Qiang Duan

Qiang Duan
Pennsylvania State University | Penn State · Information Sciences & Technology

Ph.D.

About

158
Publications
74,899
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,607
Citations
Additional affiliations
July 2019 - February 2021
Pennsylvania State University
Position
  • Professor
July 2014 - June 2019
Pennsylvania State University
Position
  • Professor (Associate)
August 2008 - June 2014
Pennsylvania State University
Position
  • Professor (Assistant)

Publications

Publications (158)
Preprint
Full-text available
Vertical Federated Learning (VFL) facilitates collaborative machine learning without the need for participants to share raw private data. However, recent studies have revealed privacy risks where adversaries might reconstruct sensitive features through data leakage during the learning process. Although data reconstruction methods based on gradient...
Article
Brain simulation is one of the most important measures to understand how information is represented and processed in the brain, which usually needs to be realized in supercomputers with a large number of interconnected graphical processing units (GPUs). For the whole human brain simulation, tens of thousands of GPUs are utilized to simulate tens of...
Article
Mobile Edge Computing (MEC) has great potential to facilitate cheap and fast customer behavior analysis (CBA). Model splitting, widely adopted in collaborative learning of MEC, partitions the CBA models between customer devices and the edge servers in a layer-wise manner to support efficient distributed learning. However, the split-model architectu...
Article
Federated learning (FL) has gained attention due to the exponential growth of data. However, the Non-IID nature of local data introduces bias into the global model during training. In mobile IoT scenarios, client mobility can lead to data over-aggregation in the edge region, increasing bias in data distribution among edge regions and affecting glob...
Article
While edge computing has the potential to offer low-latency services and overcome the limitations of traditional cloud computing, it presents new challenges in terms of trust, security, and privacy (TSP) in IoT environments. Cooperative edge computing (CEC) has emerged as a solution to address these challenges through resource sharing among edge no...
Article
Full-text available
With the rapid development of SDN/NFV technologies, Service Function Chaining (SFC) has become a key enabler for end-to-end service provisioning in future networks. In the Internet of Things (IoT), the highly dynamic nature of the network environment demands flexible and adaptive mechanisms for dynamic SFC deployment to fully utilize network resour...
Article
Full-text available
Full leverage of the huge volume of data generated on a large number of user devices for providing intelligent services in the 6G network calls for Ubiquitous Intelligence (UI). A key to developing UI lies in the involvement of the large number of network devices, which contribute their data to collaborative Machine Learning (ML) and provide their...
Preprint
Full-text available
p>Full leverage of the huge volume of data generated on a large number of user devices for providing intelligent services in the 6G network calls for Ubiquitous Intelligence (UI). A key to developing UI lies in the involvement of the large number of network devices, which contribute their data to collaborative Machine Learning (ML) and provide thei...
Preprint
Full-text available
p>Full leverage of the huge volume of data generated on a large number of user devices for providing intelligent services in the 6G network calls for Ubiquitous Intelligence (UI). A key to developing UI lies in the involvement of the large number of network devices, which contribute their data to collaborative Machine Learning (ML) and provide thei...
Article
Full-text available
With the application of numerous services or software, process mining has attracted more and more attention. However, concept drift may occur during process mining due to the instability of the process. Sudden and gradual drifts are considered to be two basic modes of change, that may always appear in independent or nested forms. Although the exist...
Article
Full-text available
Anomaly detection is crucial to the reliability and safety of rail transit systems. The rapid development of Internet of Things (IoT) and cloud technologies together with recent advances in machine learning offered various cloud-based data-driven approaches to automatic anomaly detection. However, the challenges introduced by the different types of...
Article
We investigate how to provide Quality-of-Service (QoS) for diversified video flows. We design a fine-grained video traffic control mechanism that integrates traffic classification with path selection for video flows within the framework of SDN. For the design, we present a category-theoretic ontology log (olog) diagram model, which provides a novel...
Article
Full-text available
Federated learning (FL) and split learning (SL) are two emerging collaborative learning methods that may greatly facilitate ubiquitous intelligence in the Internet of Things (IoT). Federated learning enables machine learning (ML) models locally trained using private data to be aggregated into a global model. Split learning allows different portions...
Preprint
Full-text available
Knowledge graph is the structural representation of the real-world facts, it mainly divides the knowledge into two forms of triples: (head entity, relation, tail entity) and (node, attribute, value). Thus, the attribute of entity is an indispensable part of knowledge graph, it plays an important role in enriching the concepts of entity and revealin...
Article
Full-text available
The widespread deployment of scientific applications and business services of various types on clouds requires the transfer of big data with different priorities between geographically distributed cloud-based data centers. As a result, Cloud Service Providers (CSP) face a significant challenge to fully utilize the expensive bandwidth resources of t...
Preprint
Full-text available
Federated learning (FL) and split learning (SL) are two emerging collaborative learning methods that may greatly facilitate ubiquitous intelligence in Internet of Things (IoT). Federated learning enables machine learning (ML) models locally trained using private data to be aggregated into a global model. Split learning allows different portions of...
Article
The wide deployment of advanced robots with industrial IoT (IIoT) technologies in smart factories generates a large volume of data during production and a wide variety of data processing workloads are launched to maintain productivity and safety of smart manufacture. The emerging fog computing paradigm offers a promising solution to enhancing data...
Article
Brain simulation, as one of the latest advances in artificial intelligence, facilitates better understanding about how information is represented and processed in the brain. The extreme complexity of the human brain makes brain simulations only feasible on high-performance computing platforms. Supercomputers with a large number of interconnected gr...
Article
Full-text available
The advanced services provided by vehicle ad hoc network (VANET) often require vehicles to process complex computing tasks that may not be completed by individual vehicles within a required delay limit. Task offloading to road side units (RSUs) is a typical approach to enhancing service performance in VANET; however, RSUs may not always have suffic...
Article
Federated Learning (FL) offers a promising approach to efficient machine learning with privacy protection in distributed environments, such as Internet of Things (IoT) and Mobile Edge Computing (MEC). Effectiveness of FL relies on a group of participant nodes that contribute their data and computing capacities to the collaborative training of a glo...
Article
In recent years, mobile edge computing has attracted a considerable amount of attention from both academia and industry through its many advantages (such as low latency, computation efficiency and privacy) caused by its local model of providing storage and computation resources. In addition, machine learning has become the dominant approach in appl...
Article
Full-text available
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service provisioning. Intelligent and autonomous management is one of the most challenging issues in cloud-...
Article
Full-text available
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer’s trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity eff...
Article
Trends such as increasing mobile device ownership and faster and more affordable Internet speed have contributed to significant demands in media-based services on mobile devices. There has been an emphasis on content delivery networks to support media-based services. However, achieving high-performance content delivery in large-scale dynamic networ...
Article
Mobile-edge computing provisions computing and storage resources by deploying edge servers (ESs) at the edge of the network to support ultralow delay and high bandwidth services. To ensure QoS of latency-sensitive services in vehicular networks, service migration is required to migrate data of the ongoing services to the closest ES seamlessly when...
Article
Full-text available
The wide applications of virtualization and service-oriented principles in various emerging networking technologies introduce a trend of network cloudification that enables network systems to be realized based on cloud technologies and allows network services to be provisioned following the cloud service model. Network cloudification together with...
Chapter
Full-text available
Mobile Edge Computing (MEC) is a fast growing research area that may soon offer alternate service platforms to the clients over today’s Cloud Computing vendors (e.g., Amazon AWS, Google Cloud, or Microsoft Azure, etc.). And when the MEC services are ready and available, just like when Cloud Computing services were presented to the “On-Premises” ser...
Chapter
This paper reviews big data security analytics and looks into the big data lifecycle for assessments of big data security challenge in clouds. The paper justifies the reasons to develop big data security metrics. In this paper, we propose ten big data security metrics securing big data on cloud. This paper contributes new knowledge to big data secu...
Article
Full-text available
The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior of social network accounts also affects the SIoT, this paper studies the analysis and prediction of malicious behavior for SIoT...
Preprint
Full-text available
The recent developments in networking research leverage the principles of virtualization and service-orientation to enable fundamental changes in network architecture, which forms a trend of network cloudification that enables network systems to be realized using cloud technologies and network services to be provisioned following the cloud service...
Article
Full-text available
Service function chaining (SFC) in the SDN/NFV architecture offers a flexible approach to end-to-end service provisioning in future networks. Analysis on the quality of service (QoS) guaranteed by SFC becomes an important research topic. The resource abstraction and dynamic elastic service provisioning enabled by SDN/NFV bring in new challenges to...
Article
Full-text available
Data fusion in the Internet of Things (IoT) environment demands collecting and processing a wide variety of data with mixed time characteristics, both real-time and non-real-time data. Most of the previous research on data fusion was about the data processing aspect; however, successful data transmission is a prerequisite for high-performance data...
Article
In this paper, we propose an SDN-based multi-priority fork-join scheduling scheme for achieving high-performance data transmissions for mobile crowdsourcing. A network calculus-based modeling and analysis technique for evaluating the performance of the proposed scheme is developed. Through extensive simulations and investigations on the impacts of...
Article
The split-protocol theory was developed for load balancing and quicker data communication. Split-protocol computing paradigm uses web services on geographically distributed web servers on the cloud. A system of large split-servers that form the cloud to handle computing and storage task that would otherwise create a massive CPU utilisation if we wo...
Article
Empirical rules are among the most widely employed approaches for processing view abstraction for UML, which can support model simplification, consistency checking, and complexity reduction. However, empirical rules face challenges such as completeness validation, consistency among rules, and composition priority arrangement. The challenge of compo...
Article
Full-text available
Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive stra...
Article
Full-text available
Currently, different kinds of security devices are deployed in the cloud datacenter environment and tenants may choose their desired security services such as firewall and IDS (intrusion detection system). At the same time, tenants in cloud computing datacenters are dynamic and have different requirements. Therefore, security device deployment in c...
Conference Paper
In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recomm...
Article
Networking plays a crucial role in Cloud computing especially in an inter-Cloud environment, where data communications among data centers located at different geographical sites form the foundation of inter-Cloud federation. Data transmissions required for inter-Cloud federation in the complex inter-Cloud networking system are often point-to-multi...
Article
The IoT is one of the most significant recent innovations in information technologies, which has attracted extensive attention from both industry and academia due to its potential impact on various networking-related fields. The rapid development in IoT technologies has resulted in widespread application of this emerging networking paradigm in vari...
Article
Supporting diverse Quality of Service (QoS) performance for data flows generated by multimedia applications has been a challenging issue in Software Defined Network (SDN). However, the current available QoS provision mechanisms proposed for SDN have not fully considered the heterogeneity and performance diversity for multimedia data flows. To this...
Article
Multicast routing that meets multiple QoS constraints is important for supporting multimedia communications in the Internet of Things (IoT). Existing multicast routing technologies for IoT mainly focus on ad hoc sensor networking scenarios; thus are not responsive and robust enough for supporting multimedia applications in an IoT environment. In or...
Article
Full-text available
With rapid advancement of Cloud computing and networking technologies, a wide spectrum of Cloud services have been developed by various providers and utilized by numerous organizations as indispensable ingredients of their information systems. Cloud service performance has a significant impact on performance of the future information infrastructure...
Article
Full-text available
Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however don't provide guidance to and integrate directly with the IT side implementation to achieve coherent information coordination and robust adaptability which indicts maximization of business profitabi...
Article
Full-text available
SDN and NFV are two significant innovations in networking. The evolution of both SDN and NFV has shown strong synergy between these two paradigms. Recent research efforts have been made toward combining SDN and NFV to fully exploit the advantages of both technologies. However, integrating SDN and NFV is challenging due to the variety of intertwined...
Conference Paper
In this paper, we demonstrate a system for automated transformation rule application in mobile system development. Our application enables correctness and consistency of the automated transformation rules, by leveraging Egyed's work [2] on automated model transformation. Our approach is implemented via finite state automation generation, extending...
Article
Full-text available
Across all industry segments, 96 percent of systems could be breached on average. In the game of cyber security, every moment a new player (attacker) is entering the game with new skill sets. An attacker only needs to be effective once while defenders of cyberspace have to be successful all of the time. There will be a first-mover advantage in such...
Article
Full-text available
Service composition has become a common approach to realising complex business processes. The large number of services developed and deployed independently by various providers can lead to undesirable interactions between properties of different services which are a serious obstacle for service composition to meet users' requirements. While some pr...
Article
The crucial role of networking in cloud service provisioning calls for federated selection of network and cloud services in order to guarantee the service performance required by diverse applications. In order to address the new challenges brought in by the software-defined cloud environment (SDCE) to service selection, we develop an approach for p...
Conference Paper
Split-protocol computing paradigm uses web services on geographically distributed Web servers. A network of large Split-servers that form the cloud to handles computing and storage task that would otherwise create a heavy CPU utilization for the individual traditional server. The split-protocol concept was devised for load balancing and faster data...
Conference Paper
Full-text available
Supporting diverse Quality of Service (QoS) performance for heterogeneous data flows generated by multimedia applications has been a challenging issue that is not fully addressed in the Internet. Software Defined Network, which decouples data forwarding and network control, offers a promising approach to QoS guarantee of multimedia flows in the fut...
Conference Paper
Full-text available
Context-aware Cloud services, which may significantly enhance usability of the future Internet-based information infrastructure, also brings in new challenges to Cloud system development. In this paper, we investigate application of value engineering, a systematic method for achieving optimal system design, to address the challenges introduced by t...
Article
Full-text available
The design of wireless sensor networks (WSNs) in the Internet of Things (IoT) faces many new challenges that must be addressed through an optimization of multiple design objectives. Therefore, multiobjective optimization is an important research topic in this field. In this paper, we develop a new efficient multiobjective optimization algorithm bas...
Article
Full-text available
The crucial role of networking in Cloud computing calls for a holistic vision of both networking and computing systems that leads to composite network–compute service provisioning. Software-Defined Network (SDN) is a fundamental advancement in networking that enables network programmability. SDN and software-defined compute/storage systems form a S...
Conference Paper
This paper proposes a hybrid scheduling scheme to combine the priority queueing and Packet General Processor Sharing (PGPS) algorithm for Multimedia Cloud Services in Software Defined Network (SDN). The network calculus theory is employed to develop modeling and analysis techniques for evaluating the QoS performance of the proposed scheduling schem...
Article
Full-text available
Software-Defined Network (SDN) is expected to have a significant impact on future networking. Although exciting progress has been made toward realizing SDN, application of this new networking paradigm in the future Internet to support end-to-end QoS provisioning faces some new challenges. The autonomous network domains coexisting in the Internet an...
Conference Paper
Software Defined Networking (SDN) is an emerging networking paradigm that is expected to play a significant role in future networks. Although exciting progress has been made in research and development of SDN technologies, application of this new networking paradigm in large scale networks with heterogeneous autonomous domains, such as the Internet...
Conference Paper
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed in this paper. The proposed protocol is composed of two critical phases: 1) adjusting the value of minimum-hops between a phantom node and its source, and varying the area...
Article
Software Defined Network (SDN) may significantly enhance network and service management by enabling separated control and data planes. The centralized OpenFlow controller with a global vision of network states offers a promising approach to realizing flow-based admission control for supporting Quality of Service (QoS) provisioning in SDN. However,...
Article
Full-text available
Device-to-device (D2D) communication plays a crucial role in improving the performance of cellular systems, and it is expected to be an innovative technology for next-generation wireless systems. Although significant progress has been made toward cellular and D2D coexistence, the issue of access control for D2D communications in the cellular networ...
Article
Full-text available
The crucial role of networking in Cloud computing calls for federated management of both computing and networking resources for end-to-end service provisioning. Application of the Service-Oriented Architecture (SOA) in both Cloud computing and networking enables a convergence of network and Cloud service provisioning. One of the key challenges to h...
Article
Full-text available
Multicast routing with multiple Quality-of-Service (QoS) constraints has been realized as an promising technology to meet the increasing bandwidth demand of multimedia services. Developing cost-effective multicast routing algorithm plays a crucial role in implementing multicast routing protocol successfully. However, most of prior multicast routing...
Article
Networking plays a crucial role in Cloud computing, which calls for a holistic vision of combined control and optimization for both networking and computing resources. Essentially the services received by Cloud users are composite services that consist of not only Cloud computing functions but also networking services. Therefore, composite network–...
Conference Paper
Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a priority-bas...
Conference Paper
Full-text available
The large amount of data collected in the Internet of Things (IoT) need to be transmitted to servers for processing in order to provide various services. Due to the limited amount of resources in IoT, including network bandwidth, node processing abilities, and server capacities, congestion control in IoT plays a crucial role for meeting service per...
Article
Full-text available
Quality-of-Service (QoS) provisioning plays a pivotal role in widespread deployment of new emerging services over the current Internet and is expected to be an indispensable attribute of future Internet. Though relevant progress has been made towards ensuring QoS, modeling and developing efficient algorithms for end-to-end QoS provisioning remain c...

Network

Cited By