Xiaoming Fu

Xiaoming Fu
Georg-August-Universität Göttingen | GAUG · Institute of Computer Science

PhD

About

337
Publications
42,368
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,728
Citations
Introduction
EU FP7 CleanSky; EU FP7 MobileCloud; EU FP7 GreenICN; EU H2020 ICN2020; EU H2020 CoSAFE; Lower Saxony Ministry MWK project Simulation Center; DAAD PPP-Australia Big Data Security
Additional affiliations
February 2020 - March 2021
University of Oregon
Position
  • Professor
February 2018 - March 2019
Victoria University Melbourne
Position
  • Professor
January 2016 - July 2016
Sorbonne Université
Position
  • Professor
Education
March 1997 - June 2000
Tsinghua University
Field of study
  • Computer Science
September 1994 - March 1997
Northeastern University (Shenyang, China)
Field of study
  • Computer Science
August 1990 - July 1994
Northeastern University (Shenyang, China)
Field of study
  • Automatic Instrumentation

Publications

Publications (337)
Article
Full-text available
An aggregate congestion control mechanism, namely Probe- Aided MulTCP (PA-MulTCP), is proposed in this paper. It is based on MulTCP, a proposal for enabling an aggre- gate to emulate the behavior of multiple concurrent TCP connections. The objective of PA-MulTCP is to ensure the fair sharing of the bottleneck bandwidth between the ag- gregate and o...
Conference Paper
Full-text available
Networks are becoming increasingly complex and service providers incorporate additional functionality in the network to protect, manage and improve service performance. Software De�ned Networking (SDN) seeks to manage the network with the help of a (logically) centralized control plane. We observe that current SDN solutions pre-translate policy (wh...
Article
Numerous applications in 3D underwater sensor networks (UWSNs), such as pollution detection, disaster prevention, animal monitoring, navigation assistance, and submarines tracking, heavily rely on accurate localization techniques. However, due to the limited batteries of sensor nodes and the difficulty for energy harvesting in UWSNs, it is challeng...
Conference Paper
Full-text available
The rapid growth of mobile video traffic and user demand poses a more stringent requirement for efficient bandwidth allocation in mobile networks where multiple users may share a bottleneck link. This provides content providers an opportunity to optimize multiple users' experiences jointly, but users often suffer short connection durations and freq...
Preprint
Full-text available
Artificial intelligence (AI) has been introduced in communication networks and services to improve efficiency via self-optimization. Cooperative intelligence (CI), also known as collective intelligence and collaborative intelligence, is expected to become an integral element in next-generation networks because it can aggregate the capabilities and...
Article
Full-text available
Predicting individual socioeconomic status (SES) from social media content benefits various applications in economic and social fields. Most previous works adopt machine learning methods with predefined features to infer SES. Nevertheless, they ignore some important information of social media content, such as order, structure and relation informat...
Article
Full-text available
Many hardware-based security middleboxes have been deployed in the networks to defend against different threats. However, these hardware middleboxes are hard to upgrade or migrate. The emergence of network functions virtualization (NFV), which realizes various security functions in the form of virtual network functions (VNFs), brings many benefits...
Article
Network Function Virtualization (NFV) provides the possibility to implement complex network functions from dedicated hardware to software instances called Virtual Network Functions (VNF) by leveraging the virtualization technology. Service Function Chaining (SFC) is defined as a chain-ordered set of placed VNFs that handles the traffic of the deliv...
Preprint
Full-text available
Background: Side effects in psychotherapy are sometimes unavoidable. Therapists play a significant role in the side effects of psychotherapy, but there have been few quantitative studies on the mechanisms by which therapists contribute to them. Methods: We designed the Psychotherapy Side Effects Questionnaire-Therapist Version (PSEQ-T) and released...
Article
Predicting where people will consume in the future is of great significance for promoting local business. Although the prevalence of Geo-Social Networks (GSNs) has provided sufficient and desirable geo-tagged data for user mobility modeling, most studies attempt to directly fit user’s preference toward locations through exploring the complex intera...
Article
Full-text available
Many organizations nowadays have multiple sites at different geographic locations. Typically, transmitting massive data among these sites relies on the interconnection service offered by ISPs. Segment Routing over IPv6 (SRv6) is a new simple and flexible source routing solution which could be leveraged to enhance interconnection services. Compared...
Conference Paper
Full-text available
Heterogeneous information network (HIN) embedding, learning the low-dimensional representation of multi-type nodes, has been applied widely and achieved excellent performance. However, most of the previous works focus more on static heterogeneous networks or learning node embedding within specific snapshots, and seldom attention has been paid to th...
Article
Full-text available
Identifying an unfamiliar caller’s profession is important to protect citizens’ personal safety and property. Owing to limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggra...
Article
The Bulk Synchronous Parallel (BSP) paradigm is gaining tremendous importance recently due to the popularity of computations as distributed machine learning and graph computation. In a typical BSP job, multiple workers concurrently conduct iterative computations, where frequent synchronization is required. Therefore, the workers should be scheduled...
Article
Full-text available
Understanding commuters’ behavior and influencing factors becomes more and more important every day. With the steady increase of the number of commuters, commuter traffic becomes a major bottleneck for many cities. Commuter behavior consequently plays an increasingly important role in city and transport planning and policy making. Although prior st...
Article
Dear readers, It is our pleasure to welcome you to the second issue of the second volume of the Journal of Social Computing. This issue comprises the following six unique articles.
Article
Full-text available
Online social networks (OSNs) have become a commodity in our daily life. As an important concept in sociology and viral marketing, the study of social influence has received a lot of attentions in academia. Most of the existing proposals work well on dominant OSNs, such as Twitter, since these sites are mature and many users have generated a large...
Preprint
BACKGROUND Side effects in psychotherapy are sometimes unavoidable. Therapists play a significant role in the side effects of psychotherapy, but there have been few quantitative studies on the mechanisms by which therapists contribute to them. OBJECTIVE Using machine learning techniques to distinguish therapists with and without the perception of...
Article
Full-text available
Dating apps have gained tremendous popularity during the past decade. Compared with traditional offline dating means, dating apps ease the process of partner finding significantly. While bringing convenience to hundreds of millions of users, dating apps are vulnerable to become targets of adversaries. In this work, we focus on malicious user detect...
Article
Full-text available
Coreness is an important index to reflect the cohesiveness of a graph. The problems of core computation in static graphs and core update in dynamic graphs, known as the core decomposition and core maintenance problems respectively, have been extensively studied in previous work. However, most of these work focus on unweighted graphs. Considering th...
Article
Full-text available
Dear readers, It's our pleasure to welcome you to the first issue of the second volume of the Journal of Social Computing. This issue comprises the following six interesting articles.
Chapter
A good location goes beyond the direct benefits from its neighbourhood. Unlike most previous statistical and machine learning based housing appraisal research, which limit their investigations to neighbourhoods within 1 km radius of the house, we expand the investigation beyond the local neighbourhood and to the whole metropolitan area, by introduc...
Article
Full-text available
Inferring people’s Socioeconomic Attributes (SEAs), including income, occupation, and education level, is an important problem for both social sciences and many networked applications like targeted advertising and personalized recommendation. Previous works mainly focus on estimating SEAs from peoples’ cyberspace behaviors and relationships, such a...
Book
This book constitutes the proceedings of the 18th International Conference on Web Information Systems and Applications, WISA 2021, held in Kaifeng, China, in September 2021. The 49 full papers and 18 short papers presented were carefully reviewed and selected from 206 submissions. The papers are grouped in topical sections on world wide web, query...
Article
Full-text available
On behalf of the Editorial Board, it is our privilege to present the first issue of the Journal of Social Computing, affectionately shortened JoSoCo. Social computing concerns the intersection of social behavior and computational systems. Historically focused on recreating human social conventions and contexts through software and technology, we pr...
Article
Full-text available
This paper poses a question: How many types of social relations can be categorized in the Chinese context? In social networks, the calculation of tie strength can better represent the degree of intimacy of the relationship between nodes, rather than just indicating whether the link exists or not. Previou research suggests that Granovetter measures...
Article
Full-text available
Network Function Virtualization (NFV) has been emerging as an appealing solution that transforms complex network functions from dedicated hardware implementations to software instances running in a virtualized environment. In this survey, we provide an overview of recent advances of resource allocation in NFV. We generalize and analyze four represe...
Article
Full-text available
Network Function Virtualization (NFV) is emerging as an attractive solution, which can transform complex network functions from the dedicated hardware implementations into software instances running in a virtualized environment. In NFV, the requested service is implemented by a sequence of Virtual Network Functions (VNF) that can run on generic ser...
Article
Full-text available
This paper considers the fundamental problem of deployment of Unmanned Aerial VehIcles for aniSotropic monItoring Tasks (VISIT), that is, given a set of objects with determined coordinates and directions in 2D area, deploy a fixed number of UAVs by adjusting their coordinates and orientations such that the overall monitoring utility for all objects...
Article
Heterogeneous networks raise the challenge on ubiquitous connections among heterogeneous devices and networking protocols. As a promising approach to meet this challenge, Information-centric networking (ICN) offers a new communication paradigm which can conceal the heterogeneity of underlying networks. However, it suffers from the problem of segmen...
Article
Cloud Radio Access Network (C-RAN) is a promising 5G network architecture by establishing Baseband Units (BBU) pools to perform baseband processing functionalities and deploying Remote Radio Heads (RRH) for wireless signal transmission and reception. Mobile Edge Computing (MEC) offers a way to shorten the service delay by building small-scale cloud...
Article
Full-text available
Recently, the issue of offloading cellular data while reducing the duplicated cellular transmission has gained more and more attention. Several studies have shown that sharing contents through Device-to-Device (D2D) to offload traffic to local connections nearby can offer better performance for mobile users. Nevertheless, most existing proposals ar...
Article
Full-text available
With the popularity of smart mobile terminals and advances in wireless communication and positioning technologies, Geo-Social Networks (GSNs), which combine location awareness and social service functions, have become increasingly prevalent. The increasing amount of user and location information in GSNs makes the information overload phenomenon mor...
Article
Load balancing in datacenter networks (DCNs) is an important and challenging task for datacenter managers. A number of sophisticated technologies have been proposed to improve load balancing performance in a complicated circumstance, i.e., with various traffic characteristics. Many approaches need a high cost to implement, such as changing switch h...
Preprint
Full-text available
With the rapid development of autonomous driving, collision avoidance has attracted attention from both academia and industry. Many collision avoidance strategies have emerged in recent years, but the dynamic and complex nature of driving environment poses a challenge to develop robust collision avoidance algorithms. Therefore, in this paper, we pr...
Article
Full-text available
Socioeconomic status (SES) is an important economic and social aspect widely concerned. Assessing individual SES can assist related organizations in making a variety of policy decisions. Traditional approach suffers from the extremely high cost in collecting large-scale SES-related survey data. With the ubiquity of smart phones, mobile phone data h...
Article
Ensuring high availability (HA) for software-based networks is a critical design feature that will help the adoption of software-based network functions (NFs) in production networks. It is important for NFs to avoid outages and maintain mission-critical operations. However, HA support for NFs on the critical data path can result in unacceptable per...
Article
Full-text available
Managing Network Function (NF) service chains requires careful system resource management. We propose NFVnice, a user space NF scheduling and service chain management framework to provide fair, efficient and dynamic resource scheduling capabilities on Network Function Virtualization (NFV) platforms. The NFVnice framework monitors load on a service...
Article
With the rapid development of autonomous driving, collision avoidance has attracted attention from both academia and industry. Many collision avoidance strategies have emerged in recent years, but the dynamic and complex nature of driving environment poses a challenge to develop robust collision avoidance algorithms. Therefore, in this paper, we pr...
Article
Full-text available
Computational social science has integrated social science theories and methodology with big data analysis. It has opened a number of new topics for big data analysis and enabled qualitative and quantitative sociological research to provide the ground truth for testing the results of data mining. At the same time, threads of evidence obtained by da...
Article
Full-text available
Mobile Edge Computing (MEC) offers a way to shorten the cloud servicing delay by building the small-scale cloud infrastructures at the network edge, which are in close proximity to the end users. Moreover, Network Function Virtualization (NFV) has been an emerging technology that transforms from traditional dedicated hardware implementations to sof...
Conference Paper
Given the limited battery lifetime and difficulties for harvesting energy in Underwater Wireless Sensor Networks (UWSNs), the localization problem of underwater sensor nodes poses crucial challenges. In this paper, an Adaptive Energy Efficient Localization Algorithm (Adaptive EELA) using the Fuzzy game theoretic method is proposed to solve the envi...
Article
Full-text available
Network Function Virtualization (NFV) has been emerging as an appealing solution that transforms from dedicated hardware implementations to software instances running in a virtualized environment. In NFV, the requested service is implemented by a sequence of Virtual Network Functions (VNF) that can run on generic servers by leveraging the virtualiz...
Article
Full-text available
With an increasing demand for resilience in software-defined networks (SDN), it becomes critical to minimize service recovery delay upon route failures. Fast reroute (FRR) mechanisms are widely used in IP and MPLS networks by computing the recovery path before a failure occurs. The centralized control plane in SDN can potentially enhance path compu...
Preprint
Full-text available
The notion of socioeconomic status (SES) of a person or family reflects the corresponding entity's social and economic rank in society. Such information may help applications like bank loaning decisions and provide measurable inputs for related studies like social stratification, social welfare and business planning. Traditionally, estimating SES f...
Article
Mobile Edge Computing (MEC) offers a way to shorten the cloud servicing delay by building the small-scale cloud infrastructures such as cloudlets at the network edge, which are in close proximity to end users. On one hand, it is energy consuming and costly to place each cloudlet on each Access Point (AP) to process the requested tasks. On the other...
Article
In Software-defined Networking (SDN), high-level abstractions typically offer a useful means to avoids writing network applications and policies on lower levels. However, abstractions are typically developed for a specific use case, which in turn results in an abundance of existing abstractions for different networking tasks. As a consequence orche...
Article
Varieties of wireless communication links, such as HSPA+ access in high speed trains, balloon-based aerial wireless networks and satellite Internet connections have high loss rates. In such environments, Multipath TCP (MPTCP) offers a robust solution compared to regular TCP. However, MPTCP and existing schedulers suffer from performance degradation...