User profiles for Dongxiao Yu
Dongxiao YuProfessor of Computer Science, Shandong University Verified email at sdu.edu.cn Cited by 3903 |
Connected dominating sets in wireless ad hoc and sensor networks–A comprehensive survey
Topology control is a fundamental issue in wireless ad hoc and sensor networks. Due to
intrinsic characteristic of flatness, hierarchical topology can achieve the scalability and efficiency …
intrinsic characteristic of flatness, hierarchical topology can achieve the scalability and efficiency …
Edge content caching with deep spatiotemporal residual network for IoV in smart city
Internet of Vehicles (IoV) enables numerous in-vehicle applications for smart cities, driving
increasing service demands for processing various contents (eg, videos). Generally, for …
increasing service demands for processing various contents (eg, videos). Generally, for …
Mining hard samples globally and efficiently for person reidentification
Person reidentification (ReID) is an important application of Internet of Things (IoT). ReID
recognizes pedestrians across camera views at different locations and time, which is usually …
recognizes pedestrians across camera views at different locations and time, which is usually …
Stable local broadcast in multihop wireless networks under SINR
We present a distributed stable protocol for local broadcast in multi-hop wireless networks,
where packets are injected to the nodes continuously, and each node needs to quickly …
where packets are injected to the nodes continuously, and each node needs to quickly …
Implementing the abstract MAC layer in dynamic networks
Dynamicity is one of the most challenging, yet, key aspects of wireless networks. It can come
in many guises, such as churn (node insertion/deletion) and node mobility. Although the …
in many guises, such as churn (node insertion/deletion) and node mobility. Although the …
Coverage Contribution Area Based -Coverage for Wireless Sensor Networks
Coverage is a primary metric for ensuring the quality of services provided by a wireless
sensor network (WSN). In this paper, we focus on the k-coverage problem, which requires a …
sensor network (WSN). In this paper, we focus on the k-coverage problem, which requires a …
Applications of differential privacy in social network analysis: A survey
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …
As social network analysis has been enjoying many applications, it opens a new arena for …
Near-online tracking with co-occurrence constraints in blockchain-based edge computing
Multiobject tracking is a basic task in video analysis. Due to the strict requirements on efficiency
and resource consumption, most of the applications on edge devices are online or near-…
and resource consumption, most of the applications on edge devices are online or near-…
Meta matrix factorization for federated rating predictions
With distinct privacy protection advantages, federated recommendation is becoming
increasingly feasible to store data locally in devices and federally train recommender models. …
increasingly feasible to store data locally in devices and federally train recommender models. …
Decentralized wireless federated learning with differential privacy
This article studies decentralized federated learning algorithms in wireless IoT networks. The
traditional parameter server architecture for federated learning faces some problems such …
traditional parameter server architecture for federated learning faces some problems such …