The search functionality is under construction.

Author Search Result

[Author] Yuan'an LIU(3hit)

1-3hit
  • An Efficient Double-Sourced Energy Transfer Scheme for Mobility-Constrained IoT Applications

    Chao WU  Yuan'an LIU  Fan WU  Suyan LIU  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2018/04/11
      Vol:
    E101-B No:10
      Page(s):
    2213-2221

    The energy efficiency of Internet of Things (IoT) could be improved by RF energy transfer technologies.Aiming at IoT applications with a mobility-constrained mobile sink, a double-sourced energy transfer (D-ET) scheme is proposed. Based on the hierarchical routing information of network nodes, the Simultaneous Wireless Information and Power Transfer (SWIPT) method helps to improve the global data gathering performance. A genetic algorithm and graph theory are combined to analyze the node energy consumption distribution. Then dedicated charger nodes are deployed on the basis of the genetic algorithm's output. Experiments are conducted using Network Simulator-3 (NS-3) to evaluate the performance of the D-ET scheme. The simulation results show D-ET outperforms other schemes in terms of network lifetime and data gathering performance.

  • Proportional Fair Resource Allocation for Uplink OFDMA Network Using Priority-Ranked Bargaining Model

    Lingkang ZENG  Yupei HU  Gang XIE  Yi ZHAO  Junyang SHEN  Yuan'an LIU  Jin-Chun GAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:8
      Page(s):
    2638-2648

    In this paper, we focus on the adaptive resource allocation issue for uplink OFDMA systems. The resources are allocated according to a proportional fairness criterion, which can strike an alterable balance between fairness and efficiency. Optimization theory is used to analyze the multi-constraint resource allocation problem and some heuristic characteristics about the optimal solution are obtained. To deal with the cohesiveness of the necessary conditions, we resort to bargaining theory that has been deeply investigated in game theory. Firstly, we summarize some assumptions about bargaining theory and show their similarities with the resource allocation process. Then we propose a priority-ranked bargaining model, whose primary contribution is applying the economic thought to the resource allocation process. A priority-ranked bargaining algorithm (PRBA) is subsequently proposed to permit the base station to auction the subcarriers one by one according to the users' current priority. By adjusting the predefined rate ratio flexibly, PRBA can achieve different degrees of fairness among the users' capacity. Simulation results show that PRBA can achieve similar performance of the max-min scheme and the NBS scheme in the case of appropriate predefined rate ratio.

  • Android Malware Detection Based on Functional Classification

    Wenhao FAN  Dong LIU  Fan WU  Bihua TANG  Yuan'an LIU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/12/01
      Vol:
    E105-D No:3
      Page(s):
    656-666

    Android operating system occupies a high share in the mobile terminal market. It promotes the rapid development of Android applications (apps). However, the emergence of Android malware greatly endangers the security of Android smartphone users. Existing research works have proposed a lot of methods for Android malware detection, but they did not make the utilization of apps' functional category information so that the strong similarity between benign apps in the same functional category is ignored. In this paper, we propose an Android malware detection scheme based on the functional classification. The benign apps in the same functional category are more similar to each other, so we can use less features to detect malware and improve the detection accuracy in the same functional category. The aim of our scheme is to provide an automatic application functional classification method with high accuracy. We design an Android application functional classification method inspired by the hyperlink induced topic search (HITS) algorithm. Using the results of automatic classification, we further design a malware detection method based on app similarity in the same functional category. We use benign apps from the Google Play Store and use malware apps from the Drebin malware set to evaluate our scheme. The experimental results show that our method can effectively improve the accuracy of malware detection.