Mianxiong Dong's research while affiliated with Muroran Institute of Technology and other places

Publications (428)

Article
A fundamental issue of the vehicular digital twin (DT) is efficiently synchronizing the data between the DT and the vehicular user (VUE). In this paper, we consider the heterogeneous vehicular networks (HetVNets) in which a VUE can connect to the network through different networks. The HetVNets can improve the efficiency of communication by providi...
Preprint
Full-text available
p>Traffic signal control plans significantly impact transportation system efficiency at intersections. Adaptive plans that adjust to real-time conditions are more effective. Reinforcement learning (RL) adapts strategies based on environmental feedback, making it proficient in handling dynamic traffic scenarios. However, current RL methods have long...
Preprint
Full-text available
p>Traffic signal control plans significantly impact transportation system efficiency at intersections. Adaptive plans that adjust to real-time conditions are more effective. Reinforcement learning (RL) adapts strategies based on environmental feedback, making it proficient in handling dynamic traffic scenarios. However, current RL methods have long...
Article
The aim of this paper is to present a groundwork on the delay-minimized routing problem in a vehicular ad-hoc network (VANET) where some of the vehicles are equipped with full-duplex (FD) radios. We first give the generalized delay calculation model for a multi-hop path, and prove that the Dijkstra algorithm is unable to get the delay-minimized rou...
Article
In this work, we design a covert jamming scheme against an intelligent Eve towards physical layer security in a cooperative cognitive radio networks. To protect the primary message from being decoded by an intelligent eavesdropper (Eve), a secondary user is picked as a friendly jammer that transmits artificial noise (AN) to the Eve. However, the in...
Article
Emotion plays a critical role in making the computer more human-like. As the first and most essential step, emotion recognition emerges recently as a hot but relatively nascent topic, i.e., current research mainly focuses on single modality (e.g., facial expression) while human emotion expressions are multi-modal in nature. To this end, we propose...
Article
The effective utilization of computation and communication resources is one of the primary challenges for Artificial Intelligence (AI)-based applications. The complexity of the edge computation environment and the diversity of communication interference in the wireless environment make it particularly difficult to quickly and accurately complete mu...
Preprint
Full-text available
For multiple Unmanned-Aerial-Vehicles (UAVs) assisted Mobile Edge Computing (MEC) networks, we study the problem of combined computation and communication for user equipments deployed with multi-type tasks. Specifically, we consider that the MEC network encompasses both communication and computation uncertainties, where the partial channel state in...
Article
Full-text available
Time series data mining techniques have attracted extensive attention from researchers worldwide. Of these techniques, time series classification is an important part of time series mining. Among the many time series classification algorithms, methods based on the bag-of-patterns algorithm have attracted much attention from researchers because of t...
Article
Full-text available
Server logs are always essential in website maintenance. The services maintained may encounter various problems, and the logs generated by the server are the core data for locating the problem. However, existing log storage systems are susceptible to single points of failure, which can lead to potential log leakage. Meanwhile, external adversaries...
Article
Secure ultra-reliable low-latency communication (URLLC) has become a crucial requirement of mission-critical Internet of Things (IoT) applications and use cases including automotive driving, remote surgery, and many others. However, it is still challenging to protect initial access of massive IoT devices over wireless channels, especially when mali...
Article
Nowadays, wireless charging has become one of the most popular technologies in Internet of Things (IoT), which makes electric devices battery-free and flexible. The electromagnetic coupling in antenna design is important to push the range limits beyond the near field. Previous studies did not consider the coupling among coils and they do not work f...
Article
Resource allocation is conceived for cell-free (CF) massive multi-input multi-output (MIMO)-aided ultra-reliable and low latency communication (URLLC) systems. Specifically, to support multiple devices with limited pilot overhead, pilot reuse among the users is considered, where we formulate a joint pilot length and pilot allocation strategy for ma...
Article
This paper investigates the optimal data transmission for collaborative driving in autonomous vehicular networks (AVNs). We consider that vehicles communicate with each other based on the definition of Robot Operating System (ROS), which is a pervasively adopted middleware operating system for autonomous vehicles such as Baidu Apollo. ROS defines a...
Article
Full-text available
Vital sign (breathing and heartbeat) monitoring is essential for patient care and sleep disease prevention. Most current solutions are based on wearable sensors or cameras; however, the former could affect sleep quality, while the latter often present privacy concerns. To address these shortcomings, we propose Wital, a contactless vital sign monito...
Article
Underwater acoustic sensor networks (UASNs) are among the most critical tools for underwater environment sensing and information acquisition. Since the complexity of the underwater environment renders battery replenishment and replacement more difficult and UASNs are mainly powered by batteries built into the underwater acoustic sensor nodes, the o...
Preprint
Full-text available
Vital sign (breathing and heartbeat) monitoring is essential for patient care and sleep disease prevention. Most current solutions are based on wearable sensors or cameras; however, the former could affect sleep quality, while the latter often present privacy concerns. To address these shortcomings, we propose Wital, a contactless vital sign monito...
Article
The mobile edge computing (MEC) technology can simultaneously provide high-speed computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) networks. Nevertheless, due to the open feature of the wireless offloading channels and the high mobility of the vehicles, the security and stability of the offloading process would...
Article
This paper considers computation offloading and service caching in a three-tier mobile cloud-edge computing structure, in which Mobile Users (MUs) have subscribed to the Cloud Service Center (CSC) for computation offloading services and paid related fees monthly or yearly, and the CSC provides computation services to subscribed MUs and charges serv...
Article
Full-text available
Mediated semi-quantum key distribution (M-SQKD) allows two “semi-quantum” or “classical” users to establish a secret key with the help of a third party (TP), in which TP has full quantum power and possibly adversarial. It is the basis of the multi-party semi-quantum cryptography protocol for securing the private data of classical users. In this wor...
Preprint
Full-text available
Resource allocation is conceived for cell-free (CF) massive multi-input multi-output (MIMO)-aided ultra-reliable and low latency communication (URLLC) systems. Specifically, to support multiple devices with limited pilot overhead, pilot reuse among the users is considered, where we formulate a joint pilot length and pilot allocation strategy for ma...
Article
Thyroid cancer is the most pervasive disease in the endocrine system and is getting extensive attention. The most prevalent method for an early check is ultrasound examination. Traditional research mainly concentrates on promoting the performance of processing a single ultrasound image using deep learning. However, the complex situation of patients...
Article
Millimeter wave (mmWave) massive multiple-input multiple-output (massive MIMO) is one of the most promising technologies for the fifth generation and beyond wireless communication system. However, a large number of antennas incur high power consumption and hardware costs, and high-frequency communications place a heavy burden on the analog-to-digit...
Preprint
This paper considers an active reconfigurable intelligent surface (RIS)-aided integrated sensing and communication (ISAC) system. We aim to maximize Radar signal-to-interference-plus-noise-ratio (SINR) by jointly optimizing the beamforming matrix at the dual-function Radar-communication (DFRC) base station (BS) and the reflecting coefficient matrix...
Article
Video Frame Interpolation (VFI) is a fascinating and challenging problem in the computer vision (CV) field, aiming to generate non-existing frames between two consecutive video frames. In recent years, many algorithms based on optical flow, kernel, or phase information have been proposed. In this paper, we provide a comprehensive review of recent d...
Preprint
Full-text available
Millimeter wave (mmWave) massive multiple-input multiple-output (massive MIMO) is one of the most promising technologies for the fifth generation and beyond wireless communication system. However, a large number of antennas incur high power consumption and hardware costs, and high-frequency communications place a heavy burden on the analog-to-digit...
Article
Abstract--In sixth-generation (6G) wireless communications, deep learning will still be essential for the Internet of Vehicles (IoV). 6G will bring new opportunities and challenges to current deep learning systems applied in the IoV environment. This article introduces a new framework named Learning IoV in 6G, focusing on the deep learning applicat...
Article
Recurrent neural network (RNN), a branch of deep learning, is a powerful model for sequential data that has outstanding performance on a wide range of important Internet of Things (IoT) tasks. This unprecedented growth of RNN model has however encountered both heterogeneous IoT data and privacy issues. Existing RNN model can not deal with heterogen...
Article
Dynamically scaling Virtual Network Function (VNF) is essential for network operators to make their networks accommodate time-varying network traffic. However, current research only applies homogeneous VNF scaling or focuses on mathematical optimizations without implementations in a real-world environment. To build this gap, this paper presents HyS...
Article
The blockchain-based Internet of Things (IoT) has served widely across various industries for authentication, cooperation, and data sharing but faced the severe challenge of storage scalability. The storage burden gets worse for IoT devices with limited resources. The state data is essential for efficient transaction issuance and validation. This p...
Article
Full-text available
Nowadays, one of the main challenges in expanding AI applications is the effective use of Computation, Communication, and Caching (3C) resources. The complexity of the cloud environment and the diversity of resource usage make it challenging to complete federated learning tasks in a cost-effective, timely, and seamless manner. To address these issu...
Article
Full-text available
For multiple Unmanned-Aerial-Vehicles (UAVs) assisted Mobile Edge Computing (MEC) networks, we study the problem of combined computation and communication for user equipments deployed with multi-type tasks. Specifically, we consider that the MEC network encompasses both communication and computation uncertainties, where the partial channel state in...
Article
Along with emerging mobile Internet applications embedded in tremendous growth of computing demand, mobile edge computing (MEC) could effectively address the issue of compute-intensive and latency-sensitive computation imposed on mobile terminals through performing computation offloading strategies. However, how to find optimal decisions of transmi...
Article
With the advancement of mobile communication technology, there has been a marked increase in the demand for personalized and ubiquitous Internet-of-Things (IoT) services, raising the expectations for network quality of service (QoS) and quality of experience (QoE). Existing popularity prediction-based content caching policies improve QoS and QoE by...
Article
The unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) networks exist security and privacy issues on task offloading, which can not be tackled by conventional security mechanisms. In this paper, we consider consortium blockchain combined with UAV-assisted MEC networks to overcome these challenges. An improved Delegated Proof of Stak...
Article
In this paper, we investigate physical layer security in full-duplex (FD) millimeter-wave (mmWave) communication system, where an FD receiver generates the jamming signal at the destination to protect the confidential message. Secrecy rate and secrecy throughput are selected as metrics to characterize the secrecy performance. We analyze and derive...
Article
As a promising edge computing paradigm, task offloading involves transferring data from resource-limited devices to high-performance servers to expedite processing. However, devices in isolated networks without direct Internet connections face challenges in task offloading. To address this issue, we propose a novel Low-cost Unmanned Aerial Vehicle...
Article
Quantum sealed-bid auction (QSA) is expected to provide an alternative to classical sealed-bid auction to defend against attacks from quantum adversaries. However, most previous QSA protocols required bidders to have quantum operation capabilities, resulting in excessive quantum resource requirements. To relieve the burden of protocol quantum resou...
Article
Generalized Processor Sharing (GPS) under self-similar traffic is widely used for guiding resource allocation in modern communication networks where performance evaluation, i.e., average waiting queue length and average waiting queue delay, is the key step. Due to its high complexity and unknown inherent relations, theoretically attaining the accur...
Article
Semantic segmentation is a critical area in computer vision, which needs voluminous image data streaming from user devices. Usually, it is challenging to process semantic segmentation tasks in user devices due to the limited computation power and battery life. Intelligent edge computing effectively enhances the accuracy of semantic segmentation tas...
Article
Internet of medical things (IoMT) aggregates a series of smart medical devices and fully uses the collected health data to improve user experience, medical resource utilization, and full life cycle protection. However, privacy leakage, data loss, and inefficient sharing problems are still serious in the data-sharing process between different smart...
Article
Mobile CrowdSensing (MCS) is a crucial component in the Industrial Internet of Things (IIoT), mainly due to its role in collecting data and enhancing applications. Nonetheless, it faces challenges in maintaining data quality and cost efficiency. Low-quality workers and their deceptive data bids undermine the trustworthiness of MCS data collection....
Article
This article explores the optimal offloading strategy in the Internet of Vehicles (IoVs), which is challenged by three issues. First, the resources of edge servers are shared by multiple vehicles, leading to random changes over time. Second, as a vehicle would drive across consecutive edge servers, the offloading strategy needs to consider the over...
Article
With the ubiquitous of WiFi infrastructure, wireless signals-based indoor localization is attracting intensive attentions and fostered a range of intelligent applications. However, most of existing schemes fail to capture the full scope of the relationship between WiFi signals and physical locations. To tackle this issue, we present a framework for...
Article
Mobile edge computing (MEC) offers promising solutions for various delay-sensitive vehicular applications by providing high-speed computing services for a large number of user vehicles simultaneously. In this paper, we investigate non-orthogonal multiple access (NOMA) assisted secure offloading for vehicular edge computing (VEC) networks in the pre...
Article
Healthchain is a new solution for electronic medical record (EMR) management in the Internet of Medical Things, which avoids data island and information tampering problems by applying blockchain technology. However, some attacks are executed on the cryptographic algorithm to steal user privacy. This article focuses on the privacy security of system...
Article
This paper considers an active reconfigurable intelligent surface (RIS)-aided integrated sensing and communication (ISAC) system. We aim to maximize radar signal-to-interference-plus-noise-ratio (SINR) by jointly optimizing the beamforming matrix at the dual-function radar-communication (DFRC) base station (BS) and the reflecting coefficients at th...
Article
As Industrial Internet of Things (IIoT) systems have superior distributed characteristics, Federated Learning (FL) has gradually become a mainstream distributed computing paradigm in recent years, promoting its intelligent development. A key factor of FL is the model accuracy, which relies on the truth of the participating Industrial Edge Device (I...
Article
Due to hardware limitations, Internet of Things (IoT) devices without integrated security become easy targets for network attacks. IoT device identification is significant for network security management. Despite many efforts, previous studies either require excessive features raising concerns about efficiency and privacy, or underutilize the data...
Preprint
Machine learning as a service (MLaaS) framework provides intelligent services or well-trained artificial intelligence (AI) models for local devices. However, in the process of model transmission and deployment, there are security issues, i.e. AI model leakage due to the unreliable transmission environments and illegal abuse at local devices without...
Article
Underwater acoustic sensor networks (UASNs) currently provide an important technical means of underwater communication, but there are difficulties in power updating or power replenishment because the sensor nodes work in an underwater environment. Therefore, energy consumption optimization has become the focus of research on UASNs. Node clustering...
Article
Along with applying blockchain technology in the health care service system (HSS), many distributed solutions have been proposed to solve the centralized, data island problems. Although blockchain-enabled HSS has significantly changed the traditional management mode of medical Big Data [e.g., electronic medical records (EMRs)], some new problems su...
Article
With the transmission and sharing of data in the Internet of Things (IoT), while bring development to life and the economy, it also inevitably threatens the data copyright protection and authentication. Digital watermarking technology can provide an effective solution for copyright protection by embedding the watermark in the data to prove the copy...
Article
The advances of both computation and communication technologies facilitate the exploitation of massive data generated by mobile devices. It is attractive to leverage these data and computation resources to train high-performance machine learning (ML) models. In traditional ML methods, all data are uploaded to servers for model training, which incur...
Article
Full-text available
The global population is aging due to many factors, including longer life expectancy through better healthcare, changing diet, physical activity, etc. We are also witnessing various frequent epidemics as well as pandemics. The existing healthcare system has failed to deliver the care and support needed to our older adults (seniors) during these fre...
Article
Vehicles on the road are expected to connect continuously to the Internet at sufficiently high speeds, e.g., several Mbps or higher, to support multimedia applications. However, even when passing through a well-facilitated city area, Internet access can be unreliable and even disconnected if the travel speed is high. We therefore propose a network...
Article
In Mobile Crowd Sensing (MCS), the platform publishes sensing tasks with the requirements of location, time and data attributes and hires participants to perform sensing tasks, thus it can collect and process mass of sensing data to construct various applications and publish them to service requesters, which is a low cost and effective method for l...
Article
Despite wearable electronic devices have enormous potential applications, the recording quality has not sufficiently met the requirements for fetal disease detection. In this paper, we aim to propose a novel framework for fetal ECG extraction, where the hybrid approach mainly considers the combination of a novel adaptive maternal QRS removal (AQRSR...
Article
Vehicular Ad hoc Networks (VANETs), as the integration of mobile vehicle and intelligent technology, has raised plenty of attentions. In VANETs, mobile smart vehicles can timely get information from surrounding environment, which brings great convenience for society. However, this highlights the need to improve data quality while protecting privacy...
Article
Fog computing provides new ideas for solving big data problems in the Internet of Things (IoT) era. With fog computing, we can save a lot of time on long-distance transmission, thereby increasing the efficiency of network service. However, before entering the stage of implementation, we need to properly handle the many-to-many relationship between...
Article
Cloud storage and edge computing provide the possibility to address the tremendous storage and computing pressure caused by the explosive growth of traffic at the edge of the networks. In this scene, as data is outsourced to the cloud or edge servers, data privacy can be leaked. For enhancing security and privacy, attribute-based searchable encrypt...
Article
With the rapid development of wireless communication technologies, the emerging multimedia applications make mobile Internet traffic grow explosively while putting forward higher service requirements for the next-generation wireless networks. Therefore, how to achieve low-latency content transmission by effectively allocating heterogeneous network...
Article
Millimeter wave (Mmwave) communication can realize high rate service for the upcoming Internet of Things (IoT) networks. Although directional multiantenna gains can help enhance security, randomly distributed eavesdroppers can still intercept confidential messages by residing in both the main-lobe and side-lobe areas of the beam signal. Considering...
Article
Time delay has always been one of the main factors affecting the application performance of neural network (NN) systems, and dynamic performance research of NNs with time delays has been the focus of many scholars in recent years. This article enquires into the exponentially synchronous problem of switched delayed NNs with time delay in the leakage...
Article
Gestures constitute an important form of nonverbal communication where bodily actions are used for delivering messages alone or in parallel with spoken words. Recently, there exists an emerging trend of WiFi sensing-enabled gesture recognition due to its inherent merits like remote sensing, non-line-of-sight covering, and privacy-friendly. However,...
Chapter
Quantum private comparison (QPC) is the quantum method that can compare the equality of the distrustful participants’ private information without leaking them. The 4-particle cluster state has a strong violation of local reality and shows to be robust against decoherence than any other 4-particle state. In this paper, a new efficient QPC protocol b...
Article
This letter studies the task offloading in reputation-based consortium blockchain networks, where the tasks are transmitted to Edge Computing Servers (ECSs) due to limited resources. We propose a novel Delegated Proof of Stake (DPoS) consensus mechanism in which validation nodes (including active nodes and backup nodes) are voted based on their rep...
Article
Efficient transmission resource allocation in medium access control (MAC) is essential for ensuring high performance in vehicular ad hoc networks (VANETs). However, existing solutions cannot satisfy the requirements of high throughput and low delay in high-density environments. In this article, we propose a timeslot-reserved MAC protocol to meet su...
Article
Artificial Intelligence of Things (AIoT) is an emerging area of future Internet of Things (IoT) to support intelligent IoT applications. In AIoT, intelligent edge computing technologies accelerate intelligent services’ processing speed with much lower cost than simple cloud-aided IoT architecture. However, it is still a lack of resource strategy to...
Preprint
Full-text available
p>A Game for Task Offloading in Reputation-Based Consortium Blockchain Networks</p
Preprint
Full-text available
p>A Game for Task Offloading in Reputation-Based Consortium Blockchain Networks</p
Preprint
Full-text available
We have witnessed the rise of cross-data against multimodal data problems recently. The cross-modal retrieval system uses a textual query to look for images; the air quality index can be predicted using lifelogging images; the congestion can be predicted using weather and tweets data; daily exercises and meals can help to predict the sleeping quali...
Article
Virtual reality (VR) technology is gaining popularity in a variety of fields, including education, games, movies, medicine, and engineering, to name a few. 360° VR video could provide an immersive experience and attract more researchers and developers attention. Some literature focused on the head movement when users watched 360° videos and release...
Article
Mobile edge computing (MEC) has been recognized as a viable technology to satisfy low-delay computation requirements for resource-constrained Internet of things (IoT) devices. Nevertheless, the broadcast feature of wireless electromagnetic communications may lead to the security threats to IoT devices. In order to enhance the task offloading securi...
Preprint
Because of disaster, terrestrial base stations (TBS) would be partly crashed. Some user equipments (UE) would be unserved. Deploying unmanned aerial vehicles (UAV) as aerial base stations is a method to cover UEs quickly. But existing methods solely refer to the coverage of UAVs. In those scenarios, they focus on the deployment of UAVs in the post-...
Preprint
Full-text available
As intelligent transportation systems been implemented broadly and unmanned arial vehicles (UAVs) can assist terrestrial base stations acting as multi-access edge computing (MEC) to provide a better wireless network communication for Internet of Vehicles (IoVs), we propose a UAVs-assisted approach to help provide a better wireless network service r...