Zhangbing Zhou's research while affiliated with China University of Geosciences (Beijing) and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (250)
Amidst the progressive proliferation of user petitions in the realm of Internet of Things (IoT), the concept of Edge Computing (EC) is being hailed as a beacon of promise, epitomizing multifaceted dexterity and sound service delivery methodologies. Given the finite resource allocation of IoT devices, it is plausible to assert that those IoT devices...
With the applicability of edge intelligence in various domains, anomaly detection, which aims to identify unusual and infrequent circumstances, is regarded as a regularly performed task to guarantee the health of the Internet of Things (IoT) applications. Generally, sensory data are gathered at the network edge and completely transmitted to the clo...
Anomaly event coverage is usually related to several attributes, among which the primary attribute dominates at the time of improving detection efficiency. In the case of Internet of Things (IoT) devices with complex social-aware relationships, IoT nodes with primary attributes should cooperate with each other through their social-aware interaction...
The Internet of Things (IoT) paradigm has established an effective platform to promote the collaboration of resource-limited and duty-cycle IoT nodes, in order to support relative complex service requests that can hardly be achieved by any single IoT node. The functionalities of IoT nodes are typically encapsulated into IoT services, and the satisf...
With the explosive growth of the Internet of Things (IoT) devices deployed in edge networks, the functionalities of IoT devices are typically encapsulated as IoT services, and user requests can be achieved through the composition of data and/or computation-intensive IoT services. Considering the prediction-uncertainty of forthcoming requests, certa...
Edge computing reduces network latency and improves service responsiveness by bringing services down to the edge. Compared to servers in the cloud center, edge devices are deployed more decentralized. Also, due to size and resource constraints, edge devices are difficult to manage or update security patches uniformly in real time. It makes it easie...
In recent years, edge computing has emerged as a promising paradigm for providing flexible and reliable services for Internet of things (loT) applications. User requests can be offloaded and processed in real time at the edge of a network. However, considering the limited storage and computing resources of loT devices, certain services requested by...
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm for the provision of flexible and reliable services. Considering the resource constraints of IoT devices, for some delay-aware user requests, a heavy-workload IoT device may not respond on time. EC has spa...
As a new form of manufacturing in the industrial Internet era, cloud manufacturing service ecosystem (CMSE) can meet complex customization needs through a dynamic collaborative network between cloud manufacturing services. The source of cloud manufacturing service is social, and such sociality aggravates the uncertainty and dynamics of CMSE. This p...
Yujin Li Bo Liu Enju Wu- [...]
Wenbo Zhang
Federated edge cloud (FEC) is an edge computing environment where servers in the same edge management domain could collaborate to handle latency‐sensitive services, thus better guaranteeing users' requirements on multiple quality of service (MQoS). Traditional scheduling methods only consider whether the server meets the resource requirements of th...
With the mutual interaction and dependence of several intelligent services, a crowd intelligence service network has been formed, and a service ecosystem has gradually emerged. Such a development produces an ever-increasing effect on our lives and the functioning of the whole society. These facts call for research on these phenomena with a new theo...
Edge computing as a complementary paradigm of cloud computing has gained more attention by providing mobile users with diversified services at the network edge. However, the increasingly complex mobile applications put a heavier load on edge networks. It is challenging to provide concurrency requests with high-quality service processing, especially...
With the development of electronic information network technology, large car networking systems can produce all kinds of data such as text, images, and videos, a large number of heterogeneous data, different features of heterogeneous data, and different data structures. In the Internet of vehicles, the beacon message generation strategy needs to be...
Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine capable of responding in a manner similar to human intelligence. Research in this area includes robotics, language recognition, image identification, natural language processing, and expert systems. I...
Constructing a novel bioinformatic workflow by reusing and repurposing fragments crossing workflows is regarded as an error-avoiding and effort-saving strategy. Traditional techniques have been proposed to discover scientific workflow fragments leveraging their profiles and historical usages of their activities (or services). However, social relati...
With the booming proliferation of user requests in the Internet of Things (IoT) network, Edge Computing (EC) is emerging as a promising paradigm to provide flexible and reliable services. Considering the resource constraints of IoT devices, for some delay-aware user requests, a heavy workload IoT device may not respond on time. EC spurs a popular w...
Deep learning has been widely applied in various fields such as computer vision, natural language processing, and data mining. Although deep learning has achieved significant success in solving complex problems, it has been shown that deep neural networks are vulnerable to adversarial attacks, resulting in models that fail to perform their tasks pr...
Named entity recognition (NER) is a fundamental technique in natural language processing that provides preconditions for tasks, such as natural language question reasoning, text matching, and semantic text similarity. Compared to English, the challenge of Chinese NER lies in the noise impact caused by the complex meanings, diverse structures, and a...
In this paper, a multidisciplinary cross-fusion of bionics, robotics, computer vision, and cloud service networks was used as a research platform to study wide-field bionic compound eye target recognition and detection from multiple perspectives. The current research status of wide-field bionic compound-eye target recognition and detection was anal...
The Internet of Things (IoT) is currently in a stage of rapid development. Hundreds of millions of sensing nodes and intelligent terminals undertake the tasks of sensing and transmitting data. Data collection is the key to realizing data analysis and intelligent application of IoT. The life cycle of IoT is limited by the energy of the IoT nodes in...
Vehicular ad hoc networks (VANETs) have become an important part of the intelligent transportation system that aims to promote communication among vehicles to ensure vehicular safety and improve the driving experience. In VANETs, signed messages need to be authenticated by roadside units in a very short time. Certificateless aggregate signature (CL...
Anomaly detection is assumed to be an efficient means of probing cyber-attacks upon business processes, and frequent pattern recognition (referred as interestingness) is complementary to anomaly detection for providing insights about processes. Current studies on anomalies and interestingness focus mostly on measurement design and discovery methods...
The Internet of Things (IoT) has been widely deployed to support versatile applications, where an application can be satisfied by functionally compatible and non-functionally satisfiable IoT services. Considering the fact that the capacities of IoT devices may change dynamically, whether or not, and to what extent, certain constraints can be satisf...
Edge computing is a popular paradigm in solving the problems of long time delay and high energy consumption in Internet of Things (IoT) network, which can effectively realize the IoT task offloading by collaboration of multiple edge servers. Nevertheless, how to choose the appropriate edge servers for offloading the dependent subtasks is still a bi...
With the recent adoption of edge computing, I nternet of T hings ( IoT ) devices collaborate at the network edge to facilitate edge-native applications. In this setting, IoT devices are typically encapsulated as IoT services to encode their functionalities, and their collaboration is achieved through IoT service composition. Due to the continuous r...
Anomaly detection is playing an increasingly important role in Internet of Things applications since anomalous events may cause some damage to the physical-social environment monitored by different kinds of smart object devices. In some cases, the occurrence of an anomalous event is caused by the fusion impact derived from several primary monitorin...
With the proliferation of I nternet o f T hings (IoT) devices deployed in edge networks, the functionalities of IoT devices are typically encapsulated in terms of IoT services. Their collaboration is mostly achieved through the composition of functionally complementary and geographically contiguous IoT services, to achieve complex requests. Conside...
With an increasing number of scientific workflows accessible on public repositories, the mechanism for discovering and recommending workflow fragments is important to facilitate the reuse and repurposing of legacy workflows when novel workflows are to be constructed, where dependencies among workflow activities, which implies functional patterns wi...
Finding the nearest parking location in road networks is one of the most commonly faced challenges in everyday life of green transportation. A main challenge faced by the state-of-the-art existing parking allocation methods is to optimally offer the nearest parking location for a group of m users at the cost of minimal overall traveling time to ens...
Considering the resource-hungry and capability-constraint of Internet of Things (IoT) nodes, their functionalities, which are encapsulated as containerized IoT services, are composed to satisfy user requests. IoT nodes are usually duty-cycled and energy-awareness. Therefore, IoT service allocation to respective IoT nodes should be re-calibrated on-...
The Internet of Things (IoT) networks have been adopted ubiquitously to support domain applications. Specially, social robots have become an important part of IoT networks as smart devices and are widely used to support versatile domain applications. In this setting, gathering sensory data from social-aware mobile robots in an energy-efficient mann...
Along with a large and increasing number of resource-constrained and battery-powered smart things being deployed in networks, an energy-efficient mechanism for continuous object boundary detection is fundamental for prolonging the network lifetime. Most of the existing studies focus on how to improve the boundary accuracy of continuous objects whil...
The edge–cloud collaboration network is promising to support complex requirements with temporal constraints, where a requirement can be achieved through the composition of computation-demanding and delay-sensitive services. In this setting, most services should be optimally configured at the network edge, in order to decrease service response laten...
The explosive growth of mobile edge users causes potential pressure for achieving their delay-sensitive requests in edge networks. Moreover, the incoming requests with task-dependency, which can be represented as Directed Acyclic Graphs (DAG), are hard to deal with effectively. In this paper, we intend to mitigate the DAG-based concurrent requests...
Smart agriculture enables the efficiency and intelligence of production in physical farm management. Though promising, due to the limitation of the existing data collection methods, it still encounters few challenges required to be considered. Mobile crowd sensing (MCS) embeds three beneficial characteristics: 1) cost-effectiveness; 2) scalability;...
The rapid growth of the Internet of Things (IoT) and the increasing number of connected devices have propelled the proliferation of offered applications, causing “Applications Exploding”. In the context of IoT, filtering and selecting the most relevant applications in a given situation is a challenging task. Thus, developing techniques that can all...
The Internet of Things (IoT) has become the infrastructure to widely support ubiquitous services. In this setting, a large number of smart object devices provide IoT services for people to carry on day-to-day activities. These services are easy to access, and thus, can be easily used by different users with different requirements through service al...
Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
Abstract In microservice systems, availability can be ensured through a variety of measures, such as fault tolerance and flow limiting, which are collectively called the flow control. In the current mainstream system design, the flow control rules are usually fixed and set manually, which cannot be dynamically adjusted according to the flow shape....
With an increasing number of Geographical Information System (GIS) services publicly available on the Web, the discovery of composite GIS services is promising when novel requirements are to be satisfied. GIS services in the repository like ArcGIS software are organized in a tree hierarchy, where a parent node represents a categorial GIS service wi...
An energy-efficient anomaly detection is fundamental to maintain a healthy status of domain applications in edge-cloud collaboration networks. Generally, various kinds of multimodal sensory data capture heterogeneous attributes, where a certain attribute, called the
primary
one, may be more significant in detecting certain anomaly. This observati...
The popularity of smart things constructs sensing networks for the Internet of Things (IoT), and promotes intelligent decision-makings in industrial IoT applications, where multi-attribute query processing is an essential ingredient. Considering the huge number of smart things and large-scale of the network, traditional query processing mechanisms...
Wireless underground sensor networks (WUSNs) consist of sensors that are buried in and communicate through soil medium, while the channel quality of WUSNs is greatly impacted by the underground environment, such as soil moisture and composition. Due to the precipitation and harsh weather, the underground environments change frequently, which make w...
The network of objects/things embedded with electronics, software, sensors, and network connectivity, Internet of Things (IoT), creates many exciting applications (e.g., smart grids, smart homes, and smart cities) by enabling objects/things to collect and exchange data so that they can be sensed and controlled. To fulfill IoT, one essential step is...
With the development of cloud computing, service computing, IoT(Internet of Things) and mobile Internet, the diversity and sociality of services are increasingly apparent. With the increasing complexity of collaborative relationships between services, service ecosystems are beginning to emerge with the characteristics of natural ecosystems, economi...
Intelligence services are playing an increasingly important role in the operation of our society. Exploring the evolution mechanism, boundaries and challenges of service ecosystem is essential to our ability to realize smart society, reap its benefits and prevent potential risks. We argue that this necessitates a broad scientific research agenda to...
With the development of cloud computing, service computing, IoT(Internet of Things) and mobile Internet, the diversity and sociality of services are increasingly apparent. To meet the customized user demands, service ecosystems begins to emerge with the formation of various IT services collaboration network. However, service ecosystem is a complex...
Noise pollution has been an issue since ancient times. Recently, this problem has been exacerbated due to rapid population growth and urbanization. Noise mapping is a strategic action plan that visualizes the long-term and real-time noise pollution of our cities, industrial sites, and other regions of interest. This article first discusses the work...
Along with the large and increasing number of scientific workflows publicly accessible on Web repositories, the discovery of workflow fragments is significant to promote the reuse or repurposing of best-practices evidenced in legacy workflows, when novel scientific experiments are to be conducted. This paper proposes a novel crossing-workflow fragm...
The wide-adoption of edge computing promotes the scheduling of tasks in complex requests upon smart devices on the network edge, whereas tasks are necessary to be offloaded to the cloud when they are intensive in computational and energy resources. Traditional techniques explore mostly the scheduling of atomic tasks, whereas complex requests schedu...
The Internet of Things (IoT) networks have become the infrastructure to enable the detection and reaction of anomalies in various domains, where an efficient sensory data gathering mechanism is fundamental since IoT nodes are typically constrained in their energy and computational capacities. Besides, anomalies may occur occasionally in most applic...
With the rapid development and massive deployment of the Internet of things (IoT) networks, security related issues in the IoT networks have been paid more and more attention to. Among all the security concerns, message authentication is critical in preventing the unauthorized messages from being transmitted in the IoT networks. Many message authen...
The Internet of Things (IoT) networks have become the infrastructure to enable the detection and reaction of anomalies in various domains, where an efficient sensory data gathering mechanism is fundamental since IoT nodes are typically constrained in their energy and computational capacities. Besides, anomalies may occur occasionally in most applic...
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 17th International Conference on Service-Oriented Computing, ICSOC 2019, held in Toulouse, France, in October 2019.
The ICSOC 2019 workshop track consisted of five workshops on a wide range of topics that fall into the genera...
In this study, deposit- and district-scale three-dimensional (3D) fault-and-intrusion structure models were constructed, based on which a numerical simulation was implemented in the Jiaojia gold district, China. The numerical simulation of the models shows the basic metallogenic path and trap of the gold deposits using mineral system theory. The ob...
It is a common phenomenon that GIS service, a convenient tool, helps people to solve the problem in various fields. However, single GIS service can no longer meet the diverse needs of users. To address this challenge, a GIS services composition recommendation framework based on semantic and heuristic optimization algorithms is proposed in this pape...
Internet of Things (IoT) has been widely used to facilitate environmental perception, where detecting the boundary regions for continuous objects with energy-efficient manner is a challenge to be explored to support domain applications. This paper proposes a novel approach for continuous objects boundary prediction and detection in IoT sensing netw...
The Internet of Things (IoT) has become the infrastructure to widely support ubiquitous applications. Due to the highly dynamic context setting, IoT search engines have attracted increasing attention from both industrial and academic field to crawl and search heterogeneous data sources. Today, a large amount of work on IoT search engines is devoted...
With the Internet of Things (IoT) becoming the infrastructure to support domain applications, IoT search engines have attracted increasing attention from users, industry, and research community, since they are capable of crawling heterogeneous data sources in highly dynamic environment. IoT search engines have to be able to process tens of thousand...
This paper proposes a novel crossing-workflow fragment discovery mechanism, where an activity knowledge graph (AKG) is constructed to capture partial-ordering relations between activities in scientific workflows, and parent-child relations specified upon sub-workflows and their corresponding activities. The biterm topic model is adopted to generate...
Cloud computing, which is claimed to provide plentiful storage, computational, and other resources, has become a promising platform to support resource-intensive applications. Due to the wide adoption of smart things to support domain applications and considering the delay-sensitivity of certain requests and limited network capacity compared with h...
Sensing network of the Internet of Things (IoT) has become the infrastructure for facilitating the monitoring of potential events, where the accuracy and energy-efficiency are essential factors to be considered when determining the boundary of continuous objects. This article proposes an energy-efficient boundary detection mechanism in IoT sensing...