Xingwei Wang’s research while affiliated with Northeastern University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (771)


Cooperative Beamforming for Double-RIS Assisted CoMP Systems
  • Article

December 2024

·

1 Read

IEEE Transactions on Green Communications and Networking

Jian Chen

·

Yuchen Sun

·

·

[...]

·

Xingwei Wang

Energy efficiency (EE) has become a key performance indicator in designing future wireless networks. In this regard, we propose a novel two reconfigurable intelligent surfaces (RISs) assisted coordinated multipoint (CoMP) network, where two RISs cooperate to reduce energy consumption by constructing an intelligent radio environment. Aiming to maximize this system’s energy efficiency (EE), the joint optimization problem on the cooperative beamforming among base stations (BSs) and passive beamforming among RISs, subject to each user’s data rate requirement, is formulated. An alternative optimization algorithm is proposed by decoupling it into a cooperative beamforming subproblem among BSs and a cooperative reflective coefficients design subproblem among RISs. Dinkelbach’s transform and complex fractional programming algorithms are also invoked to transform these two subproblems into convex optimization problems and obtain the optimal solution for each sub-problem. Numerical results validate the proposed algorithm’s feasibility, fast convergence, and flexibility. It also shows that the proposed scheme with cooperative beamforming design for both BSs and RISs outperforms that without RIS and that with randomly initialized RISs.


KDN-FLB: Knowledge-defined Networking through Federated Learning and Blockchain

December 2024

·

42 Reads

Computer

In this article, we explore the opportunities and benefits of integrating federated learning (FL) and blockchain technologies to build an adaptable and secure Knowledge-Defined Networking (KDN) system. Our aim is to enhance network performance by ensuring self-learning, self-adapting, and self-adjustment capabilities in dynamic and decentralized network environments. The proposed conceptual architecture, KDN-FLB, also strategically addresses critical challenges in knowledge sharing and privacy preservation within network environments. We discuss the constituents, architecture, processes, and use cases of KDN-FLB in contemporary networking applications. Additionally , we analyze the benefits, challenges, and future prospects associated with KDN-FLB, making it more intelligent for large-scale, dynamic, and decentralized network environments.




Fig. 1. An illustration of medication recommendation models, where (a) is the paradigm of existing methods; (b) is our method with the hierarchical encoder.
The statistics of MIMIC-III and MIMIC-IV datasets.
Ablation study on MIMIC-III dataset. The models with relation embedding or position encoding are denoted by 'w/ E' and 'w/ P', respectively.
Self-supervised Hierarchical Representation for Medication Recommendation
  • Preprint
  • File available

November 2024

·

3 Reads

Medication recommender is to suggest appropriate medication combinations based on a patient's health history, e.g., diagnoses and procedures. Existing works represent different diagnoses/procedures well separated by one-hot encodings. However, they ignore the latent hierarchical structures of these medical terms, undermining the generalization performance of the model. For example, "Respiratory Diseases", "Chronic Respiratory Diseases" and "Chronic Bronchiti" have a hierarchical relationship, progressing from general to specific. To address this issue, we propose a novel hierarchical encoder named HIER to hierarchically represent diagnoses and procedures, which is based on standard medical codes and compatible with any existing methods. Specifically, the proposed method learns relation embedding with a self-supervised objective for incorporating the neighbor hierarchical structure. Additionally, we develop the position encoding to explicitly introduce global hierarchical position. Extensive experiments demonstrate significant and consistent improvements in recommendation accuracy across four baselines and two real-world clinical datasets.

Download

Computation Offloading in Resource-Constrained Multi-Access Edge Computing

November 2024

·

39 Reads

·

1 Citation

IEEE Transactions on Mobile Computing

Recently, computation offloading methods have greatly improved the Quality of Experience (QoE) in Multi-access Edge Computing (MEC) by offloading tasks to the edge servers. Since well-coordinated actions of Terminal Devices (TDs) are critical to improving the performance of the entire individual system, many practical MEC-based applications, i.e., firefighting robots and unmanned aerial vehicles, require great teamwork among TDs. However, real-world scenarios are usually bound by resource conditions. For instance, network connectivity may weaken or experience interruptions during emergency situations. In cases where the communication medium is utilized by multiple TDs, achieving effective coordination poses a significant challenge. In this paper, we propose a computation offloading scheme based on Scheduled Multi-agent Deep Reinforcement Learning (SMDRL) to make the most efficient decision in a resource-constrained scenario. First, we design a virtual energy queue based on the MEC system and maximize the QoE (related to service delay and energy consumption) in a real-time manner. Subsequently, we propose a scheduled multi-agent deep reinforcement learning algorithm to support each TD in learning how to encode messages, select actions, and schedule itself based on the received messages. Furthermore, a TopK mechanism is introduced. This mechanism chooses the most crucial TDs to broadcast their messages, and then the computation offloading problem in a communication-constrained MEC environment can be solved in a low-communication manner. Also, we prove that even under limited communication conditions, our proposed methods can still lead to the close-to-optimal performance. The final performance analysis shows that the developed scheme has significant advantages over other representative schemes.



A Chaos-Based Tunable Selective Encryption Algorithm for H.265/HEVC With Semantic Understanding

November 2024

·

9 Reads

IEEE Transactions on Circuits and Systems for Video Technology

Existing H.265/HEVC selective encryption (SE) schemes do not take into account the semantic features of input videos, nor do they adjust the encryption syntax elements according to the sensitivity of video content, which greatly limits their applicability. In this paper, we propose a chaos-based tunable H.265/HEVC SE scheme with semantic understanding. First, a deep hashing network is employed to identify content-sensitive videos by analyzing the semantic features of video sequences. Then, the non-sensitive videos and the retrieved sensitive ones are encrypted with different encryption strengths, respectively. Specifically, for non-sensitive videos, seven syntax elements with bypass-coded bins are selected for encryption at a constant bit rate. Hence, the encrypted bitstream keeps exactly the same compression ratio. To provide heavier visual distortion for content-sensitive videos, the regular-coded bins of four syntax elements and the intra prediction mode (IPM) are encrypted based on their corresponding encoding characteristics as well. Additionally, the selected syntax elements are all masked using a keystream generated by a chaotic system to ensure real-time constraints. Experimental results demonstrate that our suggested scheme offers format compatibility and is secure against all common attacks. Meanwhile, it outperforms state-of-the-art SE schemes in terms of security strength. Furthermore, the proposed scheme can be flexibly used in a wide range of applications according to the user’s requirements for encryption strength and bit rate.



SurgeryV2: Bridging the Gap Between Model Merging and Multi-Task Learning with Deep Representation Surgery

October 2024

Model merging-based multitask learning (MTL) offers a promising approach for performing MTL by merging multiple expert models without requiring access to raw training data. However, in this paper, we examine the merged model's representation distribution and uncover a critical issue of "representation bias". This bias arises from a significant distribution gap between the representations of the merged and expert models, leading to the suboptimal performance of the merged MTL model. To address this challenge, we first propose a representation surgery solution called Surgery. Surgery is a lightweight, task-specific module that aligns the final layer representations of the merged model with those of the expert models, effectively alleviating bias and improving the merged model's performance. Despite these improvements, a performance gap remains compared to the traditional MTL method. Further analysis reveals that representation bias phenomena exist at each layer of the merged model, and aligning representations only in the last layer is insufficient for fully reducing systemic bias because biases introduced at each layer can accumulate and interact in complex ways. To tackle this, we then propose a more comprehensive solution, deep representation surgery (also called SurgeryV2), which mitigates representation bias across all layers, and thus bridges the performance gap between model merging-based MTL and traditional MTL. Finally, we design an unsupervised optimization objective to optimize both the Surgery and SurgeryV2 modules. Our experimental results show that incorporating these modules into state-of-the-art (SOTA) model merging schemes leads to significant performance gains. Notably, our SurgeryV2 scheme reaches almost the same level as individual expert models or the traditional MTL model. The code is available at \url{https://github.com/EnnengYang/SurgeryV2}.


Citations (29)


... Hypergraphs extend the edges of traditional graphs to connect multiple nodes, offering an effective method to describe multivalent relationships and complex group interactions [32]. The hypergraph model is particularly suited to depicting group interactions and multiparty information exchanges in online social networks, a capability that stems from its structural characteristics, enabling it to naturally map multivalent relationships and high-order interactions [33,34]. Building on the advantages of hypergraphs, this paper further introduces the BA scale-free hypernetwork model, which not only simulates the scale-free characteristics of online social networks [35] but also allows us to explore the clustering behavior of nodes and the heterogeneity of connections through its structure. ...

Reference:

Information Propagation in Hypergraph-Based Social Networks
Hypergraph-Based Influence Maximization in Online Social Networks

Mathematics

... Moreover, the channels h 0 and h 2i are assumed to follow Rayleigh fading [18]. Thus, they are distributed as h 0 ∼ CN (0, σ 2 0 ) and h 2i ∼ CN (0, σ 2 ) (In mobile environments, channel fading can be modeled as a zero-mean complex Gaussian distribution using a first-order auto-regressive process, as detailed in [19]); (iv) the BS operates in an underlay CR mode [20], which enables it to concurrently utilize the spectrum of the PU as long as the interference imposed on the PU remains beneath a tolerable limit. Denote the interference power of the BS to the PU as P 2 and the maximum transmission power at the BS as P 1 . ...

AmBC-NOMA-Aided Short-Packet Communication for High Mobility V2X Transmissions
  • Citing Article
  • September 2024

IEEE Wireless Communications Letters

... The results indicate that both the proposed feature augmentation scheme and the Wasserstein-distance-based loss improve GCL model performance. Future work will explore the practical applicability and effectiveness of the proposed method in real-world applications, such as social network analysis [11,12] and recommendation systems. ...

Multistage Competitive Opinion Maximization With Q-Learning-Based Method in Social Networks
  • Citing Article
  • May 2024

IEEE Transactions on Neural Networks and Learning Systems

... For instance, it could be used to delay the spread of diseases by immunizing (or isolating) the critical nodes in epidemic-spreading networks [7][8][9]. In terms of information dissemination, it has the potential to help block key users to control the propagation of rumors and false information on online social platforms [10,11]. In addition, effective network dismantling measures can achieve the purpose of quickly thwarting the crime for terrorist organization networks [12,13]. ...

An Efficient Rumor Suppression Approach With Knowledge Graph Convolutional Network in Social Network
  • Citing Article
  • October 2024

IEEE Transactions on Computational Social Systems

... SC design quality strategies are used extensively for suppliers Sawik, 2011), general facilities (Snyder & Daskin, 2005;Saha et al., 2023), DCs (Hasani & Khosrojerdi, 2016) and transportation (Ghavamifar et al., 2018, Wang andYao 2023). Reactive strategies are commonly applied to suppliers (Cheng et al., 2018, Ghomi-Avili et al., 2021Fattahi et al., 2020), DCs (Alikhani et al., 2021;Zhang et al., 2024), demand points (Hosseini et al., 2019a(Hosseini et al., , 2019bAlikhani et al., 2023aAlikhani et al., , 2023b, plant and manufacturers (Feng et al., 2023;Sabouhi et al., 2020) and general facilities (Egri et al., 2023;Xie et al., 2019). ...

Multi-period fourth-party logistics network design from the viability perspective: a collaborative hyper-heuristic embedded with double-layer Q-learning algorithm
  • Citing Article
  • April 2024

... Here, we provide a brief overview of our data processing methods. First, in accordance with other studies [36], [37], we selected sensors that were useful for RUL prediction. Sensors that demonstrate a clear deterioration pattern from operation to failure are the most informative. ...

Pre-training enhanced unsupervised contrastive domain adaptation for industrial equipment remaining useful life prediction
  • Citing Article
  • April 2024

Advanced Engineering Informatics

... It introduces VM selection technique to allocate tasks, considering resource constraints, execution time. MOMWS includes a task preprocessing mechanism for workflow applications, which aims to reduce the amount of transferred data by merging tasks with identical datasets is proposed in [19]. Additionally, a priority assignment mechanism is used to determine scheduling sequence of workflow applications. ...

Multi-objective optimization-based workflow scheduling for applications with data locality and deadline constraints in geo-distributed clouds
  • Citing Article
  • April 2024

Future Generation Computer Systems

... Multi-label data stream is very common in real-world applications. For example, the online image recognition system automatically annotates multiple objects in the streaming images [3]; in movie recommendation, the online customers accessing the movie website are recommended several movies of different types, e.g., tragedy, science fiction and horror movies [4]; in music emotion classification, different types of emotions are recognized from continuous pieces of music [5]. ...

Limited-Supervised Multi-Label Learning with Dependency Noise
  • Citing Article
  • March 2024

Proceedings of the AAAI Conference on Artificial Intelligence

... Chunlin Li et al. [19] demonstrated how SDN architecture supports granular network management and security policy enforcement, offering real-time insights into network traffic and node behavior to indirectly improve trust management in migration nodes. An Du et al. [20] applied reinforcement learning to dynamically adjust service deployment in response to user mobility, balancing the trade-off between service migration response times and quality maintenance. PreGAN [21] aims to predict edge nodes likely to fail, facilitating preemptive service migration to minimize security vulnerabilities and data loss risks. ...

Online two-timescale service placement for time-sensitive applications in MEC-assisted network: A TMAGRL approach
  • Citing Article
  • March 2024

Computer Networks

... Online display advertising provides significant value to advertisers, publishers, and users by facilitating targeted content delivery and meeting users' personal interests [36,37]. Traditionally, display advertising systems utilize a multi-stage architecture, including retrieval, coarse ranking, ranking, re-ranking, etc. ...

Multi-Scenario and Multi-Task Aware Feature Interaction for Recommendation System
  • Citing Article
  • March 2024

ACM Transactions on Knowledge Discovery from Data