Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zongqing Lu is active.

Publication


Featured researches published by Zongqing Lu.


IEEE Transactions on Parallel and Distributed Systems | 2015

Algorithms and Applications for Community Detection in Weighted Networks

Zongqing Lu; Xiao Sun; Yonggang Wen; Guohong Cao; Thomas F. La Porta

Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are naturally weighted such as DTN or OSN, in this article, we address the problems of community detection in weighted networks, exploit community for data forwarding in DTN and worm containment in OSN, and demonstrate how community can facilitate these network designs. Specifically, we propose a novel community detection algorithm, and introduce two metrics: intra-centrality and inter-centrality, to characterize nodes in communities, based on which we propose an efficient data forwarding algorithm for DTN and a worm containment strategy for OSN. Extensive trace-driven simulation results show that the proposed community detection algorithm, the data forwarding algorithm, and the worm containment strategy significantly outperform existing works.


international conference on computer communications | 2014

Information Diffusion in Mobile Social Networks: The Speed Perspective

Zongqing Lu; Yonggang Wen; Guohong Cao

The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the problem of identifying a small number of individuals through whom the information can be diffused to the network as soon as possible, referred to as the diffusion minimization problem. Diffusion minimization under the probabilistic diffusion model can be formulated as an asymmetric k-center problem which is NP-hard, and the best known approximation algorithm for the asymmetric k-center problem has approximation ratio of log* n and time complexity O(n5). Clearly, the performance and the time complexity of the approximation algorithm are not satisfiable in large-scale mobile social networks. To deal with this problem, we propose a community based algorithm and a distributed set-cover algorithm. The performance of the proposed algorithms is evaluated by extensive experiments on both synthetic networks and a real trace. The results show that the community based algorithm has the best performance in both synthetic networks and the real trace, and the distributed setcover algorithm outperforms the approximation algorithm in the real trace in terms of diffusion time.


ieee international conference on pervasive computing and communications | 2016

Networking smartphones for disaster recovery

Zongqing Lu; Guohong Cao; Thomas F. La Porta

In this paper, we investigate how to network smart-phones for providing communications in disaster recovery. By bridging the gaps among different kinds of wireless networks, we have designed and implemented a system called TeamPhone, which provides smartphones the capabilities of communications in disaster recovery. Specifically, TeamPhone consists of two components: a messaging system and a self-rescue system. The messaging system integrates cellular networking, ad-hoc networking and opportunistic networking seamlessly, and enables communications among rescue workers. The self-rescue system energy-efficiently groups the smartphones of trapped survivor and sends out emergency messages so as to assist rescue operations. We have implemented TeamPhone as a prototype application on the Android platform and deployed it on off-the-shelf smartphones. Experiment results show that TeamPhone can properly fulfill communication requirements and greatly facilitate rescue operations in disaster recovery.


sensor, mesh and ad hoc communications and networks | 2014

Skeleton construction in mobile social networks: Algorithms and applications

Zongqing Lu; Xiao Sun; Yonggang Wen; Guohong Cao

Mobile social networks have emerged as a new frontier in the mobile computing research society, and the commonly used social structure (i.e., community) has been exploited to facilitate the design of network protocols and applications, such as data forwarding and worm containment. However, community based approaches may not be accurate when applied for predicting node contacts and may separate two frequently contacted nodes into different communities. In this paper, to address these problems, we propose skeleton, a tree structure specially designed for organizing network nodes, as the underlying structure in mobile social networks. We address the challenges on how to uncover skeleton from network, how to adapt skeleton with dynamic network and how to leverage skeleton for network protocol designs. Skeleton is constructed based on best friendship and skeleton construction is simple and efficient (e.g., less computational complexity than community detection). Algorithms are also designed to adapt skeleton construction to dynamic network. Moreover, a data forwarding algorithm and a worm containment strategy are designed based on skeleton. Trace-driven simulation results show that the skeleton based data forwarding algorithm and worm containment strategy outperform existing schemes based on community.


ieee international conference computer and communications | 2016

Cooperative data offloading in opportunistic mobile networks

Zongqing Lu; Xiao Sun; Thomas F. La Porta

Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. Different from existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to an intermittently connected remote server or data center within a given time constraint, which is referred to as the cooperative offloading problem. Unfortunately, cooperative offloading is NP-hard. To this end, a heuristic algorithm is designed based on the proposed probabilistic framework, which provides the estimation of the probability of successful data delivery over the opportunistic path, considering both data size and contact duration. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces, and simulation results show that cooperative offloading can significantly improve the data delivery probability and the performance of both heuristic algorithm and distributed algorithm outperforms other approaches.


ieee international conference on pervasive computing and communications | 2015

Targeted vaccination based on a wireless sensor system

Xiao Sun; Zongqing Lu; Xiaomei Zhang; Marcel Salathé; Guohong Cao

Vaccination is one of the most effective ways to protect people from being infected by infectious disease. However, it is often impractical to vaccinate all people in a community due to various resource constraints. Therefore, targeted vaccination, which vaccinates a small group of people, is an alternative approach to contain infectious disease spread. To achieve better performance in targeted vaccination, we collect student contact traces in a high school based on wireless sensors carried by students. With our wireless sensor system, we can record student contacts within the disease propagation distance, and then construct a disease propagation graph to model the infectious disease propagation. Based on this graph, we propose a metric called connectivity centrality to measure a nodes importance during disease propagation and design centrality based algorithms for targeted vaccination. The proposed algorithms are evaluated and compared with other schemes based on our collected traces. Trace driven simulation results show that our algorithms can help to effectively contain infectious disease.


IEEE Transactions on Mobile Computing | 2017

TeamPhone: Networking SmartPhones for Disaster Recovery

Zongqing Lu; Guohong Cao; Thomas F. La Porta

In this paper, we investigate how to network smartphones for providing communications in disaster recovery. By bridging the gaps among different kinds of wireless networks, we have designed and implemented a system called TeamPhone, which provides smartphones the capabilities of communications in disaster recovery. Specifically, TeamPhone consists of two components: A messaging system and a self-rescue system. The messaging system integrates cellular networking, ad-hoc networking, and opportunistic networking seamlessly, and enables communications among rescue workers. The self-rescue system groups, schedules, and positions the smartphones of trapped survivors. Such a group of smartphones can cooperatively wake up and send out emergency messages in an energy-efficient manner with their location and position information so as to assist rescue operations. We have implemented TeamPhone as a prototype application on the Android platform and deployed it on off-the-shelf smartphones. Experimental results demonstrate that TeamPhone can properly fulfill communication requirements and greatly facilitate rescue operations in disaster recovery.


IEEE Access | 2016

Infectious Disease Containment Based on a Wireless Sensor System

Xiao Sun; Zongqing Lu; Xiaomei Zhang; Marcel Salathé; Guohong Cao

Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. One of the most effective ways to protect people from being infected by these diseases is through vaccination. However, due to various resource constraints, vaccinating all the people in a community is not practical. Therefore, targeted vaccination, which vaccinates a small group of people, is an alternative approach to contain infectious diseases. Since many infectious diseases spread among people by droplet transmission within a certain range, we deploy a wireless sensor system in a high school to collect contacts happened within the disease transmission distance. Based on the collected traces, a graph is constructed to model the disease propagation, and a new metric (called connectivity centrality) is presented to find the important nodes in the constructed graph for disease containment. Connectivity centrality considers both a nodes local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes, which can be detected during targeted vaccination. Simulation results show that our algorithms can effectively contain infectious diseases and outperform other schemes under various conditions.Infectious diseases pose a serious threat to public health due to its high infectivity and potentially high mortality. One of the most effective ways to protect people from being infected by these diseases is through vaccination. However, due to various resource constraints, vaccinating all the people in a community is not practical. Therefore, targeted vaccination, which vaccinates a small group of people, is an alternative approach to contain infectious diseases. Since many infectious diseases spread among people by droplet transmission within a certain range, we deploy a wireless sensor system in a high school to collect contacts happened within the disease transmission distance. Based on the collected traces, a graph is constructed to model the disease propagation, and a new metric (called connectivity centrality) is presented to find the important nodes in the constructed graph for disease containment. Connectivity centrality considers both a node’s local and global effect to measure its importance in disease propagation. Centrality based algorithms are presented and further enhanced by exploiting the information of the known infected nodes, which can be detected during targeted vaccination. Simulation results show that our algorithms can effectively contain infectious diseases and outperform other schemes under various conditions.


international conference on computer communications and networks | 2015

Task Allocation for Mobile Cloud Computing in Heterogeneous Wireless Networks

Zongqing Lu; Jing Zhao; Yibo Wu; Guohong Cao

The ubiquity of mobile devices creates a rapidly growing market for mobile applications. Many of these applications involve complex processing tasks that are difficult to run on resource constrained mobile devices. This leads to the emergence of mobile cloud computing, in which cloud-based resources are used to enhance the computing capabilities of mobile devices. In this paper, we consider heterogeneous wireless networks in which multiple resource-rich computing nodes can be used as mobile clouds, and mobile devices can upload computation extensive tasks to these mobile clouds. The goal is to minimize the average task response time through determining whether to upload a task, and to which cloud the task should be uploaded. We formalize this task allocation problem, which is proved to be a NP-hard problem, and propose both offline centralized approach and online distributed approach to address this problem. Simulation results show that our approaches outperform others in terms of task response time in various scenarios.


acm multimedia | 2017

Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices

Zongqing Lu; Swati Rallapalli; Kevin S. Chan; Thomas F. La Porta

Convolutional Neural Networks (CNNs) have revolutionized the research in computer vision, due to their ability to capture complex patterns, resulting in high inference accuracies. However, the increasingly complex nature of these neural networks means that they are particularly suited for server computers with powerful GPUs. We envision that deep learning applications will be eventually and widely deployed on mobile devices, e.g., smartphones, self-driving cars, and drones. Therefore, in this paper, we aim to understand the resource requirements (time, memory) of CNNs on mobile devices. First, by deploying several popular CNNs on mobile CPUs and GPUs, we measure and analyze the performance and resource usage for every layer of the CNNs. Our findings point out the potential ways of optimizing the performance on mobile devices. Second, we model the resource requirements of the different CNN computations. Finally, based on the measurement, profiling, and modeling, we build and evaluate our modeling tool, Augur, which takes a CNN configuration (descriptor) as the input and estimates the compute time and resource usage of the CNN, to give insights about whether and how efficiently a CNN can be run on a given mobile platform. In doing so Augur tackles several challenges: (i) how to overcome profiling and measurement overhead; (ii) how to capture the variance in different mobile platforms with different processors, memory, and cache sizes; and (iii) how to account for the variance in the number, type and size of layers of the different CNN configurations.

Collaboration


Dive into the Zongqing Lu's collaboration.

Top Co-Authors

Avatar

Thomas F. La Porta

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Guohong Cao

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Xiao Sun

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Yonggang Wen

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Noor Felemban

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Xiaomei Zhang

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Qinghua Zheng

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Weizhan Zhang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Marcel Salathé

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Jing Zhao

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge