Anchored User Selection For Traffic Offloading Optimization in D2D-Aided Mobile-Edge Computing
Anchored User Selection For Traffic Offloading Optimization in D2D-Aided Mobile-Edge Computing
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
16912 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 23, DECEMBER 1, 2021
Fig. 2. Introduction of the embedding from D2D-based MSNs to a 3-D tensor space by the proposed MPPT.
Presently, a large number of scholars use social network of users by adaptively selecting and retaining a set of individ-
analysis technology to study network structure. Specifically, uals for each D2D network under the limitation of resources.
network representation learning (NRL) can map high- Then, we allocate certain resources to these anchors to ensure
dimensional node attributes in a social network into low- that the resource can be shared to other users in the network
dimensional vectors, so as to exploit the vertex classifica- so that the repeated download can be effectively reduced.
tion [4], clustering [5], and link prediction [6]. Further, we proposed a user-edge-cloud framework to select
However, there are two challenges that have not been fully anchors adaptively through communication and cooperation
considered in the previous work. between BS and central cloud. The cloud formulates alloca-
1) Most of the NRL algorithms are used in the analysis tion strategies of anchors based on the process of the structure
of online network, and the attributes on the edge of the information of D2D networks collected by BSs. The edge
users (such as content types, sharing time, and geograph- receives the resources allocated by the cloud and selects
ical information) are merely considered as a binary or the corresponding anchors to reduce the cloud computing
continuous value. stress.
2) Effective and invalid edge relationships still cannot be Contributions of this research are summarized in the fol-
accurately separated in some of the link prediction lowing.
studies considering the edge relations of users. 1) We have proposed a pioneering work that models the
In this article, we conduct multirelational embeddings for multidimensional relationships among users in large-
D2D NRL, and the third-order (3-D) probability-scored tensor scale D2D sharing data sets in the real world as the 3-D
factorization algorithm, named MPPT, is proposed to improve probability tensor instead of considering binary values.
the content sharing prediction. Specifically, as a decisive char- 2) The introduction of GPS slicing in this article avoids
acteristics of D2D networks, global positioning system (GPS) the loss of implicit relationships between D2D users,
is considered to be a crucial relation slice. As shown in Fig. 2, complements the explicit relationship model, and ana-
the 3-D tensor space is derived from a D2D sharing network lyzes true and false triplets more accurately in offline
by considering the multiple edge relations (e.g., App types and MSNs effectively.
GPS) between senders and receivers. 3) An adaptive (k, r)-core anchor selection algorithm is
Besides, many research studies have been carried out on proposed to highlight the stability of mobile D2D
MEC and D2D communications, the stability of networks networks based on the large scale of BSs, aiming at
is largely ignored when designing an efficient and reliable maximizing the total engaged users by adaptively allo-
resource allocation strategies. The decay of an offline D2D cating anchored vertices of the networks, to improve the
MSN, which is determined by the social relations between efficiency and reliability of traffic offload.
D2D users, can lead to the loss of resources due to the con- 4) We devise a user-edge-cloud framework for resource
nections of users are interrupted and reduce the computing allocation and divert computation tasks to BS for pro-
performance of the whole network. cessing to reduce the computing burden of the central
To tackle the aforementioned issue, we propose the adaptive cloud.
anchored (k, r)-core problem considering the large number of 5) We proposed P-OLAK, a probability-based onion lay-
D2D networks under the coverage of BSs in reality and the ers anchored (P-OLAK) algorithm with (k, r)-core to
relations between D2D users affected by spatial and temporal. achieve the adaptive selection of the anchor users in each
The scope of this research lies in maximizing the total number mobile D2D network.
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: ANCHORED USER SELECTION FOR TRAFFIC OFFLOADING OPTIMIZATION IN D2D-AIDED MEC 16913
The remainder of this article is organized as follows. uncompressed data for D2D communications. Tang et al. [17]
Section II summarizes the related work. We introduce the pre- applied D2D to manage mobile-edge servers to improve the
liminaries of the system model and formulation in Section III. offloading efficiency of computation tasks.
The design of the proposed MPPT algorithm is illustrated in
Section IV. The anchored user selection is shown in Section V. B. User Engagement and Anchored k-Core Problem
Trace-driven experimental results reveal the effectiveness of
The user engagement phenomenon has been recently studied
the proposed framework in Sections VI and VII. Finally, we
to simulate the human behaviors that they may decide to stay
summarize this article in Section VIII.
engaged in, or drop out of a social network [18], [19]. It is
influenced by that of his/her neighbors. The k-core model, first
II. R ELATED W ORK introduced by Seidman, is widely used to quantify the user
A. MEC and D2D Sharing in MSNs engagement in the social networks [20]. In a k-core model, a
user with less than k neighbors will be eliminated from the
MEC has been developed by the European
social network, and the drop out of a user may lead a cascade
Telecommunications Standard Institute (ETSI) to offer
of departures. This is called the unraveling of a network.
agile and ubiquitous computation for mobile services in
To prevent unraveling, the k-core problem was first proposed
wireless MSNs [7], [8]. Compared to traditional mobile cloud
by Bhawalkar et al. [21] which aims to maximize the engaged
computing, MEC can provide a faster interactive response
users in a social network by selecting a fixed number of users,
by low-latency connections and offload computation tasks
whose presence is important to the stable of the networks.
of mobile devices to edge cloud for processing due to the
Bhawalkar put forward a polynomial-time algorithm based on
resources are placed at the edge of wireless MSNs in physical
bounded treewidth, but it only works on small-scale networks.
proximity to mobile users.
To address this issue, Zhang et al. [22] proposed the OLAK
Specifically, some studies use edge caching to solve the
strategy. The core of the algorithm is to find a set of candidate
problem of traffic offloading, the key issue is which content
anchor vertices and design an auxiliary structure L called onion
should be cached or replaced in the edge of the network. For
layers such that the search space can be significantly reduced.
instance, Yuan et al. [9] investigated the content precaching
Besides, some work also considers the geographical location
problem considering the D2D communications to provide
to measure the engagement of the user with similarity [23].
quick services for users. Wei et al. [10] proposed a similarity-
based edge caching strategy by exploiting the similarity of
popularity determined by the request history and the exist- III. S YSTEM M ODEL
ing ones. For energy-constrained caching, Vallero et al. [11] In the general social networks, most of the edges of
studied the edge caching optimization in energy-efficiency het- users are shown as the simple relation (e.g., sharing activi-
erogeneous radio access networks by considering a renewable ties) with undirected graph presentation. However, there are
energy generation system, energy batteries, and the power grid. many attributes that existed in real-world large-scale social
However, the attributes and relations are not fully discussed networks. For instance, geographic location information and
in the aforementioned studies. sharing activities can be regarded as the key personal tag
Other researchers study the task caching, resource alloca- in D2D networks, which is always used to model the prob-
tion, and task scheduling problems in MEC. Miao et al. [12] lems of group division, community detection, and influence
proposed an online strategy to learn the task patterns of mobile maximization.
devices and formulated the problem as a nonlinear integer pro-
gramming problem to minimize task latency. Chen et al. [13] A. D2D Knowledge Graph
developed a traffic-flow prediction algorithm to train the
Given a directed graph G = {VH , E, VT } as a D2D knowl-
mobile traffic data by using long short-term memory (LSTM)
edge graph (DKG), where V = VH ∪ VT is the users (or
with attention mechanism in single-site mode, and the exten-
entities), VH indicates the head user, and VT signifies the
sion control architecture is proposed to tackle the dynamical
tail user. Let E ⊆ VH × VT stand for the set of relations of
environment with communication and computing resources.
the user pairs, e.g., file type, sharing time, and geographical
Chen et al. [14] proposed a cloudlet-assisted strategy to mini-
information. Furthermore, the edge set E consists of two parts,
mize the energy consumption by compromising among cloud,
i.e., EL (explicit relations) or EP (implicit relations), having
cloudlet, and co-located clouds. Most of the related work does
E = EL + EP .
not consider the D2D communication, but the participation
of user behavior directly affects the dynamic changes of the
network environment. B. D2D Network Representation Learning
Besides, D2D communications for MSN content sharing are In order to learn the representation of DKG, we have the
attracting more and more research interests from academia. It following D2D network representation learning (D2D-NRL).
is widely used in video and voice communication, gaming, and Suppose a DKG G with n users and m entities, we have obser-
multimedia sharing between users [15]. Some studies also inte- vation with T + = {(h, t, k)}, where each triplet contains a head
grate D2D with edge computing to enhance the performance of user h ∈ VH , a tail user t ∈ VT , and a sharing relation k ∈ E.
D2D communications. Qin et al. [16] proposed an edge com- The D2D NRL process is to construct a learning procedure
puting and relaying scheme to strengthen the throughput of of the continuous vector representation of users and content
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
16914 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 23, DECEMBER 1, 2021
Kronecker product form of Rk ← ((A ⊗ A)T (A ⊗ A) + where f (eh , Wk , et ) = log(1 + exp(−Yhtk ϕ(h, t, k))), and
λI)−1 (A ⊗ A)vec(Xk ). g(eh , Wk , et ) = λ( eh 22 + Wk 2F + et 22 ).
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: ANCHORED USER SELECTION FOR TRAFFIC OFFLOADING OPTIMIZATION IN D2D-AIDED MEC 16915
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
16916 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 23, DECEMBER 1, 2021
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: ANCHORED USER SELECTION FOR TRAFFIC OFFLOADING OPTIMIZATION IN D2D-AIDED MEC 16917
Algorithm 4 P-OLAK(G, k, r, b)
Fig. 6. APP relations mapping from Google Play Store [1].
Require: the social network G, degree constraint k;
Ensure: the set of selected anchor vertices (S).
1: S = ∅; i = 0;
2: L ← Onion Computing(G, k, r) (Algorithm 1); VII. DATA P REPROCESSING
3: while i < b do
We experimented with a real large-scale offline user transfer
4: for each v in L do
5: Compute F(S ∪ v, G); data set from Xender. It is one of the world’s leading D2D
6: end for content sharing [25]. In the data set, the user behavior con-
7: v∗ ← best anchor users in iteration; tains nine columns (FileType, MD5, SenderID, ReceiverID,
8: S = S ∪ v∗ ; i = i + 1; TimeStamp, UserIP, Country, GPS, and FilesSize). We selected
9: end while
three of the most valuable items <APP name, sender,
10: return S
receiver> in the log on 01/08/2016 for the experimental
simulation.
TABLE I
S TATISTICS OF L ARGE G ROUPS
A. Labels of APP Relations and Metadata Conduct
Aiming to predict sharing activities of users and conduct
interest recommendations, we retrieved all APP names and
categories from Google Play as their labels, noting that each
APP only has a unique label. Then, the captured data table
<APP name and the label> properties for each row will
be matched with the experimental data table, and the APP
time complexity of the anchor’s selection is O(nm) in the name will be converted to the corrected label. For instance,
worst, n and m correspond to the size of candidates and the WhatsApp tagging is an example illustrated in Fig. 6. The
cost of neighbors computation. name of WhatsAPP is replaced by the mapped Communication
Relation label, which generates the metadata of our experiment
named Xender-Filtered.
VI. E XPERIMENTS In the experiment, the data set filtered by Xender consisted
A. Data Set Validation and Settings of 64 028 transmissions of 72 550 users with 48 relationship
labels associated with the APP type. Be noted that MPPT
The large-scale data set used is the traces of a realistic
specifically takes into account the geographic cosine sim-
mobile D2D sharing activities, named Xender. Users can trans-
ilarity [25], which is the 49th label we use. Specifically,
mit multimedia content via mobile D2D communication. In
we describe 48 tags for the APP, of which the top two are
order to improve the experimental efficiency, we preprocess
Communication and Tools shown in Fig. 7.
the raw data, including extracting useful data items and divid-
Since that there only exist positive triples in our data set,
ing users into D2D social groups. We define a D2D social
we generate a negative triplet [26] based on the locally closed
group as the user pairs who have conducted a content sharing
world hypothesis. Thus, we obtain the negative examples by
activity at least once, they will be gathered and appear only
randomly changing the sender or receiver. In the following
once in a group. In our experiments, we simulate a D2D social
experiment, negative sampling was used in the process of
group as a mobile D2D network covered by a BS.
positive example training.
The size of the preprocessed data set is about 96 GB with
seven data dimensions include the sender ID, receiver ID, GPS
record, timestamps, etc. We classify the total groups by their B. Clustering and Geographical Similarity
size and conduct the experiment on large groups, which have Different from online relationships, the content of offline
more than 20 nodes. Table I shows the statistics of large groups MSNs is restricted by geographical location and always fol-
with total of 7179 graphs. The maximum value of k can only lows the principle of homogeneity. Considering the diversity of
be 5 due to the sparse of the offline data set. geographical position in the real world, the actual movement
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
16918 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 23, DECEMBER 1, 2021
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
WANG et al.: ANCHORED USER SELECTION FOR TRAFFIC OFFLOADING OPTIMIZATION IN D2D-AIDED MEC 16919
Fig. 9. Comparison of adaptive algorithms. (a) k = 3 Total Followers. (b) k = 4 Total Followers. (c) k = 3 Avg Followers. (d) k = 4 Avg Followers.
VIII. C ONCLUSION
In order to deal with the mobile traffic explosion, mobile-
edge intelligence (MEI) is proposed as a promising method,
wherein D2D communication has been promoted to reduce
the traffic pressure and improve the computation capacity.
Fig. 10. Comparison of nonadaptive methods. (a) Total Followers. (b) Avg Moreover, considering the stability of the social network and
Followers. the rich information between users. We first propose MPPT,
a network represented model to map the multidimensional
relations as a probability in a third-order (3-D) tensor space.
Then, the similarity-based onion layers anchored (k, r)-core
(P-OLAK) algorithm is proposed to identify the anchor users
and solve the optimization problem of traffic offloading.
R EFERENCES
[1] Q. Zhang, X. Ren, Y. Cao, H. Zhang, X. Wang, and V. Leung,
“Content sharing prediction for device-to-device (D2D)-based offline
mobile social networks by network representation learning,” in Proc.
Asia–Pac. Web (APWeb) Web-Age Inf. Manage. (WAIM) Joint Int. Conf.
Web Big Data, 2020, pp. 112–126.
Fig. 11. Comparison of adaptive methods. [2] X. Wang, C. Wang, X. Li, V. C. M. Leung, and T. Taleb, “Federated
deep reinforcement learning for Internet of Things with decentralized
cooperative edge caching,” IEEE Internet Things J., vol. 7, no. 10,
pp. 9441–9455, Oct. 2020.
[3] Y. Hao, Y. Miao, L. Hu, M. S. Hossain, G. Muhammad, and S. U. Amin,
“Smart-edge-CoCaCo: AI-enabled smart edge with joint computation,
caching, and communication in heterogeneous IoT,” IEEE Netw., vol. 33,
no. 2, pp. 58–64, Mar./Apr. 2019.
[4] J. Chen, Z. Gong, W. Wang, and W. Liu, “HNS: Hierarchical nega-
tive sampling for network representation learning,” Inf. Sci., vol. 542,
pp. 343–356, Jan. 2021.
[5] A. Çelikkanat and F. D. Malliaros, “Topic-aware latent models for rep-
resentation learning on networks,” Pattern Recognit. Lett., vol. 144,
pp. 89–96, Apr. 2021.
[6] Z. Li, X. Wang, J. Li, and Q. Zhang, “Deep attributed network repre-
sentation learning of complex coupling and interaction,” Knowl. Based
Syst., vol. 212, 2021, Art. no. 106618.
Fig. 12. Comparison of running time. [7] Y. He, F. R. Yu, N. Zhao, and H. Yin, “Secure social networks in
5G systems with mobile edge computing, caching, and device-to-device
communications,” IEEE Wireless Commun., vol. 25, no. 3, pp. 103–109,
the Self-Adaptive method can identify a larger number of Jun. 2018.
followers, which means more data can be offloaded from the [8] C. Wang, C. Liang, F. R. Yu, Q. Chen, and L. Tang, “Computation
cellular network. Besides, although the optimum algorithm can offloading and resource allocation in wireless cellular networks with
mobile edge computing,” IEEE Trans. Wireless Commun., vol. 16, no. 8,
get a better result, it is computationally expensive. pp. 4924–4938, Aug. 2017.
Further, we run the three comparison methods 20 times and [9] P. Yuan, Y. Cai, Y. Liu, J. Zhang, Y. Wang, and X. Zhao, “ProRec:
computed the average running time. As shown in Fig. 12, A unified content caching and replacement framework for mobile edge
computing,” Wireless Netw., vol. 26, pp. 2929–2941, Jan. 2020.
the consuming time of the Self-Adaptive method is the low- [10] X. Wei, J. Liu, Y. Wang, C. Tang, and Y. Hu, “Wireless edge caching
est. Meanwhile, though the Optimum Method can maintain based on content similarity in dynamic environments,” J. Syst. Archit.,
the largest number of vertices of the graphs, we cannot vol. 115, May 2021, Art. no. 102000.
[11] G. Vallero, M. Deruyck, M. Meo, and W. Joseph, “Base station switching
afford the consuming time. This proves that the Self-Adaptive and edge caching optimisation in high energy-efficiency wireless access
method is the best method to solve the adaptive anchored network,” Comput. Netw., vol. 192, Jun. 2020, Art. no. 108100.
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.
16920 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 23, DECEMBER 1, 2021
[12] Y. Miao, Y. Hao, M. Chen, H. Gharavi, and K. Hwang, “Intelligent task Ruibin Li (Student Member, IEEE) received
caching in edge cloud via bandit learning,” IEEE Trans. Netw. Sci. Eng., the B.S. degree from the School of Computer
vol. 8, no. 1, pp. 625–637, Jan.–Mar. 2021. Science and Technology, College of Intelligence
[13] M. Chen, Y. Miao, H. Gharavi, L. Hu, and I. Humar, “Intelligent traffic and Computing, Tianjin University, Tianjin, China,
adaptive resource allocation for edge computing-based 5G networks,” in 2019, where he is currently pursuing the M.S.
IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 2, pp. 499–508, degree.
Jun. 2020. His current research interests include edge
[14] M. Chen, Y. Hao, C.-F. Lai, D. Wu, Y. Li, and K. Hwang, “Opportunistic caching, distributed federated learning optimization,
task scheduling over co-located clouds in mobile environment,” IEEE reinforcement learning, edge intelligence, and deep
Trans. Services Comput., vol. 11, no. 3, pp. 549–561, Jun. 2018. learning.
[15] C. Wang, R. Li, W. Li, C. Qiu, and X. Wang, “SimEdgeIntel: A
open-source simulation platform for resource management in edge
intelligence,” J. Syst. Archit., vol. 115, May 2021, Art. no. 102016.
[16] M. Qin, L. Chen, N. Zhao, Y. Chen, F. R. Yu, and G. Wei, “Computing
and relaying: Utilizing mobile edge computing for P2P communi-
cations,” IEEE Trans. Veh. Technol., vol. 69, no. 2, pp. 1582–1594,
Feb. 2020.
[17] W. Tang, X. Zhao, W. Rafique, L. Qi, W. Dou, and Q. Ni, “An offloading Zheng Di (Student Member, IEEE) received the
method using decentralized P2P-enabled mobile edge servers in edge B.S. degree in software engineering from Tianjin
computing,” J. Syst. Archit., vol. 94, pp. 1–13, Mar. 2019. Normal University, Tianjin, China, in 2018. She is
[18] R. Chitnis, F. V. Fomin, and P. A. Golovach, “Parameterized complex- currently pursuing the M.S. degree with the School
ity of the anchored k-core problem for directed graphs,” Inf. Comput., of Computer Science and Technology, College
vol. 247, pp. 11–22, Apr. 2016. of Intelligence and Computing, Tianjin University,
[19] R. H. Chitnis, F. V. Fomin, and P. A. Golovach, “Preventing unraveling Tianjin.
in social networks gets harder,” in Proc. 27th AAAI Conf. Artif. Intell., Her current research interests include edge com-
2013, p. 1. puting and computing power network.
[20] S. B. Seidman, “Network structure and minimum degree,” Soc. Netw.,
vol. 5, no. 3, pp. 269–287, 1983.
[21] K. Bhawalkar, J. Kleinberg, K. Lewi, T. Roughgarden, and A. Sharma,
“Preventing unraveling in social networks: The anchored k-core
problem,” SIAM J. Discrete Math., vol. 29, no. 3, pp. 1452–1475, 2015.
[22] F. Zhang, W. Zhang, Y. Zhang, L. Qin, and X. Lin, “OLAK: An effi-
cient algorithm to prevent unraveling in social networks,” Proc. VLDB
Endowment, vol. 10, no. 6, pp. 649–660, 2017.
[23] Q. Zhu, H. Hu, C. Xu, J. Xu, and W.-C. Lee, “Geo-social group queries Chao Qiu (Member, IEEE) received the B.S.
with minimum acquaintance constraints,” VLDB J., vol. 26, no. 5, degree in communication engineering from China
pp. 709–727, 2017. Agricultural University, Beijing, China, in 2013, and
[24] T. Trouillon, J. Welbl, S. Riedel, É. Gaussier, and G. Bouchard, the Ph.D. degree in information and communication
“Complex embeddings for simple link prediction,” in Proc. Int. Conf. engineering from the Beijing University of Posts and
Mach. Learn. (ICML), 2016, pp. 2071–2080. Telecommunications, Beijing, in 2019.
[25] X. Wang, Y. Zhang, V. C. M. Leung, N. Guizani, and T. Jiang, “D2D She is currently a Lecturer with the School
big data: Content deliveries over wireless device-to-device sharing in of Computer Science and Technology, College
large-scale mobile networks,” IEEE Wireless Commun., vol. 25, no. 1, of Intelligence and Computing, Tianjin University,
pp. 32–38, Feb. 2018. Tianjin, China. From September 2017 to September
[26] A. Bordes, N. Usunier, A. Garcia-Duran, J. Weston, and O. Yakhnenko, 2018, she visited Carleton University, Ottawa, ON,
“Translating embeddings for modeling multi-relational data,” in Canada, as a Visiting Scholar. Her current research interests include machine
Advances in Neural Information Processing Systems. Red Hook, NY, learning, software-defined networking, and blockchain.
USA: Curran, 2013, pp. 2787–2795.
[27] Z. Yuan, Y. Jiang, and G. Gidófalvi, “Geographical and temporal sim-
ilarity measurement in location-based social networks,” in Proc. 2nd
ACM SIGSPATIAL Int. Workshop Mobile Geograph. Inf. Syst., 2013,
pp. 30–34.
[28] Y. Zhang, Z. Huang, S. Wang, X. Wang, and T. Jiang, “Spark-based
measurement and analysis on offline mobile application market over
device-to-device sharing in mobile social networks,” in Proc. IEEE Xiaofei Wang (Senior Member, IEEE) received the
23rd Int. Conf. Parallel Distrib. Syst. (ICPADS), Shenzhen, China, 2017, master’s and Doctoral degrees from Seoul National
pp. 545–552. University, Seoul, South Korea, in 2006 and 2013,
respectively.
He is currently a Professor with the Tianjin
Key Laboratory of Advanced Networking, School
of Computer Science and Technology, Tianjin
Chenyang Wang (Student Member, IEEE) received University, Tianjin, China. He was a Postdoctoral
the B.S. and M.S. degrees in computer science Fellow with The University of British Columbia,
and technology from Henan Normal University, Vancouver, BC, Canada, from 2014 to 2016.
Xinxiang, China, in 2013 and 2017, respectively. Focusing on the research of social-aware cloud
He is currently pursuing the Ph.D. degree with computing, cooperative cell caching, and mobile traffic offloading, he has
the School of Computer Science and Technology, authored over 100 technical papers in the IEEE J OURNAL ON S ELECTED
College of Intelligence and Computing, Tianjin A REAS IN C OMMUNICATIONS, the IEEE T RANSACTIONS ON W IRELESS
University, Tianjin, China. C OMMUNICATIONS, the IEEE W IRELESS C OMMUNICATIONS, the IEEE
He has been a visiting Ph.D. student under the C OMMUNICATIONS, the IEEE T RANSACTIONS ON M ULTIMEDIA, the IEEE
support of China Scholarship Council with the INFOCOM, and the IEEE SECON.
School of Electrical Engineering, Aalto University, Prof. Wang was a recipient of the National Thousand Talents Plan (Youth)
Espoo, Finland, since May 15, 2021. His current research interests include of China. He received the Scholarship for Excellent Foreign Students in IT
edge computing, big data analytics, reinforcement learning, and deep learning. Field by NIPA of South Korea from 2008 to 2011, the Global Outstanding
Mr. Wang received the Best Student Paper Award of the 24th International Chinese Ph.D. Student Award by the Ministry of Education of China in 2012,
Conference on Parallel and Distributed Systems by IEEE Computer Society and the Peiyang Scholar from Tianjin University. In 2017, he received the
in 2018. Fred W. Ellersick Prize from the IEEE Communication Society.
Authorized licensed use limited to: CINVESTAV. Downloaded on September 01,2022 at 00:04:07 UTC from IEEE Xplore. Restrictions apply.