General Education Talks

  1. You and Your Research, 2015, 9th International Conference of IoT and Cloud Computing, WuXi, July 8th, 2015
  2. You and Your Research, 2014中国未来网络暑期研讨班, 中国未来网络产业创新联盟, Nanjing, 2014/07/14,
  3. You and Your Research, 高端系列学术讲座, Nanjing University of Information Science and Technology, 2014/06/13,
  4. You and Your Research, Department of Computer Science, University of Science and Technology, (UST, HeFei), March 13, 2014,
  5. You and Your Research, Department of Computer Science, HIT (Harbin), Jan 13, 2014,
  6. You and Your Research, Network research group, CS Department, Tsinghua University, Jan 8, 2014,
  7. You and Your Research, International Conference for Internet of Things, WuXi Research Center of Internet of Things, Dec 21, 2013,
  8. You and Your Research, Department of Computer Science, Tsinghua University, Dec 14, 2013,
  9. From student to researcher and more, WenZhou University, 2009/06/15,
  10. From student to researcher and more, ZheJiang Forest University, 2009/05/20,
  11. How To Do Good Research, HangZhou DianZi University, January 8, 2009,
  12. From student to researcher and more, Dalian University of Technology, June 26, 2008,
  13. From student to researcher and more, Microsoft Research Asia, 2007/10/26.

Conference Keynote Talks

  1. Keynote: Internet of Things: Sensor Networking, RFID, and Beyond. Second Anhui-Taiwan Internet of Things Conference, 2015, July 13.
  2. KEYNOTE: Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing,
    Annual Meeting of Internet Professional Committee of China Computer Society, 2014 China National Computer Congress, Zheng-Zhou October 24, 2014,
  3. KEYNOTE: Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing,
    13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, September 26, 2014,
  4. KEYNOTE: Large Scale Wireless Network Systems: Theory, Experience, and Lessons,
    the 3rd International Symposium on Networked Embedded System for Internet of Things (http://www.u-aizu.ac.jp/~sguo/nest2014/), Aizuwakamatsu, Japan on Sep. 23-25, 2014. The symposium is a part of MCSoC (http://www.mcsoc-forum.org/),
  5. KEYNOTE: Large Scale Wireless Network Systems: Experience, Lessons, and Theories, WuXi Research Center of Internet of Things, April 9th, 2014,
  6. Invited talk, Push the Limit of Wireless Network Capacity: A Tale of Cognitive and Coexistence, ACM MobiCom workshop CRAB, Oct 4, 2013,
  7. KEYNOTE for ACM China ShangHai Chapter, Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, ShangHai, China, December 21, 2012,
  8. KEYNOTE: Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, 2012 Advanced Symposium of IOT and Big Data, ChenDu, China, December 16, 2012,
  9. Keynote: Some Research Issues in Wireless Networking, Second China Wireless Sensor Networking Conference, and First China-Korea Wireless Sensor Networking Forum, Beijing, (China CCF Technical Committee on Sensor Network), July 10, 2008,
  10. KEYNOTE: Multicast Capacity for Large Scale Wireless Ad Hoc Networks Key-Note Address, First National Conference of China on Sensor Network (CWSN), August, 31, 2007, China, Harbin.

Tutorial Talks or Meeting Talks

  1. TUTORIAL: Participatory Wireless Networking, Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China); Xiang-Yang Li (Illinois Institute of Technology, USA), June 10, 2014, ICC 2014,
  2. PI-Meeting: EARS: Providing Predictable Service and Spectrum Access Realtime Decision in Cognitive Multihop Wireless Networks, PI meeting, Oct 6, 2013,
  3. TUTORIAL: Algorithm and Graph Issues in Wireless Networks, Tutorial, ACM MobiHoc, May 29th, 2005,

Colloquium Talks

  1. Computer Science and Economics, AliBaba, HangZhou, China, July 21, 2015.
  2. High Precision Real-Time Tracking with RFID Tags Using COTS Devices; Southeastern University, China, July 7th, 2015.
  3. Internet of Things: Sensor Networking, RFID, and Beyond. ChangZhou University, 2015, June 29.
  4. Internet of Things: Sensor Networking, RFID, and Beyond; Rutgers University, March 25, 2015.
  5. High Precision Real-Time Tracking with RFID Tags Using COTS Devices; HongKong Baptist University, March 13, 2015.
  6. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Zhejiang University of Technology, December 6, 2014
  7. Large Scale Wireless Network Systems: Experience, Lessons, and Theories; School of Software, Tsinghua University, BeiJing December 3, 2014.
  8. Large Scale Wireless Network Systems: Experience, Lessons, and Theories, for ACM Taiyuan Chapter, Taiyuan University of Technology, November 28, 2014.
  9. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, CS Department, UT Dallas, November 14, 2014,
  10. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, ECE Department, UIUC, October 30, 2014,
  11. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Rutgers, September 17, 2014,
  12. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, School of Computer Science, TuZhou College, June 26, 2014,
  13. Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Bejing Institute of Technology, June 20, 2014,
  14. Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of Computer Science, Nanjing University of Information Science and Technology, June 17, 2014,
  15. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of Computer Science, Northeastern University, China, April 14, 2014,
  16. Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of Computer Science, Nanjing University, March 19, 2014,
  17. Large Scale Wireless Network Systems: Experience, Lessons, and Theories, AnHui University, March 13, 2014,
  18. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Purdue Calumet, Nov 14, 2013,
  19. Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing. Bejing Institute of Technology, July 3, 2013, The Keynote Series for 21st Century Research Frontier,
  20. Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Dalian University of Technology, Dalian, May 17, 2013,
  21. Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Shanghai University of Electric Power, ShangHai, May 14, 2013,
  22. Smoothing the Energy Consumption: Peak Demand Reduction in Smart Grid, Shanghai University of Electric Power, ShangHai, May 14, 2013,
  23. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of CS, SIS Seminar, University of North Carolina at Charlotte, February 8, 2013,
  24. Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, Tsinghua National Lab on Information and Technology, 2012/12/22,
  25. Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, Xi’An JiaoTong University, 2012/12/17,
  26. Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, ShangHai JiaoTong University, 2012/12/7,
  27. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, University of Science and Technology, Anhui, China, Oct 30, 2012, talk news
  28. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of Computer Science, August 15th, 2012, Simon Fraser University,
  29. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of ECE, Clemson University, February 7, 2012,
  30. Large Scale Wireless Network Systems: Theory, Experience, and Lessons, CSE Department, University of Notre Dame, February 2, 2012,
  31. Efficient Spectrum Allocation and Auction for Wireless Networks, University of Iowa, March 30, 2009,
  32. Asymptotic Capacity of Large Scale Wireless Networks, University of Electronic Science and Technology of China (formerly Chengdu Institute of Radio Engineering), January 10, 2009,
  33. Multicast Capacity for Large Scale Wireless Ad Hoc Networks Computer Science Department, HKUST, HongKong, Oct. 29, 2007,
  34. How Much Is It Worth? Computer Science Department, NanJing University. China, Sept. 25, 2007,
  35. Well-Shaped Delaunay Mesh Generation, Invited talk, Computer Science Department, University of Illinois at Chicago, USA. September 26th, 2005,
  36. Wireless Ad hoc/Sensor Networks: Energy Efficiency and Cooperativeness, CS department, IIT, Sept 19th, 2005.
  37. Strategyproof Network Protocol Design, Invited talk at Computer Science Department, Kent State University, USA. Feb 18th, 2005,
  38. Price of Anarchy and Strategyproof Network Protocols, Invited talk at Mathematics Department, BeiJing University of Science of Technology, China. January 5th, 2005,
  39. Truthful Multicast in Selfish Wireless Ad Hoc Networks, Department of Computer Science, HongKong Baptist University, March, 2004,
  40. Strategyproof Routing in Selfish Wireless Networks, Invited talk at IIMAS-UNAM, Mexico. May 11th 2004,
  41. Wireless Ad Hoc Networks: a computational Geometric Approach, Invited talk at IIMAS-UNAM, Mexico. May 13th, 2004,
  42. Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department, HongKong City University, HongKong. Aug 10th, 2004,
  43. Strategyproof Network Protocol Design, Invited talk at Computer Science Department of NanJing University of Aeronautics and Astronautics (NUAA), China. Aug 25th, 2004,
  44. Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department, Wayne State University, USA. Sept 14th, 2004,
  45. Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department of TianJing University, China. December 20th, 2004,
  46. Application of Computational Geometry in Wireless Networks, Invited talk at Computer Science Department of TianJin University, China. December 27th, 2004,
  47. Communications in Selfish Wireless Ad Hoc Networks, Department of Computer Science, Tsinghua University, December, 2003,
  48. Communications in Selfish Wireless Ad Hoc Networks Department of Computer Science, TianJin University, December, 2003,
  49. Computational Geometry and Wireless Ad Hoc Networks, Department of Computer Science, TianJin University, December, 2003,
  50. Geometric and Game Theoretical Approaches for Wireless Networks Department of Computer Science, University of Illinois at Urbana-Champaign, October, 2003,
  51. Computational Geometry and Wireless Ad Hoc Networks Computer Science Department, Purdue University. Indiana, Nov. 15-16, 2001,