Prof. Jing Deng's Research
Home |
Teaching |
Research |
Publications |
CV |
Misc
DISCLAIMER:
The PDF files are presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are
retained by authors or by other copyright holders. All persons
copying this information are expected to adhere to the terms and
constraints invoked by each author's copyright. In most cases,
these works may not be reposted without the explicit permission of
the copyright holder.
Selected Grants
-
National Science Foundation, "REU Site: Graph Learning and Network
Analysis: from Foundations to Applications (GraLNA)." senior personnel,
with Chunjiang Zhu (PI), Qianqian Tong, and Minjeong Kim, $371,995,
May 2024 - April 2027.
-
National Science Foundation, "Archaeology Program Full Proposal: A
Network Approach to Magdalenian Social Landscapes." co-PI (with
Charles Egeland, Minjeong Kim, Rebecca Schwendler, Christopher
Nicholson, $237,001, April 2021 - March 2024.
-
National Science Foundation, "CIF: Security in Dynamic Environments:
Harvesting Network Randomness and Diversity," PI, REU-supplement,
amount: $20,000, August 2016 - July 2017.
-
UNCG Faculty First Summer Scholarship Support Award, "Zombie User
Detection in Online Social Networks," PI, amount: $5,000, June 2016.
-
National Science Foundation, "CIF: Security in Dynamic Environments:
Harvesting Network Randomness and Diversity," PI, amount: $155,817,
August 2013 - July 2017.
Sponsor
Our research was partly supported by Microsoft Windows Phone
Global Trial Program.
Research Areas
The following are selected publications. Please
see publications for a full reverse
chronicle order list.
In online social networks, we focus on information propagation,
fabricated user detection, shortest path discovery, as well as market
analysis on e-commerce sites.
-
S. Muttineni and J. Deng,
"Estimating Sentiment in Social Media - a Case Study of the Migrant
Caravans News on Twitter,"
in Proc. of the 9th International Workshop on Semantic Computing
for Social Networks and Organization Sciences: from user information
to social knowledge (SCSN '21), in conjunction with the 15th IEEE
International Conference on Semantic Computing (ICSC '21),
Virtual, January 27-29, 2021, pp. 404-408,
doi: 10.1109/ICSC50631.2021.00074.
[PDF]
[BibTeX]
-
B. Joyce and J. Deng,
"Sentiment Analysis Using Naive Bayes Approach with Weighted Reviews -
a case study," in Proc. of IEEE Global Telecommunications
Conference - Special Areas in Communications - Social Networks
(GLOBECOM '19), Waikoloa, HI, USA,
December 9-13, 2019, pp. 1-6,
doi: 10.1109/GLOBECOM38437.2019.9013588.
[PDF]
[BibTeX]
-
X. Zhao,
K. Zhao,
and J. Deng,
"Geography Still Matters: Examine the Role of Location in Online
Markets for Foreign Branded Products,"
Decision Sciences, vol. 50, no. 2, pp. 285-310, April 2019,
doi: 10.1111/deci.12337.
[PDF]
[BibTeX]
-
B. Joyce and J. Deng,
"Sentiment Analysis of Tweets for the 2016 US Presidential Election,"
in Proc. of the 2017 IEEE MIT Undergraduate Research Technology
Conference (URTC'17), Cambridge, MA, USA, November 3-5, 2017,
pp. 1-4,
doi: 10.1109/URTC.2017.8284176.
[PDF]
[BibTeX]
-
J. Deng, X. Gao, and C. Wang,
"Using Bi-level Penalized Logistic Classifier to Detect Zombie
Accounts in Online Social Networks,"
in Proc. of the 5th International Conference on Network,
Communication and Computing (ICNCC'16),
Kyoto, Japan, December 17-21, 2016, pp. 126-130,
doi: 10.1145/3033288.3033349.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng,
"An Empirical Investigation of Online Gray Markets,"
Journal of Retailing,
vol. 92, no. 4, pp. 397-410, December 2016,
doi: 10.1016/j.jretai.2016.05.002.
[PDF]
[BibTeX]
-
F. Xia, H. B. Liaqat, J. Deng,
J. Wan, and S. K. Das,
"Overhead Control with Reliable Transmission of Popular Packets in
Ad-Hoc Social Networks," IEEE Transactions
on Vehicular Technology, vol. 65, no. 9, pp. 7647-7661, September 2016,
doi: 10.1109/TVT.2015.2484418.
[PDF]
[BibTeX]
-
J. Ruan, J. Deng, G. A. Amariucai, and S. Wei,
"Efficient Link Cuts in Online Social Networks,"
in Proc. of IEEE Global Telecommunications Conference - Special
Areas in Communications - Social Networks (GLOBECOM '15),
San Diego, CA, USA, December 6-10, 2015, pp. 1-6,
doi: 10.1109/GLOCOM.2015.7417589.
[PDF]
[BibTeX]
-
J. Deng,
L. Fu, and Y. Yang,
"ZLOC: Detection of Zombie Users in Online Social Networks
Using Location Information,"
in Proc. of the third IARIA International Conference on Building and
Exploring Web Based Environments (WEB 2015),
Rome, Italy, May 24-29, 2015, pp. 24-28.
This paper received the sole Best Paper
Award of the conference.
[PDF]
[BibTeX]
-
L. Fu and
J. Deng,
"ROBE: Knitting a Tight Hub for Shortest-Path
Discovery in Large Social Graphs,"
in Proc. of 17th International Conference on Enterprise Information
Systems (ICEIS '15), Barcelona, Spain, April 27-30, 2015,
pp. 97-107, doi: 10.5220/0005353500970107.
[PDF]
[BibTeX]
-
L. Fu and
J. Deng,
"Graph Calculus: Scalable Shortest Path Analytics for Large Social
Graphs through Core Net,"
in Proc. of IEEE/WIC/ACM International
Conference on Web Intelligence (WI '13),
Atlanta, GA, USA, November 17-20, 2013, pp. 417-424,
doi: 10.1109/WI-IAT.2013.59.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng,
"Online Price Dispersion Revisited: How Do Transaction Prices Differ
from Listing Prices?"
Journal of Management Information Systems, vol. 32, no. 1,
pp. 261-290, summer 2015, doi: 10.1080/07421222.2015.1029397.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng, "Parallel Importation: An
Empirical Investigation of Online Unauthorized Distribution
Channels," in Proc. of the 10th Workshop on e-Business (WEB 2011),
Shanghai, P. R. China, December 4, 2011.
Lecture Notes in Business Information Processing, vol. 108,
no. II, part 4, pp. 216-224, Springer-Verlag.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng, "An Empirical Investigation of
Online Gray Market," in Proc. of the 21st Workshop on Information
Technologies and Systems (WITS 2011), Shanghai, P. R. China,
December 3-4, 2011.
[PDF]
[BibTeX]
We focus on several research areas in security. These include key
pre-distribution, misbehavior detection, covert transmission,
and information assurance.
Our key pre-distribution research concentrates on how to distribute
randomly-chosen key rings to wireless sensors prior to sensor
deployment. The goal is to allow sensors to share common keys with a
pre-defined probability. Security connectivity and vulnerability
against node capture or compromise are two of the main concerns.
-
J. Deng, V. Kolesnikov, and A. A. Schwarzmann,
"Cryptology and Network Security - 22nd International Conference, CANS
2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings,"
Lecture Notes in Computer Science, Springer Singapore, 2023.
doi: 10.1007/978-981-99-7563-1.
[PDF]
[BibTeX]
-
J. Deng
and Y. S. Han,
"Cooperative Secret Delivery in Wireless Sensor Networks,"
International Journal of Ad Hoc and Ubiquitous Computing,
vol. 14, no. 4, pp. 226-237, 2013, doi: 10.1504/IJAHUC.2013.058504.
[PDF]
[BibTeX]
-
P. Papadimitratos and
J. Deng,
"Stealthy pre-attacks against random key pre-distribution security,"
in Proc. of the IEEE International Conference on Communications -
Communication and Information Systems Security Symposium (ICC'12
CISS), Ottawa, Canada, June 10-15, 2012, pp. 955-959.
[PDF]
[BibTeX]
-
X. Zou and J. Deng,
"Detection of Fabricated CTS Packet Attacks in Wireless LANs,"
in Proc. of 7th International ICST Conference on Heterogeneous
Networking for Quality, Reliability, Security and Robustness
(QSHINE '10),
Houston, TX, USA, November 17-19, 2010. Invited Paper.
[PDF]
[BibTeX]
-
Y. Kong,
J. Deng, and
S. R. Tate,
"A Distributed Public Key Caching Scheme in Large Wireless Networks,"
in Proc. of IEEE Global Telecommunications Conference -
Communication & Information System Security (GLOBECOM '10),
Miami, FL, USA, December 6-10, 2010, pp. 1-5.
[PDF]
[BibTeX]
-
W. Du,
J. Deng,
Y. S. Han,
and P. K. Varshney,
"A Key Pre-distribution Scheme for Sensor Networks Using Deployment
Knowledge," IEEE Transactions on Dependable and
Secure Computing, vol. 3, no. 1, pp. 62-77,
January-March 2006.
[PDF]
[BibTeX]
-
W. Du,
J. Deng,
Y. S. Han,
P. K. Varshney,
J. Katz, and A. Khalili,
"A Pairwise Key Pre-Distribution Scheme for
Wireless Sensor Networks," ACM Transactions on
Information and System Security, vol. 8, no. 2, pp. 228-258,
May 2005.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han,
S. Chen, and P. K. Varshney,
"A Key Management Scheme for Wireless Sensor Networks Using Deployment
Knowledge," in Proc. of
the 23rd Conference of the IEEE Communications Society
(INFOCOM '04), Hong Kong, China, March 7-11, 2004,
pp. 586-597.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney,
"A Pairwise
Key Pre-distribution Scheme for Wireless Sensor Networks,"
in Proc. of ACM
Conference on Computer and Communications Security (CCS '03),
Washington, DC, USA, October 27-31, 2003, pp. 42-51.
[PDF]
[BibTeX]
Since there are disconnected neighbors on the security plane
after the random key pre-distribution techniques are used, we
designed new mechanisms to efficiently deliver secret link keys
through multiple multi-hop secured paths and common bridge node. With
the use of information coding on multiple multi-hop secured paths, we
were able to achieve "just enough" redundancy combating information
leakage and alteration in transit. We also designed a technique termed
Babel, using a single common bridge node to deliver secret information
from a source to several insecure neighbors securely.
-
J. Deng and
Y. S. Han,
"Multi-path Key Establishment for Wireless Sensor
Networks Using Just Enough Redundancy Transmission,"
IEEE Transactions on Dependable and Secure Computing,
vol. 5, no. 3, pp. 177-190, July-September 2008.
[PDF]
[BibTeX]
-
J. Deng and
Y. S. Han,
"Babel: Using a Common Bridge Node to Deliver Multiple Keys in
Wireless Sensor Networks," in
Proc. of IEEE Global Telecommunications Conference - General
Symposium (GLOBECOM '07),
Washington, DC, USA, November 26-30, 2007, pp. 161-165.
[PDF]
[BibTeX]
In the area of information assurance, we proposed techniques to
mitigate the effects of routing misbehavior caused by selfish nodes or
users. Malicious attackers may also attack control messages such as
the CTS (Clear-To-Send) and ACK (Acknowledgment) packets. For
instance, when ACK packets are jammed by adversaries, the data packet
sender must re-transmit and this wastes the precious wireless
channel. We developed a technique to randomize the ACK packet
transmission within a window so that the adverse effect of ACK jamming
is mitigated. We also investigated fusion assurance in wireless sensor
networks and used a witness approach to improve data fusion assurance.
-
J. Deng and E. Wang,
"Just Enough Disclosure (JED): Taking Advantage of Non-IID Data for
Federated Learning in Mobile Edge Computing,"
in Proc. of the 6th International Workshop on Data Driven
Intelligence for Networks and Systems (DDINS'24), in conjunction with
the IEEE International Conference on Communications (ICC'24),
June 9-13, 2024, Denver, CO, USA. to appear.
[PDF]
[BibTeX]
-
F. Chen, P. Li, S. Pan, L. Zhong, and J. Deng,
"Giant Could be Tiny: Efficient Inference of Giant Models on
Resource-Constrained UAVs,"
IEEE Internet of Things Journal Special Issue on
Tiny Machine Learning in Internet of Unmanned Aerial Vehicles,
2024, to appear.
[PDF]
[BibTeX]
-
C. Lin, Z. Yang, Y. Sun, J. Deng, L. Wang, and G. Wu,
"Cooperative Game for Multiple Chargers with Dynamic Network Topology,"
in Proc. of the 49th International Conference on Parallel
Processing (ICPP '20), Edmonton, AB, Canada, August 17-20, 2020,
article number: 17, pp. 1-10, doi: 10.1145/3404397.3404469.
[PDF]
[BibTeX]
-
C. Jia, K. Lin, and J. Deng,
"A Multi-property Method to Evaluate Trust of Edge Computing Based on
Data Driven Capsule Network,"
in Proc. of the 2nd International Workshop on Data Driven
Intelligence for Networks (DDIN), in conjunction with the 39th
Conference of the IEEE Communications Society (INFOCOM '20),
Toronto, Canada, July 6-9, 2020, pp. 616-621,
doi: 10.1109/INFOCOMWKSHPS50562.2020.9163069.
[PDF]
[BibTeX]
-
L. Yao, B. Jiang, J. Deng, and M. S. Obaidat,
"LSTM-based Detection for Timing Attacks in Named Data Network,"
in Proc. of IEEE Global Telecommunications
Conference - Communication and Information Systems Security Symposium
(GLOBECOM '19), Waikoloa, HI, USA,
December 9-13, 2019, pp. 1-6,
doi: 10.1109/GLOBECOM38437.2019.9013144.
[PDF]
[BibTeX]
-
L. Yao, J. Li, J. Deng, and G. Wu,
"Detection of Cache Pollution Attack Based on Federated Learning in
Ultra-Dense Network,"
Elsevier Computers & Security,
vol. 124, pp. 102965, January 2023,
doi: 10.1016/j.cose.2022.102965.
[PDF]
[BibTeX]
-
L. Yao, Z. Fan, J. Deng,
X. Fan, and G. Wu,
"Detection and Defense of Cache Pollution Attacks Using Clustering in
Named Data Networks," IEEE Transactions
on Dependable and Secure Computing, vol. 17, no. 6,
pp. 1310-1321, November-December 2020.
doi: 10.1109/TDSC.2018.2876257.
[PDF]
[BibTeX]
-
C. Lin, K. Wang, Z. Chu, K. Wang, J. Deng,
M. S. Obaidat, and G. Wu,
"Hybrid Charging Scheduling Schemes for Three-dimensional Underwater
Wireless Rechargeable Sensor Networks," Elsevier Journal of
Systems and Software, vol. 146, pp. 42-58, December 2018,
doi: 10.1016/j.jss.2018.09.002.
[PDF]
[BibTeX]
-
C. Lin, S. Wei, J. Deng,
M. S. Obaidat, H. Song, L. Wang, and G. Wu,
"GTCCS: A Game Theoretical Collaborative Charging Scheduling for
On-demand Charging Architecture," IEEE Transactions
on Vehicular Technology, vol. 67, no. 12,
pp. 12124-12136, December 2018,
doi: 10.1109/TVT.2018.2872890.
[PDF]
[BibTeX]
-
M. R. Khalili Shoja, G. Amariucai, Z. Wang, S. Wei, and J. Deng,
"On the Secret Key Capacity of Sibling Hidden Markov Models,"
IEEE Transactions on Information Forensics & Security,
vol. 14, no. 2, pp. 514-524, February 2018,
doi: 10.1109/TIFS.2018.2855638.
[PDF]
[BibTeX]
-
L. Yao, A. Chen, J. Deng,
J. Wang, and G. Wu,
"A Cooperative Caching Scheme Based on Mobility Prediction in
Vehicular Content Centric Networks," IEEE Transactions
on Vehicular Technology, vol. 67, no. 6, pp. 5435-5444, June 2018,
doi: 10.1109/TVT.2017.2784562.
[PDF]
[BibTeX]
-
A. Moharrer, S. Wei, G. A. Amariucai, and J. Deng,
"Successive Synthesis of Latent Gaussian Trees,"
in Proc. of the 36th IEEE Military Communications
Conference (MILCOM'17),
Baltimore, MD, USA, October 23-25, 2017, pp. 315-320,
doi: 10.1109/MILCOM.2017.8170791.
[PDF]
[BibTeX]
-
M. R. Khalili Shoja, G. Amariucai, Z. Wang, S. Wei, and J. Deng,
"Asymptotic Converse Bound for Secret Key Capacity in Hidden Markov Model,"
in Proc. of the IEEE International Symposium on Information Theory
(ISIT'17), Aachen, Germany, June 25-30, 2017, pp. 1968-1972,
doi: 10.1109/ISIT.2017.8006873.
[PDF]
[BibTeX]
-
C. Lin, D. Han, J. Deng,
and G. Wu,
"P2S: A Primary and Passer-by Scheduling
Algorithm for On-demand Charging Architecture in
Wireless Rechargeable Sensor Networks," IEEE Transactions
on Vehicular Technology, vol. 66, no. 9, pp. 8047-8058,
September 2017, doi: 10.1109/TVT.2017.2683493.
[PDF]
[BibTeX]
-
A. Moharrer, S. Wei, G. A. Amariucai, and J. Deng,
"Synthesis of Gaussian Trees with Correlation Sign Ambiguity: An
Information Theoretic Approach,"
in Proc. of 46th Annual Allerton Conference on Communication,
Control, and Computing (Allerton'16),
Urbana, IL, USA, September 28-30, 2016, pp. 378-384,
doi: 10.1109/ALLERTON.2016.7852256.
[PDF]
[BibTeX]
-
M. R. Khalili Shoja, G. Amariucai, S. Wei, and J. Deng,
"KERMAN: A Key Establishment Algorithm based on Harvesting Randomness
in MANETs,"
in Proc. of the International Conference on Security and Management
(SAM'16), Las Vegas, NV, USA, July 25-28, 2016, pp. 324-330.
[PDF]
[BibTeX]
-
M. R. Khalili Shoja, G. Amariucai, S. Wei, and J. Deng,
"Secret Common Randomness from Routing Metadata in Ad-Hoc Networks,"
IEEE Transactions on Information Forensics & Security,
vol. 11, no. 8, pp. 1674-1684, August 2016,
doi: 10.1109/TIFS.2016.2550424.
[PDF]
[BibTeX]
-
A. Moharrer, S. Wei, G. Amariucai, and J. Deng,
"Extractable Common Randomness from Gaussian Trees: Topological and
Algebraic Perspectives," IEEE Transactions on
Information Forensics & Security,
vol. 11, no. 10, pp. 2312-2321, October 2016,
doi: 10.1109/TIFS.2016.2543688.
[PDF]
[BibTeX]
-
C. Lin, K. Liu, G. Wu, and J. Deng,
"VCLT: An Accurate Trajectory Tracking Attack based on Crowdsourcing
in VANETs," in Proc. of the 15th International Conference on
Algorithms and Architectures for Parallel Processing (ICA3PP '15),
Zhangjiajie, China, November 18-20, 2015, pp. 297-310,
doi: 10.1007/978-3-319-27137-8_23.
[PDF]
[BibTeX]
-
L. Yao, Y. Man, Z. Huang, J. Deng,
and X. Wang, "Secure Routing based on Social Similarity in
Opportunistic Networks,"
IEEE Transactions on Wireless Communications,
vol. 15, no. 1, pp. 594-605, January 2016,
doi: 10.1109/TWC.2015.2476466.
[PDF]
[BibTeX]
-
A. Moharrer, S. Wei, G. A. Amariucai, and J. Deng,
"Topological and Algebraic Properties for Classifying Unrooted
Gaussian Trees under Privacy Constraints,"
in Proc. of IEEE Global Telecommunications Conference -
Communications and Information System Security (GLOBECOM '15),
San Diego, CA, USA, December 6-10, 2015, pp. 1-6,
doi: 10.1109/GLOCOM.2015.7417559.
[PDF]
[BibTeX]
-
L. Yao, J. Deng, J. Wang, and G. Wu,
"A-CACHE: an Anchor-based Public Key Caching Scheme in Large Wireless
Networks," Elsevier Computer Networks, vol. 87, pp. 78-88, July
2015, doi: 10.1016/j.comnet.2015.06.001.
[PDF]
[BibTeX]
-
A. Moharrer, S. Wei, G. T. Amariucai, and J. Deng,
"Evaluation of Security Robustness Against Information Leakage
in Gaussian Polytree Graphical Models,"
in Proc. of IEEE Wireless Communications & Networking
Conference, Mobile and Wireless Networks (WCNC '15), New Orleans, LA, USA,
March 9-12, 2015, pp. 1404-1409, doi: 10.1109/WCNC.2015.7127674.
[PDF]
[BibTeX]
-
G. Wu, Z. Liu, L. Yao, and J. Deng,
"A Trust Routing for Multimedia Social Networks,"
Computer Journal, vol. 58, no. 4, pp. 688-699, April 2015,
doi: 10.1093/comjnl/bxu091.
[PDF]
[BibTeX]
-
K. Lee, J. Deng, and R. S. Sudhaakar,
"Fast Authentication in Multi-Hop Infrastructure-based Communication,"
in Proc. of IEEE International Conference on Communications -
Communication and Information Systems Security Symposium (ICC '14),
Sydney, Australia, June 10-14, 2014, pp. 665-670,
doi: 10.1109/ICC.2014.6883395.
[PDF]
[BibTeX]
-
L. Yao, C. Lin, J. Deng, F. Deng, J. Miao, and K. Yim,
"Biometrics-based Data Link Layer Anonymous Authentication in VANETs,"
in Proc. of the 7th International Conference on Complex,
Intelligent, and Software Intensive System (IMIS'13),
Taichung, Taiwan, July 3-5, 2013, pp. 182-187,
doi: 10.1109/IMIS.2013.38.
[PDF]
[BibTeX]
-
L. Yao, L. Kang, F. Deng, J. Deng, and G. Wu,
"Protecting Source-Location Privacy Based on Multi-Rings in Wireless
Sensor Networks," Wiley's Concurrency and Computation: Practice and
Experience, Special Issue on Trust and Security in Wireless Sensor
Networks, June 2013, doi: 10.1002/cpe.3075.
[PDF]
[BibTeX]
-
J. Deng,
S. C.-H. Huang,
Y. S. Han, and
J. H. Deng,
"Fault-Tolerant and Reliable Computation in Cloud Computing,"
in Proc. of IEEE Globecom Workshop on Web and Pervasive Security
(WPS 2010),
Miami, FL, USA, December 10, 2010, pp. 1601-1605.
[PDF]
[BibTeX]
-
H.-T. Pai,
J. Deng,
and Y. S. Han,
"Time-Slotted Voting Mechanism for Fusion Data Assurance in
Wireless Sensor Networks under Stealthy Attacks,"
Elsevier Computer Communications,
vol. 33, no. 13, pp. 1524-1530, August, 2010.
[PDF]
[BibTeX]
-
Z. Zhang and J. Wu and J. Deng and
M. Qiu,
"Jamming ACK Attack to Wireless Networks and a Mitigation Approach," in
Proc. of IEEE Global Telecommunications Conference - Wireless Networking Symposium
(GLOBECOM '08),
New Orleans, LA, USA, November 30-December 4, 2008,
vol. ECP.950, pp. 1-5.
[PDF]
[BibTeX]
-
J. Deng, Z. Zhang, S. Pagadala,
and P. K. Varshney,
"Protecting MANETs from Spurious CTS Attacks with Randomized
Carrier Sensing," in
Proc. of IEEE Sarnoff Symposium '08,
Princeton, NJ, USA, April 28-30, 2008, pp. 1-5.
[PDF]
[BibTeX]
-
K. Liu, J. Deng,
P. K. Varshney,
and K. Balakrishnan,
"An Acknowledgment-based Approach for the Detection of Routing
Misbehavior in MANETs," IEEE Transactions on Mobile
Computing, vol. 6, no. 5, pp. 536-550, May 2007.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney,
"A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor
Networks," in Proc. of IEEE Global Telecommunications
Conference (GLOBECOM '03), San Francisco, CA, USA, December 1-5,
2003, vol. 3, pp. 1435-1439.
[PDF]
[BibTeX]
We designed a covert channel communication technique to take
advantage of the splitting tree algorithm in collision resolution of
Multiple Access Control protocols. Using our technique, the covert
receivers do not need to know the identity of the covert senders,
achieving mutual anonymous covert communication.
-
Z. Wang,
J. Deng, and
R. B. Lee,
"Mutual Anonymous Communications:
A New Covert Channel Based on Splitting Tree MAC," in
the 26th Conference of the IEEE Communications Society
(INFOCOM '07), Minisymposium,
Anchorage, AK, USA, May 6-12, 2007.
[PDF]
[BibTeX]
In networking, we investigate Multiple Access Control (MAC), data
forwarding, energy preservation, back-off control, and a spectrum of
broader issues in Mobile Ad Hoc Networks (MANETs), Wireless Sensor
Networks (WSNs), and cognitive radio networks.
Our study of data delivery in large wireless networks such wireless
sensor networks focused on communication energy conservation and
balancing to extend network lifetime.
-
Y. Long, J. Zhuang, S. Gong, B. Gu, J. Xu, and J. Deng,
"Exploiting Deep Reinforcement Learning for Stochastic AoI
Minimization in Multi-UAV-assisted Wireless Networks,"
in Proc. of IEEE Wireless Communications & Networking
Conference, Mobile and Wireless Networks (WCNC '24),
Dubai, United Arab Emirates,
April 21-24, 2024. to appear.
[PDF]
[BibTeX]
-
L. Yao, X. Zou,
J. Deng, and S. Suthaharan,
"PeB: Periodic Broadcast for Information Distribution in Large
Wireless Networks,"
in Proc. of IEEE Global Telecommunications Conference - Wireless
Networking Symposium (GLOBECOM '13),
Atlanta, GA, USA, December 9-13, 2013, pp. 4514-4519,
doi: 10.1109/GLOCOMW.2013.6855650.
[PDF]
[BibTeX]
-
J. Deng,
S. C.-H. Huang,
and Y. S. Han,
"An On-line Relay Selection Scheme in Power Controllable Wireless
Sensor Networks,"
Hindawi International Journal of Distributed Sensor Networks,
vol. 2012, pp. 1-13, May 2012.
[PDF]
[BibTeX]
-
J. Deng,
"Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor
Networks," ACM Transactions on Sensor Networks,
vol. 5, no. 4, pp. 1-25, November 2009.
[PDF]
[BibTeX]
Our MAC study focused on how to improve the throughput performance
of MAC schemes while maintaining fair access. Besides proposing
new MAC schemes for MANETs, we are also investigating the benefits
and drawbacks of using multiple subchannels instead of a single
channel in MAC schemes in networks such as cognitive radio networks.
-
J. Deng, P.-N. Chen, and Y. S. Han,
"perMAC: Perturbation-based MAC for Dense Wireless Networks with
Periodic Traffic," in Proc. of the 2023 International Conference on
Computing, Networking and Communications (ICNC'23): Mobile and Wireless
Networking, Honolulu, HI, USA,
February 20-22, 2023, pp. 372-376,
doi: 10.1109/ICNC57223.2023.10074191.
[PDF]
[BibTeX]
-
L. Deng, J. Deng, P.-N. Chen, and Y. S. Han,
"On the Asymptotic Performance of Delay-Constrained Slotted ALOHA,"
in Proc. of the 27th International Conference on Computer
Communications and Networks (ICCCN'18),
Hangzhou, P. R. China, July 30 - August 2, 2018, pp. 1-8,
doi: 10.1109/ICCCN.2018.8487430.
Invited Paper.
[PDF]
[BibTeX]
-
Y. Liu,
M. Liu, and
J. Deng, "Revisiting Optimal Power Control: Dual Effects of SNR
and Contention," in Proc. of the 10th International Workshop on
Wireless Network Measurements and Experimentation (WiNMeE '14) in
conjunction with the 12th International Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '14),
Hammamet, Tunisia, May 12, 2014, pp. 143-150,
doi: 10.1109/WIOPT.2014.6850292.
[PDF]
[BibTeX]
-
Y. Liu,
M. Liu, and
J. Deng,
"Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth
the Pain?" in IEEE Journal on
Selected Areas in Communications - Cognitive Radio Series,
vol. 31, no. 11, pp. 2301-2311, November 2013,
doi: 10.1109/JSAC.2013.131122.
[PDF]
[BibTeX]
-
Y. Liu,
M. Liu, and
J. Deng,
"Is Diversity Gain Worth the Pain: a Delay Comparison Between
Opportunistic Multi-Channel MAC and Single-Channel MAC,"
in Proc. of the 31st Conference of the IEEE Communications Society
(INFOCOM '12), Minisymposium,
Orlando, FL, USA, March 25-30, 2012, pp. 2921-2925.
[PDF]
[BibTeX]
-
J. Deng, Y. S. Han,
and S. R. Kulkarni,
"Can Multiple Subchannels Improve the Delay Performance of
RTS/CTS-based MAC Schemes?"
IEEE Transactions on Wireless Communications,
vol. 8, no. 4, pp. 1591-1596, April 2009.
[PDF]
[BibTeX]
-
Y. S. Han,
J. Deng,
and Z. J. Haas,
"Analyzing Multi-Channel Medium Access Control Schemes
with ALOHA Reservation,"
IEEE Transactions on Wireless Communications, vol. 5, no. 8,
pp. 2143-2152, August 2006.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
and Z. J. Haas,
"Analyzing Split Channel Medium Access Control Schemes,"
IEEE Transactions on Wireless Communications, vol. 5, no. 5,
pp. 967-971, May 2006.
[PDF]
[BibTeX]
Energy conservation in wireless communication is a huge
challenge. This is mainly because wireless devices are
highly resource (energy) constrained. We investigated a broad range
of problems in energy conservation in wireless networks, using
techniques such as radio transmission range optimization and node sleeping.
-
C. Lin, C. Guo, W. Du, J. Deng, L. Wang, and G. Wu,
"Maximizing Energy Efficiency of Period-Area Coverage with UAVs for
Wireless Rechargeable Sensor Networks,"
in Proc. of the 16th IEEE International Conference on Sensing,
Communication, and Networks (SECON '19),
Boston, MA, USA, June 10-13, 2019, pp. 1-9,
doi: 10.1109/SAHCN.2019.8824918.
[PDF]
[BibTeX]
-
C. Lin, Y. Zhou, F. Ma, J. Deng, L. Wang, and G. Wu,
"Minimizing Charging Delay for Directional Charging in Wireless
Rechargeable Sensor Networks,"
in Proc. of the 38th Conference of the IEEE Communications Society
(INFOCOM '19), Paris, France, April 29 - May 2, 2019,
pp. 1819-1827,
doi: 10.1109/INFOCOM.2019.8737589.
[PDF]
[BibTeX]
-
Y. Man, J. Deng, G. A. Amariucai, and S. Wei,
"HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable
Sensor Networks,"
in Proc. of the 25th International Conference on Telecommunications
(ICT'18), Saint Malo, France, June 26-28, 2018,
pp. 649-553,
doi: 10.1109/ICT.2018.8464833.
[PDF]
[BibTeX]
-
C. Lin, C. Guo, J. Deng, and G. Wu,
"3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless
Rechargeable Sensor Networks with Heterogeneous Chargers,"
in Proc. of the 38th IEEE International Conference on Distributed
Computing Systems (ICDCS '18),
Vienna, Austria, July 2-5, 2018,
pp. 311-320,
doi: 10.1109/ICDCS.2018.00039.
[PDF]
[BibTeX]
-
C. Lin, Y. Zhou, H. Dai, J. Deng, and G. Wu,
"MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor
Networks by Mixing Partial Charge and Full Charge," in Proc. of the
15th IEEE International Conference on Sensing, Communication, and
Networks (SECON '18), Hong Kong, China, June 11-13, 2018,
pp. 1-9,
doi: 10.1109/SAHCN.2018.8397138.
[PDF]
[BibTeX]
-
C. Lin, Z. Wang, J. Deng, L. Wang, J. Ren, and G. Wu,
"mTS: Temporal- and Spatial-Collaborative Charging for Wireless
Rechargeable Sensor Networks with Multiple Vehicles,"
in Proc. of the 37th Conference of the IEEE Communications Society
(INFOCOM '18), Honolulu, HI, USA, April 15-19, 2018,
pp. 99-107,
doi: 10.1109/INFOCOM.2018.8486402.
[PDF]
[BibTeX]
-
C. Lin, B. Xue, Z. Wang, D. Han, J. Deng, and G. Wu,
"DWDP: A Double Warning Thresholds with Double Preemptive Scheduling
Scheme for Wireless Rechargeable Sensor Networks,"
in Proc. of the International Conference on High Performance
Computing and Communications (HPCC '15),
New York City, NY, USA, August 24-26, 2015, pp. 503-508,
doi: 10.1109/HPCC-CSS-ICESS.2015.115.
[PDF]
[BibTeX]
-
S. Suthaharan, A. Chawade, R. Jana, and J. Deng,
"Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor
Networks," in Proc. of the International Conference on Wireless
Algorithms, Systems and Applications (WASA'09),
Boston, MA, USA, August 16-18, 2009. B. Liu, B. Azer, and
D.-Z. Du, Eds., vol. 5682 of Lecture Notes in Computer Science
(LNCS), pp. 459-468, Springer-Verlag.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
P.-N. Chen,
and P. K. Varshney,
"Optimal Transmission Range for Wireless Ad Hoc Networks Based on
Energy Efficiency," IEEE Transactions on Communications,
vol. 55, no. 9, pp. 1772-1782, September 2007.
[PDF]
[BibTeX]
- J. Deng,
Y. S. Han,
W. B. Heinzelman, and
P. K. Varshney,
"Scheduling Sleeping Nodes in High Density Cluster-based Sensor
Networks," ACM/Kluwer Mobile Networks and Applications
(MONET) Special Issue on "Energy Constraints and Lifetime Performance in
Wireless Sensor Networks," vol. 10, no. 6, pp. 825-835,
December 2005.
[PDF]
[BibTeX]
- J. Deng,
Y. S. Han,
W. B. Heinzelman, and
P. K. Varshney,
"Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based
Sensor Networks,"
Elsevier Computer Communications Journal, Special
Issue on ASWN '04, vol. 28, no. 14, pp. 1631-1642, September
2005.
[PDF]
[BibTeX]
Geographic routing and data forwarding can identify optimum route
toward the final destination with help from geographic information
from the source, the routers, and the destination. We investigated
forwarding area optimization,
-
D. Chen, J. Deng,
and P. K. Varshney,
"Selection of a Forwarding Area for Contention-Based Geographic
Forwarding in Wireless Multi-hop Networks," IEEE Transactions
on Vehicular Technology, vol. 56, no. 5, pp. 3111-3122, September 2007.
[PDF]
[BibTeX]
We published several papers on MAC scheme survey, design, and
backoff control optimization. We have also designed a fairness index,
based on the transmission sequence's variation from the fair access
sequences, to evaluate the access pattern to the channel from all
contending nodes.
-
L. Yao, X. Xu, J. Deng, G. Wu, Z. Li,
"A Cooperative Caching Scheme for VCCN with Mobility Prediction and
Consistent Hashing,"
IEEE Transactions on Intelligent Transportation Systems,
vol. 23, no. 11, pp. 20230-20242, November 2022.
doi: 10.1109/TITS.2022.3171071.
[PDF]
[BibTeX]
-
K. Lin, Y. Li, J. Deng, P. Pace, and G. Fortino,
"Clustering-learning-based Long-term Predictive Localization in
5G-Envisioned Internet of Connected Vehicles,"
IEEE Transactions on Intelligent Transportation Systems,
vol. 22, no. 8, pp. 5232-5246, August 2021.
doi: 10.1109/TITS.2020.2997472.
[PDF]
[BibTeX]
-
K. Lin, M. Chen, J. Deng, M. M. Hasan, and G. Fortino,
"Enhanced Fingerprinting and Trajectory Prediction for IoT
Localization in Smart Buildings," IEEE Transactions on
Automation Science and Engineering, special issue on Advances and
Applications of Internet of Things for Smart Automated Systems,
vol. 13, no. 3, pp. 1294-1307, July 2016,
doi: 10.1109/TASE.2016.2543242.
[PDF]
[BibTeX]
-
D.-F. Tseng,
Y. S. Han,
W. H. Mow,
P.-N. Chen,
J. Deng, and A. J. Han Vinck,
"Robust Decoding for Convolutionally Coded Systems Impaired
by Memoryless Impulsive Noise,"
IEEE Transactions on Communications, vol. 61, no. 11,
pp. 4640-4652, November 2013, doi: 10.1109/TCOMM.2013.101813.130122.
[PDF]
[BibTeX]
-
D.-F. Tseng, Y. S. Han, W. Ho Mow, and J. Deng, "Efficient
Decoding over Power-line Channels," in Proc. of the 5th
International Workshop on Signal Design and its Applications in
Communications (IWSDA '11), Guilin, P. R. China, October 10-14,
2011, pp. 138-141.
[PDF]
[BibTeX]
-
J. Deng,
M. Qiu,
and G. Wu,
"Fault Tolerant Data Collection in Heterogeneous Intelligent
Monitoring Networks,"
in Proc. of the 5th IEEE International Conference
on Networking, Architecture, and Storage (NAS '10),
Macau, P. R. China, July 15-17, 2010, pp. 13-18.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
and B. Liang,
"Fairness Index Based on Variational Distance,"
in Proc. of IEEE Global Telecommunications Conference - Wireless
Networking Symposium (GLOBECOM '09),
Hawaii, USA, November 30-December 4, 2009, pp. 3338-3343.
[PDF]
[BibTeX]
- J. Deng, P. K. Varshney, and Z. J. Haas,
"A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination
Function," in
Proc. of Communication Networks and Distributed Systems Modeling and
Simulation (CNDS '04), San Diego, CA, USA, January 18-21, 2004.
[PDF]
[BibTeX]
- Z. J. Haas and
J. Deng,
"On Optimizing the Backoff Interval for Random Access Schemes,"
IEEE Transactions on Communications, vol. 51, no. 12,
pp. 2081-2090, December 2003.
[PDF]
[BibTeX]
- Z. J. Haas and
J. Deng,
"Dual Busy Tone Multiple Access
(DBTMA) - A Multiple Access Control Scheme for Ad Hoc
Networks," IEEE Transactions on
Communications, vol. 50, no. 6, pp. 975-985, June 2002.
[PDF]
[BibTeX]
-
S. Kumar,
V. S. Raghavan, and J. Deng,
"Medium Access Control Protocols for Ad-Hoc Wireless Networks: A
Survey," Elsevier Ad Hoc Networks,
vol. 4, no. 3, pp. 326-358, May 2006.
[PDF]
[BibTeX]
It is essential to perform efficient message broadcast and to
search for a known service in large
wireless networks. We investigated different broadcast techniques
and search schemes.
-
S. C.-H. Huang,
P.-J. Wan,
J. Deng, and
Y. S. Han,
"Broadcast Scheduling in Interference Environment,"
IEEE Transactions on Mobile Computing,
vol. 7, no. 11, pp. 1338-1348, November 2008.
[PDF]
[BibTeX]
-
J. Deng and S. Zuyev,
"On Search Sets of Expanding Ring Search in Wireless Networks,"
Elsevier Ad Hoc Networks,
vol. 6, no. 7, pp. 1168-1181, September 2008.
[PDF]
[BibTeX]
-
X. Wang, J. Deng, and
T. Berger,
"GB: Distributed Reachability-Tunable Broadcast Algorithms
for Wireless Sensor Networks,"
in Proc. of the 2nd IEEE International Conference
on Mobile Ad-Hoc and Sensor Systems (MASS '05),
Washington, DC, USA, November 7-10, 2005, pp. 733-742.
[PDF]
[BibTeX]