Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiadi Yu is active.

Publication


Featured researches published by Jiadi Yu.


IEEE Transactions on Dependable and Secure Computing | 2013

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Jiadi Yu; Peng Lu; Guangtao Xue; Minglu Li

Cloud computing has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. In this paper, we focus on addressing data privacy issues using SSE. For the first time, we formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, we propose a two-round searchable encryption (TRSE) scheme that supports top-k multikeyword retrieval. In TRSE, we employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on ciphertext. As a result, information leakage can be eliminated and data security is ensured. Thorough security and performance analysis show that the proposed scheme guarantees high security and practical efficiency.


IEEE Transactions on Parallel and Distributed Systems | 2008

Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement

Minglu Li; Jiadi Yu; Jie Wu

BitTorrent has emerged as a very popular peer-to-peer file sharing system, which uses an embedded set of incentive mechanisms to encourage contribution and prevent free-riding. However, BitTorrents ability to prevent free-riding needs further study. In this paper, we present a fluid model with two different classes of peers to capture the effect of free-riding on BitTorrent-like systems. With the model, we find that BitTorrents incentive mechanism is successful in preventing free-riding in a system without seeds but may not succeed in producing a disincentive for free-riding in a system with a high number of seeds. The reason for this is that BitTorrent does not employ any effective mechanisms for seeds to effectively guard against free-riding. Therefore, we propose a seed bandwidth allocation strategy for the BitTorrent system to reduce the effect of seeds on free-riding. Finally, simulation results are given that validate what we have found in our analysis and demonstrate the effectiveness of the proposed strategy.


international conference on distributed computing systems | 2014

Towards Truthful Mechanisms for Mobile Crowdsourcing with Dynamic Smartphones

Qian Zhang; Hongzi Zhu; Jiadi Yu; Jian Cao; Lionel M. Ni

Stimulating participation from smartphone users is of paramount importance to mobile crowd sourcing systems and applications. A few incentive mechanisms have been proposed, but most of them have made the impractical assumption that smartphones remain static in the system and sensing tasks are known in advance. The existing mechanisms fail when being applied to the realistic scenario where smartphones dynamically arrive to the system and sensing tasks are submitted at random. It is particularly challenging to design an incentive mechanism for such a mobile crowd sourcing system, given dynamic smartphones, uncertain arrivals of tasks, strategic behaviors, and private information of smartphones. We propose two truthful auction mechanisms for two different cases of mobile crowd sourcing with dynamic smartphones. For the offline case, we design an optimal truthful mechanism with an optimal task allocation algorithm of polynomial-time computation complexity of O (n+γ)3, where n is the number of smartphones and γ is the number of sensing tasks. For the online case, we design a near-optimal truthful mechanism with an online task allocation algorithm that achieves a constant competitive ratio of 1:2. Rigorous theoretical analysis and extensive simulations have been performed, and the results demonstrate the proposed auction mechanisms achieve truthfulness, individual rationality, computational efficiency, and low overpayment.


Eurasip Journal on Wireless Communications and Networking | 2012

A novel vehicular location prediction based on mobility patterns for routing in urban VANET

Guangtao Xue; Yuan Luo; Jiadi Yu; Minglu Li

Location information is crucial for most applications and protocol designs in high-speed vehicular ad-hoc networks (VANETs). In traditional approaches, this is obtained by object tracking techniques that keep tracking the objects and publish the information to the users. In highly dynamic environments, however, these approaches are not efficient as the target objects in VANETs are typically vehicles that present high mobility. Their locations keep changing in a large range so that the tracking and information publication algorithms have to be frequently invoked to obtain the instant locations of the objects. To deal with this problem, we propose a novel approach based on the observation that in high-speed VANET environment, the target objects are strictly constrained by the road network. Their mobilities are well patterned and many patterns can clearly be identified. These patterns can smartly be leveraged so that a large amount of control overhead can be saved. Towards this end, in this article we adopt Variable-order Markov model to abstract Vehicular Mobility Pattern (VMP) from the real trace data in Shanghai. We leverage VMP for predicting the possible trajectories of moving vehicles which help to keep the timely effectiveness of the evolutional location information. To reveal the benefits of VMP, we propose a Prediction-based Soft Routing Protocol (PSR), taking VMP as an advantage. The experimental results show that PSR significantly outperforms existing solutions in terms of control packet overhead, packet delivery ratio, packet delivery delay. In certain scenarios, the control packet overhead can be saved by up to 90% compared with DSR, and 75% compared with WSR.


international conference on distributed computing systems workshops | 2005

PChord: improvement on chord to achieve better routing efficiency by exploiting proximity

Feng Hong; Minglu Li; Jiadi Yu; Yi Wang

Routing efficiency is the critical issue when constructing peer-to-peer overlay. However, chord has often been criticized on its careless of routing locality. A peer-to-peer overlay, called PChord is illustrated in this paper which focuses on achieving better routing efficiency. PChord is constructed on the basis of chord which exploits proximity of the underly Internet by combining proximity routing into its routing scheme. The simulation shows that PChord has achieved lower RDP per message routing.


international conference on embedded networked sensor systems | 2013

E 3 : energy-efficient engine for frame rate adaptation on smartphones

Haofu Han; Jiadi Yu; Hongzi Zhu; Yingying Chen; Jie Yang; Guangtao Xue; Minglu Li

Touch-screen technique has gained the large popularity in human-screen interaction with modern smartphones. Due to the limited size of equipped screens, scrolling operations are indispensable in order to display the content of interest on screen. While power consumption caused by hardware and software installed within smartphones is well studied, the energy cost made by human-screen interaction such as scrolling remains unknown. In this paper, we analyze the impact of scrolling operations to the power consumption of smartphones, finding that the state-of-art strategy of smartphones in responding a scrolling operation is to always use the highest frame rate which arouses huge computation burden and can contribute nearly 50% to the total power consumption of smartphones. In recognizing this significance, we further propose a novel system, Energy-Efficient Engine(E3), which automatically tracks the scrolling speed and adaptively adjusts the frame rate according to individual user preference. The goal of E3 is to guarantee the user experience and minimize the energy consumption caused by scrolling at the same time. Extensive experiment results demonstrate the efficiency of E3 design. On average, E3 can save up to 58% of the energy consumed by CPU and 34% of the overall energy consumption.


Computer Communications | 2008

CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks

Jiadi Yu; Minglu Li

In a large-scale BitTorrent-like peer-to-peer file sharing system, the track server could be overloaded to update the state information of constantly arriving and leaving peers. Upon the connection request from a peer, the track server responses with a random list of peers and such randomly selected peers among the whole peer-to-peer network could create a long delay of file sharing between two peers. To improve the file sharing performance, we propose a hierarchical architecture to group peers into clusters according to their proximity in the underlying overlay network in such a way that clusters are evenly distributed and that the peers within each cluster are relatively close to each other. We achieve this by constructing the CBT (Clustered BitTorrent) system with two novel algorithms: a peer joining algorithm and a super-peer selection algorithm. We develop a fluid model to compare the performance of the proposed CBT system with a original BitTorrent system. With this model, we find that the CBT system quite effectively improves the performance of the system. Finally, simulation results are given, which demonstrate that the CBT system achieves better results than a randomly organized BitTorrent network, improving the system scalability and efficiency while retaining the robustness and incentives of the original BitTorrent paradigm.


asia-pacific services computing conference | 2006

Free-Riding Analysis of BitTorrent-Like Peer-to-Peer Networks

Jiadi Yu; Minglu Li; Feng Hong; Guangtao Xue

BitTorrent is a very popular P2P file sharing system. It has been successful at distributing large files quickly and efficiently. Embedded in BitTorrent is a set of incentive mechanisms to encourage sharing and contribute, and prevent systematic free-riding. In this paper, a fluid model with two classes of peers is used to capture the effect of free-riding in a BitTorrent system. With the model, we explore how does free-riding influenced the BitTorrent system. From results, it is shown that BitTorrent mechanism is successful to guard against free-riding. Finally, we discuss the dying process of a BitTorrent system and the probability of system dead that is induced by free-riding


IEICE Transactions on Information and Systems | 2006

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

Feng Hong; Minglu Li; Min-You Wu; Jiadi Yu

Routing efficiency is the critical issue when constructing peer-to-peer overlay. However, Chord has often been criticized on its careless of routing locality. A routing efficiency enhancement protocol on top of Chord is illustrated in this paper, which is called PChord. PChord aims to achieve better routing efficiency than Chord by exploiting proximity of the underlying network topology. The simulation shows that PChord has achieved lower RDP per message routing.


Eurasip Journal on Wireless Communications and Networking | 2014

Geographic routing based on predictive locations in vehicular ad hoc networks

Yanmin Zhu; Ruobing Jiang; Jiadi Yu; Zhi Li; Minglu Li

Many geographic routing algorithms have been proposed for vehicular ad hoc networks (VANETs), which have the strength of not maintaining any routing structures. However, most of which rely on the availability of accurate real-time location information. It is well known that vehicles can be intermittently connected with other vehicles. Thus, in such networks, it is difficult or may incur considerable cost to retrieve accurate locations of moving vehicles. Furthermore, the location information of a moving vehicle available to other vehicles is usually time-lagged since it is constantly moving over time. Fortunately, we observe that the short-term future locations of vehicles can be predicted. Based on the important observation, we propose a novel approach for geographic routing which exploits the predictive locations of vehicles. Thus, we have developed a prediction technique based on the current speed and heading direction of a vehicle. As a result, the request frequency of location updates can be reduced. In addition, we propose two forwarding strategies and three buffer management strategies. We have performed extensive simulations based on real vehicular GPS traces collected from around 4,000 taxis in Shanghai, China. Simulation results clearly show that geographic routing based on predictive locations is viable and can significantly reduce the cost of location updates.

Collaboration


Dive into the Jiadi Yu's collaboration.

Top Co-Authors

Avatar

Minglu Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Guangtao Xue

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Feng Hong

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Hongzi Zhu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Ying Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xiangyu Xu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Juan Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Yuan Luo

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Shiyou Qian

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge