Baochao Chen’s research while affiliated with Tianjin University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (10)


A Comprehensive Survey of Blockchain Scalability: Shaping Inner-Chain and Inter-Chain Perspectives
  • Preprint

September 2024

·

14 Reads

Baochao Chen

·

Liyuan Ma

·

·

[...]

·

Blockchain is widely applied in logistics, finance, and agriculture. As single blockchain users grow, scalability becomes crucial. However, existing works lack a comprehensive summary of blockchain scalability. They focus on single chains or cross-chain technologies. This survey summarizes scalability across the physical and logical layers, as well as inner-chain, inter-chain, and technology dimensions. The physical layer covers data and protocols, while the logical layer represents blockchain architecture. Each component is analyzed from inner-chain and inter-chain perspectives, considering technological factors. The aim is to enhance researchers' understanding of blockchain's architecture, data, and protocols to advance scalability research.


BSSN: Enabling Adjustable Blockchain Storage for Resource-Constrained IoT Scenarios

January 2024

·

1 Read

IEEE Internet of Things Journal

Blockchain, with its immutability and decentralization, drives innovation in finance and supply chain, but the growing data volume makes storing complete ledger replicas impractical for users, especially in the resource-constrained Internet of Thing (IoT) scenarios. Existing solutions focus on nodes storing only a partial ledger to alleviate storage burdens. Nonetheless, these approaches prioritize storage optimization by minimizing the query cost and lack control over storage cost. Furthermore, these approaches overlook the relationships between network users, thus failing to fully measure the future query cost. Thus, this paper proposes BSSN, a Blockchain Storage technology based on Social Networks. The combined use of storage cost and query cost is introduced for the first time to formulate the Node Allocation Optimization (NAO) problem, and the Multi-population Genetic Ant Colony (MGAC) algorithm will be employed to derive node allocation strategies. Specifically, we address three technical challenges. (i) To predict the transactions that nodes will participate in in the future, we employ the social ties to obtain the access frequencies among users. (ii) To strike a balance between the storage cost and query cost, we jointly model the two costs as a multi-objective optimization problem to formulate the NAO problem. (iii) To solve the NP-hard NAO problem, we use MGAC algorithm, where the storage and query populations collaboratively search for solutions based on four operations. Extensive experiments indicate that compared with existing work, BSSN can reduce the average query cost to 67% with its adjustable storage cost, ensuring a balanced data storage among users.




An online dynamic pricing framework for resource allocation in edge computing

October 2022

·

28 Reads

·

4 Citations

Journal of Systems Architecture

As more and more Internet of Things (IoT) applications move to the edge clouds, the scarce resource cannot satisfy the users’ ever-growing demands. Usually, users are charged by Edge Service Providers (ESPs) and access the service according to their preference and budget. The usual non-interactive transactions aggravate the imbalance and inefficiency of the edge resource. Moreover, the network dynamics and uncertain user demands pose a considerable challenge to the operator. To achieve the load balancing and satisfy the users’ satisfaction simultaneously, we put forward an online congestion-aware dynamic pricing based resource allocation method. We aim at maximizing the operator’s profit and leverage the two-timescale Lyapunov optimization technique to jointly balance the utility maximization and system stability. More briefly, it allows the ESP operator to make the online decisions on how much the computing units should be charged at a coarse-grained timescale, when and where to serve the users’ demands at a fine-grained timescale. We conduct rigorous theoretical analysis and verify the performance guarantee of our online control algorithm. The simulation results show that the proposed method can effectively improve the total utility and control the deadline miss rate within a relatively low range. Meanwhile, it turns out to be robust to the uncertain request estimation errors.


Joint Service Placement for Maximizing the Social Welfare in Edge Federation
  • Conference Paper
  • Full-text available

June 2021

·

55 Reads

·

7 Citations

Download



SIGMM: A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing

January 2018

·

886 Reads

·

78 Citations

IEEE Transactions on Industrial Informatics

Industrial mobile network is crucial for industrial production in Internet of Things. It guarantees the normal function of machines and the normalization of industrial production. However this characteristic might be utilized by spammers to attack others and influence industrial production. The users who only share spams such as links with virus and advertisement are called spammers. With the growth of mobile network members, spammers are organized in groups for the purpose of benefit maximization, which has caused confusion and heavy loss to industrial production. It is difficult to distinguish spammers from normal users due to characteristics of multidimensional data. To address this problem, this paper proposes a Spammer Identification scheme based on Gaussian Mixture Model (SIGMM) that utilizes machine learning for industrial mobile networks. It works on the intelligent identification of spammers without relying on the flexible and unreliable relationship. SIGMM combines the presentation of data. Each user node is classified to one class in the construction process of model. Finally, we validate SIGMM by comparing it with RMA, HFCM schemes using mobile network dataset from cloud server. Simulation results show that SIGMM outperforms these previous schemes in terms of recall, precision and time complexity.


Fig. 2. Typical applications of MSNs. 
Fig. 3. MSNs applications researches statistics from Ei Village. 
Fig. 4. Social features and social properties. 
Fig. 5. Comparison of routing research works in MSNs. 
Fig. 6. Research framework of MSNs. 
A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges

November 2017

·

1,891 Reads

·

35 Citations

IEEE Systems Journal

With the popularity of mobile devices and the development of the wireless technologies, humans can be connected ubiquitously. Because of the mobility of the devices, it is a hard task to maintain the end-to-end path between source node and destination node. Researchers have introduced analysis of nodes’ social behavior to solve the problem of data dissemination in the networks, which leads to the emersion of the Mobile Social Networks (MSNs). They increase the performance of data forwarding by the social relationships and interactions among nodes. Many schemes and algorithms have been proposed to enhance data forwarding performance and provide humanized service by introducing social features and digging social properties. In this paper, first, we investigate the architectures and evolutionary process of the MSNs. Then, the social features of nodes existing in the MSNs and main social properties of MSNs are described. In term of the state-of-the-art works, data forwarding strategies in the MSNs are divided into four categories, including only encounter history-based strategies, social-based strategies, incentive mechanisms, and forwarding methods that take social selfishness into consideration of this paper. Finally, the major issues and challenges are discussed.

Citations (6)


... The scalability of the service chain is another advantage, allowing the network to accommodate growing demands. However, ensuring high availability in diverse and potentially harsh operational environments requires sophisticated resource management and infrastructure resilience strategies [25,26]. ...

Reference:

Service provision and price strategies in edge computing
vHSFC: Generic and Agile Verification of Service Function Chain with parallel VNFs
  • Citing Conference Paper
  • May 2023

... Moreover, the nature like urgency and the priority of tasks are not taken into account, which is adverse to obtain a good solution. From service operators' perspective, Chen et al. [4] present an online control method to figure out the resource allocation problem in EC considering time and capacity constraints with the objective of maximizing the profit of operators. All above work do not consider task priority. ...

An online dynamic pricing framework for resource allocation in edge computing
  • Citing Article
  • October 2022

Journal of Systems Architecture

... Chen et al. tackle the challenge of maximizing social welfare in edge federations by introducing a joint service placement strategy that optimizes service allocation across edge nodes. The approach effectively balances resource use and service demand, ultimately enhancing social welfare in edge federations [10]. Ye et al. addressed the issue of resource pricing within edge federations by proposing a game-based pricing approach. ...

Joint Service Placement for Maximizing the Social Welfare in Edge Federation

... The advantages of the following methods can be concluded. The feature extraction problem in edge systems benefits for network limitations [3,4], the performance problem helps the tradeoff between energy consumption and latency [5], and the load balance problem is conducive to latencysensitive applications [6]. However, these methods only focus on partial performance elements, network power consumption, latency, etc. ...

Load Balance Awared Data Sharing Systems In Heterogeneous Edge Environment
  • Citing Conference Paper
  • December 2020

... The first industrial revolution marked the entry of mankind into the steam era, the second industrial revolution marked the entry into the electrification era, the third industrial revolution marked the entry into the informationization era, and the fourth industrial revolution marked the official entry of human society into the intelligence era [2][3]. It includes artificial intelligence, industrial internet, industrial cloud computing, industrial big data, industrial robotics, 3D printing, knowledge work automation, industrial cybersecurity, virtual reality, etc., among which 3D printing technology is regarded by countries as a powerful tool to realize intelligent production and is applied in various fields [4][5]. ...

SIGMM: A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing
  • Citing Article
  • January 2018

IEEE Transactions on Industrial Informatics

... With the popularity of mobile devices and the increasing development of interpersonal social interaction, mobile social networks [1] play a key role in users' daily lives. A large number of social software (such as WeChat, Weibo, Facebook, and Twitter) integrate user information into a data pool to meet the needs of social network users for making friends. ...

A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges

IEEE Systems Journal