Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weilian Xue is active.

Publication


Featured researches published by Weilian Xue.


IEEE Transactions on Communications | 2015

Sampling Bloom Filter-Based Detection of Unknown RFID Tags

Xiulong Liu; Heng Qi; Keqiu Li; Ivan Stojmenovic; Alex X. Liu; Yanming Shen; Wenyu Qu; Weilian Xue

Unknown RFID tags appear when the unread tagged objects are moved in or tagged objects are misplaced. This paper studies the practically important problem of unknown tag detection while taking both time-efficiency and energy-efficiency of battery-powered active tags into consideration. We first propose a Sampling Bloom Filter which generalizes the standard Bloom Filter. Using the new filtering technique, we propose the Sampling Bloom Filter-based Unknown tag Detection Protocol (SBF-UDP), whose detection accuracy is tunable by the end users. We present the theoretical analysis to minimize the time and energy costs. SBF-UDP can be tuned to either the time-saving mode or the energy-saving mode, according to the specific requirements. Extensive simulations are conducted to evaluate the performance of the proposed protocol. The experimental results show that SBF-UDP considerably outperforms the previous related protocols in terms of both time-efficiency and energy-efficiency. For example, when 3 or more unknown tags appear in the RFID system with 30000 known tags, the proposed SBF-UDP is able to successfully report the existence of unknown tags with a confidence more than 99%. While our protocol runs 9 times faster than the fastest existing scheme and reducing the energy consumption by more than 80%.


ieee international conference computer and communications | 2016

Top-k queries for multi-category RFID systems

Xiulong Liu; Keqiu Li; Jie Wu; Alex X. Liu; Xin Xie; Chunsheng Zhu; Weilian Xue

This paper studies the practically important problem of top-k queries, which is to find the top k largest categories and their corresponding sizes. In this paper, we propose a Top-k Query (TKQ) protocol and a technique that we call Segmented Perfect Hashing (SPH) for optimizing TKQ. Specifically, TKQ is based on the framed slotted Aloha protocol. Each tag responds to the reader with a Single-One Geometric (SOG) string using the ON-OFF Keying modulation. TKQ leverages the length of continuous leading 1s in the combined signal to estimate the corresponding category size. TKQ can quickly eliminate the sufficiently small categories, and only needs to focus on a limited number of large-size categories that require more accurate estimation. We conduct rigorous analysis to guarantee the predefined accuracy constraints. To further improve time-efficiency, we propose the SPH scheme, which improves the average frame utilization of TKQ from 36.8% to nearly 100% by establishing a bijective mapping between tag categories and slots. To minimize the overall time cost, we optimize the key parameter that trades off between communication cost and computation cost. Experimental results show that our TKQ+SPH protocol not only achieves the required accuracy constraints, but also achieves a 2.6~7x faster speed than the existing protocols.


international conference on algorithms and architectures for parallel processing | 2014

Efficient Detection of Cloned Attacks for Large-Scale RFID Systems

Xiulong Liu; Heng Qi; Keqiu Li; Jie Wu; Weilian Xue; Geyong Min; Bin Xiao

This paper studies a practically important problem of cloned tag detection in large-scale RFID systems where an attacker compromises genuine tags and produces their replicas, namely cloned tags, to threaten RFID applications. Although many efforts have been made to address this problem, the existing work can hardly satisfy the stringent real-time requirement, and thus cannot catch cloning attacks in a time-efficient way. Moreover, the existing work does not consider energy-efficiency, which is very critical when battery-powered active tags are used. To fill these gaps, this paper proposes a Location Polling-based Cloned tag Detection (LP-CTD) protocol by taking both time-efficiency and energy-efficiency into consideration. LP-CTD reports the existence of cloned tags when the reader finds an expected singleton slot appearing as collision one. To improve the efficiency of detecting cloned tags, only sampled tags in LP-CTD participate in the detection process. Theoretical analysis on the proposed protocol is conducted to minimize their execution time and energy consumption. Extensive simulation experiments are conducted to evaluate the performance of the proposed protocols. The results demonstrate that the proposed LP-CTD protocol considerably outperforms the latest related protocols by reducing more than 80% of the execution time, and more than 90% of the energy consumption.


The Journal of Supercomputing | 2012

Statistical behaviors of mobile agents in network routing

Wenyu Qu; Keqiu Li; Masaru Kitsuregawa; Weilian Xue

Mobile agent-based network routing is a new technique for routing in large-scale networks. An analysis of the searching activity and population growth of mobile agents is important for improving performance in agent-driven networks. In this paper, we describe a general execution model of mobile agents for network routing and classify it into two cases. For each case, we analyze the population distribution of mobile agents (the distribution of mobile agents running in the network) and the probability of success (the probability that an agent can find its destination). We also perform extensive experiments for various network topologies to validate our analytical results. Both theoretical and experimental results show that the population distribution and the probability of success of mobile agents can be controlled by locally adjusting relevant parameters, such as the number of agents generated per request, the number of jumps each mobile agent can move, etc. Our results reveal new theoretical insights into the statistical behaviors of mobile agents and provide useful tools for effectively managing mobile agents in large networks.


Concurrency and Computation: Practice and Experience | 2017

Dynamic scheming the duty cycle in the opportunistic routing sensor network

Bingxin Niu; Heng Qi; Keqiu Li; Xiulong Liu; Weilian Xue

In wireless sensor networks, a lot of applications need the sensed information be transmitted to the sink node within a predefined time threshold. So end‐to‐end delay is an important performance metric in wireless sensor networks. Opportunistic routing protocols have been proposed to reduce the waiting delay. In the duty cycle networks, increasing the duty cycle ratio can also reduce the end‐to‐end delay. However, this method will consume more energy. It is obvious that there exists a trade‐off between delay and energy consumption. So adjusting the duty cycle ratio of each node can investigate this trade‐off. To the best of our knowledge, no existing work takes both of end‐to‐end delay and energy efficiency into consideration in the opportunistic routing networks. In this paper, we want to minimize the whole energy consumption while guaranteeing the expected end‐to‐end delay between the source nodes and the sink node is below the given threshold. To deal with this problem, we propose a dynamic duty cycle scheme which can significantly reduce the energy consumption and guarantee the expected end‐to‐end delay demand in the opportunistic routing network. To be specific, firstly, we formulate a new metric with the wake‐up time slots as the variable to measure the end‐to‐end delay. Secondly, for simplifying the complex problem, we decompose it into a set of single‐hop delay guarantee problems. Feedback controller has been used to solve the problem. We also analyze the influence of the multiple receivers in the same forwarding set. Finally, we conduct extensive simulations to evaluate the performance of the proposed algorithm. The experimental results reveal that our scheme can guarantee the delay requirement, meanwhile, significantly reduce the energy consumption compared with prior schemes.


Computer Communications | 2017

Fast temporal continuous scanning in RFID systems

Xin Xie; Xiulong Liu; Keqiu Li; Geyong Min; Weilian Xue

This paper studies the problem of temporal continuous scanning for large-scale RFID systems, which is an essential operation to keep the inventory up-to-date. The existing solutions need to execute unknown and missing tag identification protocols separately, which are of low time-efficiency because the unknown tags disturb the identification of missing tags and vice versa. To this end, we design a Fast Continuous Scanning (FCS) protocol based on the proposed multiple categories filter which can detect unknown tags and skip the empty and collision slots for improving the efficiency of missing tag identification. FCS is faster than the prior methods because the proposed filter is helpful to decreasing the interference between unknown and missing tags. We also investigate the optimization of the involved parameters to minimize the execution time. Extensive simulation results demonstrate that the proposed protocol outperforms the state-of-the-art solutions by saving 39% 58.5% of the execution time.


sensor, mesh and ad hoc communications and networks | 2016

Fast Collection of Data in Sensor-Augmented RFID Networks

Xin Xie; Xiulong Liu; Weilian Xue; Keqiu Li; Bin Xiao; Heng Qi

This paper studies the problem of data collection in sensor-augmented RFID networks: how to quickly obtain the error-bounded data from sensor-augmented RFID tags. Existing data collection protocols require each tag to transmit the sensor data to the reader through a low-rate channel. However, in large-scale RFID system, they take too long time and block other time-sensitive operations. By exploring the correlation of sensor data, our Sampling-based Information Collection (SIC) protocol significantly reduces the number of responding tags. Specifically, SIC obtains an error bound based on the estimation model by using some randomly-sampled data. The error bound is expected to maximize the number of data within it. These data can be seen as a cluster and be approximated by one value within the error bound. Then, SIC only needs to collect the data of out this cluster, thereby significantly reducing the data transmission. It minimizes the execution time by optimizing the sample size and estimating the number of tags out of the error bound. We conduct extensive simulations to evaluate the performance of SIC and compare it with three major related work. The results demonstrate that SIC is 1 to 10 times faster than the state-of-the-art solution.


international conference on computer communications and networks | 2015

D2CS: Dynamic Duty Cycle Scheme in an Opportunistic Routing Sensor Network

Bingxin Niu; Heng Qi; Keqiu Li; Xiulong Liu; Weilian Xue

In Wireless Sensor Networks (WSNs), end-to-end delay is an important metric because the sensed information is necessary to be transmitted to the sink node within a predefined time threshold. Therefore, opportunistic routing protocols are proposed to reduce the end-to-end delay. As a matter of fact, increasing the number of wake-up slots will certainly reduce the transmission delay, however, also consumes more energy. Hence, it is interesting to control the number of wake-up slots to investigate the trade-off between the end-to-end delay and the energy-efficiency. To the best of our knowledge, no existing work takes both of end-to-end delay and energy-efficiency into consideration in the opportunistic routing networks. Therefore, this paper studies how to minimize the energy-consumption while guaranteeing that the expected end-to-end delay is below a given threshold. To solve this problem, we propose an energy-based Dynamic Duty Cycle Scheme(D2CS) in opportunistic routing network. Specifically, we first present an analytical model to measure the expected end-to-end delay. Then, we decompose the studied problem into a set of single-hop delay guarantee problems and using the feedback controller to approximate the optimal solution. Finally, extensive simulations are conducted to evaluate the performance of the proposed D2CS algorithm. The experimental results reveal that our D2CS can guarantee the delay requirement, meanwhile, significantly reduce the energy consumption compared with prior schemes.


Concurrency and Computation: Practice and Experience | 2012

DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks

Weilian Xue; Yaqiong Liu; Keqiu Li; Zhongxian Chi; Geyong Min; Wenyu Qu


global communications conference | 2010

DHTrust: A Robust and Distributed Reputation System for Trusted Peer-to-Peer Networks

Yaqiong Liu; Weilian Xue; Keqiu Li; Zhongxian Chi; Geyong Min; Wenyu Qu

Collaboration


Dive into the Weilian Xue's collaboration.

Top Co-Authors

Avatar

Keqiu Li

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Xiulong Liu

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Heng Qi

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wenyu Qu

Dalian Maritime University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bingxin Niu

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Xin Xie

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Yaqiong Liu

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Zhongxian Chi

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Alex X. Liu

Michigan State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge