Engineering VI 396
404 Westwood Plaza
University of California, Los Angeles
Los Angeles, CA 90095
Email: zyuan [at] cs.ucla.edu
I am a Ph.D. candidate in Computer Science at the University of California, Los Angeles, advised by Prof. Songwu Lu. My research interests include: next-gen low-latency mobile networks (5G/IoT), multi-carrier cellular access, mobile system security, and mobile edge computing. Prior to UCLA, I received my B.S. from Shanghai Jiao Tong University, under the supervision of Prof. Xinbing Wang.
I am a mobile system and security researcher. I am adroit at building systems and am equally deft at hacking systems, especially the Android OS. I am also an "amateur" photographer. Landscape and astrophotography are my favorite categories. A few of them are on Getty Images.
Here is my CV, my LinkedIn, and my Google Scholar profile.
We study policy conflicts between inter-carrier switching and intra-carrier handoff in multi-carrier cellular access system. We proved theoretical results on resolving such conflicts, proposed practical guidelines, and validated our findings using Google Project Fi [MobiCom '18].
DPCM [MobiCom '17] is a new design at 4G/5G control-plane reducing data access latency, by parallel processing approaches and exploiting device-side state replica.
MobileInsight [MobiCom '16] is a cross-platform software package for cellular network monitoring and analysis on end device.
C12 |
Resolving Policy Conflicts in Multi-Carrier Cellular Access MobiCom '18
Multi-carrier cellular access dynamically selects a preferred wireless carrier by leveraging the availability and diversity of multiple carrier networks at a location. It offers an alternative to the dominant single-carrier paradigm, and shows early signs of success through the operational Project Fi by Google. In this paper, we study the important, yet largely unexplored, problem of inter-carrier switching for multi-carrier access. We show that policy conflicts can arise between inter- and intra-carrier switching, resulting in oscillations among carriers in the worst case akin to BGP looping. We derive the conditions under which such oscillations occur for three categories of popular policy, and validate them with Project Fi whenever possible. We provide practical guidelines to ensure loop-freedom and assess them via trace-driven emulations.
@inproceedings{yuan2018multicarrier,
author = {Yuan, Zengwen and Li, Qianru and Li, Yuanjie and Lu, Songwu and Peng, Chunyi and Varghese, George},
title = {Resolving Policy Conflicts in Multi-Carrier Cellular Access},
booktitle = {Proceedings of the 24th Annual International Conference on Mobile Computing and Networking},
series = {MobiCom '18},
year = {2018},
isbn = {978-1-4503-5903-0},
location = {New Delhi, India},
pages = {147--162},
numpages = {16},
url = {http://doi.acm.org/10.1145/3241539.3241558},
doi = {10.1145/3241539.3241558},
acmid = {3241558},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {multi-carrier cellular access, inter-carrier switching, inter-carrier policy, policy-induced loop, stability, 4G/5G mobile networks},
}
|
C11 |
A Machine Learning Based Approach to Mobile Network Analysis ICCCN '18
In this paper, we present our recent work in progress on 4G mobile network analysis. In order to provide an in-depth study on the closed network operations, we advocate a novel approach via two-level, device-centric machine learning that can open up the system behaviors and facilitate fine-grained analysis. We describe our proposed approach, and use the latency analysis on two popular mobile apps (Web browsing and Instant Messaging) to illustrate how our scheme works. We further present preliminary results and discuss open issues.
@inproceedings{yuan2018mlanalysis,
author={Zengwen Yuan and Yuanjie Li and Chunyi Peng and Songwu Lu and Haotian Deng and Zhaowei Tan and Taqi Raza},
booktitle={2018 27th International Conference on Computer Communication and Networks (ICCCN)},
title={A Machine Learning Based Approach to Mobile Network Analysis},
year={2018},
volume={},
number={},
pages={1-9},
doi={10.1109/ICCCN.2018.8487371},
ISSN={1095-2055},
month={July},
}
|
C10 |
Dependency Analysis of Cloud Applications for Performance Monitoring using Recurrent Neural Networks BigData '17
Performance monitoring of cloud-native applications that consist of several micro-services involves the analysis of time series data collected from the infrastructure, platform, and application layers of the cloud software stack. The analysis of the runtime dependencies amongst the component microservices is an essential step towards performing cloud resource management, detecting anomalous behavior of cloud applications, and meeting customer Service Level Agreements (SLAs). Finding such dependencies is challenging due to the non-linear nature of interactions, aberrant data measurements and lack of domain knowledge. In this paper, we propose a novel use of the modeling capability of Long-Short Term Memory (LSTM) recurrent neural networks, which excel in capturing temporal relationships in multi-variate time series data and being resilient to noisy pattern representations. Our proposed technique looks into the LSTM model structure, to uncover dependencies amongst performance metrics, which were learned during training. We further apply this technique in three monitoring use cases, namely finding the strongest performance predictors, discovering lagged/temporal dependencies, and improving the accuracy of forecasting for a given metric. We demonstrate the viability of our approach, by comparing the results of our proposed method in the three use cases with those obtained from previously proposed methods, such as Granger causality and the classical statistical time series analysis models, such as ARIMA and Holt-Winters. For our experiments and analysis, we use performance monitoring data collected from two sources: a controlled experiment involving a sample cloud application that we deployed in a public cloud infrastructure and cloud monitoring data collected from the monitoring service of an operational, public cloud service provider.
@inproceedings{8258087,
author={S. Y. Shah and Z. Yuan and S. Lu and P. Zerfos},
booktitle={2017 IEEE International Conference on Big Data (Big Data)},
title={Dependency analysis of cloud applications for performance monitoring using recurrent neural networks},
year={2017},
volume={},
number={},
pages={1534-1543},
keywords={Portable document format;Big Data;Machine Learning;Neural networks;Statistical learning;Supervised learning;Time series analysis},
doi={10.1109/BigData.2017.8258087},
ISSN={},
month={Dec},}
|
C9 |
A Control-Plane Perspective on Reducing Data Access Latency in LTE Networks MobiCom '17
Control-plane operations are indispensable to providing data access to mobile devices in the 4G LTE networks. They provision necessary control states at the device and network nodes to enable data access. However, the current design may suffer from long data access latency even under good radio conditions. The fundamental problem is that, data-plane packet delivery cannot start or resume until all control-plane procedures are completed, and these control procedures run sequentially by design at the device and network nodes. In this work, we show both are more than necessary under popular usage cases. We design DPCM, which reduces data access latency through parallel processing approaches and exploiting device-side state replica. We implement DPCM and validate its effectiveness with extensive evaluations.
@inproceedings{Li:2017:CPR:3117811.3117838,
author = {Li, Yuanjie and Yuan, Zengwen and Peng, Chunyi},
title = {A Control-Plane Perspective on Reducing Data Access Latency in LTE Networks},
booktitle = {Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking},
series = {MobiCom '17},
year = {2017},
isbn = {978-1-4503-4916-1},
location = {Snowbird, Utah, USA},
pages = {56--69},
numpages = {14},
url = {http://doi.acm.org/10.1145/3117811.3117838},
doi = {10.1145/3117811.3117838},
acmid = {3117838},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {4G/5G network, control plane, device-side state replica, latency, parallel processing},
}
|
C8 |
The Tick Programmable Low-Latency SDR System MobiCom '17
Tick is a new SDR system that provides programmability and ensures low latency at both PHY and MAC. It supports modular design and element-based programming, similar to the Click router framework. It uses an accelerator-rich architecture, where an embedded processor executes control flows and handles various MAC events. User-defined accelerators offload those tasks, which are either computation-intensive or communication-heavy, or require fine-grained timing control, from the processor, and accelerate them in hardware. Tick applies a number of hardware and software co-design techniques to ensure low latency, including multi-clock-domain pipelining, field-based processing pipeline, separation of data and control flows, etc. We have implemented Tick and validated its effectiveness through extensive evaluations as well as two prototypes of 802.11ac SISO/MIMO and 802.11a/g full-duplex.
@inproceedings{Wu:2017:TPL:3117811.3117834,
author = {Wu, Haoyang and Wang, Tao and Yuan, Zengwen and Peng, Chunyi and Li, Zhiwei and Tan, Zhaowei and Ding, Boyan and Li, Xiaoguang and Li, Yuanjie and Liu, Jun and Lu, Songwu},
title = {The Tick Programmable Low-Latency SDR System},
booktitle = {Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking},
series = {MobiCom '17},
year = {2017},
isbn = {978-1-4503-4916-1},
location = {Snowbird, Utah, USA},
pages = {101--113},
numpages = {13},
url = {http://doi.acm.org/10.1145/3117811.3117834},
doi = {10.1145/3117811.3117834},
acmid = {3117834},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {802.11, 802.11ac, MAC, PHY, full-duplex, low latency, programmability, software-defined radio},
}
|
C7 |
Towards Automated Intelligence in 5G Systems ICCCN '17
In this paper, we call for a paradigm shift away from the wireless-access focused research efforts on 5G networked systems. We believe that the architectural limitations should share equal blame on issues of performance, reliability, and security. We thus identify architectural weakness on both sides of the mobile clients and the 4G network infrastructure. Our recent findings show that, contrary to commonly held perceptions, many design and operational issues arise not due to poor wireless link qualities. Instead, they are rooted in such architectural downsides. To address these issues, we further propose a new approach of enabling automated intelligence inside the 4G/5G network systems. We next describe our ongoing efforts along two dimensions: empowering date-driven smart clients and constructing verifiable network infrastructure. We report some early results and discuss possible next steps.
@inproceedings{8038472,
author={Haotian Deng and Qianru Li and Yuanjie Li and Songwu Lu and Chunyi Peng and Taqi Raza and Zhaowei Tan and Zengwen Yuan and Zhehui Zhang},
booktitle={2017 26th International Conference on Computer Communication and Networks (ICCCN)},
title={Towards Automated Intelligence in 5G Systems},
year={2017},
volume={},
number={},
pages={1-9},
keywords={Communication system security;Internet;Mobile communication;Mobile computing;Protocols;Switches;Wireless communication},
doi={10.1109/ICCCN.2017.8038472},
ISSN={},
month={July},}
|
C6 |
MobileInsight: Extracting and Analyzing Cellular Network Information on Smartphones MobiCom '16
We design and implement MobileInsight, a software tool that collects, analyzes and exploits runtime network information from operational cellular networks. MobileInsight runs on commercial off-the-shelf phones without extra hardware or additional support from operators. It exposes protocol messages on both control plane and (below IP) data plane from the 3G/4G chipset. It provides in-device protocol analysis and operation logic inference. It further offers a simple API, through which developers and researchers obtain access to low-level network information for their mobile applications. We have built three showcases to illustrate how MobileInsight is applied to cellular network research.
@inproceedings{Li:2016:MEA:2973750.2973751,
author = {Li, Yuanjie and Peng, Chunyi and Yuan, Zengwen and Li, Jiayao and Deng, Haotian and Wang, Tao},
title = {Mobileinsight: Extracting and Analyzing Cellular Network Information on Smartphones},
booktitle = {Proceedings of the 22Nd Annual International Conference on Mobile Computing and Networking},
series = {MobiCom '16},
year = {2016},
isbn = {978-1-4503-4226-1},
location = {New York City, New York},
pages = {202--215},
numpages = {14},
url = {http://doi.acm.org/10.1145/2973750.2973751},
doi = {10.1145/2973750.2973751},
acmid = {2973751},
publisher = {ACM},
address = {New York, NY, USA},
}
|
C5 |
CAP on Mobility Control for 4G LTE Networks HotWireless '16
The CAP theorem exposes the fundamental tradeoffs among three key properties of strong consistency, availability and partition tolerance in distributed networked systems. In this position paper, we take the CAP perspective on 4G mobility control. We view the control-plane management for mobility support as a distributed signaling system. We show that the impossibility result of the CAP theorem also holds for mobility control: It is impossible for any mobility control to guarantee sequential consistency, high service availability, and partition tolerance simultaneously. Unfortunately, the current 4G system adopts its mobility scheme with the notion of sequential consistency. Our empirical study further confirms that, the incurred data unavailability (i.e., data service suspension) time is comparable to that induced by wireless connectivity setup. We argue that the desirable mobility control for the upcoming 5G networks should take a paradigm shift. We discuss our early effort on re-examining the consistency notion for higher availability and fault tolerance.
@inproceedings{Li:2016:CMC:2980115.2980120,
author = {Li, Yuanjie and Yuan, Zengwen and Peng, Chunyi and Lu, Songwu},
title = {CAP on Mobility Control for 4G LTE Networks},
booktitle = {Proceedings of the 3rd Workshop on Hot Topics in Wireless},
series = {HotWireless '16},
year = {2016},
isbn = {978-1-4503-4251-3},
location = {New York City, New York},
pages = {33--37},
numpages = {5},
url = {http://doi.acm.org/10.1145/2973750.2980120},
doi = {10.1145/2973750.2980120},
acmid = {2980120},
publisher = {ACM},
address = {New York, NY, USA},
}
|
C4 |
iCellular: Device-Customized Cellular Network Access on Commodity Smartphones NSDI '16
Exploiting multi-carrier access offers a promising direction to boost access quality in mobile networks. However, our experiments show that, the current practice does not achieve the full potential of this approach because it has not utilized fine-grained, cellular-specific domain knowledge. In this work, we propose iCellular, which exploits low-level cellular information at the device to improve multi-carrier access. Specifically, iCellular is proactive and adaptive in its multi-carrier selection by leveraging existing end-device mechanisms and standards-complaint procedures. It performs adaptive monitoring to ensure responsive selection and minimal service disruption, and enhances carrier selection with online learning and runtime decision fault prevention. It is readily deployable on smartphones without infrastructure/hardware modifications. We implement iCellular on commodity phones and harness the efforts of Project Fi to assess multi-carrier access over two US carriers: T-Mobile and Sprint. Our evaluation shows that, iCellular boosts the devices with up to 3.74x throughput improvement, 6.9x suspension reduction, and 1.9x latency decrement over the state-of-the-art selection scheme, with moderate CPU, memory and energy overheads.
@inproceedings {194982,
title = {iCellular: Device-Customized Cellular Network Access on Commodity Smartphones},
booktitle = {13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)},
year = {2016},
month = Mar,
address = {Santa Clara, CA},
url = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/li-yuanjie},
publisher = {USENIX Association},
}
|
C3 |
VoLTE*: A Lightweight Voice Solution to 4G LTE Networks HotMobile '16
VoLTE is the designated voice solution to the LTE network. Its early deployment is ongoing worldwide. In this work, we report an assessment on VoLTE. We show that VoLTE offers no categorically better quality than popular VoIP applications in all tested scenarios except some congested scenarios. Given the high cost on infrastructure upgrade, we argue that VoLTE, in its current form, might not warrant the deployment effort. We sketch VoLTE*, a lightweight voice solution from which all parties of users, LTE carriers, and VoIP service providers may benefit.
@inproceedings{Tu:2016:VLV:2873587.2873604,
author = {Tu, Guan-Hua and Li, Chi-Yu and Peng, Chunyi and Yuan, Zengwen and Li, Yuanjie and Zhao, Xiaohu and Lu, Songwu},
title = {VoLTE*: A Lightweight Voice Solution to 4G LTE Networks},
booktitle = {Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications},
series = {HotMobile '16},
year = {2016},
isbn = {978-1-4503-4145-5},
location = {St. Augustine, Florida, USA},
pages = {3--8},
numpages = {6},
url = {http://doi.acm.org/10.1145/2873587.2873604},
doi = {10.1145/2873587.2873604},
acmid = {2873604},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {cellular networks, voice, volte*},
}
|
C2 |
Insecurity of Voice Solution VoLTE in LTE Mobile Networks CCS '15
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit-switched telecom telephony to the packet-switched Internet VoIP. In this work, we conduct the first study on VoLTE security before its full rollout. We discover several vulnerabilities in both its control-plane and data-plane functions, which can be exploited to disrupt both data and voice in operational networks. In particular, we find that the adversary can easily gain free data access, shut down continuing data access, or subdue an ongoing call, etc. We validate these proof-of-concept attacks using commodity smartphones (rooted and unrooted) in two Tier-1 US mobile carriers. Our analysis reveals that, the problems stem from both the device and the network. The device OS and chipset fail to prohibit non-VoLTE apps from accessing and injecting packets into VoLTE control and data planes. The network infrastructure also lacks proper access control and runtime check.
@inproceedings{Li:2015:IVS:2810103.2813618,
author = {Li, Chi-Yu and Tu, Guan-Hua and Peng, Chunyi and Yuan, Zengwen and Li, Yuanjie and Lu, Songwu and Wang, Xinbing},
title = {Insecurity of Voice Solution VoLTE in LTE Mobile Networks},
booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '15},
year = {2015},
isbn = {978-1-4503-3832-5},
location = {Denver, Colorado, USA},
pages = {316--327},
numpages = {12},
url = {http://doi.acm.org/10.1145/2810103.2813618},
doi = {10.1145/2810103.2813618},
acmid = {2813618},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {LTE, attack, cellular networks, defense, volte},}
|
C1 |
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks INFOCOM '15
Multiple-Input Multiple-Output (MIMO) technology has become an efficient way to improve the capacity and reliability of wireless networks. Traditional MIMO schemes are designed mainly for the scenario of contiguous spectrum ranges. However, in cognitive radio networks, the available spectrum is discontiguous, making traditional MIMO schemes inefficient for spectrum usage. This motivates the design of new MIMO schemes that apply to networks with discontiguous spectrum ranges. In this paper, we propose a scheme called VSMC MIMO, which enables MIMO nodes to transmit variable numbers of streams in multiple discontinuous spectrum ranges. This scheme can largely improve the spectrum utilization and meanwhile maintain the same spatial multiplexing and diversity gains as traditional MIMO schemes. To implement this spectral-efficient scheme on cooperative MIMO relays in cognitive radio networks, we propose a joint relay selection and spectrum allocation algorithm and a corresponding MAC protocol for the system. We also build a testbed by the Universal Software Radio Peripherals (USRPs) to evaluate the performances of the proposed scheme in practical networks. The experimental results show that VSMC MIMO can efficiently utilize the discontiguous spectrum and greatly improve the throughput of cognitive radio networks.
@inproceedings{7218599,
author={Chao Kong and Zengwen Yuan and Xushen Han and Feng Yang and Xinbing Wang and Tao Wang and Songwu Lu},
booktitle={2015 IEEE Conference on Computer Communications (INFOCOM)},
title={VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks},
year={2015},
pages={2137-2145},
keywords={MIMO communication;access protocols;cognitive radio;cooperative communication;diversity reception;multiplexing;radio spectrum management;relay networks (telecommunication);software radio;telecommunication network reliability;MAC protocol;USRP;VSMC MIMO scheme;cognitive radio network;contiguous spectrum range;cooperative relay;diversity gain;joint relay selection and spectrum allocation algorithm;multiple discontiguous spectrum range;multiple input multiple output technology;spatial multiplexing;spectral efficient scheme;spectrum utilization;universal software radio peripheral;wireless network reliability;Antennas;Cognitive radio;MIMO;Receivers;Relays;Resource management;Throughput},
doi={10.1109/INFOCOM.2015.7218599},
month={April},}
|
J4 |
Device-Customized Multi-Carrier Network Access on Commodity Smartphones ToN
Accessing multiple carrier networks (T-Mobile, Sprint, AT&T, etc.) offers a promising paradigm for smartphones to boost its mobile network quality. However, the current practice does not achieve the full potential of this approach because it has not utilized fine-grained, cellular-specific domain knowledge. Our experiments and code analysis discover three implementation-independent issues: (1) it may not trigger the anticipated switch when the serving carrier network is poor; (2) the switch takes a much longer time than needed; and (3) the device fails to choose the high-quality network (e.g., selecting 3G rather than 4G). To address them, we propose iCellular, which exploits low-level cellular information at the device to improve multi-carrier access. iCellular is proactive and adaptive in its multi-carrier selection by leveraging existing end-device mechanisms and standards-complaint procedures. It performs adaptive monitoring to ensure responsive selection and minimal service disruption, and enhances carrier selection with online learning and runtime decision fault prevention. It is readily deployable on smartphones without infrastructure/hardware modifications. We implement iCellular on commodity phones and harness the efforts of Project Fi to assess multi-carrier access over two US carriers: T-Mobile and Sprint. Our evaluation shows that, iCellular boosts the devices’ throughput with up to 3.74× throughput improvement, 6.9× suspension reduction, and 1.9× latency decrement over the state-of-the-art, with moderate CPU, memory and energy overheads.
@article{ton2018icellular,
author={Yuanjie Li and Chunyi Peng and Haotian Deng and Zengwen Yuan and Guan-Hua Tu and Jiayao Li and Songwu Lu and Xi Li},
journal={IEEE/ACM Transactions on Networking},
title={Device-Customized Multi-Carrier Network Access on Commodity Smartphones},
year={2018},
volume={26},
number={6},
pages={2542-2555},
keywords={Switches;5G mobile communication;Google;Smart phones;3G mobile communication;Throughput;4G mobile communication;5G mobile communication;multi-carrier network access;project Fi.},
doi={10.1109/TNET.2018.2869492},
ISSN={1063-6692},
month={Dec},
}
|
J3 |
The
|
J2 |
MobileInsight: Analyzing Cellular Network Information on Smartphones GetMobile Research Highlight
MobileInsight is a software tool that collects, analyzes and exploits runtime, fine-grained cellular network information over commodity phones. It is our first step to help developers and researchers understand the closed, large-scale cellular network system. It exposes the below-IP protocol messages to the user space, provides protocol analysis, and offers APIs for mobile applications to obtain low-level network information. We have built showcases to illustrate how MobileInsight can be applied to cellular network research.
@article{Li:2017:MAC:3103535.3103548,
author = {Li, Yuanjie and Peng, Chunyi and Yuan, Zengwen and Deng, Haotian and Li, Jiayao and Wang, Tao},
title = {MobileInsight: Analyzing Cellular Network Information on Smartphones},
journal = {GetMobile: Mobile Comp. and Comm.},
issue_date = {March 2017},
volume = {21},
number = {1},
month = may,
year = {2017},
issn = {2375-0529},
pages = {39--42},
numpages = {4},
url = {http://doi.acm.org/10.1145/3103535.3103548},
doi = {10.1145/3103535.3103548},
acmid = {3103548},
publisher = {ACM},
address = {New York, NY, USA},
}
|
J1 |
DiscoverFriends: Secure Social Network Communication in Mobile Ad Hoc Networks WCMC
This paper presents a secure communication application called DiscoverFriends. Its purpose is to securely communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide authentication. Additionally, DiscoverFriends enables anonymous location check-ins by utilizing a new cryptographic primitive called Function Secret Sharing. Finally, to the best of our knowledge, DiscoverFriends implements and evaluates the first Android multi-hop WiFi Direct protocol using IPv6.
@article {WCM:WCM2708,
author = {Joy, Joshua and Chung, Eric and Yuan, Zengwen and Li, Jiayao and Zou, Leqi and Gerla, Mario},
title = {DiscoverFriends: secure social network communication in mobile ad hoc networks},
journal = {Wireless Communications and Mobile Computing},
volume = {16},
number = {11},
issn = {1530-8677},
url = {http://dx.doi.org/10.1002/wcm.2708},
doi = {10.1002/wcm.2708},
pages = {1401--1413},
keywords = {mobile communication, ad hoc networks, social computing, security},
year = {2016},
note = {wcm.2708},
}
|
T2 |
Demystifying Multi-Carrier Access in Google Project Fi
Google Project Fi offers a new mobile Internet access paradigm to smartphones. It allows its users to select one out of multiple mobile carrier networks at any given time and location. Compared with the conventional, single-carrier access, this multi-carrier access may conceptually provide better coverage and superior data service. Despite its advantages, the current Project Fi design is unrevealed, thus making it difficult to fully understand its strengths and limitations. In this work, we decipher Project Fi's inter-carrier switching algorithm through nontrivial reverse engineering efforts. We further uncover several instances where Project Fi delivers unsatisfying performances, and conduct experiments over operational networks to validate them and quantify their impact.
|
T1 |
The Design and Implementation of an Academic Search System
The easy and efficient access to the up-to-date research frontiers and necessary academic resources is becoming increasingly important for researchers, as the number of the research papers published each year reaches an overwhelming multitude. Thus, the academic search system is valued. The topic-based academic search system can recommend papers for user’s queries and visualize the corresponding location of paper's topics in the relevant disciplines. Using the top-down approach and modular design principle, the system can be divided into the website part and the system core. The prototype website is built for evaluation purpose using Amaze UI, and the system core consists of the paper database module, the topic model module, the citation network analysis module and the search engine module. The paper database collects large sample of paper metadata through web crawler and public datasets; the topic model module uses LDA algorithm to analysis the latent topics of papers; the citation network module models and analyzes the citation relationship between papers, and uses PageRank algorithm to explore the topics of papers in terms of development status within discipline and contribution from other topics; the search engine module deploys the open-source search engine Apache Solr, and makes customization and optimization for topic-based query. The architecture of this system combines the semantic analysis with the network analysis, and taking both the macroscopic and the microscopic perspectives of the paper metadata into account, which makes academic search faster and more accurate.
|
I care about my students and I enjoy helping them achieve their academic endeavors. Here is an excerpt of anonymous feedbacks I have received from undergrads of my earlier discussions.
MobileInsight spurs in-phone mobile network intelligence. It provides both mobile app and desktop version to sheds lights on mobile network to end users. MobileInsight is free and publicly available on GitHub. Check our official website for details.
Multi-hop WiFi Direct provides an easy way to form multiple groups without external WiFi AP or Bluetooth. It is an ideal implementation platform for research of mobile ad hoc network (MANET), vehicular ad hoc network (VANET) or other related areas. Check our code release page and YouTube demo for more details. More features and routing algorithms are being added and will be included in the future release.
AceMap is my undergraduate thesis work supervised by Prof. Xinbing Wang. It is an academic search system visualizing the relations of papers, topics and authors based on a large corpora of paper metadata. I was fortunate to work with Zhaowei Tan, Jiaming Shen, and Yunqi Guo to build the initial version of it.
FiAssistant is a simple app for Project Fi users to quickly dial secret codes and directly switch to T-Mobile, Sprint, and U.S. Cellular, or Hutchison 3G and Three in UK. There are few other handy secret codes to use as well. Recently upgraded to version 2.0 for layout and function update (You need root access due to recent Android permission limitation).
I created this homepage template in 2015 and made it sharable under the Creative Commons license. Many academic researchers have adopted this template since. I have made this template open source at https://github.com/zwyuan/phd-homepage-template, so more PhD students may create a personal homepage easily and focus on the content.
Please contact me via email: base64 -d <<< "enl1YW5AY3MudWNsYS5lZHUNCg=="
I love photography and traveling. I own a Nikon D750 body. My current lens collection includes a Rokinon 14mm f/2.8, a Sigma 35mm f/1.4 Art, a Nikon 50mm f/1.4 D, a Nikon 85mm f/1.8 D, a Tokina AT-X 100mm f/2.8 macro, and a Nikon 18-35mm f/3.5-4.5 zoom. Read my pick of photos in 2017 or see more of the photos I took at my 500px photo gallery, and images available for licensing on Getty Images.
I am a big fan of classical music and I play piano in my leisure time. Read my favorite pieces of Chopin.
Advices on how to choose ACM copyright license for your paper: Discussion 1, Discussion 2