Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yaoxue Zhang is active.

Publication


Featured researches published by Yaoxue Zhang.


ubiquitous intelligence and computing | 2006

Transparent computing: a new paradigm for pervasive computing

Yaoxue Zhang; Yuezhi Zhou

Due to the research and technological advances, ubiquitous or pervasive computing is emerging rapidly as an exciting new discipline to provide computing and communication services all the time and everywhere. While with many ongoing initiatives, it is too far to achieve the vision that Mark Weiser described. After a comprehensive analysis on traditional paradigms, we argue that, not users-friendly, i.e., users can not get services from computer easily, is one of the main reasons. In this paper, a new computing paradigm, i.e., Transparent Computing will be presented to solve this problem partially. Accordingly, we propose and develop a pilot system, which runs in a network environment and operates at the assembler instruction level. This system lets users demand heterogeneous OSes and applications upon them from centered simple servers, similar to choose different TV channels in daily life. We also present some primitive real and experimental results to show that it is a feasible and efficient solution for future computing infrastructure.


IEEE Transactions on Industrial Informatics | 2016

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Ju Ren; Yaoxue Zhang; Kuan Zhang; Anfeng Liu; Jianer Chen; Xuemin Sherman Shen

Network lifetime is a crucial performance metric to evaluate data-gathering wireless sensor networks (WSNs) where battery-powered sensor nodes periodically sense the environment and forward collected samples to a sink node. In this paper, we propose an analytic model to estimate the entire network lifetime from network initialization until it is completely disabled, and determine the boundary of energy hole in a data-gathering WSN. Specifically, we theoretically estimate the traffic load, energy consumption, and lifetime of sensor nodes during the entire network lifetime. Furthermore, we investigate the temporal and spatial evolution of energy hole and apply our analytical results to WSN routing in order to balance the energy consumption and improve the network lifetime. Extensive simulation results are provided to demonstrate the validity of the proposed analytic model in estimating the network lifetime and energy hole evolution process.


Computer Networks | 2014

Provably secure three-party authenticated key agreement protocol using smart cards

Haomin Yang; Yaoxue Zhang; Yuezhi Zhou; Xiaoming Fu; Hao Liu; Athanasios V. Vasilakos

Authenticated key agreement protocol is a useful cryptographic primitive, which can be used to protect the confidentiality, integrity and authenticity for transmitted data over insecure networks. From the point of view of the management of pre-shared secrets, one of the advantages of three-party authenticated key agreement (3PAKA) protocols is that they are more suitable for use in a network with large numbers of users compared with two-party authenticated key agreement protocols. Using smart cards is a practical, secure measure to protect the secret private keys of a user. Recently, some 3PAKA protocols using smart cards have been proposed. However, up to now, it is still a challenging problem to propose a 3PAKA protocol using smart cards with fewer rounds of messages and without using timestamp technique. Another important fact to be mentioned is that existing 3PAKA protocols using smart cards all lack provable-security guarantees. In this paper, we propose a new 3PAKA protocol using smart cards. The proposed protocol gains several advantages over existing related protocols: (1) The protocol is provably secure under the computational Diffie-Hellman assumption in the random oracle model, and hence can resist strong adversaries in network scenarios; (2) The protocol needs fewer rounds of messages, and can enable short communication latency and rapid response; and (3) The protocol is not based on timestamp technique, and does not need the complicated clock synchronization.


IEEE Communications Magazine | 2015

Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions

Ju Ren; Yaoxue Zhang; Kuan Zhang; Xuemin Shen

With the proliferation of increasingly powerful mobile devices, mobile users can collaboratively form a mobile cloud to provide pervasive services, such as data collecting, processing, and computing. With this mobile cloud, mobile crowdsourcing, as an emerging service paradigm, can enable mobile users to take over the outsourced tasks. By leveraging the sensing capabilities of mobile devices and integrating human intelligence and machine-computation, mobile crowdsourcing has the potential to revolutionize the approach of data collecting and processing. In this article we investigate the mobile crowdsourcing architecture and applications, then discuss some research challenges and countermeasures for developing mobile crowdsourcing. Some research orientations are finally envisioned for further studies.


Proceedings of the sixth international workshop on MobiArch | 2011

TailTheft: leveraging the wasted time for saving energy in cellular communications

Hao Liu; Yaoxue Zhang; Yuezhi Zhou

A notion in cellular communications (e.g., GSM, 3G) is called Tail Time, namely the period of high power state after the completion of a transmission. This Tail Time can alleviate the overhead of switching from the low to the high power state, in case there is another transmission in the near future. However, it also results in large energy waste. In this paper, we propose TailTheft, a scheme that steals the wasted Tail Time for data prefetching and delayed transfer, thus significantly reducing energy consumption. In order to achieve this, TailTheft schedules a number of transmissions to the Tail Time of other transmissions. A Virtual Tail mechanism is employed to steal the Tail Time and a Dual Queue Scheduling algorithm is proposed for the scheduling of transmissions. We evaluate TailTheft through a trace-driven simulation using both per-application and real life traces. Experimental results show that TailTheft can reduce energy consumption by 20% to 34% in different cases.


IEEE Transactions on Services Computing | 2014

A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization

Yuezhi Zhou; Yaoxue Zhang; Hao Liu; Naixue Xiong; Athanasios V. Vasilakos

Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, we present the design, implementation, and evaluation of an asymmetric virtual machine monitor (AVMM), which is an asymmetric partitioning-based bare-metal approach that achieves near-native performance while supporting a new out-of-operating system mechanism for value-added services. To achieve these goals, AVMM divides underlying platforms into two asymmetric partitions: a user partition and a service partition. The user partition runs a commodity user OS, which is assigned to most of the underlying resources, maintaining end-user experience. The service partition runs a specialized OS, which consumes only the needed resources for its tasks and provides enhanced features to the user OS. AVMM considerably reduces virtualization overhead through two approaches: 1) Peripheral devices, such as graphics equipment, are assigned to be monopolized by a single user OS. 2) Efficient resource management mechanisms are leveraged to alleviate complicated resource sharing in existing virtualization technologies. We implement a prototype that supports Windows and Linux systems. Experimental results show that AVMM is a feasible and efficient approach to client virtualization.


Computer Communications | 2015

SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing

Ju Ren; Yaoxue Zhang; Kuan Zhang; Xuemin Shen

Abstract Mobile sensing has become a promising paradigm for mobile users to obtain information by task crowdsourcing. However, due to the social preferences of mobile users, the quality of sensing reports may be impacted by the underlying social attributes and selfishness of individuals. Therefore, it is crucial to consider the social impacts and trustworthiness of mobile users when selecting task participants in mobile sensing. In this paper, we propose a S ocial A ware C rowdsourcing with R eputation M anagement (SACRM) scheme to select the well-suited participants and allocate the task rewards in mobile sensing. Specifically, we consider the social attributes, task delay and reputation in crowdsourcing and propose a participant selection scheme to choose the well-suited participants for the sensing task under a fixed task budget. A report assessment and rewarding scheme is also introduced to measure the quality of the sensing reports and allocate the task rewards based the assessed report quality. In addition, we develop a reputation management scheme to evaluate the trustworthiness and cost performance ratio of mobile users for participant selection. Theoretical analysis and extensive simulations demonstrate that SACRM can efficiently improve the crowdsourcing utility and effectively stimulate the participants to improve the quality of their sensing reports.


Eurasip Journal on Wireless Communications and Networking | 2006

ZSBT: a novel algorithm for tracing DoS attackers in MANETs

Xin Jin; Yaoxue Zhang; Yi Pan; Yuezhi Zhou

Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with traditional Internet, the resources, such as bandwidth, memory, and battery power, of each node are more limited in mobile ad hoc networks (MANETs). Therefore, nodes in MANETs are more vulnerable to DoS attacks. Moreover, attackers in MANETs cannot only use IP spoofing to conceal their real identities but also move arbitrarily, which makes it a challenging task to trace a remote attacker in MANETs. In this paper, we proposed a zone sampling-based traceback (ZSBT) algorithm for tracing DoS attackers in MANETs. In our algorithm, when a node forwards a packet, the node writes its zone ID into the packet with a probability. After receiving these packets, the victim can reconstruct the path between the attacker and itself. Simulations were carried out to illustrate the validity of the algorithm; even with a little communication overhead.


ieee international conference on cloud computing technology and science | 2012

TransOS: a transparent computing-based operating system for the cloud

Yaoxue Zhang; Yuezhi Zhou

Cloud computing has become a hot topic recently. Among these research issues, cloud operating systems have attracted extensive attention. However, to date, there is no answer to such issues as what a cloud operating system is and how to develop one. This paper proposes a cloud operating system, TransOS, from the viewpoint of transparent computing, in which all traditional operating system codes and applications are centrally stored on network servers, and an almost bare terminal dynamically schedules the necessary codes selected by users from the network server, and runs them mostly with the terminal’s local resources. The TransOS manages all the resources to provide integrated services for users, including traditional operating systems. This paper first introduces the concept of transparent computing as a background and presents TransOS and its main characteristics. It then gives a layered structure-based designation of TransOS and finally illustrates one example of its implementation.


ieee international conference on cloud computing technology and science | 2015

Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments

Jinzhao Liu; Yaoxue Zhang; Yuezhi Zhou; Di Zhang; Hao Liu

Elasticity has now become the elemental feature of cloud computing as it enables the ability to dynamically add or remove virtual machine instances when workload changes. However, effective virtualized resource management is still one of the most challenging tasks. When the workload of a service increases rapidly, existing approaches cannot respond to the growing performance requirement efficiently because of either inaccuracy of adaptation decisions or the slow process of adjustments, both of which may result in insufficient resource provisioning. As a consequence, the Quality of Service (QoS) of the hosted applications may degrade and the Service Level Objective (SLO) will be thus violated. In this paper, we introduce SPRNT, a novel resource management framework, to ensure high-level QoS in the cloud computing system. SPRNT utilizes an aggressive resource provisioning strategy which encourages SPRNT to substantially increase the resource allocation in each adaptation cycle when workload increases. This strategy first provisions resources which are possibly more than actual demands, and then reduces the over-provisioned resources if needed. By applying the aggressive strategy, SPRNT can satisfy the increasing performance requirement in the first place so that the QoS can be kept at a high level. The experimental results show that SPRNT achieves up to 7.7× speedup in adaptation time, compared with existing efforts. By enabling quick adaptation, SPRNT limits the SLO violation rate up to 1.3 percent even when dealing with rapidly increasing workload.

Collaboration


Dive into the Yaoxue Zhang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ju Ren

Central South University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Deyu Zhang

Central South University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Laurence T. Yang

St. Francis Xavier University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xuemin Shen

University of Waterloo

View shared research outputs
Researchain Logo
Decentralizing Knowledge