Selected Publications

Here we list our selected publications within the different themes of our research. To get a simple overview of our work in Network Slicing, have a look at our recent paper summaries by the Exeter Science Centre.

Network Function Virtualization and Network Slicing

  • J. Cheng, Y. Wu, Y. Lin, Y. E, Y. You, and J. Ge, “VNE-HRL: A Proactive Virtual Network Embedding Algorithm Based on Hierarchical Reinforcement Learning,” IEEE Transactions on Network and Service Management.
  • H. Wang, Y. Wu, G. Min, and W. Miao, “A Graph Neural Network-based Digital Twin for Network Slicing Management,” IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2020.3047843. [PDF]
  • X. Cheng, Y. Wu, G. Min, A. Y. Zomaya and X. Fang, “Safeguard Network Slicing in 5G: A Learning Augmented Optimization Approach,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, pp. 1600-1613, July 2020, doi: 10.1109/JSAC.2020.2999696.
  • Z. Yan, J. Ge, Y. Wu, L. Li and T. Li, “Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1040-1057, June 2020, doi: 10.1109/JSAC.2020.2986662.
  • W. Miao, G. Min, Y. Wu, H. Huang, Z. Zhao, H. Wang, and C. Luo, “Stochastic Performance Analysis of Network Function Virtualisation in Future Internet,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 3, pp. 613-626, 2019.
  • H. Wang, Y. Wu, G. Min, J. Xu, and P. Tang, “Data-driven Dynamic Resource Scheduling for Network Slicing: A Deep Reinforcement Learning Approach,” Information Sciences, vol. 498, pp. 106-116, 2019.
  • X. Cheng, Y. Wu, G. Min, and A.Y. Zomaya, “Network Function Virtualization in Dynamic Networks: A Stochastic Perspective,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 10, pp. 2218-2232, 2018.

System Modelling

  • G. Lin, J. Ge, Y. Wu, H. Li, T. Li, W. Mi, and Y. E, “Network Automation for Path Selection: A New Knowledge Transfer Approach,” IFIP/IEEE Networking-2021.
  • H. Wang, Y. Wu, G. Min, and W. Miao, “A Graph Neural Network-based Digital Twin for Network Slicing Management,” IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2020.3047843. [PDF]
  • W. Miao, G. Min, Y. Wu, H. Huang, Z. Zhao, H. Wang, and C. Luo, “Stochastic Performance Analysis of Network Function Virtualisation in Future Internet,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 3, pp. 613-626, 2019.
  • C. Li, Y. Wu, Z. Lu, J. Wang and Y. Hu, “A Multiperiod Multiobjective Portfolio Selection Model With Fuzzy Random Returns for Large Scale Securities Data,” IEEE Transactions on Fuzzy Systems, vol. 29, no. 1, pp. 59-74, Jan. 2021, doi: 10.1109/TFUZZ.2020.2992866.
  • Y. Wu, G. Min, D. Zhu, and L.T. Yang, “An Analytical Model for On-Chip Interconnects in Multimedia Embedded Systems,” ACM Transactions on Embedded Computing Systems, vol. 13, no. 1s, Article No. 29, 2013.
  • Y. Wu, G. Min, and L.T. Yang, “Performance Analysis of Hybrid Wireless Networks under Bursty and Correlated Traffic,” IEEE Transactions on Vehicular Technology, vol. 62, no. 1, pp. 449-454, 2013.
  • Y. Wu, G. Min, K. Li, and B. Javadi, “Modeling and Analysis of Communication Networks in Multicluster Systems under Spatio-Temporal Bursty Traffic,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 5, pp. 902-912, 2012.
  • Y. Wu, G. Min, and A.Y. Al-Dubai “A New Analytical Model for Multi-Hop Cognitive Radio Networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1643-1648, 2012.
  • G. Min, Y. Wu, and A.Y. Al-Dubai, “Performance Modelling and Analysis of Cognitive Mesh Networks,” IEEE Transactions on Communications, vol. 60, no. 6, pp. 1474-1478, 2012.

Internet of Things / Industrial Internet of Things

  • Y. Wu, H.-N. Dai, H. Tang, “Graph Neural Networks for Anomaly Detection in Industrial Internet of Things,” IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3094295.
  • Y. Wu, Z. Wang, Y. Ma, and V.C.M. Leung, “Deep reinforcement learning for blockchain in industrial IoT: A Survey,” Computer Networks, vol. 191, pp. 108004, 2021, https://doi.org/10.1016/j.comnet.2021.108004. [PDF]
  • H.-N. Dai, Y. Wu, H. Wang, M. Imran, and N. Haider, “Blockchain-empowered Edge Intelligence for Internet of Medical Things Against COVID-19”, IEEE Internet of Things Magazine.
  • Y. Wu, H. -N. Dai and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2300-2317, 15 Feb.15, 2021, doi: 10.1109/JIOT.2020.3025916. [PDF]
  • Y. Wu, “Robust Learning Enabled Intelligence for the Internet-of-Things: A Survey From the Perspectives of Noisy Data and Adversarial Examples,” IEEE Internet of Things Journal, doi: 10.1109/JIOT.2020.3018691.
  • B. Yin, H. Yin, Y. Wu and Z. Jiang, “FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6348-6359, July 2020, doi: 10.1109/JIOT.2020.2966778.
  • L. Jiao, Y. Wu, J. Dong and Z. Jiang, “Toward Optimal Resource Scheduling for Internet of Things Under Imperfect CSI,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 1572-1581, March 2020, doi: 10.1109/JIOT.2019.2952721.
  • B. Yin, Y. Wu, T. Hu, J. Dong and Z. Jiang, “An Efficient Collaboration and Incentive Mechanism for Internet of Vehicles (IoV) With Secured Information Exchange Based on Blockchains,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 1582-1593, March 2020, doi: 10.1109/JIOT.2019.2949088.
  • R. Zhou, X. Zhang, X. Wang, G. Yang, H. Wang, and Y. Wu, “Privacy-Preserving Data Search with Fine-grained Dynamic Search Right Management in Fog-assisted Internet of Things,” Information Sciences, vol. 491, pp. 251-264, 2019.
  • D.S. Sabareesh, G.V.P. Reddy, S. Jaiswal, J.M. Ppallan, K. Arunachalam, Y. Wu, “Redundant TCP Connector (RTC) for Improving the Performance of Mobile Devices,” WCNC-2019.
  • L. Cheng, J. Liu, G. Xu, Z. Zhang, H. Wang, H.N. Dai, Y. Wu, and W. Wang, “SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs,” IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1373-1385, Dec. 2019, doi: 10.1109/TCSS.2019.2904633.
  • H. Huang, H. Yin, G. Min, J. Zhang, Y. Wu, and X. Zhang, “Energy-aware Dual-path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 17, no. 6, pp. 1339-1352, 2018.
  • H. Huang, H. Yin, G. Min, X. Zhang, W. Zhu, and Y. Wu, “Coordinate-assisted routing approach to bypass routing holes in wireless sensor networks,” IEEE Communications Magazine, vol. 55, no. 7, pp. 180-185, 2017.
  • H. Huang, H. Yin, G. Min, D.O. Wu, Y. Wu, T. Zuo, and K. Li, “Network Distance Prediction for Enabling Service-Oriented Applications Over Large-scale Networks,” IEEE Communications Magazine, vol. 53, no.8, pp. 166-174, 2015.

Edge Computing

  • J. Zhang, Y. Wu and G. Min, “System Revenue Maximization for Offloading Decisions in Mobile Edge Computing,” ICC-2021.
  • Y. Wu, H. -N. Dai and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2300-2317, 15 Feb.15, 2021, doi: 10.1109/JIOT.2020.3025916. [PDF]
  • J. Zhang, Y. Wu, G. Min, F. Hao and L. Cui, “Balancing Energy Consumption and Reputation Gain of UAV Scheduling in Edge Computing,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 4, pp. 1204-1217, Dec. 2020, doi: 10.1109/TCCN.2020.3004592.
  • H.-N. Dai, Y. Wu, H. Wang, M. Imran, and N. Haider, “Blockchain-empowered Edge Intelligence for Internet of Medical Things Against COVID-19”, IEEE Internet of Things Magazine.
  • L. Cui, D. Su, Y. Zhou, L. Zhang, Y. Wu and S. Chen, “Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 4, pp. 2274-2285, April 2021, doi: 10.1109/TITS.2020.3008420.
  • Y. Wu, “Cloud-Edge Orchestration for the Internet-of-Things: Architecture and AI-Powered Data Processing,” IEEE Internet of Things Journal, doi: 10.1109/JIOT.2020.3014845.
  • Z. Zhao, G. Min, W. Gao, Y. Wu, H. Duan, and Q. Ni, “Deploying Edge Computing Nodes for Large-scale IoT: A Diversity Aware Approach,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3606-3614, 2018.

Anomaly Detection

  • Y. Wu, H.-N. Dai, H. Tang, “Graph Neural Networks for Anomaly Detection in Industrial Internet of Things,” IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3094295.
  • H. Cao, H. Tang, Y. Wu, F. Wang and Y. Xu, “On Accurate Computation of Trajectory Similarity via Single Image Super-Resolution,” IJCNN-2021.
  • Y. Guo, Y. Wu, Y. Zhu, B. Yang and C. Han, “Anomaly Detection using Distributed Log Data: A Lightweight Federated Learning Approach,” IJCNN-2021.
  • P. Sun, Y. E, T. Li, Y. Wu, J. Ge, J. You, and B. Wu, “Context-Aware Learning for Anomaly Detection with Imbalanced Log Data,” HPCC-2021.
  • Y. Zuo, Y. Wu, G. Min, C. Huang and K. Pei, “An Intelligent Anomaly Detection Scheme for Micro-Services Architectures With Temporal and Spatial Data Analysis,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 2, pp. 548-561, June 2020, doi: 10.1109/TCCN.2020.2966615.
  • C. Huang, G. Min, Y. Wu, Y. Ying, K. Pei, and Z. Xiang, “Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems,” IEEE Transactions on Big Data, DOI: 10.1109/TBDATA.2017.2711039, In Press.
  • C. Huang, Y. Wu, G. Min, and Y. Ying, “Kernelized Convex Hull Approximation and its Applications in Data Description Tasks,” IJCNN-2018.
  • C. Huang, Y. Wu, Y. Zuo, K. Pei, and G. Min, “Towards Experienced Anomaly Detector through Reinforcement Learning,” AAAI-2018.

Software Defined Networking

  • W. Miao, G. Min, Y. Wu, H. Wang, and J. Hu, “Performance Modelling and Analysis of Software Defined Networking under Bursty Multimedia Traffic,” ACM Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 5s, pp. 77:1-77:19, 2016.
  • G. Wang, Y. Zhao, J. Huang, Y. Wu, “An Effective Approach to Controller Placement in Software Defined Wide Area Networks,” IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 344-355, 2018.
  • S. Yang, L. Cui, X. Deng, Q. Li, Y. Wu, M. Xu, D. Wang and J. Wu, “FISE: A Forwarding Table Structure for Enterprise Networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 1181-1196, June 2020, doi: 10.1109/TNSM.2019.2951426.
  • H. Huang, H. Yin, G. Min, H. Jiang, J. Zhang, and Y. Wu, “Data-Driven Information Plane in Software-Defined Networking,” IEEE Communications Magazine, vol. 55, no. 6, pp. 218-224, 2017.

Network Security, Privacy and Safety

Traffic Classification

Social Networks

 

Webpage Analysis

Z. Jiang, H. Yin, Y. Wu, Y. Lyu, G. Min, and X. Zhang, “Constructing Novel Block Layouts for Webpage Analysis,” ACM Transactions on Internet Technology, vol. 19, no. 35, Article No. 35, 2019.