The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Jing LIU(10hit)

1-10hit
  • Dynamic Multi-Band Sharing in Cognitive Radio Networks: A Market Game Approach

    Dapeng LI  Youyun XU  Jing LIU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:2
      Page(s):
    499-507

    The traditional spectrum auctions require a central auctioneer. Then, the secondary users (SUs) can bid for spectrum in multiple auction or sealed auction way. In this paper, we address the problem of distributed spectrum sharing in the cognitive networks where multiple owners sell their spare bands to multiple SUs. Each SU equips multi-interface/multi-radio, so that SU can buy spare bands from multiple owners. On the other hand, each owner can sell its spare bands to serval SUs. There are two questions to be addressed for such an environment: the first one is how to select bands/the owners for each SU; the second one is how to decide the competitive prices for the multiple owners and multiple SUs. To this end, we propose a two-side multi-band market game theoretic framework to jointly consider the benefits of all SUs and owners. The equilibrium concept in such games is named core. The outcomes in the core of the game cannot be improved upon by any subset of players. These outcomes correspond exactly to the price-lists that competitively balance the benefits of all SUs and owners. We show that the core in our model is always non-empty. When the measurement of price takes discrete value, the core of the game is defined as discrete core. The Dynamic Multi-band Sharing algorithm (DMS) is proposed to converge to the discrete core of the game. With small enough measurement unit of price, the algorithm can achieve the optimal performance compared with centralized one in terms of the system utility.

  • A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code

    Yun SHEN  Yitong LIU  Jing LIU  Hongwen YANG  Dacheng YANG  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E97-D No:11
      Page(s):
    2903-2911

    In this paper, we design an Unequal Error Protection (UEP) rateless code with special coding graph and apply it to propose a novel HTTP adaptive streaming based on UEP rateless code (HASUR). Our designed UEP rateless code provides high diversity on decoding probability and priority for data in different important level with overhead smaller than 0.27. By adopting this UEP rateless channel coding and scalable video source coding, our HASUR ensures symbols with basic quality to be decoded first to guarantee fluent playback experience. Besides, it also provides multiple layers to ensure the most suitable quality for fluctuant bandwidth and packet loss rate (PLR) without estimating them in advance. We evaluate our HASUR against the alternative solutions. Simulation results show that HASUR provides higher video quality and more adapts to bandwidth and PLR than other two commercial schemes under End-to-End transmission.

  • Optical Fiber Humidity Sensor with a Fast Response Time Using the Ionic Self-Assembly Method

    Francisco J. ARREGUI  Kristie L. COOPER  Yanjing LIU  Ignacio R. MATIAS  Richard O. CLAUS  

     
    PAPER-Chemical, Environmental, Biochemical and Medical Sensors

      Vol:
    E83-C No:3
      Page(s):
    360-365

    An optical fiber humidity sensor was fabricated forming a nanometer-scale Fabry-Perot interferometer by using the Ionic Self-Assembly Monolayer (ISAM) method. The materials used were Poly R-478 and poly(diallyldimethyl ammonium chloride). Taking advantage of the precision that the ISAM method can achieve in controlling the length of the nano cavity, the length was fit to obtain a maximum variation of 8.7 dB of reflected optical power between 11.3% and 85% RH. The sensor exhibited a fast response time and was able to monitor the human breathing.

  • Detecting Unsafe Raw Pointer Dereferencing Behavior in Rust

    Zhijian HUANG  Yong Jun WANG  Jing LIU  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2150-2153

    The rising systems programming language Rust is fast, efficient and memory safe. However, improperly dereferencing raw pointers in Rust causes new safety problems. In this paper, we present a detailed analysis into these problems and propose a practical hybrid approach to detecting unsafe raw pointer dereferencing behaviors. Our approach employs pattern matching to identify functions that can be used to generate illegal multiple mutable references (We define them as thief function) and instruments the dereferencing operation in order to perform dynamic checking at runtime. We implement a tool named UnsafeFencer and has successfully identified 52 thief functions in 28 real-world crates*, of which 13 public functions are verified to generate multiple mutable references.

  • Optimizing Hash Join with MapReduce on Multi-Core CPUs

    Tong YUAN  Zhijing LIU  Hui LIU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/02/04
      Vol:
    E99-D No:5
      Page(s):
    1316-1325

    In this paper, we exploit MapReduce framework and other optimizations to improve the performance of hash join algorithms on multi-core CPUs, including No partition hash join and partition hash join. We first implement hash join algorithms with a shared-memory MapReduce model on multi-core CPUs, including partition phase, build phase, and probe phase. Then we design an improved cuckoo hash table for our hash join, which consists of a cuckoo hash table and a chained hash table. Based on our implementation, we also propose two optimizations, one for the usage of SIMD instructions, and the other for partition phase. Through experimental result and analysis, we finally find that the partition hash join often outperforms the No partition hash join, and our hash join algorithm is faster than previous work by an average of 30%.

  • Performance Analysis of IEEE 802.11e EDCA

    Wei ZHANG  Jun SUN  Jing LIU  Haibin ZHANG  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E90-B No:1
      Page(s):
    180-183

    This letter presents a clear and more accurate analytical model to evaluate the IEEE 802.11e enhanced distributed channel access (EDCA) protocol. The proposed model distinguishes internal collision from external collision. It also differentiates the two cases when the backoff counter decreases, i.e. an arbitration interframe space (AIFS) period after a busy duration and a time slot after the AIFS period. The analytical model is validated through simulation.

  • CCTSS: The Combination of CNN and Transformer with Shared Sublayer for Detection and Classification

    Aorui GOU  Jingjing LIU  Xiaoxiang CHEN  Xiaoyang ZENG  Yibo FAN  

     
    PAPER-Image

      Pubricized:
    2023/07/06
      Vol:
    E107-A No:1
      Page(s):
    141-156

    Convolutional Neural Networks (CNNs) and Transformers have achieved remarkable performance in detection and classification tasks. Nevertheless, their feature extraction cannot consider both local and global information, so the detection and classification performance can be further improved. In addition, more and more deep learning networks are designed as more and more complex, and the amount of computation and storage space required is also significantly increased. This paper proposes a combination of CNN and transformer, and designs a local feature enhancement module and global context modeling module to enhance the cascade network. While the local feature enhancement module increases the range of feature extraction, the global context modeling is used to capture the feature maps' global information. To decrease the model complexity, a shared sublayer is designed to realize the sharing of weight parameters between the adjacent convolutional layers or cross convolutional layers, thereby reducing the number of convolutional weight parameters. Moreover, to effectively improve the detection performance of neural networks without increasing network parameters, the optimal transport assignment approach is proposed to resolve the problem of label assignment. The classification loss and regression loss are the summations of the cost between the demander and supplier. The experiment results demonstrate that the proposed Combination of CNN and Transformer with Shared Sublayer (CCTSS) performs better than the state-of-the-art methods in various datasets and applications.

  • Reliable Transmission Parameter Signalling Detection for DTMB-A Standard

    Jingjing LIU  Chao ZHANG  Changyong PAN  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2017/06/07
      Vol:
    E100-B No:12
      Page(s):
    2156-2163

    In the advanced digital terrestrial/television multimedia broadcasting (DTMB-A) standard, a preamble based on distance detection (PBDD) is adopted for robust synchronization and signalling transmission. However, traditional signalling detection method will completely fail to work under severe frequency selective channels with ultra-long delay spread 0dB echoes. In this paper, a novel transmission parameter signalling detection method is proposed for the preamble in DTMB-A. Compared with the conventional signalling detection method, the proposed scheme works much better when the maximum channel delay is close to the length of the guard interval (GI). Both theoretical analyses and simulation results demonstrate that the proposed algorithm significantly improves the accuracy and robustness of detecting the transmitted signalling.

  • Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families

    Jing LIU  Pei Dai XIE  Meng Zhu LIU  Yong Jun WANG  

     
    LETTER-Information Network

      Pubricized:
    2018/01/09
      Vol:
    E101-D No:4
      Page(s):
    1199-1202

    Malware phylogeny refers to inferring evolutionary relationships between instances of families. It has gained a lot of attention over the past several years, due to its efficiency in accelerating reverse engineering of new variants within families. Previous researches mainly focused on tree-based models. However, those approaches merely demonstrate lineage of families using dendrograms or directed trees with rough evolution information. In this paper, we propose a novel malware phylogeny construction method taking advantage of persistent phylogeny tree model, whose nodes correspond to input instances and edges represent the gain or lost of functional characters. It can not only depict directed ancestor-descendant relationships between malware instances, but also show concrete function inheritance and variation between ancestor and descendant, which is significant in variants defense. We evaluate our algorithm on three malware families and one benign family whose ground truth are known, and compare with competing algorithms. Experiments demonstrate that our method achieves a higher mean accuracy of 61.4%.

  • Inferring Phylogenetic Network of Malware Families Based on Splits Graph

    Jing LIU  Yuan WANG  Pei Dai XIE  Yong Jun WANG  

     
    LETTER-Information Network

      Pubricized:
    2017/03/22
      Vol:
    E100-D No:6
      Page(s):
    1368-1371

    Malware phylogeny refers to inferring the evolutionary relationships among instances of a family. It plays an important role in malware forensics. Previous works mainly focused on tree-based model. However, trees cannot represent reticulate events, such as inheriting code fragments from different parents, which are common in variants generation. Therefore, phylogenetic networks as a more accurate and general model have been put forward. In this paper, we propose a novel malware phylogenetic network construction method based on splits graph, taking advantage of the one-to-one correspondence between reticulate events and netted components in splits graph. We evaluate our algorithm on three malware families and two benign families whose ground truth are known and compare with competing algorithms. Experiments demonstrate that our method achieves a higher mean accuracy of 64.8%.