Zhi-Li Zhang's research while affiliated with University of Minnesota Twin Cities and other places

Publications (38)

Article
Urban traffic status (e.g., traffic speed and volume) is highly dynamic in nature, namely, varying across space and evolving over time. Thus, predicting such traffic dynamics is of great importance to urban development and transportation management. However, it is very challenging to solve this problem due to spatial-temporal dependencies and traff...
Article
Demands for wide-area connectivity between enterprise site-edge networks and central office core networks/cloud data centers have grown rapidly. Various software defined wide area network (SD-WAN) solutions have been developed with the primary aim of improving WAN link utilization. However, mechanisms used by existing SD-WAN solutions fail to provi...
Article
Many malicious activities require a large number of IP addresses for altering user identities. It is well known that a large number of IP addresses could be obtained through compromising numerous machines and building botnets. However, we recently found that a special type of off-the-shelf virtual private server (VPS), which we refer to as dynamic...
Article
It is well-known that online services resort to various cookies to track users through users’ online service identifiers (IDs) – in other words, when users access online services, various “fingerprints” are left behind in the cyberspace. As they roam around in the physical world while accessing online services via mobile devices, users also leave a...
Article
In this paper we advocate a forward-looking, ambitious and disruptive smart cloud commuting system (SCCS) for future smart cities based on shared AVs. Employing giant pools of AVs of varying sizes, SCCS seeks to supplant and integrate various modes of transport in a unified, on-demand fashion, and provides passengers with a fast, convenient, and lo...
Preprint
Imitation learning (IL) aims to learn a policy from expert demonstrations that minimizes the discrepancy between the learner and expert behaviors. Various imitation learning algorithms have been proposed with different pre-determined divergences to quantify the discrepancy. This naturally gives rise to the following question: Given a set of expert...
Conference Paper
RDMA communication in virtual private cloud (VPC) networks is still a challenging job due to the difficulty in fulfilling all virtualization requirements without sacrificing RDMA communication performance. To address this problem, this paper proposes a software-defined solution, namely, MasQ, which is short for ``queue masquerade''. The core insigh...
Article
Full-text available
Many computer network applications impose constraints for multiple quality of service (QoS) metrics, e.g., delay, packet loss, bandwidth, and jitter. These QoS constraints cannot be guaranteed by the Internet due to its best-effort service model. Overlay networks have been an effective technique at the application layer to support multiple QoS cons...
Preprint
Given an undirected graph $G(V, E)$, it is well known that partitioning a graph $G$ into $q$ connected subgraphs of equal or specificed sizes is in general NP-hard problem. On the other hand, it has been shown that the q-partition problem is solvable in polynomial time for q-connected graphs. For example, efficient polynomial time algorithms for fi...
Article
Rapid urbanization has posed significant burden on urban transportation infrastructures. In today's cities, both private and public transits have clear limitations to fulfill passengers’ needs for quality of experience (QoE): Public transits operate along fixed routes with long wait time and total transit time; Private transits, such as taxis, priv...
Preprint
Full-text available
Graph Convolutional Neural Networks (GCNNs) are the most recent exciting advancement in deep learning field and their applications are quickly spreading in multi-cross-domains including bioinformatics, chemoinformatics, social networks, natural language processing and computer vision. In this paper, we expose and tackle some of the basic weaknesses...
Conference Paper
It is well-known that online services resort to various cookies to track users through users' online service identifiers (IDs) - in other words, when users access online services, various "fingerprints" are left behind in the cyberspace. As they roam around in the physical world while accessing online services via mobile devices, users also leave a...
Article
Website fingerprinting attacks can reveal the receiver in anonymous networks and cause a potential threat to users’ privacy. Previous studies focus more on identifying individual webpages. They also neglect the hyper-link transition information, because it induces extra “noise” to classify the original webpage. However, it is a common scenario that...
Conference Paper
Consensus is a fundamental problem in distributed computing. In this poster, we ask the following question: can we partially offload the execution of a consensus algorithm to the network to improve its performance? We argue for an affirmative answer by proposing a network-assisted implementation of the Raft consensus algorithm. Our approach reduces...
Conference Paper
Service Function Chains (SFCs) comprise a sequence of Network Functions (NFs) that are typically traversed in-order by data flows. Consequently, SFC delay grows linearly with the length of the SFC. Yet, for highly latency sensitive applications, this delay may be unacceptable---particularly when the constituent NFs are virtualized, running on commo...
Conference Paper
Mobile devices and networks produce abundant data that exhibit geo-spatial and temporal properties mainly driven by human behavior and activities. We refer to such data as geoMobile data. Mining such data to extract meaningful patterns that are reflective of collective user activities and behavior can benefit mobile network resource management as w...
Article
Hypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. Attackers typically use HTTP for communication with command-and-control servers, click fraud, phishing and other malicious activities, as they can easily hide among the large amount of benign HTTP traffic. The user-agent (UA) field in the HTTP header...
Conference Paper
Hybrid networks contain both legacy and programmable network switches and allow operators to reap the benefits of Software-defined networking (SDN) without upgrading the entire network. Previous research shows that adding SDN capabilities to switches at strategic places in a network and ensuring that each flow traverses at least one such switch is...
Conference Paper
Complex networks are becoming indispensable parts of our lives. The Internet, wireless (cellular) networks, online social networks, and transportation networks are examples of some well-known complex networks around us. These networks generate an immense range of big data: weblogs, social media, the Internet traffic, which have increasingly drawn a...
Article
In this paper, we describe our experience in implementing a non-IP routing protocol - Virtual Id Routing (VIRO) - using the OVS-SDN platform in GENI. As a novel, 'plug-&-play', routing paradigm for future dynamic networks, VIRO decouples routing/forwarding from addressing by introducing a topology-aware, structured virtual id layer to encode the lo...
Article
Cloud storage services such as Dropbox, Google Drive, and Microsoft OneDrive provide users with a convenient and reliable way to store and share data from anywhere, on any device, and at any time. The cornerstone of these services is the data synchronization (sync) operation which automatically maps the changes in users' local filesystems to the cl...
Article
As a crucial operation, routing plays an important role in various communication networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (“all-path”) routing have been developed. Existing results in the literature show that the shortest path and all-path routing can be obtained...
Conference Paper
Full-text available
Software Defined Networking (SDN) deconstructs the current routing infrastructure into a small number of controllers, which are general purpose computers, and a large number of switches which are programmable forwarding engines. It is already deployed in data centres, where it offers considerable advantages of both cost and flexibility over a switc...
Conference Paper
We were able to put together an excellent technical program for ICNP 2013, thanks to the joint efforts by our authors, TPC members, and technical area leads. We received 251 submissions to the main conference this year, the highest number in ICNP's 21-year history. Each paper received at least three reviews, and the 66 technical program committee m...
Article
In recent years, cloud sync(hronization) services such as GoogleDrive and Dropbox have provided Internet users with convenient and reliable data storing/sharing functionality. The cloud synchronization mechanism (in particular, how to deliver the user-side data updates to the cloud) plays a critical role in cloud sync services because it greatly af...
Article
Measurement-based studies indicate that there is a severe tension between P2P applications and ISPs. In this paper, we propose a novel HTTP-based Peer-to-Peer (HPTP) framework to relieve this tension. The key idea is to exploit the widely deployed web cache proxies of ISPs to trick them to cache P2P traffic. This is achieved via a process we refer...

Citations

... So far, a few studies have presented different models of RNNs to predict freeway traffic, including Jordan-Elman neural network (Ishak et al. 2003), time-delay neural network (TDNN) (Ishak et al. 2003), and state-space neural network (SSNN) (Lint et al. 2002(Lint et al. , 2005Liu et al. 2006). In addition, Zhang et al. proposed an urban traffic dynamics prediction model (Zhang et al. 2022). ...
... The authors in [16] present a novel implementation of Multi-Path TCP onto SD-WAN, called WAN-aware MPTCP (WaMPTCP), which optimize the WAN paths utilization by aggregating multiple (heterogeneous) WAN paths. WaMPTCP is also capable of adapting to network failures or congestion by providing fast failure recovery to applications. ...
... Zhang and Zhang [26] Improving network function performance, safety and management Virtualization. An era of all-embracing connectivity has consistently developed, multiple new applications, network protocols, and internet services are supported. ...
... In recent years, cloud computing has been of great interest to the research community [1] [2]. It is used in a variety of applications ranging from healthcare [3] [4] to geosicences [5] and autonomous vehicles [6], [7]. Cloud computing plays a significant role in modern technology as it is actively interacting with other technological fields such as edge [8] and fog computing [9], Internet of Things (IoT) [10], sensor technology [11] and big data [12] [13]. ...
... In many instances, the deployment cannot be optimised, leaving the network redundantly and randomly deployed [1]. Data dissemination is thus quite complicated and difficult in such a network with multiple routes existing between a source and a destination [2,3]. In these networks, data dissemination is usually accomplished through flooding which is very burdensome in terms of bandwidth, energy, and processing [4]. ...
... At present, the number of user data leakages increased by 15.46% from 2018, and the privacy risk index increased by 26.66% [9]. Users inevitably leave a trail of footprints in the real world while accessing online services from a mobile device [10]. For example, people share various information on Twitter, and even when the original blog is deleted, relevant comments remain on the web [11]. ...
... For each request, we further check whether it is malformed (line 7) and record dispatch information for signaled one (Line 11 and 12). If the last request is unsignaled, we additionally signal it (Line [19][20][21]. Signal the last request is sufficient because according to the RDMA specification [7], the completion of a signaled requests clears all the previous For two-sided primitive, KRCORE must further notify the receiver of sender address. Otherwise, the receiver cannot create proper connections for sending the reply. ...
... Many studies have been conducted on the different aspects of QoS of sensor networks, such as power-saving [11][12][13][14][15][16][17][18][19], routing [20][21][22][23][24][25][26], throughput of networks [27], enhancement performance [28,29] and coverage [30][31][32], and. The main goal of this study was to autonomously control the number of active sensors. ...
... In practice, such approaches can serve to decide the VNF placement, upon which our schemes can carry out their scheduling procedures accordingly. VNF Resource Allocation: Another series of works (e.g., [26] [28] [64]) focused on the optimization of resource allocation for VNF/NFV, with the aim to minimize VNF execution overheads and accelerate the processing speed of VNF instances. They concentrated on achieving such improvements with particular hardware designs. ...
... However, transfer would incur inconvenience cost for passengers; it is not clear whether the benefits from passenger transfer can offset this inconvenience cost in CB systems. A few recent studies have attempted to answer this question (e.g., Li et al., 2019;Maknoon and Laporte, 2017;Ma et al., 2019) but they have not simultaneously considered the passenger-route assignment. ...