Jianping Wu's research while affiliated with Tsinghua University and other places

Publications (495)

Article
Full-text available
Due to the inherent difficulty in direct observation of traffic demand (including generation, attraction, and assignment), the estimation of origin–destination (OD) poses a significant and intricate challenge in the realm of Intelligent Transportation Systems. As the state-of-the-art methods usually focus on a single traffic demand distribution, ac...
Article
Few-shot action recognition has attracted increasing attention in recent years, but it remains challenging due to the intrinsic difficulty in learning transferable knowledge to generalize to novel classes by using a few labeled samples. Although some successful progress has been made, most few-shot action recognition methods commonly focus on the g...
Article
Full-text available
Driving pattern has been increasingly researched to improve driving safety and develop autonomous vehicles. Oriented towards the complex infrastructures at signalized intersections, this research digs into the risk sources brought by different kinds of road elements, including road lane markings, road curbs, median separators, signal timing, and ne...
Conference Paper
Full-text available
As one cornerstone of Internet infrastructure, Content Delivery Networks (CDNs) work as a globally distributed proxy platform between clients and websites, providing the functionalities of speeding up content delivery, offloading web traffic, and DDoS protection. In this paper, however, we reveal that inherent nature of CDN forwarding network can b...
Article
The correctness and reliability of modern networks are often the greatest concerns. A myriad network events like software update, device crash and resource exhaustion, inevitably lead to liveness errors on data plane. This paper focuses on fault detection of the network data plane using test packets. Existing test packet generation techniques are l...
Preprint
Autonomous Intersection Management (AIM) provides a signal-free intersection scheduling paradigm for Connected Autonomous Vehicles (CAVs). Distributed learning method has emerged as an attractive branch of AIM research. Compared with centralized AIM, distributed AIM can be deployed to CAVs at a lower cost, and compared with rule-based and optimizat...
Article
Platooning and coordination are two implementation strategies that are frequently proposed for traffic control of connected and autonomous vehicles (CAVs) at signal-free intersections instead of using conventional traffic signals. However, few studies have attempted to integrate both strategies to better facilitate the CAV control at signal-free in...
Article
Internet content providers (ICPs) typically exploit content distribution networks (CDNs) to provide wide-area data access with high availability and low latency. However, our analysis on a large-scale trace collected from seven major CDN operators has revealed that: from a global perspective, there are still a large portion of users suffering from...
Article
Frequent happened extreme weather events (EWEs) cause severe disruptions to the operation of large-scale urban road network. Perimeter control is of high application potential in the target scenarios. However, few studies are concerned about the lacking knowledge of the system's response features under EWE. In this work, we proposed a network resil...
Article
Video captioning evaluation aims at assessing the semantic consistency between video and candidate text, which should include measurement from two aspects: faithfulness (whether the information conveyed by candidate is correct w.r.t. video) and comprehensiveness (whether the main video content is covered by candidate). However, previous approaches...
Article
As a cutting‐edge strategy to reduce travel delay and fuel consumption, platooning of connected and autonomous vehicles (CAVs) at signal‐free intersections has become increasingly popular in academia. However, when determining optimal platoon size, few studies have attempted to comprehensively consider the relations between the size of a CAV platoo...
Chapter
Dominant pre-training work for video-text retrieval mainly adopt the “dual-encoder” architectures to enable efficient retrieval, where two separate encoders are used to contrast global video and text representations, but ignore detailed local semantics. The recent success of image BERT pre-training with masked visual modeling that promotes the lear...
Article
To reduce the investment on network infrastructure, many online service providers have begun to adopt the shared inter-DataCenter Wide Area Network (inter-DC WAN) that connects different datacenters and Internet Service Providers (ISPs). The shared inter-DC WAN accommodates two kinds of traffic, i.e. delay-sensitive ISP-facing traffic and high-thro...
Preprint
Full-text available
Platooning and coordination are two implementation strategies that are frequently proposed for traffic control of connected and autonomous vehicles (CAVs) at signal-free intersections instead of using conventional traffic signals. However, few studies have attempted to integrate both strategies to better facilitate the CAV control at signal-free in...
Preprint
As a strategy to reduce travel delay and enhance energy efficiency, platooning of connected and autonomous vehicles (CAVs) at non-signalized intersections has become increasingly popular in academia. However, few studies have attempted to model the relation between the optimal platoon size and the traffic conditions around the intersection. To this...
Preprint
Full-text available
Weakly-supervised action localization aims to localize and classify action instances in the given videos temporally with only video-level categorical labels. Thus, the crucial issue of existing weakly-supervised action localization methods is the limited supervision from the weak annotations for precise predictions. In this work, we propose a hiera...
Article
Direct Cache Access (DCA) enables a network interface card (NIC) to load and store data directly on the processor cache, as conventional Direct Memory Access (DMA) is no longer suitable as the bridge between NIC and CPU in the era of 100 Gigabit Ethernet. As numerous I/O devices and cores compete for scarce cache resources, making the most of DCA f...
Preprint
Since the development of self-supervised visual representation learning from contrastive learning to masked image modeling, there is no significant difference in essence, that is, how to design proper pretext tasks for vision dictionary look-up. Masked image modeling recently dominates this line of research with state-of-the-art performance on visi...
Preprint
As an emerging tendency of future transportation, Connected Autonomous Vehicle (CAV) has the potential to improve traffic capacity and safety at intersections. In autonomous intersection management (AIM), distributed scheduling algorithm formulates the interactions among traffic participants as multi-agent problem with information exchange and beha...
Preprint
Dominant pre-training work for video-text retrieval mainly adopt the "dual-encoder" architectures to enable efficient retrieval, where two separate encoders are used to contrast global video and text representations, but ignore detailed local semantics. The recent success of image BERT pre-training with masked visual modeling that promotes the lear...
Article
Full-text available
With the development of autonomous driving technologies, robo-taxis (shared autonomous vehicles) are being tested on real roads. In China, in particular, people in some cities such as Beijing and Shanghai can book a robo-taxi online and experience the service. To examine the influential factors on user acceptance of robo-taxi services, this study p...
Preprint
Full-text available
Recent dominant methods for video-language pre-training (VLP) learn transferable representations from the raw pixels in an end-to-end manner to achieve advanced performance on downstream video-language tasks. Despite the impressive results, VLP research becomes extremely expensive with the need for massive data and a long training time, preventing...
Preprint
Mainstream Video-Language Pre-training models \cite{actbert,clipbert,violet} consist of three parts, a video encoder, a text encoder, and a video-text fusion Transformer. They pursue better performance via utilizing heavier unimodal encoders or multimodal fusion Transformers, resulting in increased parameters with lower efficiency in downstream tas...
Article
Direct Cache Access (DCA) enables a network interface card (NIC) to load and store data directly on the processor cache, as conventional Direct Memory Access (DMA) is no longer suitable as the bridge between NIC and CPU in the era of 100 Gigabit Ethernet. As numerous I/O devices and cores compete for scarce cache resources, making the most of DCA f...
Article
Network Function Virtualization (NFV) is a new networking paradigm to enable dynamic network function deployment in networks. Existing studies focused on optimized function deployment and management in NFV. Unfortunately, these studies did not well address the problem of efficient security function enforcement in networks, which is the goal of depl...
Article
Futuristic 6G technologies will integrate emerging low-Earth orbit (LEO) megaconstellations into terrestrial networks, promising to provide ubiquitous, low-latency and high-throughput network services on-demand. However, several unique characteristics of satellites (e.g., high dynamics and error-prone operational environments) make it very challeng...
Article
In this paper, we identify the opportunity of using programmable switches to improve the state of the art in spoofed IP traffic filtering, and propose NetHCF , a line-rate in-network system to filter spoofed traffic. One key challenge in the design of NetHCF is to handle the restrictions stemmed from the limited computational model and memory r...
Article
Full-text available
Traffic accident management as an approach to improve public security and reduce economic losses has received public attention for a long time, among which traffic accidents post-impact prediction (TAPIP) is one of the most important procedures. However, existing systems and methodologies for TAPIP are insufficient for addressing the problem. The d...
Article
Network monitoring systems are designed to fulfill operators’ intents and serve as essential tools to modern networks. As a result of rapidly increasing network bandwidth and scale nowadays, network monitors should satisfy on-demand network monitoring for continuously growing traffic volumes. However, existing monitoring systems either cannot satis...
Preprint
Origin-Destination Estimation plays an important role in traffic management and traffic simulation in the era of Intelligent Transportation System (ITS). Nevertheless, previous model-based models face the under-determined challenge, thus desperate demand for additional assumptions and extra data exists. Deep learning provides an ideal data-based me...
Conference Paper
Full-text available
We study a new design objective for “Internet in space” for terrestrial users: To align logical network topology, address, and route in the virtual cyberspace with movements of satellite mega-constellations and earth’s rotations in the real physical world. We explain why this is particularly desirable by the recent low-earth-orbit (LEO) mega-conste...
Article
The emergence of Software Defined Network (SDN) provides a centralized and flexible approach to route network flows. Due to the technical and economic challenges in upgrading to a fully SDN-enabled network, hybrid SDN, with a partial deployment of SDN switches in a traditional network, has been a prevailing network architecture. Meanwhile, Traffic...
Article
Modern network devices and systems are raising higher requirements on network testers that are regularly used to evaluate performance and assess correctness. These requirements include high scale, high accuracy, flexibility and low cost, which existing testers cannot fulfill at the same time. In this paper, we propose HyperTester, a network tester...
Preprint
Full-text available
We present F-Rosette, a stable space-ground network structure for low-earth orbit (LEO) satellite mega-constellations at scale. Due to the dynamic many-to-many space-ground mapping in high mobility, existing LEO mega-constellations with IP protocol stack suffer from frequent user IP address changes (every 133~510s per user) and network routing re-c...
Article
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet. Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can easily compromise a large set of nodes and launch high-volume DDoS attacks from the botnets. State-of-the-art DDoS defenses, however, have not caught up with the fast...
Article
Network Function Virtualization (NFV) offers service delivery flexibility and reduces overall costs by running service function chains (SFCs) on commodity servers with many cores. Existing solutions for placing SFCs in one server treat all CPU cores as equal and allocate isolated CPU cores to network functions (NFs). However, advanced servers often...
Article
Most video players use adaptive bitrate (ABR) algorithms to provide good quality-of-experience (QoE) in dynamic network conditions. To deal with the adaptation challenges, many ABR algorithms select bitrate by optimizing a defined QoE function. Within the framework, various algorithms mainly differ in how the optimization problem is solved, includi...
Article
The emergence of Software Defined Networking (SDN) increases the flexibility of routing and provides an efficient approach to balance network flows. Due to the economical and technical challenges in transiting to a full SDN-enabled network, a hybrid SDN, with a partial deployment of SDN switches in a traditional network, has been a prevailing netwo...
Article
Live video applications are getting popular, and content providers widely use adaptive bitrate (ABR) streaming to improve QoE while maintaining low latency. However, users’ increasing preference to watch videos on mobile devices poses great challenges for ABR algorithm due to the dramatically varying cellular network. Existing learn-based ABR algor...
Article
In this paper, we investigate the performance bottleneck of existing deep learning (DL) systems and propose DLBooster to improve the running efficiency of deploying DL applications on GPU clusters. At its core, DLBooster leverages two-level optimizations to speed up the end-to-end DL workflow. On the one hand, DLBooster selectively offloads some ke...
Article
Software-Defined Networking (SDN) continues to be deployed spanning from enterprise data centers to cloud computing with the proliferation of various SDN-enabled hardware switches and dynamic control plane applications. However, state-of-the-art SDN-enabled hardware switches have rather limited downlink message processing capability, especially for...
Article
With the advent of network function virtualization (NFV), outsourcing network functions (NFs) to the cloud is becoming increasingly popular for enterprises since it brings significant benefits for NF deployment and maintenance, such as improved scalability and reduced overhead. However, NF outsourcing limits the control of customer enterprises over...
Article
Full-text available
Autonomous vehicles (AVs) have been reported to improve road safety, reduce traffic congestion, and increase urban mobility. However, the high price of AVs is currently a challenge for most consumers. Robo-taxi services, with ride-sharing services and AVs, are regarded as a good approach to solving this problem. As some companies have started testi...
Article
Full-text available
Controlling traffic signals to alleviate increasing traffic pressure is a concept that has received public attention for a long time. However, existing systems and methodologies for controlling traffic signals are insufficient for addressing the problem. To this end, we build a truly adaptive traffic signal control model in a traffic microsimulator...
Article
Full-text available
Car-following (CF) and lane-changing (LC) behavior models have been widely studied separately as the core models of traffic simulation. However, in practice, CF and LC are inseparable and thus integrated driving (ID) models containing CF and LC behaviors emerge. Here, we proposed a new work to introduce the social force (SF) model to the operationa...
Article
Emerging technologies such as the Internet of Things (IoT) and connected vehicles enable urban roadway system more tightly integrated as a Cyber-Physical System (CPS). Accordingly, cyber-physical resilience brings the system with new mitigation strategy interpretation, specifically when being disrupted by rainfall and its induced waterlogging risk....
Article
In large-scale distributed machine learning (DML), the network performance between machines significantly impacts the speed of iterative training. In this paper we propose BML , a scalable, high-performance and fault-tolerant DML network architecture on top of Ethernet and commodity devices. BML builds on BCube topology, and runs a fully-distribu...
Article
Network telemetry is to collect information (e.g., hop latency, throughput) from network devices. Network-wide telemetry is critical for operators to understand the quality of network performance and to diagnose on-going failures. The state-of-the-art telemetry approaches are far from ideal as they are unable to fully satisfy diverse requirements o...
Article
Configuring a network is always difficult and error-prone because of low-level configuration languages and complex routing mechanisms. Most network outages occur when network the configuration is updated. Thus, it is important to proactively verify network configurations. Unfortunately, there are two practical obstacles that inhibit the performance...
Chapter
The city is gradually becoming the most significant carrier of current economic society, in which critical infrastructures (CI), such as transportation, energy, and healthcare, are backbones for the operation of cities. In the meantime, it’s not uncommon in our cities to see traffic congestion, shortage of resources, or environmental pollution, wit...
Article
Full-text available
The emerging technology of vehicle-to-vehicle (V2V) communication, vehicle-toinfrastructure (V2I) communication makes it possible for vehicles to sense the environment information, which can be exploited to assist the vehicle in cooperative motion planning. In this paper, we focus on the cooperative trajectory planning of lane changes for connected...
Article
With the development of information communication and artificial intelligence, the ICV (intelligent connected vehicle) will inevitably play an important part in future urban transport system. In this paper, we study the car following behaviour under the heterogeneous ICV environment. The time to receive information varies from vehicle to vehicle, s...
Article
Guaranteeing that large scale networks are always operated as policy goals dictate is critical for network availability, security, and performance. The problem is challenging, as it should not only assure the correctness of policy configurations across various network devices, but also guarantee the faithfulness of policy enforcement on actual pack...
Chapter
This chapter analyzes the overall trend of Internet development, and discusses the research and development effort on new network architectures. Further, the chapter summarizes the development trend of Internet in China and proposes some suggestions on the future Internet development.
Conference Paper
Full-text available
The popularity of online gambling could bring negative social impact, and many countries ban or restrict online gambling. Taking China for example, online gambling violates Chinese laws and hence is illegal. However, illegal online gambling websites are still thriving despite strict restrictions, since they are able to make tremendous illicit profi...
Conference Paper
Modern network research and operations are inseparable from network testers to evaluate performance limits of proofs-of-concept, troubleshoot failures, etc. Existing network testers suffer from either constrained flexibility or a low performance-cost ratio. In this paper, we propose a new network tester, HyperTester. The core of HyperTester is to l...
Article
With increasing demands for more flexible services, the routing policies in enterprise networks become much richer. This has placed a heavy burden to the current router forwarding plane in support of the increasing number of policies, primarily due to the limited capacity in TCAM, which further hinders the development of new network services and ap...
Conference Paper
Full-text available
DNS packets are designed to travel in unencrypted form through the Internet based on its initial standard. Recent discoveries show that real-world adversaries are actively exploiting this design vulnerability to compromise Internet users' security and privacy. To mitigate such threats, several protocols have been proposed to encrypt DNS queries bet...
Preprint
Higher dimensional classification has attracted more attentions with increasing demands for more flexible services in the Internet. In this paper, we present the design and implementation of a two dimensional router (TwoD router), that makes forwarding decisions based on both destination and source addresses. This TwoD router is also a key element...