Yulei Wu's research while affiliated with University of Exeter and other places

Publications (158)

Article
Video cameras have been deployed widely today. Although existing systems aim to optimize live video analytics from a variety of perspectives, they are agnostic to the workload dynamics in real-world. We propose EC-MASS, an edge computing-based video scheduling system achieving both cost and performance optimization with multiple cameras and edge da...
Preprint
Full-text available
Communication networks are becoming increasingly complex towards 6G. Manual management is no longer an option for network operators. Network automation has been widely discussed in the networking community, and it is a sensible means to manage the complex communication network. Deep learning models developed to enable network automation for given o...
Chapter
Author Osama Zwaid Alsulami name is updated to Osama Zwaid Aletri throughout the book.
Article
Efficient and flexible management and interworking techniques are important for the performance of Industrial Internet of Things (IIoT). This special issue is devoted to the most recent developments and research addressing various theoretical and practical aspects of this topic. The contributions of the eleven accepted papers are summarized in this...
Article
Virtual network embedding (VNE) that instantiates virtualized networks on a substrate infrastructure, is one of the key research problems for network virtualization. Most existing VNE approaches, however, focus on the current virtual network request (VNR) and treat all VNRs equally, which disregard the long-term impact and waste many resources on t...
Article
Increased awareness of privacy protection has led to a surge in the volume of encrypted traffic, which creates a heavy burden for efficient network management (e.g. quality-of-service guarantees). The opacity of encrypted traffic essentially requires high computational overheads to make traffic classification, which is even worse when encrypted tra...
Preprint
Full-text available
We have witnessed an unprecedented public health crisis caused by the new coronavirus disease (COVID-19), which has severely affected medical institutions, our common lives, and social-economic activities. This crisis also reveals the brittleness of existing medical services, such as over-centralization of medical resources, the hysteresis of medic...
Article
The Industrial Internet of Things (IIoT) plays an important role in digital transformation of traditional industries towards Industry 4.0. By connecting sensors, instruments and other industry devices to the Internet, IIoT facilitates the data collection, data analysis, and automated control, thereby improving the productivity and efficiency of the...
Article
Full-text available
Mobile social networks (MSNs) provide real-time information services to individuals in social communities through mobile devices. However, due to their high openness and autonomy, MSNs have been suffering from rampant rumors, fraudulent activities, and other types of misuses. To mitigate such threats, it is urgent to control the spread of fraud inf...
Article
We have witnessed an unprecedented public health crisis caused by the new coronavirus disease (COVID-19), which has severely affected medical institutions, our common lives, and social-economic activities. This crisis also reveals the brittleness of existing medical services, such as over-centralization of medical resources, the hysteresis of medic...
Article
Ensuring timeliness and mobility for multimedia computing is a crucial task for wireless communication. Previous algorithms that utilize information channels, such as the information bottleneck method, have shown great performance and efficiency, which guarantees timeliness. However, such methods suit only in handling single variable tasks such as...
Article
Cyber-Physical-Social-System (CPSS) relies on cloud and edge computing for service deployment and acceleration. As an enabling technology of CPSS, network virtualization allows different services to be deployed on a single physical server and provides them with differentiated network performance based on service-level-agreement (SLA). Unfortunately...
Article
The articles in this special section focus on blockchain deployment in future networks and vertical industries. Blockchain has been successfully applied into a number of sectors, including finance, energy, logistics and supply chains, due to its ability of creating a tamper-proof digital ledger of transactions and the resulting novel trust mechanis...
Article
The booming of Social Internet of Things (SIoT) has witnessed the significance of graph mining and analysis for social network management. Online Social Networks (OSNs) can be efficiently managed by monitoring users behaviors within a cohesive social group represented by a maximal clique. They can further provide valued social intelligence for thei...
Article
Distributed peer-to-peer power energy markets are emerging quickly. Due to central governance and lack of effective information aggregation mechanisms, energy trading cannot be efficiently scheduled and tracked. We devise a new distributed energy transaction system over the energy Industrial Internet of Things based on predictive analytics, blockch...
Article
With the ambitious plans of renewal and expansion of industrialization in many countries, the efficiency, agility and cost savings potentially resulting from the application of industrial Internet of Things (IIoT) are drawing attentions. Although blockchain and machine learning technologies (especially deep learning and deep reinforcement learning)...
Article
5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social/ physical distancing during pandemics such as COVID-19). Such applications generally involve the collection and dissemination of (massive) data from the drones t...
Article
Network slicing has emerged as a promising networking paradigm to provide resources tailored for Industry 4.0 and diverse services in 5G networks. However, the increased network complexity poses a huge challenge in network management due to virtualised infrastructure and stringent Quality-of-Service (QoS) requirements. Digital twin (DT) technology...
Article
5G heterogeneous networks have become a promising platform to connect a growing number of Internet-of-Things (IoT) devices and accommodate a wide variety of vertical services. IoT has not been limited to traditional sensing systems since the introduction of 5G, but also includes a range of autonomous moving platforms, e.g., autonomous flying vehicl...
Article
Full-text available
Critical infrastructure systems are vital to underpin the functioning of a society and economy. Due to ever-increasing number of Internet-connected Internet-of-Things (IoTs) / Industrial IoT (IIoT), and high volume of data generated and collected, security and scalability are becoming burning concerns for critical infrastructures in industry 4.0. T...
Article
Full-text available
Critical infrastructure systems are vital to underpin the functioning of a society and economy. Due to ever-increasing number of Internet-connected Internet-of-Things (IoTs) / Industrial IoT (IIoT), and high volume of data generated and collected, security and scalability are becoming burning concerns for critical infrastructures in industry 4.0. T...
Preprint
Full-text available
5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social / physical distancing during pandemics such as COVID-19). Such applications generally involve the collection and dissemination of (massive) data from the drones...
Chapter
With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of users. There exist techniques to classify encrypted traffic. Although many studies on the classification of encrypted traffic claim that the p...
Article
OpenFlow is unable to provide customized flow tables, resulting in memory explosions and high switch retirement rates. This is the bottleneck for the development of SDN. Recently, P4 (Programming Protocol-independent Packet Processors) attracts much attentions from both academia and industry. It provides customized networking services by offering f...
Chapter
Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven by consumers (i.e., the requester of content). A consumer puts the name of the desired content into an Interest packet and sends it to the ne...
Chapter
This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the solutions designed for existing network architectures, but also propose innovative mechanisms for future networks (see Chap. 10.1007/978-981-...
Chapter
This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify a flow. In addition, the mechanism of the cooperation between a delegate and a registry, which we have briefly introduc1ed in Sect. 10.1007/9...
Chapter
This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in this chapter, because the receiver acts as the content requester in content-based networks. In the network where content transmission is the...
Chapter
This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be applied to the scenarios that belong to one-to-many communication mode, such as distributed computing. This is because in the architecture pr...
Article
The Internet-of-Things (IoT) has been widely adopted in a range of verticals, e.g., automation, health, energy and manufacturing. Many of the applications in these sectors, such as self-driving cars and remote surgery, are critical and high stakes applications, calling for advanced machine learning (ML) models for data analytics. Essentially, the t...
Article
The Internet-of-Things (IoT) has been deeply penetrated into a wide range of important and critical sectors, including smart city, water, transportation, manufacturing and smart factory. Massive data are being acquired from a fast growing number of IoT devices. Efficient data processing is a necessity to meet diversified and stringent requirements...
Article
The four papers in this special section focus on the use of blockchain in the healthcare field. With the development of society, health has received increasing attentions. The development of science and technology has also promoted the protection of health. In recent years, the rapid development of computing and networking technologies has improved...
Article
Nowadays, surveillance cameras have been pervasively equipped with vehicles in public transport systems. For the sake of public security, it is crucial to upload recorded surveillance videos to remote servers timely for backup and necessary video analytics. However, continuously uploading video content generated by tens of thousands of vehicles can...
Article
In the rapidly growing era of Internet-of-Things (IoT), healthcare systems have enabled a sea of connections of physical sensors. Data analysis methods (e.g., k-means) are often used to process data collected from wireless sensor networks to provide treatment advices for physicians and patients. However, many methods pose a threat of privacy leakag...
Article
The ten papers in this special section are devoted to the most recent developments and research outcomes addressing the related theoretical and practical aspects of computational intelligence solutions in sustainable computing and aims at presenting latest innovative ideas targeted at the corresponding key challenges, either from a methodological o...
Article
Due to the extensive use of unmanned aerial vehicles (UAVs) in civil and military environment, effective deployment and scheduling of a swarm of UAVs are rising to be a challenging issue in edge computing. This is especially apparent in the area of Internet of Things (IoT) where massive UAVs are connected for communications. One of the characterist...
Article
Network slicing, as a key 5G enabling technology, is promising to support with more flexibility, agility, and intelligence towards the provisioned services and infrastructure management. Fulfilling these tasks is challenging, as nowadays networks are increasingly heterogeneous, dynamic and large-dimensioned. This contradicts the dominant network sl...
Article
Distributed and pervasive web services have become a major platform for sharing information. However, the hypertext transfer protocol secure (HTTPS), which is a crucial web encryption technology for protecting the information security of users, creates a supervisory burden for network management (e.g., quality-of-service guarantees and traffic engi...
Article
Learning from massive network data to produce cognitive knowledge for efficient resource management in 5G and beyond 5G (B5G) is still challenging. We are delighted to introduce the readers to this special section of the IEEE Transactions on Cognitive Communications and Networking (TCCN), which aims at exploring recent advances and addressing pract...
Article
To protect user privacy (e.g., IP address and sensitive data in a packet), many traffic protection methods, like traffic obfuscation and encryption technologies, are introduced. However, these methods have been used by attackers to transmit malicious traffic, posing a serious threat to network security. To enhance network traffic supervision, this...
Article
Virtual network embedding arranges virtual network services onto substrate network components. The performance of embedding algorithms determines the effectiveness and efficiency of a virtualized network, making it a critical part of the network virtualization technology. To achieve better performance, the algorithm needs to automatically detect th...
Article
Full-text available
Mobile video streaming is a successful example of Cyber-Physical-Social Systems (CPSS). How to schedule network resources and provide better mobile video streaming services for mobile users are very important. Scalable video streaming is regarded as a promising technology in wireless networks where the cognitive femtocells are overlaid within the c...
Article
The dramatic spread of online social network services, such as Facebook, Twitter, Instagram, and Google+, has led to increasing awareness of the power of incorporating social elements into a variety of data-centric applications. These applications, in recent years, apply various sensors with social media platforms to continuously collect massive da...
Chapter
Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitcoin address association scheme which makes address tracing possible in Bitcoin systems. The proposed scheme can be used to warn relevant inst...
Article
With the explosive network data due to the advanced development of Internet of Things (IoT), the demand for multi-party computation is increasing. In addition, with the advent of future digital society, data has been gradually evolved into an effective virtual asset for sharing and usage. With the nature of the sensitivity, massiveness, fragmentati...
Article
Service-oriented 5G mobile systems are commonly believed to reshape the landscape of the Internet with ubiquitous services and infrastructures. The micro-services architecture has attracted significant interests from both academia and industry, offering the capabilities of agile development and scale capacity. The emerging mobile edge computing is...
Article
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow an...
Article
The Internet of Things (IoT) increases the number of connected devices and supports ever-growing complexity of applications. Owing to the constrained physical size, the IoT devices can significantly enhance computation capacity by offloading computation-intensive tasks to the resource-rich edge servers deployed at the base station (BS) via wireless...
Article
With increasing demands for more flexible services, the routing policies in enterprise networks become much richer. This has placed a heavy burden to the current router forwarding plane in support of the increasing number of policies, primarily due to the limited capacity in TCAM, which further hinders the development of new network services and ap...
Article
With the rapid development of Internet-of-Things (IoT), mobile crowdsensing, i.e., outsourcing sensing tasks to mobile devices or vehicles, has been proposed to address the problem of data collection in the scenarios such as smart city. Despite its benefits for a wide range of applications, mobile crowdsensing lacks an efficient incentive mechanism...
Article
Full-text available
Due to the increasing volume of network traffic and growing complexity of network environment, rapid identification of heavy hitters is quite challenging. To deal with the massive data streams in real-time, accurate and scalable solution is required. The traditional method to keep an individual counter for each host in the whole data streams is ver...
Article
Full-text available
A software defined networking (SDN)-enabled smart city is a new paradigm that can effectively improve the cost efficiency and flexibility of data management through data-control separation. However, it faces significant security threats such as distributed denial of service (DDoS) attacks which jeopardize the security and availability of data and s...
Preprint
Higher dimensional classification has attracted more attentions with increasing demands for more flexible services in the Internet. In this paper, we present the design and implementation of a two dimensional router (TwoD router), that makes forwarding decisions based on both destination and source addresses. This TwoD router is also a key element...
Article
Webpage segmentation is the basic building block for a wide range of webpage analysis methods. The rapid development of Web technologies results in more dynamic and complex webpages, which bring new challenges to this area. To improve the performance of webpage segmentation, we propose a two-stage segmentation method that can combine visual, logic,...
Article
The identities of packet senders and receivers are treated as important privacy information in communication networks. Any packet can be attributed to its sender for evaluating its credibility. Existing studies mainly rely on third-party agents that contain the packet sender’s identity to ensure the sender’s privacy preservation and credibility. In...
Article
Network slicing is designed to support a variety of emerging applications with diverse performance and flexibility requirements, by dividing the physical network into multiple logical networks. These applications along with a massive number of mobile phones produce large amounts of data, bringing tremendous challenges for network slicing performanc...
Article
Assisting traffic control is one of the most important applications on the Internet of Vehicles (IoVs). Traffic information provided by vehicles is desired since drivers or vehicle sensors are sensitive in perceiving or detecting nuances on roads. However, the availability and privacy preservation of this information are critical while conflicted w...
Article
Rational delegation of computation is an important technology of mobile Internet at present, which is significant to the construction of intelligent urban computing. In order to close to practical applications, many tasks need the cooperation with edge computing and cloud computing. The delegated computation scheme with rational players guarantees...