Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing

    With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things te...

    **rong Fu, Yiwen Liu, Haobo Yan, Yahui Yang, Ling Peng, Yuanquan Shi in Wireless Internet (2024)

  2. No Access

    Article

    Theories, algorithms and applications in tensor learning

    Due to the accelerated development and popularization of Internet, mobile Internet, and Internet of Things and the breakthrough of storage and communication technologies, the amount of data obtained in the fie...

    **aowu Deng, Yuanquan Shi, Dunhong Yao in Applied Intelligence (2023)

  3. No Access

    Chapter and Conference Paper

    A Study on Random Differentiation Methods for Homework Based on Fuzzy Test

    A fuzzy test-based method for random differentiation of homework is proposed to address the problems of low update frequency, serious plagiarism and weakened barriers in university coursework. In order to gene...

    Yiwen Liu, Yuanquan Shi, **aoning Peng, Chunqiao Mi in Computer Science and Education (2023)

  4. No Access

    Chapter and Conference Paper

    Edge Intelligence Based Garbage Classification Detection Method

    To address the problem that the classification and cleaning of garbage in city streets is always ineffective nowadays, the paper proposes a garbage detection method based on edge intelligence. The edge intelli...

    Ruijia Zhu, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  5. No Access

    Chapter and Conference Paper

    Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence

    The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield exca...

    Yanxia Gao, Yiwen Liu, Chunqiao Mi in Edge Computing and IoT: Systems, Managemen… (2023)

  6. No Access

    Chapter and Conference Paper

    A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence

    With the rise of data storage computing and IoT technology. The increase in data volume and user demand, the accurate delivery of data and low latency during transmission become important factors that affect t...

    Zhirong Zhu, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  7. No Access

    Chapter and Conference Paper

    Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices

    Edge networks are highly volatile and the quality of device communication and computational resources change not only over time but also according to the movement of users

    Wenkan Wen, Yiwen Liu, Yanxia Gao in Edge Computing and IoT: Systems, Managemen… (2023)

  8. No Access

    Article

    Unsupervised anomaly detection for network traffic using artificial immune network

    In the existing approaches of multifarious knowledge based anomaly detection for network traffic, the priori knowledge labelled by human experts has to be consecutively updated for identification of new anomal...

    Yuanquan Shi, Hong Shen in Neural Computing and Applications (2022)

  9. No Access

    Chapter and Conference Paper

    A Novel CFLRU-Based Cache Management Approach for NAND-Based SSDs

    To ensure better I/O performance of NAND-based SSD storage, a DRAM cache is commonly equipped inside SSDs to absorb overwrites or writes performed to underlying SSD cells. This paper presents a simple, effecti...

    Haodong Lin, Jun Li, Zhibing Sha, Zhigang Cai in Network and Parallel Computing (2022)

  10. No Access

    Chapter and Conference Paper

    Unsupervised Anomaly Detection for Network Flow Using Immune Network Based K-means Clustering

    To detect effectively unknown anomalous attack behaviors of network traffic, an Unsupervised Anomaly Detection approach for network flow using Immune Network based K-means clustering (UADINK) is proposed. In U...

    Yuanquan Shi, **aoning Peng, Renfa Li, Yu Zhang in Data Science (2017)