User profiles for Dongxiao Yu

Dongxiao Yu

Professor of Computer Science, Shandong University
Verified email at sdu.edu.cn
Cited by 3903

Connected dominating sets in wireless ad hoc and sensor networks–A comprehensive survey

J Yu, N Wang, G Wang, D Yu - Computer Communications, 2013 - Elsevier
Topology control is a fundamental issue in wireless ad hoc and sensor networks. Due to
intrinsic characteristic of flatness, hierarchical topology can achieve the scalability and efficiency …

Edge content caching with deep spatiotemporal residual network for IoV in smart city

X Xu, Z Fang, J Zhang, Q He, D Yu, L Qi… - ACM Transactions on …, 2021 - dl.acm.org
Internet of Vehicles (IoV) enables numerous in-vehicle applications for smart cities, driving
increasing service demands for processing various contents (eg, videos). Generally, for …

Mining hard samples globally and efficiently for person reidentification

H Sheng, Y Zheng, W Ke, D Yu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Person reidentification (ReID) is an important application of Internet of Things (IoT). ReID
recognizes pedestrians across camera views at different locations and time, which is usually …

Stable local broadcast in multihop wireless networks under SINR

D Yu, Y Zou, J Yu, X Cheng, QS Hua… - IEEE/ACM …, 2018 - ieeexplore.ieee.org
We present a distributed stable protocol for local broadcast in multi-hop wireless networks,
where packets are injected to the nodes continuously, and each node needs to quickly …

Implementing the abstract MAC layer in dynamic networks

D Yu, Y Zou, J Yu, Y Zhang, F Li… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Dynamicity is one of the most challenging, yet, key aspects of wireless networks. It can come
in many guises, such as churn (node insertion/deletion) and node mobility. Although the …

Coverage Contribution Area Based -Coverage for Wireless Sensor Networks

J Yu, S Wan, X Cheng, D Yu - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
Coverage is a primary metric for ensuring the quality of services provided by a wireless
sensor network (WSN). In this paper, we focus on the k-coverage problem, which requires a …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Near-online tracking with co-occurrence constraints in blockchain-based edge computing

H Sheng, S Wang, Y Zhang, D Yu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Multiobject tracking is a basic task in video analysis. Due to the strict requirements on efficiency
and resource consumption, most of the applications on edge devices are online or near-…

Meta matrix factorization for federated rating predictions

Y Lin, P Ren, Z Chen, Z Ren, D Yu, J Ma… - Proceedings of the 43rd …, 2020 - dl.acm.org
With distinct privacy protection advantages, federated recommendation is becoming
increasingly feasible to store data locally in devices and federally train recommender models. …

Decentralized wireless federated learning with differential privacy

S Chen, D Yu, Y Zou, J Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article studies decentralized federated learning algorithms in wireless IoT networks. The
traditional parameter server architecture for federated learning faces some problems such …