Feng Qi

Orcid: 0000-0003-2481-8774

Affiliations:
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
  • Peng Cheng Laboratory, Cyberspace Security Research Center, Shenzhen, China


According to our database1, Feng Qi authored at least 39 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain-Assisted Privacy-Preserving Data Computing Architecture for Web3.
IEEE Commun. Mag., August, 2023

Federated Learning Meets Blockchain: State Channel-Based Distributed Data-Sharing Trust Supervision Mechanism.
IEEE Internet Things J., July, 2023

Multi task dynamic edge-end computing collaboration for urban Internet of Vehicles.
Comput. Networks, May, 2023

Sandbox Computing: A Data Privacy Trusted Sharing Paradigm Via Blockchain and Federated Learning.
IEEE Trans. Computers, March, 2023

Decentralized AI-Enabled Trusted Wireless Network: A New Collaborative Computing Paradigm for Internet of Things.
IEEE Netw., 2023

A Distributed Asset Trading Mechanism Based on Automated Negotiation.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Reliability and Energy Balanced Computation Resource Allocation Mechanism in Federated Learning System for AI-Enabled IoT Businesses.
Proceedings of the IEEE Global Communications Conference, 2023

Crowdsensing Data Trading Mechanism Based on Personalized Local Differential Privacy.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT.
IEEE Internet Things J., 2022

Cost and QoS Balanced Service Function Graph Scaling Algorithm in Cloud-Edge Collaborative Multimedia IoT.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2022

2021
Task Allocation Mechanism for Cable Real-Time Online Monitoring Business Based on Edge Computing.
IEEE Syst. J., 2021

Delay and Energy Consumption Optimization Oriented Multi-service Cloud Edge Collaborative Computing Mechanism in IoT.
J. Web Eng., 2021

2020
Blockchain Meets Edge Computing: Stackelberg Game and Double Auction Based Task Offloading for Mobile Blockchain.
IEEE Trans. Veh. Technol., 2020

Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System.
IEEE Trans. Ind. Informatics, 2020

When Network Operation Meets Blockchain: An Artificial-Intelligence-Driven Customization Service for Trusted Virtual Resources of IoT.
IEEE Netw., 2020

Master-slave chain based trusted cross-domain authentication mechanism in IoT.
J. Netw. Comput. Appl., 2020

RJCC: Reinforcement-Learning-Based Joint Communicational-and-Computational Resource Allocation Mechanism for Smart City IoT.
IEEE Internet Things J., 2020

Joint DNN Partition Deployment and Resource Allocation for Delay-Sensitive Deep Learning Inference in IoT.
IEEE Internet Things J., 2020

Trusted Cloud-Edge Network Resource Management: DRL-Driven Service Function Chain Orchestration for IoT.
IEEE Internet Things J., 2020

Container Migration Mechanism for Load Balancing in Edge Network Under Power Internet of Things.
IEEE Access, 2020

Distributed Edge Computing Offloading Algorithm Based on Deep Reinforcement Learning.
IEEE Access, 2020

Cost-and-QoS-Based NFV Service Function Chain Mapping Mechanism.
Proceedings of the NOMS 2020, 2020

Traffic Anomaly Detection for Data Communication Networks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Multi-requests satisfied based on energy optimization for the service composition in wireless sensor network.
Int. J. Distributed Sens. Networks, 2019

Workload Allocation Mechanism for Minimum Service Delay in Edge Computing-Based Power Internet of Things.
IEEE Access, 2019

Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Hybrid Chain Based Incentive Mechanism for Resource Leasing in NDN.
Proceedings of the Cognitive Radio-Oriented Wireless Networks, 2019

2018
Resource allocation and distributed uplink offloading mechanism in fog environment.
J. Commun. Networks, 2018

2017
A Service-Reliability-Based Resource Mapping Method in Smart Grid Virtual Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A path planning method of wireless sensor networks based on service priority.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Cooperative Relay Transmission in Advanced Metering Infrastructure with Wireless Attacks.
J. Low Power Electron., 2016

2015
Optimal location of electric vehicle charging stations using genetic algorithm.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Optimal planning of power distribution communication network using genetic algorithm.
Proceedings of the IEEE International Conference on Communications, 2014

Routing algorithm of smart grid data collection based on data balance measurement model.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
Services paths planning for Electric Power Communication Network based on improved Ant Colony Optimization.
Proceedings of the 15th Asia-Pacific Network Operations and Management Symposium, 2013

2011
An Incomplete Coverage Control Based on Target Tracking Wireless Sensor Network.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

An Internet Traffic Classification Method Based on Semi-Supervised Support Vector Machine.
Proceedings of IEEE International Conference on Communications, 2011

2010
Efficient method of station selection for passive monitoring in distributed network using information gain.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A flow-based anomaly detection method using sketch and combinations of traffic features.
Proceedings of the 6th International Conference on Network and Service Management, 2010


  Loading...