Visible to the public Biblio

Filters: Author is Peng, J.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Ding, C., Peng, J..  2015.  A hopping sensor deployment scheme based on virtual forces. 2015 IEEE International Conference on Robotics and Biomimetics (ROBIO). :988–993.

Wireless sensor networks have been widely utilized in many applications such as environment monitoring and controlling. Appropriate sensor deployment scheme to achieve the maximal coverage is crucial for effectiveness of sensor network. In this paper, we study coverage optimization problem with hopping sensors. Although similar problem has been investigated when each mobile sensor has continuous dynamics, the problem is different for hopping sensor which has discrete and constraint dynamics. Based on the characteristics of hopping, we obtain dynamics equation of hopping sensors. Then we propose an enhanced virtual force algorithm as a deployment scheme to improve the coverage. A combination of attractive and repulsive forces generated by Voronoi neighbor sensors, obstacles and the centroid of local Voronoi cell is used to determine the motion paths for hopping sensors. Furthermore, a timer is designed to adjust the movement sequence of sensors, such that unnecessary movements can be reduced. Simulation results show that optimal coverage can be accomplished by hopping sensors in an energy efficient manner.

X
Xia, H., Gao, N., Peng, J., Mo, J., Wang, J..  2020.  Binarized Attributed Network Embedding via Neural Networks. 2020 International Joint Conference on Neural Networks (IJCNN). :1—8.
Traditional attributed network embedding methods are designed to map structural and attribute information of networks jointly into a continuous Euclidean space, while recently a novel branch of them named binarized attributed network embedding has emerged to learn binary codes in Hamming space, aiming to save time and memory costs and to naturally fit node retrieval task. However, current binarized attributed network embedding methods are scarce and mostly ignore the local attribute similarity between each pair of nodes. Besides, none of them attempt to control the independency of each dimension(bit) of the learned binary representation vectors. As existing methods still need improving, we propose an unsupervised Neural-based Binarized Attributed Network Embedding (NBANE) approach. Firstly, we inherit the Weisfeiler-Lehman proximity matrix from predecessors to aggregate high-order features for each node. Secondly, we feed the aggregated features into an autoencoder with the attribute similarity penalizing term and the orthogonality term to make further dimension reduction. To solve the problem of integer optimization we adopt the relaxation-quantization method during the process of training neural networks. Empirically, we evaluate the performance of NBANE through node classification and clustering tasks on three real-world datasets and study a case on fast retrieval in academic networks. Our method achieves better performance over state- of-the-art baselines methods of various types.
Z
Zhang, S., Peng, J., Huang, K., Xu, X., Zhong, Z..  2017.  Physical layer security in IoT: A spatial-temporal perspective. 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP). :1–6.
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure on-off scheme is proposed to improve the network performance. Then, the delay performance and secrecy performance are evaluated in terms of packet delay and packet secrecy outage probability. It is demonstrated that the intensity of IoT devices arouse a tradeoff between the delay and security and the secure on-off scheme can improve the network delay performance and secrecy performance. Moreover, secrecy transmission rate is adopted to reflect the delay-security tradeoff. The analytical and simulation results show the effects of intensity of IoT devices and secure on-off scheme on the network delay performance and secrecy performance.