings in new challenges to Cloud system development. In this paper, we investigate application of value engineering, a systematic method for achieving optimal system design, to address the challenges introduced by t...
Article
Full-text available
The design of wireless sensor networks (WSNs) in the Internet of Things (IoT) faces many new challenges that must be addressed through an optimization of multiple design objectives. Therefore, multiobjective optimization is an important research topic in this field. In this paper, we develop a new efficient multiobjective optimization algorithm bas...
Article
Full-text available
The crucial role of networking in Cloud computing calls for a holistic vision of both networking and computing systems that leads to composite network–compute service provisioning. Software-Defined Network (SDN) is a fundamental advancement in networking that enables network programmability. SDN and software-defined compute/storage systems form a S...
Conference Paper
This paper proposes a hybrid scheduling scheme to combine the priority queueing and Packet General Processor Sharing (PGPS) algorithm for Multimedia Cloud Services in Software Defined Network (SDN). The network calculus theory is employed to develop modeling and analysis techniques for evaluating the QoS performance of the proposed scheduling schem...
Article
Full-text available
Software-Defined Network (SDN) is expected to have a significant impact on future networking. Although exciting progress has been made toward realizing SDN, application of this new networking paradigm in the future Internet to support end-to-end QoS provisioning faces some new challenges. The autonomous network domains coexisting in the Internet an...
Conference Paper
Software Defined Networking (SDN) is an emerging networking paradigm that is expected to play a significant role in future networks. Although exciting progress has been made in research and development of SDN technologies, application of this new networking paradigm in large scale networks with heterogeneous autonomous domains, such as the Internet...
Conference Paper
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed in this paper. The proposed protocol is composed of two critical phases: 1) adjusting the value of minimum-hops between a phantom node and its source, and varying the area...