scispace - formally typeset
Search or ask a question
Author

Xiulei Liu

Bio: Xiulei Liu is an academic researcher from Beijing Information Science & Technology University. The author has contributed to research in topics: Computer science & Engineering. The author has an hindex of 4, co-authored 12 publications receiving 481 citations. Previous affiliations of Xiulei Liu include Beijing University of Posts and Telecommunications.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents a comprehensive framework of IoV with emphasis on layered architecture, protocol stack, network model, challenges, and future aspects, and performs a qualitative comparison between IoV and VANETs.
Abstract: Internet of Things is smartly changing various existing research areas into new themes, including smart health, smart home, smart industry, and smart transport. Relying on the basis of “smart transport,” Internet of Vehicles (IoV) is evolving as a new theme of research and development from vehicular ad hoc networks (VANETs). This paper presents a comprehensive framework of IoV with emphasis on layered architecture, protocol stack, network model, challenges, and future aspects. Specifically, following the background on the evolution of VANETs and motivation on IoV an overview of IoV is presented as the heterogeneous vehicular networks. The IoV includes five types of vehicular communications, namely, vehicle-to-vehicle, vehicle-to-roadside, vehicle-to-infrastructure of cellular networks, vehicle-to-personal devices, and vehicle-to-sensors. A five layered architecture of IoV is proposed considering functionalities and representations of each layer. A protocol stack for the layered architecture is structured considering management, operational, and security planes. A network model of IoV is proposed based on the three network elements, including cloud, connection, and client. The benefits of the design and development of IoV are highlighted by performing a qualitative comparison between IoV and VANETs. Finally, the challenges ahead for realizing IoV are discussed and future aspects of IoV are envisioned.

435 citations

Journal ArticleDOI
TL;DR: Design and evaluation of the proposed geographic-based spray-and-relay (GSaR) routing scheme in delay/disruption-tolerant networks show that GSaR is reliable for delivering messages before the expiration deadline and efficient for achieving low routing overhead ratio.
Abstract: In this paper, we design and evaluate the proposed geographic-based spray-and-relay (GSaR) routing scheme in delay/disruption-tolerant networks. To the best of our knowledge, GSaR is the first spray-based geographic routing scheme using historical geographic information for making a routing decision. Here, the term spray means that only a limited number of message copies are allowed for replication in the network. By estimating a movement range of destination via the historical geographic information, GSaR expedites the message being sprayed toward this range, meanwhile prevents that away from and postpones that out of this range. As such, the combination of them intends to fast and efficiently spray the limited number of message copies toward this range and effectively spray them within range, to reduce the delivery delay and increase the delivery ratio. Furthermore, GSaR exploits delegation forwarding to enhance the reliability of the routing decision and handle the local maximum problem, which is considered to be the challenges for applying the geographic routing scheme in sparse networks. We evaluate GSaR under three city scenarios abstracted from real world, with other routing schemes for comparison. Results show that GSaR is reliable for delivering messages before the expiration deadline and efficient for achieving low routing overhead ratio. Further observation indicates that GSaR is also efficient in terms of a low and fair energy consumption over the nodes in the network.

71 citations

Journal ArticleDOI
TL;DR: The investigative evaluation of the geometrical-model-based deployment patterns presented in this paper could be useful for practitioners and researchers in developing performance guaranteed applications for precision agriculture and novel coverage and connectivity models for deployment patterns.
Abstract: Efficient sensor deployment is one of the primary requirements of the precision agriculture use case of wireless sensor networks (WSNs) to provide qualitative and optimal coverage and connectivity. The application-based performance variations of the geometrical-model-based sensor deployment patterns restrict the generalization of a specific deployment pattern for all applications. Furthermore, single or double metrics-based evaluation of the deployment patterns focusing on theoretical or simulation aspects can be attributed to the difference in performance of real applications and the reported performance in the literature. In this context, this paper proposes a testbed-based multi-metric quality measurement of sensor deployment for the precision agriculture use case of WSNs. Specifically, seven metrics are derived for the qualitative measurement of sensor deployment patterns for precision agriculture. The seven metrics are quantified for four sensor deployment patterns to measure the quality of coverage and connectivity. Analytical- and simulation-based evaluations of the measurements are validated through testbed experiment-based evaluations which are carried out in “INDRIYA” WSNs testbed. Toward realistic research impact, the investigative evaluation of the geometrical-model-based deployment patterns presented in this paper could be useful for practitioners and researchers in developing performance guaranteed applications for precision agriculture and novel coverage and connectivity models for deployment patterns.

50 citations

Journal ArticleDOI
TL;DR: A multi-output DNN model simultaneously learning multi-task traffic classifications that shares the potential of meeting new demands in the future and meanwhile being able to achieve the classification with advanced speed and fair accuracy is proposed.
Abstract: Deep neural networks have been used for traffic classifications and promising results have been obtained. However, most of the previous work confined to one specific task of the classification, where restricts the classifier potential performance and application areas. The traffic flow can be labeled from a different perspective which might help to improve the accuracy of classifier by exploring more meaningful latent features. In addition, deep neural network (DNN)-based model is hard to adapt the changes in new classification demand, because of training such a new model costing not only many computing resources but also lots of labeled data. For this purpose, we proposed a multi-output DNN model simultaneously learning multi-task traffic classifications. In this model, the common knowledge of traffic is exploited by the synergy among the tasks and improves the performance of each task separately. Also, it is showed that this structure shares the potential of meeting new demands in the future and meanwhile being able to achieve the classification with advanced speed and fair accuracy. One-shot learning, which refers to the learning process with scarce data, is also explored and our approach shows notable performance.

23 citations

Journal ArticleDOI
TL;DR: A novel approach by combining spectrum and mutation to improve the fault localization accuracy is proposed and the accuracy of the proposed approach outperforms those of the SBFL and MBFL techniques.
Abstract: The performance of software fault localization techniques is critical to software debugging and the reliability of software. Spectrum-based fault localization (SBFL) and mutation-based fault localization (MBFL) are the two most popular fault localization methods. However, the accuracies of the two methods are still limited. For example, only 10.63% of faults can be detected by inspecting the top 3 suspicious elements reported by Ochiai, which is a famous SBFL technique. Unfortunately, programmers only examine the first few suspicious elements before losing patience. Since the information used in SBFL and MBFL are quite different and complementary, this paper proposes a novel approach by combining spectrum and mutation to improve the fault localization accuracy. First, the faulty program is evaluated by using SBFL, and the potential faulty statements are ranked according to their suspiciousness. Then, mutants of the program are generated and executed by MBFL. Finally, the statements that are ranked in the top tied ${n}$ by SBFL are evaluated and reranked according to their mutation scores. Experiments are carried on the Defects4J benchmark and the results reveal that the accuracy of the proposed approach outperforms those of the SBFL and MBFL techniques. In terms of the faults located by inspecting the top 1 suspicious elements, the SMFL techniques detect at least 2.36 times more faults than two SBFL techniques (DStar and Ochiai) and detect at least 1.86 times more faults than two MBFL techniques (MUSE and Metallaxis).

10 citations


Cited by
More filters
01 Jan 2009
TL;DR: This paper presents a meta-modelling framework for modeling and testing the robustness of the modeled systems and some of the techniques used in this framework have been developed and tested in the field.
Abstract: ing WS1S Systems to Verify Parameterized Networks . . . . . . . . . . . . 188 Kai Baukus, Saddek Bensalem, Yassine Lakhnech and Karsten Stahl FMona: A Tool for Expressing Validation Techniques over Infinite State Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 J.-P. Bodeveix and M. Filali Transitive Closures of Regular Relations for Verifying Infinite-State Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Bengt Jonsson and Marcus Nilsson Diagnostic and Test Generation Using Static Analysis to Improve Automatic Test Generation . . . . . . . . . . . . . 235 Marius Bozga, Jean-Claude Fernandez and Lucian Ghirvu Efficient Diagnostic Generation for Boolean Equation Systems . . . . . . . . . . . . 251 Radu Mateescu Efficient Model-Checking Compositional State Space Generation with Partial Order Reductions for Asynchronous Communicating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Jean-Pierre Krimm and Laurent Mounier Checking for CFFD-Preorder with Tester Processes . . . . . . . . . . . . . . . . . . . . . . . 283 Juhana Helovuo and Antti Valmari Fair Bisimulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Thomas A. Henzinger and Sriram K. Rajamani Integrating Low Level Symmetries into Reachability Analysis . . . . . . . . . . . . . 315 Karsten Schmidt Model-Checking Tools Model Checking Support for the ASM High-Level Language . . . . . . . . . . . . . . 331 Giuseppe Del Castillo and Kirsten Winter Table of

1,687 citations

Journal ArticleDOI
TL;DR: This exhaustive survey provides insights into the state-of-the-art of IoT enabling and emerging technologies and brings order in the existing literature by classifying contributions according to different research topics.

510 citations

Journal ArticleDOI
TL;DR: Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.
Abstract: As modern vehicle and communication technologies advanced apace, people begin to believe that the Intelligent Transportation System (ITS) would be achievable in one decade. ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in vehicular communication systems (VCSs). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considered as a critical technique for network security. In this paper, we propose a framework for providing secure key management within the heterogeneous network. The security managers (SMs) play a key role in the framework by capturing the vehicle departure information, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel network topology based on a decentralized blockchain structure. The blockchain concept is proposed to simplify the distributed key management in heterogeneous VCS domains. The second part of the framework uses the dynamic transaction collection period to further reduce the key transfer time during vehicles handover. Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.

466 citations

Journal ArticleDOI
23 Jan 2020
TL;DR: A thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.
Abstract: To enable large-scale and ubiquitous automotive network access, traditional vehicle-to-everything (V2X) technologies are evolving to the Internet of Vehicles (IoV) for increasing demands on emerging advanced vehicular applications, such as intelligent transportation systems (ITS) and autonomous vehicles. In recent years, IoV technologies have been developed and achieved significant progress. However, it is still unclear what is the evolution path and what are the challenges and opportunities brought by IoV. For the aforementioned considerations, this article provides a thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV. We first review the early stage when the dedicated short-range communications (DSRC) was issued as an important initial beginning and compared the cellular V2X with IEEE 802.11 V2X communications in terms of both the pros and cons. In addition, considering the advent of big data and cloud-edge regime, we highlight the key technical challenges and pinpoint the opportunities toward the big data-driven IoV and cloud-based IoV, respectively. We believe our comprehensive survey on evolutionary V2X technologies toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.

348 citations

Journal ArticleDOI
Lei Liu1, Chen Chen1, Qingqi Pei1, Sabita Maharjan2, Yan Zhang2 
TL;DR: A comprehensive survey of state-of-the-art research on VEC can be found in this paper, where the authors provide an overview of VEC, including the introduction, architecture, key enablers, advantages, challenges as well as several attractive application scenarios.
Abstract: As one key enabler of Intelligent Transportation System (ITS), Vehicular Ad Hoc Network (VANET) has received remarkable interest from academia and industry. The emerging vehicular applications and the exponential growing data have naturally led to the increased needs of communication, computation and storage resources, and also to strict performance requirements on response time and network bandwidth. In order to deal with these challenges, Mobile Edge Computing (MEC) is regarded as a promising solution. MEC pushes powerful computational and storage capacities from the remote cloud to the edge of networks in close proximity of vehicular users, which enables low latency and reduced bandwidth consumption. Driven by the benefits of MEC, many efforts have been devoted to integrating vehicular networks into MEC, thereby forming a novel paradigm named as Vehicular Edge Computing (VEC). In this paper, we provide a comprehensive survey of state-of-art research on VEC. First of all, we provide an overview of VEC, including the introduction, architecture, key enablers, advantages, challenges as well as several attractive application scenarios. Then, we describe several typical research topics where VEC is applied. After that, we present a careful literature review on existing research work in VEC by classification. Finally, we identify open research issues and discuss future research directions.

205 citations