Dapeng Oliver Wu's research while affiliated with The University of Hong Kong and other places

Publications (322)

Article
Abundant real-time applications over Internet of things (IoT) have imperative demands on timely information. Compared to average age of information (AoI), distribution of AoI characterizes the timeliness in more details. This paper studies the timeliness of an IoT-based multi-source status update system. By modeling the system as a multi-source M/G...
Article
Full-text available
The modern smart grid is a vital component of national development and is a complex coupled network composed of power and communication networks. The faults or attacks of either network may cause the performance of a power grid to decline or result in a large-scale power outage, leading to significant economic losses. To assess the impact of grid f...
Article
Reconfigurable intelligent surface (RIS) is an emerging technology for enabling the manipulation of wireless environments, which shows great potential for the coverage and capacity enhancements of wireless networks. In this letter, a hybrid deployment scheme of terrestrial and aerial RISs (TRIS, ARIS) is proposed to avoid the obstruction of light-o...
Preprint
Full-text available
This paper is concerned with the issue of improving video subscribers' quality of experience (QoE) by deploying a multi-unmanned aerial vehicle (UAV) network. Different from existing works, we characterize subscribers' QoE by video bitrates, latency, and frame freezing and propose to improve their QoE by energy-efficiently and dynamically optimizin...
Preprint
This paper addresses the problem of cross-modal object tracking from RGB videos and event data. Rather than constructing a complex cross-modal fusion network, we explore the great potential of a pre-trained vision Transformer (ViT). Particularly, we delicately investigate plug-and-play training augmentations that encourage the ViT to bridge the vas...
Article
Full-text available
Recently, stereoscopic image quality assessment has attracted a lot attention. However, compared with 2D image quality assessment, it is much more difficult to assess the quality of stereoscopic images due to the lack of understanding of 3D visual perception. This paper proposes a novel no-reference quality assessment metric for stereoscopic images...
Article
Full-text available
In this paper, we propose a single-agent Monte Carlo-based reinforced feature selection method, as well as two efficiency improvement strategies, i.e., early stopping strategy and reward-level interactive strategy. Feature selection is one of the most important technologies in data prepossessing, aiming to find the optimal feature subset for a give...
Article
Traffic measurement will play an essential role in future networks to reveal the traffic requirements of the users, which will support network operations like resource allocation. In this paper, we study the traffic-aware resource allocation problem for downlink rate-splitting multiple access (RSMA) based unmanned aerial vehicle (UAV) communication...
Article
Topology robustness is critical to the connectivity and lifetime of large-scale Internet-of-Things (IoT) applications. To improve robustness while reducing the execution cost, the existing robustness optimization methods utilize neural learning schemes, including neural networks, deep learning, and reinforcement learning. However, insufficient expl...
Article
This paper studies the joint three-dimensional (3D) deployment and beamforming problem for a rate-splitting multiple access (RSMA)-enabled unmanned aerial vehicle base station (UBS) assisted by geographic information. Specifically, we maximize the minimum achievable rate among users by optimizing the beamforming, rate allocation and UBS deployment...
Article
Internet of Things (IoT) as a ubiquitous networking paradigm has been experiencing serious security and privacy challenges with the increasing data in diversified applications. Fortunately, this will be, to a great extent, alleviated with the emerging blockchain, which is a decentralized digital ledger based on cryptography and has offered potentia...
Article
Network Functions Virtualization (NFV), which decouples network functions from the underlying hardware, has been regarded as an emerging paradigm to provide flexible virtual resources for various applications through the ordered interconnection of Virtual Network Functions (VNFs), in the form of Service Function Chains (SFCs). In order to achieve t...
Article
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individual local servers, MEC helps meet the requirements of ultralow latency, localized data processing, and extends the potential of Interne...
Article
Numerous sensor nodes deployed in the Internet of Things (IoT) can form a large heterogeneous network. The increased energy consumption of sensor nodes and the unbalanced communication load on multiple sink nodes reduce the energy efficiency of the network. Moreover, frequent network attacks also pose severe challenges to topology robustness. Optim...
Article
Unmanned aerial vehicles (UAVs) have emerged as a promising solution for enhancing mobile edge computing (MEC) networks. However, the integration of UAVs into MEC networks poses unique challenges, such as the presence of dynamic devices and complex resource allocation. This research investigates the problem of task offloading in a distributed MEC n...
Article
For moving cameras, the video content changes significantly, which leads to inaccurate prediction in traditional inter prediction and results in limited compression efficiency. To solve these problems, first, we propose a camera pose-based background modeling (CP-BM) framework that uses the camera motion and the textures of reconstructed frames to...
Preprint
Full-text available
Neural network pruning has been a well-established compression technique to enable deep learning models on resource-constrained devices. The pruned model is usually specialized to meet specific hardware platforms and training tasks (defined as deployment scenarios). However, existing pruning approaches rely heavily on training data to trade off mod...
Article
The span of Internet of Things (IoT) is expanding owing to numerous applications being linked to massive devices. Subsequently, node failures frequently occur because of malicious attacks, battery exhaustion, or other malfunctions. A reliable and robust network topology can alleviate the cascading collapse caused by local node failures. Existing op...
Article
Full-text available
The accurate prediction of protein-ligand binding affinity is critical for the success of computer-aided drug discovery. However, the accuracy of current scoring functions is usually unsatisfactory due to their rough approximation or sometimes even omittance of many factors involved in protein-ligand binding. For instance, the intrinsic dynamics of...
Article
A cellular unmanned-aerial-vehicle (UAV)-enabled system is studied in this research, where multiple UAVs work cooperatively to upload the collected sensory data to the base station (BS). The UAVs form a two-tier network with two kinds of communication modes, i.e., UAV-to-Network (U2N) and UAV-to-UAV (UAV) communications. We investigate the communic...
Preprint
Lots of real-time applications over Internet of things (IoT)-based status update systems have imperative demands on information freshness, which is usually evaluated by age of information (AoI). Compared to the average AoI and peak AoI (PAoI), violation probabilities and distributions of AoI and PAoI characterize the timeliness in more details. Thi...
Article
Full-text available
This paper presents GeoDMA , which processes the GPS data from multiple vehicles to detect anomalous driving maneuvers, such as rapid acceleration, sudden braking, and rapid swerving. First, an unsupervised deep auto-encoder is designed to learn a set of unique features from the normal historical GPS data of all drivers. We consider the temporal de...
Conference Paper
Federated learning enables multiple distributed devices to collaboratively learn a shared prediction model without centralizing their on-device data. Most of the current algorithms require comparable individual efforts for local training with the same structure and size of on-device models, which, however, impedes participation from resource-constr...
Article
Full-text available
This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profi...
Preprint
In the midst of an outbreak, identification of groups of individuals that represent risk for transmission of the pathogen under investigation is critical to public health efforts. Several approaches exist that utilize the evolutionary information from pathogen genomic data derived from infected individuals to distinguish these groups from the backg...
Article
Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning as a Service (MLaaS). Recent studies show that machine learning services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing att...
Article
Unsupervised domain adaptation (UDA) aims to utilize knowledge from a label-rich source domain to understand a similar yet distinct unlabeled target domain. Notably, global distribution statistics across domains and local semantic characteristics across samples, are two essential factors of data analysis that should be fully explored. Most existing...
Article
Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and communication tasks quickly, robustly, safely, and cost-efficiently via effective situation awareness and cooperation among UAVs. To achieve the promising benefits, the crucial IUAV networking issue should be tackled. This article argues that I-UAV networking can...
Article
The emerging network-softwarization technologies such as Software Defined Networking and Network Function Virtualization play important roles in 5G communication and future networks. One of the critical challenges of the practical application of the softwarized networks is to appropriately place virtual network functions (VNFs). The underlying reso...
Article
Resource allocation for mobile edge computing (MEC) in unmanned aerial vehicle (UAV) networks has been a popular research issue. Different from existing works, this paper considers a multi-UAV-aided uplink communication scenario and investigates a resource allocation problem of minimizing the total system latency and the energy consumption, subject...
Article
Unmanned aerial vehicles (UAVs) play a crucial role in emergency-oriented applications. However, in UAV-aided Internet of Things (IoT) networks, the sensor nodes (SNs) would be mobile which poses a big challenge for trajectory planning of the UAV. In this paper, we investigate priority-oriented UAV-aided time-sensitive data collection problems in a...
Article
Resource provisioning for the ever-increasing applications to host the necessary network functions necessitates the efficient and accurate prediction of required resources. However, the current efforts fail to leverage the inherent features hidden in network traffic, such as temporal stability, service correlation and periodicity, to predict the re...
Article
Federated Edge Learning considers a large amount of distributed edge nodes collectively train a global gradient-based model for edge computing in the Artificial Internet of Things, which significantly promotes the development of cloud computing. However, current federated learning algorithms take tens of communication rounds transmitting unwieldy m...
Preprint
Full-text available
Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and transmission tasks quickly, robustly, and cost-efficiently via effective cooperation among UAVs. To achieve the promising benefits, the crucial I-UAV networking issue should be tackled. This article argues that I-UAV networking can be classified into three catego...
Article
With the wide deployment of edge devices, a variety of emerging applications have been deployed at the edge of network. To guarantee the safe and efficient operations of the edge applications, especially the extensive web applications, it is important and challenging to detect packet payload anomalies, which can be expressed as a number of specific...
Preprint
The accurate prediction of protein-ligand binding affinity is critical for the success of computer-aided drug discovery. However, the accuracy of current scoring functions is usually unsatisfactory due to their rough approximation or sometimes even omittance of many factors involved in protein-ligand binding. For instance, the intrinsic dynamic of...
Article
Graph clustering, i.e., partitioning nodes or data points into non-overlapping clusters, can be beneficial in a large varieties of computer vision and machine learning applications. However, main graph clustering schemes, such as spectral clustering, cannot be applied to a large network due to prohibitive computational complexity required. While th...
Preprint
In this paper, we propose a single-agent Monte Carlo based reinforced feature selection (MCRFS) method, as well as two efficiency improvement strategies, i.e., early stopping (ES) strategy and reward-level interactive (RI) strategy. Feature selection is one of the most important technologies in data prepossessing, aiming to find the optimal feature...
Article
Internet of Things (IoT) includes numerous sensing nodes that constitute a large scale-free network. Optimizing the network topology to increase resistance against malicious attacks is a complex problem, especially on 3-dimension (3D) topological deployment. Heuristic algorithms, particularly genetic algorithms, can effectively cope with such probl...
Article
In the areas after natural disaster strikes, the ground communication network can be failed, due to the damage of the communication infrastructure. However, during or after the natural disasters such as earthquakes or tsunamis, ground vehicles may not enter the effected areas easily to set up mobile base stations. Unmanned Aerial Vehicles (UAVs) ca...
Article
Widespread deployment of the Internet of Things (IoT) has changed network services in which people, processes, data, and things connect each other. According to Cisco, 500 billion devices are expected to be connected to the Internet by 2030, where IoT is the network of these connected devices. Currently, most advanced IoT devices are equipped with...
Article
Full-text available
Lots of machine learning tasks require dealing with graph data, and among them, scene graph generation is a challenging one that calls for graph neural networks’ potential ability. In this paper, we present a definition of graph neural network (GNN) consists of node, edge and global attribute, as well as their corresponding update and aggregate fun...
Article
The statistical values of the latencies between two sets of hosts over a given period, which is referred as to statistical latency, can benefit many applications in the next-generation networks, such as Network in a Box (NIB) based resource provisioning. However, existing methods can hardly achieve low measurement cost and high prediction accuracy...
Article
This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme...
Article
Indoor positioning technology based on Wi-Fi fingerprint recognition has been widely studied owing to the pervasiveness of hardware facilities and the ease of implementation of software technology. However, the similarity-based method is not sufficiently accurate, whereas the offline training of the neural network-based method is overly time-consum...
Article
In this paper, we develop a novel global-attention-based neural network (GANN) for vision language intelligence, specifically, image captioning (language description of a given image). As many previous works, the encoder-decoder framework is adopted in our proposed model, in which the encoder is responsible for encoding the region proposal features...
Article
The Internet of Things (IoT) has been extensively deployed in smart cities. However, with the expanding scale of networking, the failure of some nodes in the network severely affects the communication capacity of IoT applications. Therefore, researchers pay attention to improving communication capacity caused by network failures for applications th...
Article
Full-text available
Federated learning (FL) enables multiple clients to collaboratively build a global learning model without sharing their own raw data for privacy protection. Unfortunately, recent research still found privacy leakage in FL, especially on image classification tasks, such as the reconstruction of class representatives. Nevertheless, such analysis on i...
Preprint
Full-text available
This paper investigates whether computer usage profiles comprised of process-, network-, mouse- and keystroke-related events are unique and temporally consistent in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profi...
Article
Recognizing human expression in videos is a challenging task due to dynamic changes in facial actions and diverse visual appearances. The key to design a reliable video-based expression recognition system is to extract robust spatial features and make full use of temporal modality characteristics. In this paper, we present a novel network architect...
Article
Recently increasing real-time network applications have raised a new requirement for the future 6G network transmission, which desires the information-update packets arrive at the receiver as timely as possible. Multipath TCP (MPTCP) can be employed in the real-time update transmission system by making use of multiple paths so as to promote the inf...
Article
With the rapid growth in the demand for location-based services in indoor environments, wireless fingerprint localization has attracted increasing attention because of its high precision and easy implementation. However, an effective method does not exist owing to the problems of data loss, noise interference in the fingerprint database, and being...
Article
Future wireless networks are envisioned to serve massive Internet of things (mIoT) via some radio access technologies, where the random access channel (RACH) procedure should be exploited for IoT devices to access the networks. However, the theoretical analysis of the RACH procedure for massive IoT devices is challenging. To address this challenge,...
Preprint
Full-text available
Federated learning allows distributed devices to collectively train a model without sharing or disclosing the local dataset with a central server. The global model is optimized by training and averaging the model parameters of all local participants. However, the improved privacy of federated learning also introduces challenges including higher com...
Article
To enable insight extractions without the risk of information leakage, deep learning (DL) models are increasingly built on federated edge participants holding local data, in combination with differential privacy (DP). The core theme is to tradeoff learning accuracy by adding statistically calibrated noises, particularly to local gradients of edge l...
Article
Mobile Opportunistic Networks (MONs) are characterized by the lack of continuous end-to-end connectivity between two nodes due to node mobility, sparse deployment, and constrained resources. In order to fulfill ubiquitous communication requirements of them, social-aware routing, which exploits social ties and behaviors among nodes to make forwardin...
Article
Computed tomography (CT) images are formally taken as an assistance of early diagnosis in lung nodule analysis. Thus the accurate lung nodule segmentation is in great need for image-driven tasks. However, as heterogeneity exists between different types of lung nodules, the similar visual appearance between the pixels of nodules and pixels of non-no...
Article
Occupying the most significant portion of global data traffic, video is being generated in almost every aspect of our life. Because of its huge volume, we are depending much more heavily on machine intelligence based analysis. In the meantime, video coding technology has been continuously improved for better compression efficiency. However, the sta...
Article
Full-text available
Estimating the depth of image and egomotion of agent are important for autonomous and robot in understanding the surrounding environment and avoiding collision. Most existing unsupervised methods estimate depth and camera egomotion by minimizing photometric error between adjacent frames. However, the photometric consistency sometimes does not meet...
Article
Full-text available
Graph Neural Networks (GNNs) have been applied in many fields of semi-supervised node classification for non-Euclidean data. However, some GNNs cannot make good use of positive information brought by nodes which are far away from each central node for aggregation operations. These remote nodes with positive information can enhance the representatio...
Article
Large volumes of video data recorded by the increasing mobile devices and embedded sensors can be leveraged to answer queries of our lives, physical world and our evolving society. Especially, the rapid development of convolutional neural networks (CNNs) in the past few years offers the great advantage for multiple tasks in video analysis. However,...
Article
Full-text available
Long-term visual tracking undergoes more challenges and is closer to realistic applications than short-term tracking. However, the performances of most existing methods have been limited in the long-term tracking tasks. In this work, we present a reliable yet simple long-term tracking method, which extends the state-of-the-art learning adaptive dis...
Article
Full-text available
This paper is concerned with slicing a radio access network (RAN) for simultaneously serving two 5G-and-Beyond typical use cases, i.e., enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC). Although many researches have been conducted to tackle this issue, few of them have considered the impact of bursty URLLC....
Article
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering methods. Missing instances may make these methods difficult to use directly, and noises will lead to unreliable clustering results. In...
Article
Huanglongbing (HLB) is a devastating citrus disease worldwide. A three-pronged approach to controlling HLB has been suggested, namely, removal of HLB-symptomatic trees, psyllid control, and replacement with HLB-free trees. However, such a strategy did not lead to successful HLB control in many citrus producing regions. We hypothesize this is becaus...
Article
Computational drug design relies on the calculation of binding strength between two biological counterparts especially a chemical compound, i.e., a ligand, and a protein. Predicting the affinity of protein-ligand binding with reasonable accuracy is crucial for drug discovery, and enables the optimization of compounds to achieve better interaction w...
Chapter
Full-text available
Recently web applications have been widely used in enterprises to assist employees in providing effective and efficient business processes. Forecasting upcoming web events in enterprise web applications can be beneficial in many ways, such as efficient caching and recommendation. In this paper, we present a web event forecasting approach, DeepEvent...
Article
Random mobility models (RMMs) capture the random mobility patterns of mobile agents, and have been widely used as the modeling framework for the evaluation and design of mobile networks. All existing RMMs in the literature assume independent movements of mobile agents, which does not hold for unmanned aircraft systems (UASs). In particular, UASs mu...
Article
Unmanned aerial vehicle (UAV) relay networks are convinced to be a significant complement to terrestrial infrastructures to provide robust network capacity. However, most of the existing works either considered enhanced mobile broadband (eMBB) payload communication or ultra-reliable and low latency communications (URLLC) control information communi...
Preprint
Full-text available
Real data often appear in the form of multiple incomplete views. Incomplete multiview clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information between different views and ignore the unique information of each view, which limits their clustering performance and generalizations. To...
Preprint
Full-text available
Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous works assume that all views have the same incompleteness, i.e., balanced incompleteness. However, different views often have distinct incompleteness, i.e., unbalanced incompleteness, which results in strong views (low-incompletene...
Preprint
Full-text available
Multi-view clustering has wide applications in many image processing scenarios. In these scenarios, original image data often contain missing instances and noises, which is ignored by most multi-view clustering methods. However, missing instances may make these methods difficult to use directly and noises will lead to unreliable clustering results....
Article
Future wireless networks are convinced to provide flexible and cost-efficient services via exploiting network slicing techniques. However, it is challenging to configure slicing systems for bursty ultra-reliable and low latency communications (URLLC) service provision due to its stringent requirements on low packet blocking probability and low code...
Article
Erasure coding is widely used in distributed storage systems (DSSs) to efficiently achieve fault tolerance. However, when the original data need to be updated, erasure coding must update every encoded block, resulting in long update time and high bandwidth consumption. Exiting solutions are mainly focused on coding schemes to minimize the size of t...
Article
In this paper, a resource allocation problem is formulated to maximize the throughput of vehicular user equipments (VUEs) in both licensed, and unlicensed frequency bands under constraints of reliability, and latency for vehicular communications as well as the Quality of Service (QoS) for WiFi network based on a network system with coexisting VUEs,...
Article
Full-text available
Internet of Underwater Things (IoUT) has a wide range of application prospects in civil and military fields. As a key enabling technology of IoUT, Underwater acoustic sensor networks (UASNs) feature a variety of unique characteristics, including high latency, high mobility and low bandwidth. All these problems pose challenges in the design of effic...
Preprint
Full-text available
Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning as a Service (MLaaS). Recent studies show that machine learning services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing att...
Preprint
Current federated learning algorithms take tens of communication rounds transmitting unwieldy model weights under ideal circumstances and hundreds when data is poorly distributed. Inspired by recent work on dataset distillation and distributed one-shot learning, we propose Distilled One-Shot Federated Learning, which reduces the number of communica...