Skip to main content

Showing 1–50 of 112 results for author: Leung, V C M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.08429  [pdf, ps, other

    cs.NI

    Age of Information Optimization in Laser-charged UAV-assisted IoT Networks: A Multi-agent Deep Reinforcement Learning Method

    Authors: Geng Sun, Likun Zhang, Jiahui Li, Jing Wu, Jiacheng Wang, Zemin Sun, Changyuan Zhao, Victor C. M. Leung

    Abstract: The integration of unmanned aerial vehicles (UAVs) with Internet of Things (IoT) networks offers promising solutions for efficient data collection. However, the limited energy capacity of UAVs remains a significant challenge. In this case, laser beam directors (LBDs) have emerged as an effective technology for wireless charging of UAVs during operation, thereby enabling sustained data collection w… ▽ More

    Submitted 11 July, 2025; originally announced July 2025.

    Comments: 21 pages, 8 figures

  2. arXiv:2506.23493  [pdf, ps, other

    cs.NI eess.SP

    Securing the Sky: Integrated Satellite-UAV Physical Layer Security for Low-Altitude Wireless Networks

    Authors: Jiahui Li, Geng Sun, Xiaoyu Sun, Fang Mei, Jingjing Wang, Xiangwang Hou, Daxin Tian, Victor C. M. Leung

    Abstract: Low-altitude wireless networks (LAWNs) have garnered significant attention in the forthcoming 6G networks. In LAWNs, satellites with wide coverage and unmanned aerial vehicles (UAVs) with flexible mobility can complement each other to form integrated satellite-UAV networks, providing ubiquitous and high-speed connectivity for low-altitude operations. However, the higher line-of-sight probability i… ▽ More

    Submitted 29 June, 2025; originally announced June 2025.

    Comments: This paper has been submitted to IEEE Wireless Communications

  3. arXiv:2506.12481  [pdf, ps, other

    cs.CV cs.LG cs.SD eess.AS

    Exploring Audio Cues for Enhanced Test-Time Video Model Adaptation

    Authors: Runhao Zeng, Qi Deng, Ronghao Zhang, Shuaicheng Niu, Jian Chen, Xiping Hu, Victor C. M. Leung

    Abstract: Test-time adaptation (TTA) aims to boost the generalization capability of a trained model by conducting self-/unsupervised learning during the testing phase. While most existing TTA methods for video primarily utilize visual supervisory signals, they often overlook the potential contribution of inherent audio data. To address this gap, we propose a novel approach that incorporates audio informatio… ▽ More

    Submitted 14 June, 2025; originally announced June 2025.

    Comments: 14 pages, 7 figures

  4. arXiv:2505.23347  [pdf, ps, other

    cs.LG

    Sentinel: Scheduling Live Streams with Proactive Anomaly Detection in Crowdsourced Cloud-Edge Platforms

    Authors: Yuting Li, Shaoyuan Huang, Tengwen Zhang, Cheng Zhang, Xiaofei Wang, Victor C. M. Leung

    Abstract: With the rapid growth of live streaming services, Crowdsourced Cloud-edge service Platforms (CCPs) are playing an increasingly important role in meeting the increasing demand. Although stream scheduling plays a critical role in optimizing CCPs' revenue, most optimization strategies struggle to achieve practical results due to various anomalies in unstable CCPs. Additionally, the substantial scale… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: arXiv admin note: text overlap with arXiv:2402.14619

  5. arXiv:2505.01821  [pdf, ps, other

    cs.DC cs.AI cs.LG

    Edge-Cloud Collaborative Computing on Distributed Intelligence and Model Optimization: A Survey

    Authors: Jing Liu, Yao Du, Kun Yang, Yan Wang, Xiping Hu, Zehua Wang, Yang Liu, Peng Sun, Azzedine Boukerche, Victor C. M. Leung

    Abstract: Edge-cloud collaborative computing (ECCC) has emerged as a pivotal paradigm for addressing the computational demands of modern intelligent applications, integrating cloud resources with edge devices to enable efficient, low-latency processing. Recent advancements in AI, particularly deep learning and large language models (LLMs), have dramatically enhanced the capabilities of these distributed sys… ▽ More

    Submitted 17 May, 2025; v1 submitted 3 May, 2025; originally announced May 2025.

    Comments: 30 pages, 10 figures, 6 tables

  6. arXiv:2503.18808  [pdf, other

    cs.CV

    CRCL: Causal Representation Consistency Learning for Anomaly Detection in Surveillance Videos

    Authors: Yang Liu, Hongjin Wang, Zepu Wang, Xiaoguang Zhu, Jing Liu, Peng Sun, Rui Tang, Jianwei Du, Victor C. M. Leung, Liang Song

    Abstract: Video Anomaly Detection (VAD) remains a fundamental yet formidable task in the video understanding community, with promising applications in areas such as information forensics and public safety protection. Due to the rarity and diversity of anomalies, existing methods only use easily collected regular events to model the inherent normality of normal spatial-temporal patterns in an unsupervised ma… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

    Comments: Accepted for publication by IEEE Transactions on Image Processing

  7. arXiv:2502.19450  [pdf, other

    cs.CV

    CLIP-Optimized Multimodal Image Enhancement via ISP-CNN Fusion for Coal Mine IoVT under Uneven Illumination

    Authors: Shuai Wang, Shihao Zhang, Jiaqi Wu, Zijian Tian, Wei Chen, Tongzhu Jin, Miaomiao Xue, Zehua Wang, Fei Richard Yu, Victor C. M. Leung

    Abstract: Clear monitoring images are crucial for the safe operation of coal mine Internet of Video Things (IoVT) systems. However, low illumination and uneven brightness in underground environments significantly degrade image quality, posing challenges for enhancement methods that often rely on difficult-to-obtain paired reference images. Additionally, there is a trade-off between enhancement performance a… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  8. arXiv:2502.10687  [pdf, other

    cs.NI

    Multi-objective Aerial IRS-assisted ISAC Optimization via Generative AI-enhanced Deep Reinforcement Learning

    Authors: Wenwen Xie, Geng Sun, Jiacheng Wang, Hongyang Du, Jiawen Kang, Kaibin Huang, Victor C. M. Leung

    Abstract: Integrated sensing and communication (ISAC) has garnered substantial research interest owing to its pivotal role in advancing the development of next-generation (6G) wireless networks. However, achieving a performance balance between communication and sensing in the dual-function radar communication (DFRC)-based ISAC system remains a significant challenge. In this paper, an aerial intelligent refl… ▽ More

    Submitted 15 February, 2025; originally announced February 2025.

  9. arXiv:2502.09038  [pdf, other

    cs.AI

    AoI-Sensitive Data Forwarding with Distributed Beamforming in UAV-Assisted IoT

    Authors: Zifan Lang, Guixia Liu, Geng Sun, Jiahui Li, Zemin Sun, Jiacheng Wang, Victor C. M. Leung

    Abstract: This paper proposes a UAV-assisted forwarding system based on distributed beamforming to enhance age of information (AoI) in Internet of Things (IoT). Specifically, UAVs collect and relay data between sensor nodes (SNs) and the remote base station (BS). However, flight delays increase the AoI and degrade the network performance. To mitigate this, we adopt distributed beamforming to extend the comm… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 6 pages, 4 figures, ICC2025

  10. arXiv:2501.15468  [pdf, other

    cs.CR eess.SP

    Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning

    Authors: Jiawei Huang, Aimin Wang, Geng Sun, Jiahui Li, Jiacheng Wang, Dusit Niyato, Victor C. M. Leung

    Abstract: Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channels, can cause the communication process to suffer from security risks. This paper presents a low-altitude friendly-jamming LEO satellite-maritime communication system enabled by a unma… ▽ More

    Submitted 26 January, 2025; originally announced January 2025.

  11. arXiv:2501.14832  [pdf, other

    cs.DC cs.NI

    Resource Allocation Driven by Large Models in Future Semantic-Aware Networks

    Authors: Haijun Zhang, Jiaxin Ni, Zijun Wu, Xiangnan Liu, V. C. M. Leung

    Abstract: Large model has emerged as a key enabler for the popularity of future networked intelligent applications. However, the surge of data traffic brought by intelligent applications puts pressure on the resource utilization and energy consumption of the future networks. With efficient content understanding capabilities, semantic communication holds significant potential for reducing data transmission i… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  12. arXiv:2501.11430  [pdf, other

    cs.LG cs.AI

    A Survey on Diffusion Models for Anomaly Detection

    Authors: Jing Liu, Zhenchao Ma, Zepu Wang, Chenxuanyin Zou, Jiayang Ren, Zehua Wang, Liang Song, Bo Hu, Yang Liu, Victor C. M. Leung

    Abstract: Diffusion models (DMs) have emerged as a powerful class of generative AI models, showing remarkable potential in anomaly detection (AD) tasks across various domains, such as cybersecurity, fraud detection, healthcare, and manufacturing. The intersection of these two fields, termed diffusion models for anomaly detection (DMAD), offers promising solutions for identifying deviations in increasingly c… ▽ More

    Submitted 26 February, 2025; v1 submitted 20 January, 2025; originally announced January 2025.

  13. arXiv:2501.10408  [pdf, other

    eess.AS cs.CL cs.SD

    Leveraging Cross-Attention Transformer and Multi-Feature Fusion for Cross-Linguistic Speech Emotion Recognition

    Authors: Ruoyu Zhao, Xiantao Jiang, F. Richard Yu, Victor C. M. Leung, Tao Wang, Shaohu Zhang

    Abstract: Speech Emotion Recognition (SER) plays a crucial role in enhancing human-computer interaction. Cross-Linguistic SER (CLSER) has been a challenging research problem due to significant variability in linguistic and acoustic features of different languages. In this study, we propose a novel approach HuMP-CAT, which combines HuBERT, MFCC, and prosodic characteristics. These features are fused using a… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  14. arXiv:2412.18230  [pdf, other

    cs.CV

    Efficient Detection Framework Adaptation for Edge Computing: A Plug-and-play Neural Network Toolbox Enabling Edge Deployment

    Authors: Jiaqi Wu, Shihao Zhang, Simin Chen, Lixu Wang, Zehua Wang, Wei Chen, Fangyuan He, Zijian Tian, F. Richard Yu, Victor C. M. Leung

    Abstract: Edge computing has emerged as a key paradigm for deploying deep learning-based object detection in time-sensitive scenarios. However, existing edge detection methods face challenges: 1) difficulty balancing detection precision with lightweight models, 2) limited adaptability of generalized deployment designs, and 3) insufficient real-world validation. To address these issues, we propose the Edge D… ▽ More

    Submitted 24 December, 2024; originally announced December 2024.

  15. Facial Expression Analysis and Its Potentials in IoT Systems: A Contemporary Survey

    Authors: Zixuan Shangguan, Yanjie Dong, Song Guo, Victor C. M. Leung, M. Jamal Deen, Xiping Hu

    Abstract: Facial expressions convey human emotions and can be categorized into macro-expressions (MaEs) and micro-expressions (MiEs) based on duration and intensity. While MaEs are voluntary and easily recognized, MiEs are involuntary, rapid, and can reveal concealed emotions. The integration of facial expression analysis with Internet-of-Thing (IoT) systems has significant potential across diverse scenario… ▽ More

    Submitted 23 May, 2025; v1 submitted 23 December, 2024; originally announced December 2024.

  16. arXiv:2412.06456  [pdf, other

    cs.NE cs.NI

    UAV Virtual Antenna Array Deployment for Uplink Interference Mitigation in Data Collection Networks

    Authors: Hongjuan Li, Hui Kang, Geng Sun, Jiahui Li, Jiacheng Wang, Xue Wang, Dusit Niyato, Victor C. M. Leung

    Abstract: Unmanned aerial vehicles (UAVs) have gained considerable attention as a platform for establishing aerial wireless networks and communications. However, the line-of-sight dominance in air-to-ground communications often leads to significant interference with terrestrial networks, reducing communication efficiency among terrestrial terminals. This paper explores a novel uplink interference mitigation… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    Comments: This paper has been accepted by IEEE Internet of Things Journal

  17. arXiv:2411.09712  [pdf, other

    eess.SY cs.GT

    Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach

    Authors: Long He, Geng Sun, Zemin Sun, Jiacheng Wang, Hongyang Du, Dusit Niyato, Jiangchuan Liu, Victor C. M. Leung

    Abstract: The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communicati… ▽ More

    Submitted 30 January, 2025; v1 submitted 12 November, 2024; originally announced November 2024.

    Comments: arXiv admin note: text overlap with arXiv:2406.11918

  18. arXiv:2411.00838  [pdf, other

    cs.CV cs.AI

    Task-Oriented Real-time Visual Inference for IoVT Systems: A Co-design Framework of Neural Networks and Edge Deployment

    Authors: Jiaqi Wu, Simin Chen, Zehua Wang, Wei Chen, Zijian Tian, F. Richard Yu, Victor C. M. Leung

    Abstract: As the volume of image data grows, data-oriented cloud computing in Internet of Video Things (IoVT) systems encounters latency issues. Task-oriented edge computing addresses this by shifting data analysis to the edge. However, limited computational power of edge devices poses challenges for executing visual tasks. Existing methods struggle to balance high model performance with low resource consum… ▽ More

    Submitted 29 October, 2024; originally announced November 2024.

  19. arXiv:2408.10691  [pdf, other

    cs.AI

    Fine-Tuning and Deploying Large Language Models Over Edges: Issues and Approaches

    Authors: Yanjie Dong, Haijun Zhang, Chengming Li, Song Guo, Victor C. M. Leung, Xiping Hu

    Abstract: Since the invention of GPT2--1.5B in 2019, large language models (LLMs) have transitioned from specialized models to versatile foundation models. The LLMs exhibit impressive zero-shot ability, however, require fine-tuning on local datasets and significant resources for deployment. Traditional fine-tuning techniques with the first-order optimizers require substantial GPU memory that exceeds mainstr… ▽ More

    Submitted 1 October, 2024; v1 submitted 20 August, 2024; originally announced August 2024.

  20. arXiv:2406.08115  [pdf, other

    cs.DC cs.AI

    Resource Allocation and Workload Scheduling for Large-Scale Distributed Deep Learning: A Survey

    Authors: Feng Liang, Zhen Zhang, Haifeng Lu, Chengming Li, Victor C. M. Leung, Yanyi Guo, Xiping Hu

    Abstract: With rapidly increasing distributed deep learning workloads in large-scale data centers, efficient distributed deep learning framework strategies for resource allocation and workload scheduling have become the key to high-performance deep learning. The large-scale environment with large volumes of datasets, models, and computational and communication resources raises various unique challenges for… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  21. arXiv:2405.10347  [pdf, other

    cs.CV cs.AI cs.CY

    Networking Systems for Video Anomaly Detection: A Tutorial and Survey

    Authors: Jing Liu, Yang Liu, Jieyu Lin, Jielin Li, Liang Cao, Peng Sun, Bo Hu, Liang Song, Azzedine Boukerche, Victor C. M. Leung

    Abstract: The increasing utilization of surveillance cameras in smart cities, coupled with the surge of online video applications, has heightened concerns regarding public security and privacy protection, which propelled automated Video Anomaly Detection (VAD) into a fundamental research task within the Artificial Intelligence (AI) community. With the advancements in deep learning and edge computing, VAD ha… ▽ More

    Submitted 3 April, 2025; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted to ACM Computing Surveys. For more information and supplementary material, please visit https://github.com/fdjingliu/NSVAD

  22. arXiv:2404.15292  [pdf, other

    eess.SP cs.IT

    Multi-objective Optimization for Multi-UAV-assisted Mobile Edge Computing

    Authors: Geng Sun, Yixian Wang, Zemin Sun, Qingqing Wu, Jiawen Kang, Dusit Niyato, Victor C. M. Leung

    Abstract: Recent developments in unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) have provided users with flexible and resilient computing services. However, meeting the computing-intensive and latency-sensitive demands of users poses a significant challenge due to the limited resources of UAVs. To address this challenge, we present a multi-objective optimization approach for multi-UAV-assis… ▽ More

    Submitted 23 March, 2024; originally announced April 2024.

  23. arXiv:2404.13348  [pdf, other

    cs.NI cs.LG

    Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems

    Authors: Xiaofei Wang, Yunfeng Zhao, Chao Qiu, Qinghua Hu, Victor C. M. Leung

    Abstract: Amidst the robust impetus from artificial intelligence (AI) and big data, edge intelligence (EI) has emerged as a nascent computing paradigm, synthesizing AI with edge computing (EC) to become an exemplary solution for unleashing the full potential of AI services. Nonetheless, challenges in communication costs, resource allocation, privacy, and security continue to constrain its proficiency in sup… ▽ More

    Submitted 3 November, 2024; v1 submitted 20 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by IEEE Communications Surveys and Tutorials

  24. arXiv:2404.07450  [pdf, other

    cs.NI cs.NE

    Collaborative Ground-Space Communications via Evolutionary Multi-objective Deep Reinforcement Learning

    Authors: Jiahui Li, Geng Sun, Qingqing Wu, Dusit Niyato, Jiawen Kang, Abbas Jamalipour, Victor C. M. Leung

    Abstract: In this paper, we propose a distributed collaborative beamforming (DCB)-based uplink communication paradigm for enabling ground-space direct communications. Specifically, DCB treats the terminals that are unable to establish efficient direct connections with the low Earth orbit (LEO) satellites as distributed antennas, forming a virtual antenna array to enhance the terminal-to-satellite uplink ach… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: This paper has been submitted to IEEE Journal on Selected Areas in Communications

  25. arXiv:2404.06114  [pdf, other

    cs.DC cs.AI

    Communication-Efficient Large-Scale Distributed Deep Learning: A Comprehensive Survey

    Authors: Feng Liang, Zhen Zhang, Haifeng Lu, Victor C. M. Leung, Yanyi Guo, Xiping Hu

    Abstract: With the rapid growth in the volume of data sets, models, and devices in the domain of deep learning, there is increasing attention on large-scale distributed deep learning. In contrast to traditional distributed deep learning, the large-scale scenario poses new challenges that include fault tolerance, scalability of algorithms and infrastructures, and heterogeneity in data sets, models, and resou… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  26. arXiv:2312.07917  [pdf, other

    cs.NI cs.AI

    On Designing Multi-UAV aided Wireless Powered Dynamic Communication via Hierarchical Deep Reinforcement Learning

    Authors: Ze Yu Zhao, Yue Ling Che, Sheng Luo, Gege Luo, Kaishun Wu, Victor C. M. Leung

    Abstract: This paper proposes a novel design on the wireless powered communication network (WPCN) in dynamic environments under the assistance of multiple unmanned aerial vehicles (UAVs). Unlike the existing studies, where the low-power wireless nodes (WNs) often conform to the coherent harvest-then-transmit protocol, under our newly proposed double-threshold based WN type updating rule, each WN can dynamic… ▽ More

    Submitted 6 June, 2024; v1 submitted 13 December, 2023; originally announced December 2023.

    Comments: 13 pages, 10 figures; Submitted for possible journal publishing

  27. arXiv:2311.13233  [pdf, other

    cs.CR cs.AI

    A Survey of Adversarial CAPTCHAs on its History, Classification and Generation

    Authors: Zisheng Xu, Qiao Yan, F. Richard Yu, Victor C. M. Leung

    Abstract: Completely Automated Public Turing test to tell Computers and Humans Apart, short for CAPTCHA, is an essential and relatively easy way to defend against malicious attacks implemented by bots. The security and usability trade-off limits the use of massive geometric transformations to interfere deep model recognition and deep models even outperformed humans in complex CAPTCHAs. The discovery of adve… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: Submitted to ACM Computing Surveys (Under Review)

  28. arXiv:2310.01980  [pdf, other

    cs.NI cs.NE

    UAV Swarm-enabled Collaborative Secure Relay Communications with Time-domain Colluding Eavesdropper

    Authors: Chuang Zhang, Geng Sun, Qingqing Wu, Jiahui Li, Shuang Liang, Dusit Niyato, Victor C. M. Leung

    Abstract: Unmanned aerial vehicles (UAVs) as aerial relays are practically appealing for assisting Internet of Things (IoT) network. In this work, we aim to utilize the UAV swarm to assist the secure communication between the micro base station (MBS) equipped with the planar array antenna (PAA) and the IoT terminal devices by collaborative beamforming (CB), so as to counteract the effects of collusive eaves… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: Submitted to IEEE Transactions on Mobile Computing

  29. arXiv:2309.16709  [pdf, other

    eess.SP cs.GT cs.NI

    Joint Task Offloading and Resource Allocation in Aerial-Terrestrial UAV Networks with Edge and Fog Computing for Post-Disaster Rescue

    Authors: Geng Sun, Long He, Zemin Sun, Qingqing Wu, Shuang Liang, Jiahui Li, Dusit Niyato, Victor C. M. Leung

    Abstract: Unmanned aerial vehicles (UAVs) play an increasingly important role in assisting fast-response post-disaster rescue due to their fast deployment, flexible mobility, and low cost. However, UAVs face the challenges of limited battery capacity and computing resources, which could shorten the expected flight endurance of UAVs and increase the rescue response delay during performing mission-critical ta… ▽ More

    Submitted 6 October, 2023; v1 submitted 17 August, 2023; originally announced September 2023.

    Comments: 18 pages, 6 figures

  30. arXiv:2308.12322  [pdf, other

    cs.NI

    Fine-grained Spatio-Temporal Distribution Prediction of Mobile Content Delivery in 5G Ultra-Dense Networks

    Authors: Shaoyuan Huang, Heng Zhang, Xiaofei Wang, Min Chen, Jianxin Li, Victor C. M. Leung

    Abstract: The 5G networks have extensively promoted the growth of mobile users and novel applications, and with the skyrocketing user requests for a large amount of popular content, the consequent content delivery services (CDSs) have been bringing a heavy load to mobile service providers. As a key mission in intelligent networks management, understanding and predicting the distribution of CDSs benefits man… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  31. EdgeMatrix: A Resource-Redefined Scheduling Framework for SLA-Guaranteed Multi-Tier Edge-Cloud Computing Systems

    Authors: Shihao Shen, Yuanming Ren, Yanli Ju, Xiaofei Wang, Wenyu Wang, Victor C. M. Leung

    Abstract: With the development of networking technology, the computing system has evolved towards the multi-tier paradigm gradually. However, challenges, such as multi-resource heterogeneity of devices, resource competition of services, and networked system dynamics, make it difficult to guarantee service-level agreement (SLA) for the applications. In this paper, we propose a multi-tier edge-cloud computing… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Comments: JSAC. arXiv admin note: substantial text overlap with arXiv:2203.10470

  32. arXiv:2307.14626  [pdf, other

    cs.IT

    Multi-Agent Graph Reinforcement Learning based On-Demand Wireless Energy Transfer in Multi-UAV-aided IoT Network

    Authors: Ze Yu Zhao, Yueling Che, Sheng Luo, Kaishun Wu, Victor C. M. Leung

    Abstract: This paper proposes a new on-demand wireless energy transfer (WET) scheme of multiple unmanned aerial vehicles (UAVs). Unlike the existing studies that simply pursuing the total or the minimum harvested energy maximization at the Internet of Things (IoT) devices, where the IoT devices' own energy requirements are barely considered, we propose a new metric called the hungry-level of energy (HoE), w… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: This paper is accepted by the 21th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2023). 8 pages, 8 figures, conference

  33. Collaborative Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud Network

    Authors: Shihao Shen, Yiwen Han, Xiaofei Wang, Shiqiang Wang, Victor C. M. Leung

    Abstract: Kubernetes (k8s) has the potential to coordinate distributed edge resources and centralized cloud resources, but currently lacks a specialized scheduling framework for edge-cloud networks. Besides, the hierarchical distribution of heterogeneous resources makes the modeling and scheduling of k8s-oriented edge-cloud network particularly challenging. In this paper, we introduce KaiS, a learning-based… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: IEEE/ACM Transactions On Networking. arXiv admin note: substantial text overlap with arXiv:2101.06582

  34. arXiv:2304.02278  [pdf, ps, other

    cs.CV

    SCMM: Calibrating Cross-modal Fusion for Text-Based Person Search

    Authors: Jing Liu, Donglai Wei, Yang Liu, Sipeng Zhang, Tong Yang, Wei Zhou, Weiping Ding, Victor C. M. Leung

    Abstract: Text-Based Person Search (TBPS) faces critical challenges in cross-modal information fusion, requiring effective alignment of visual and textual modalities for person retrieval using natural language queries. Existing methods struggle with cross-modal heterogeneity, where visual and textual features reside in disparate semantic spaces, creating substantial inter-modal gaps that limit fusion effect… ▽ More

    Submitted 9 July, 2025; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: 35 pages, 8 figures, 7 tables

  35. arXiv:2303.17885  [pdf, ps, other

    cs.LG cs.IT

    Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principle Component Analysis

    Authors: Yanjie Dong, Luya Wang, Yuanfang Chi, Jia Wang, Haijun Zhang, Fei Richard Yu, Victor C. M. Leung, Xiping Hu

    Abstract: A wireless federated learning system is investigated by allowing a server and workers to exchange uncoded information via orthogonal wireless channels. Since the workers frequently upload local gradients to the server via bandwidth-limited channels, the uplink transmission from the workers to the server becomes a communication bottleneck. Therefore, a one-shot distributed principle component analy… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

  36. arXiv:2303.16129  [pdf, other

    cs.NI

    Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services

    Authors: Minrui Xu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Shiwen Mao, Zhu Han, Abbas Jamalipour, Dong In Kim, Xuemin Shen, Victor C. M. Leung, H. Vincent Poor

    Abstract: Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while mainta… ▽ More

    Submitted 31 October, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

  37. arXiv:2303.10872  [pdf, other

    cs.IT cs.NI

    Timely Status Update in Relay-Assisted Cooperative Communications

    Authors: Haoyuan Pan, Jian Feng, Tse-Tin Chan, Victor C. M. Leung, Jianqiang Li

    Abstract: We investigate the age of information (AoI) of a relay-assisted cooperative communication system, where a source node sends status update packets to the destination node as timely as possible with the aid of a relay node. For time-slotted systems without relaying, prior works have shown that the source should generate and send a new packet to the destination every time slot to minimize the average… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

  38. arXiv:2303.02722  [pdf, other

    cs.IT eess.SP

    Performance of OTFS-NOMA Scheme for Coordinated Direct and Relay Transmission Networks in High-Mobility Scenarios

    Authors: Yao Xu, Zhen Du, Weijie Yuan, Shaobo Jia, Victor C. M. Leung

    Abstract: In this letter, an orthogonal time frequency space (OTFS) based non-orthogonal multiple access (NOMA) scheme is investigated for the coordinated direct and relay transmission system, where a source directly communicates with a near user with high mobile speed, and it needs the relaying assistance to serve the far user also having high mobility. Due to the coexistence of signal superposition coding… ▽ More

    Submitted 5 March, 2023; originally announced March 2023.

  39. arXiv:2301.01058  [pdf, ps, other

    cs.CR

    Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks

    Authors: Shao-Di Wang, Hui-Ming Wang, Zhetao Li, Victor C. M. Leung

    Abstract: For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-complexity machine-type devices, active jamming attack in the uplink access is a serious threat. Uplink access jamming (UAJ) can increase the number of dropped/retransmitted packets an… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

  40. arXiv:2212.02811  [pdf, ps, other

    cs.IT

    Asynchronous Cell-Free Massive MIMO With Rate-Splitting

    Authors: Jiakang Zheng, Jiayi Zhang, Julian Cheng, Victor C. M. Leung, Derrick Wing Kwan Ng, Bo Ai

    Abstract: In practical cell-free (CF) massive multiple-input multiple-output (MIMO) networks with distributed and low-cost access points, the asynchronous arrival of signals at the user equipments increases multi-user interference that degrades the system performance. Meanwhile, rate-splitting (RS), exploiting the transmission of both common and private messages, has demonstrated to offer considerable spect… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: 34 pages, 11 figures, Accepted in IEEE Journal on Selected Areas in Communications

  41. arXiv:2212.01356  [pdf, ps, other

    cs.CR eess.SP

    Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR

    Authors: Shao-Di Wang, Hui-Ming Wang, Chen Feng, Victor C. M. Leung

    Abstract: In fifth generation (5G) new radio (NR), the demodulation reference signal (DMRS) is employed for channel estimation as part of coherent demodulation of the physical uplink shared channel. However, DMRS spoofing poses a serious threat to 5G NR since inaccurate channel estimation will severely degrade the decoding performance. In this correspondence, we propose to exploit the spatial sparsity struc… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

  42. arXiv:2211.15941  [pdf, other

    cs.AI

    When Quantum Information Technologies Meet Blockchain in Web 3.0

    Authors: Minrui Xu, Xiaoxu Ren, Dusit Niyato, Jiawen Kang, Chao Qiu, Zehui Xiong, Xiaofei Wang, Victor C. M. Leung

    Abstract: With the drive to create a decentralized digital economy, Web 3.0 has become a cornerstone of digital transformation, developed on the basis of computing-force networking, distributed data storage, and blockchain. With the rapid realization of quantum devices, Web 3.0 is being developed in parallel with the deployment of quantum cloud computing and quantum Internet. In this regard, quantum computi… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

  43. arXiv:2210.08869  [pdf, ps, other

    cs.IT eess.SP

    Performance Analysis of Cell-Free Massive MIMO Systems with Asynchronous Reception

    Authors: Jiakang Zheng, Zhuoyi Zhao, Jiayi Zhang, Julian Cheng, Victor C. M. Leung

    Abstract: Cell-free (CF) massive multiple-input multiple-output (MIMO) is considered as a promising technology for achieving the ultimate performance limit. However, due to its distributed architecture and low-cost access points (APs), the signals received at user equipments (UEs) are most likely asynchronous. In this paper, we investigate the performance of CF massive MIMO systems with asynchronous recepti… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted in IEEE GLOBECOM Workshops 2022

  44. arXiv:2204.03504   

    cs.NI cs.LG

    AI-aided Traffic Control Scheme for M2M Communications in the Internet of Vehicles

    Authors: Haijun Zhang, Minghui Jiang, Xiangnan Liu, Keping Long, Victor C. M. Leung

    Abstract: Due to the rapid growth of data transmissions in internet of vehicles (IoV), finding schemes that can effectively alleviate access congestion has become an important issue. Recently, many traffic control schemes have been studied. Nevertheless, the dynamics of traffic and the heterogeneous requirements of different IoV applications are not considered in most existing studies, which is significant… ▽ More

    Submitted 12 April, 2022; v1 submitted 5 March, 2022; originally announced April 2022.

    Comments: There have some mistakes in Section II

  45. arXiv:2203.10470  [pdf, other

    cs.NI cs.DC

    EdgeMatrix: A Resources Redefined Edge-Cloud System for Prioritized Services

    Authors: Yuanming Ren, Shihao Shen, Yanli Ju, Xiaofei Wang, Wenyu Wang, Victor C. M. Leung

    Abstract: The edge-cloud system has the potential to combine the advantages of heterogeneous devices and truly realize ubiquitous computing. However, for service providers to guarantee the Service-Level-Agreement (SLA) priorities, the complex networked environment brings inherent challenges such as multi-resource heterogeneity, resource competition, and networked system dynamics. In this paper, we design a… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

  46. arXiv:2202.03296  [pdf, other

    cs.IT

    Reconfigurable Intelligent Surface With Energy Harvesting Assisted Cooperative Ambient Backscatter Communications

    Authors: Hui Ma, Haijun Zhang, Ning Zhang, Jianquan Wang, Ning Wang, Victor C. M. Leung

    Abstract: The performance of cooperative ambient backscatter communications (CABC) can be enhanced by employing reconfigurable intelligent surface (RIS) to assist backscatter transmitters. Since the RIS power consumption is a non-negligible issue, we consider a RIS assisted CABC system where the RIS with energy harvesting circuit can not only reflect signal but also harvest wireless energy. We study a trans… ▽ More

    Submitted 7 September, 2022; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: Fixed a typo

  47. arXiv:2107.06537  [pdf, other

    cs.IT cs.NI

    Age of Information in Physical-Layer Network Coding Enabled Two-Way Relay Networks

    Authors: Haoyuan Pan, Tse-Tin Chan, Victor C. M. Leung, Jianqiang Li

    Abstract: This paper investigates the information freshness of two-way relay networks (TWRN) operated with physical-layer network coding (PNC). Information freshness is quantified by age of information (AoI), defined as the time elapsed since the generation time of the latest received information update. PNC reduces communication latency of TWRNs by turning superimposed electromagnetic waves into network-co… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: 28 pages

  48. arXiv:2106.09274  [pdf

    cs.NI cs.AI cs.GT

    Cooperative Multi-Agent Reinforcement Learning Based Distributed Dynamic Spectrum Access in Cognitive Radio Networks

    Authors: Xiang Tan, Li Zhou, Haijun Wang, Yuli Sun, Haitao Zhao, Boon-Chong Seet, Jibo Wei, Victor C. M. Leung

    Abstract: With the development of the 5G and Internet of Things, amounts of wireless devices need to share the limited spectrum resources. Dynamic spectrum access (DSA) is a promising paradigm to remedy the problem of inefficient spectrum utilization brought upon by the historical command-and-control approach to spectrum allocation. In this paper, we investigate the distributed DSA problem for multi-user in… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  49. arXiv:2102.10498  [pdf, ps, other

    cs.NI cs.IT eess.SP

    Customized Slicing for 6G: Enforcing Artificial Intelligence on Resource Management

    Authors: Wanqing Guan, Haijun Zhang, Victor C. M. Leung

    Abstract: Next generation wireless networks are expected to support diverse vertical industries and offer countless emerging use cases. To satisfy stringent requirements of diversified services, network slicing is developed, which enables service-oriented resource allocation by tailoring the infrastructure network into multiple logical networks. However, there are still some challenges in cross-domain multi… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: to appear in IEEE Network Magazine

  50. arXiv:2101.12375  [pdf, ps, other

    cs.NI

    Blockchain-empowered Data-driven Networks: A Survey and Outlook

    Authors: Xi Li, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, Heli Zhang

    Abstract: The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network managemen… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.