Zhi-Li Zhang's research while affiliated with University of Minnesota Twin Cities and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (39)
Urban traffic status (e.g., traffic speed and volume) is highly dynamic in nature, namely, varying across space and evolving over time. Thus, predicting such traffic dynamics is of great importance to urban development and transportation management. However, it is very challenging to solve this problem due to spatial-temporal dependencies and traff...
Demands for wide-area connectivity between enterprise site-edge networks and central office core networks/cloud data centers have grown rapidly. Various software defined wide area network (SD-WAN) solutions have been developed with the primary aim of improving WAN link utilization. However, mechanisms used by existing SD-WAN solutions fail to provi...
Many malicious activities require a large number of IP addresses for altering user identities. It is well known that a large number of IP addresses could be obtained through compromising numerous machines and building botnets. However, we recently found that a special type of off-the-shelf virtual private server (VPS), which we refer to as dynamic...
It is well-known that online services resort to various cookies to track users through users’ online service identifiers (IDs) – in other words, when users access online services, various “fingerprints” are left behind in the cyberspace. As they roam around in the physical world while accessing online services via mobile devices, users also leave a...
Emergence of autonomous vehicles (AVs) offers the potential to fundamentally transform the way how urban transport systems be designed and deployed, and alter the way we view private car ownership. In this article we advocate a forward-looking, ambitious and disruptive
smart cloud commuting system
(SCCS) for future smart cities based on shared AV...
Imitation learning (IL) aims to learn a policy from expert demonstrations that minimizes the discrepancy between the learner and expert behaviors. Various imitation learning algorithms have been proposed with different pre-determined divergences to quantify the discrepancy. This naturally gives rise to the following question: Given a set of expert...
RDMA communication in virtual private cloud (VPC) networks is still a challenging job due to the difficulty in fulfilling all virtualization requirements without sacrificing RDMA communication performance. To address this problem, this paper proposes a software-defined solution, namely, MasQ, which is short for ``queue masquerade''. The core insigh...
Many computer network applications impose constraints for multiple quality of service (QoS) metrics, e.g., delay, packet loss, bandwidth, and jitter. These QoS constraints cannot be guaranteed by the Internet due to its best-effort service model. Overlay networks have been an effective technique at the application layer to support multiple QoS cons...
Given an undirected graph $G(V, E)$, it is well known that partitioning a graph $G$ into $q$ connected subgraphs of equal or specificed sizes is in general NP-hard problem. On the other hand, it has been shown that the q-partition problem is solvable in polynomial time for q-connected graphs. For example, efficient polynomial time algorithms for fi...
Rapid urbanization has posed significant burden on urban transportation infrastructures. In today's cities, both private and public transits have clear limitations to fulfill passengers’ needs for quality of experience (QoE): Public transits operate along fixed routes with long wait time and total transit time; Private transits, such as taxis, priv...
Graph Convolutional Neural Networks (GCNNs) are the most recent exciting advancement in deep learning field and their applications are quickly spreading in multi-cross-domains including bioinformatics, chemoinformatics, social networks, natural language processing and computer vision. In this paper, we expose and tackle some of the basic weaknesses...
It is well-known that online services resort to various cookies to track users through users' online service identifiers (IDs) - in other words, when users access online services, various "fingerprints" are left behind in the cyberspace. As they roam around in the physical world while accessing online services via mobile devices, users also leave a...
Website fingerprinting attacks can reveal the receiver in anonymous networks and cause a potential threat to users’ privacy. Previous studies focus more on identifying individual webpages. They also neglect the hyper-link transition information, because it induces extra “noise” to classify the original webpage. However, it is a common scenario that...
Consensus is a fundamental problem in distributed computing. In this poster, we ask the following question: can we partially offload the execution of a consensus algorithm to the network to improve its performance? We argue for an affirmative answer by proposing a network-assisted implementation of the Raft consensus algorithm. Our approach reduces...
Service Function Chains (SFCs) comprise a sequence of Network Functions (NFs) that are typically traversed in-order by data flows. Consequently, SFC delay grows linearly with the length of the SFC. Yet, for highly latency sensitive applications, this delay may be unacceptable---particularly when the constituent NFs are virtualized, running on commo...
Mobile devices and networks produce abundant data that exhibit geo-spatial and temporal properties mainly driven by human behavior and activities. We refer to such data as geoMobile data. Mining such data to extract meaningful patterns that are reflective of collective user activities and behavior can benefit mobile network resource management as w...
Hypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. Attackers typically use HTTP for communication with command-and-control servers, click fraud, phishing and other malicious activities, as they can easily hide among the large amount of benign HTTP traffic. The user-agent (UA) field in the HTTP header...
Hybrid networks contain both legacy and programmable network switches and allow operators to reap the benefits of Software-defined networking (SDN) without upgrading the entire network. Previous research shows that adding SDN capabilities to switches at strategic places in a network and ensuring that each flow traverses at least one such switch is...
Complex networks are becoming indispensable parts of our lives. The Internet, wireless (cellular) networks, online social networks, and transportation networks are examples of some well-known complex networks around us. These networks generate an immense range of big data: weblogs, social media, the Internet traffic, which have increasingly drawn a...
In this paper, we describe our experience in implementing a non-IP routing protocol - Virtual Id Routing (VIRO) - using the OVS-SDN platform in GENI. As a novel, 'plug-&-play', routing paradigm for future dynamic networks, VIRO decouples routing/forwarding from addressing by introducing a topology-aware, structured virtual id layer to encode the lo...
Cloud storage services such as Dropbox, Google Drive, and Microsoft OneDrive provide users with a convenient and reliable way to store and share data from anywhere, on any device, and at any time. The cornerstone of these services is the data synchronization (sync) operation which automatically maps the changes in users' local filesystems to the cl...
As a crucial operation, routing plays an important role in various communication networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (“all-path”) routing have been developed. Existing results in the literature show that the shortest path and all-path routing can be obtained...
Software Defined Networking (SDN) deconstructs the current routing infrastructure into a small number of controllers, which are general purpose computers, and a large number of switches which are programmable forwarding engines. It is already deployed in data centres, where it offers considerable advantages of both cost and flexibility over a switc...
We were able to put together an excellent technical program for ICNP 2013, thanks to the joint efforts by our authors, TPC members, and technical area leads. We received 251 submissions to the main conference this year, the highest number in ICNP's 21-year history. Each paper received at least three reviews, and the 66 technical program committee m...
In recent years, cloud sync(hronization) services such as GoogleDrive and Dropbox have provided Internet users with convenient and reliable data storing/sharing functionality. The cloud synchronization mechanism (in particular, how to deliver the user-side data updates to the cloud) plays a critical role in cloud sync services because it greatly af...
Measurement-based studies indicate that there is a severe tension between P2P applications and ISPs. In this paper, we propose a novel HTTP-based Peer-to-Peer (HPTP) framework to relieve this tension. The key idea is to exploit the widely deployed web cache proxies of ISPs to trick them to cache P2P traffic. This is achieved via a process we refer...
Citations
... More recently, with the rapid development of deep learning techniques, the integration of Graph Neural Networks (GNNs) and Recurrent Neural Networks (RNNs) is emphasized to enable accurate spatiotemporal prediction in transportation systems, such as parking occupancy [17], traffic speed [18], flow [19] and also EV charging demand predictions [20], [21], e.g., SGCN [22] combines graph convolutional network (GCN) and gated recurrent unit (GRU) to extract spatial and temporal features of the operating status at EV charging stations, respectively to better assist the prediction. However, the typical convolutional and recurrent structures can be crippled by their inflexibility and ambiguity in weight assignment. ...
... Perhatikan bahwa server cloud yang disediakan oleh perusahaan seperti Amazon dan Alibaba juga didasarkan pada virtualisasi. Namun, dibandingkan dengan VPS, mereka memiliki banyak manfaat lanjutan terkait keandalan, skalabilitas, dan elastisitas [9]. ...
... A novel implementation of Multi-Path Transmission Control Protocol (MPTCP) specifically tailored for SD-WAN environments, referred to as WAN-aware MPTCP, has recently been presented [11]. This implementation aims to optimize the utilization of multiple, heterogeneous WAN transports through aggregation, while also providing fast failure recovery for applications. ...
... Zhang and Zhang [26] Improving network function performance, safety and management Virtualization. An era of all-embracing connectivity has consistently developed, multiple new applications, network protocols, and internet services are supported. ...
... In recent years, cloud computing has been of great interest to the research community [1] [2]. It is used in a variety of applications ranging from healthcare [3] [4] to geosicences [5] and autonomous vehicles [6], [7]. Cloud computing plays a significant role in modern technology as it is actively interacting with other technological fields such as edge [8] and fog computing [9], Internet of Things (IoT) [10], sensor technology [11] and big data [12] [13]. ...
... In many instances, the deployment cannot be optimised, leaving the network redundantly and randomly deployed [1]. Data dissemination is thus quite complicated and difficult in such a network with multiple routes existing between a source and a destination [2,3]. In these networks, data dissemination is usually accomplished through flooding which is very burdensome in terms of bandwidth, energy, and processing [4]. ...
... Additionally, multiple different applications (Chrome, Firefox, wget, curl, etc.) invoke the same application protocol (HTTP). Recent work towards network-application integration [14]- [16] suggests a need to differentiate application processes when performing customization. To allow customization granularity on a per application process level even in cases where targeted processes are yet active, while avoiding transport protocol modification, we have chosen to tap into application messages when they arrive at socket buffers, right before they are passed down to the transport protocol on the sender end, and right after the transport layer finishes processing on the receiver end. ...
... An example use case is the adaptive bitrate (ABR) mechanism [15,36,38] used for online video streaming, where the network performance counters are used to adaptively decide the video playback quality depending on the QoE requirements of the end-users. To enable applications to use such network-related information effectively, various recent works have focused on designing frameworks and APIs for Networkaware Applications (NAA), such as Mobile and Wireless Information Exposure (MoWIE) [42] and Network Exposure Functions (NEF) for 5G networks 1 . In this context, one of the essential aspects that help an auto-adaptive NAA to decide its state is the perceived network throughput of that corresponding application. ...
... At present, the number of user data leakages increased by 15.46% from 2018, and the privacy risk index increased by 26.66% [9]. Users inevitably leave a trail of footprints in the real world while accessing online services from a mobile device [10]. For example, people share various information on Twitter, and even when the original blog is deleted, relevant comments remain on the web [11]. ...
... These applications circumvent OS services (including the network stack), instead they come with their own NIC drivers and perform most of the scheduling and resource management themselves [18,61]. This approach forces the OS to rely on the NIC to implement security (IOMMUs [72,80] or VLANs [75] are not sufficient) and resource-sharing policies [30,44,90]. As a result, the OS becomes just an over-engineered bootloader [27,28,37,87]. ...