default search action
Wei Yu 0002
Person information
- affiliation: Towson University, Department of Computer & Information Sciences
- affiliation: Texas A&M University, College Station, Department of Computer Science
Other persons with the same name
- Wei Yu — disambiguation page
- Wei Yu 0001 — University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (and 1 more)
- Wei Yu 0003 — Microsoft Corporation, Redmond, USA (and 1 more)
- Wei Yu 0004 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Wei Yu 0005 — Citadel Investment Group, Chicago, USA (and 1 more)
- Wei Yu 0006 — Centers for Disease Control and Prevention, Atlanta, USA
- Wei Yu 0007 — Tsinghua University, National Laboratory for Information Science and Technology (and 2 more)
- Wei Yu 0008 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Wei Yu 0009 — Wuhan University, Computer School, China
- Wei Yu 0010 — Zhijiang University, Hangzhou, China
- Wei Yu 0011 — East China University of Science and Technology, Shanghai, China
- Wei Yu 0012 — Xiamen University, China
- Wei Yu 0013 — Earth Resources Technology, Inc., Laurel, MD, USA
- Wei Yu 0014 — Graz University of Technology, Austria
- Wei Yu 0015 — Nanjing Forestry University, College of Automobile and Transport Engineering, China
- Wei Yu 0016 — Tianjin University, School of Computer Science and Technology, China
- Wei Yu 0017 — Nantong University, School of Electronics and Information / Engineering Training Center, China
Other persons with a similar name
- Yu-Wei Chao
- Wei-Yu Chen
- Yu-Wei Chen
- Wei-Yu Chiu
- Yuwei Liu (aka: Yu-Wei Liu) — disambiguation page
- Chen-Yu Wei
- Hung-Yu Wei
- Yu Wei — disambiguation page
- Wei T. Yue (aka: Wei Thoo Yue, Wei Yue 0002) — City University of Hong Kong, Department of Information Systems, Hong Kong (and 2 more)
- Yuwei Zhang (aka: Yu-Wei Zhang) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j131]Mohammed Alzahrani, Qianlong Wang, Weixian Liao, Xuhui Chen, Wei Yu:
Survey on Multi-Task Learning in Smart Transportation. IEEE Access 12: 17023-17044 (2024) - [j130]Mian Qian, Cheng Qian, Guobin Xu, Pu Tian, Wei Yu:
Smart Irrigation Systems from Cyber-Physical Perspective: State of Art and Future Directions. Future Internet 16(7): 234 (2024) - [j129]Hengshuo Liang, Cheng Qian, Wei Yu, David W. Griffith, Nada Golmie:
Assessing deep learning performance in power demand forecasting for smart grid. Int. J. Sens. Networks 44(1): 36-48 (2024) - [j128]Hengshuo Liang, Wei Yu, Cheng Qian, Yifan Guo, David W. Griffith, Nada Golmie:
Deep learning-based power quality disturbance detection and classification in smart grid. Int. J. Sens. Networks 46(3): 161-175 (2024) - [j127]Qianlong Wang, Weixian Liao, Yifan Guo, Michael P. McGuire, Wei Yu:
Blockchain-Empowered Federated Learning Through Model and Feature Calibration. IEEE Internet Things J. 11(4): 5770-5780 (2024) - [j126]Papa Pene, Weixian Liao, Wei Yu:
Incentive Design for Heterogeneous Client Selection: A Robust Federated Learning Approach. IEEE Internet Things J. 11(4): 5939-5950 (2024) - [j125]Saier Alharbi, Yifan Guo, Wei Yu:
Collusive Backdoor Attacks in Federated Learning Frameworks for IoT Systems. IEEE Internet Things J. 11(11): 19694-19707 (2024) - [j124]Qinglin Liu, Xiaoqian Lv, Wei Yu, Changyong Guo, Shengping Zhang:
Dual-context aggregation for universal image matting. Multim. Tools Appl. 83(17): 53119-53137 (2024) - [j123]Mingxiu Li, Wei Yu, Qinglin Liu, Zonglin Li, Ru Li, Bineng Zhong, Shengping Zhang:
Hybrid Transformers With Attention-Guided Spatial Embeddings for Makeup Transfer and Removal. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2876-2890 (2024) - [c171]Xing Liu, Wei Yu, Cheng Qian, David W. Griffith, Nada Golmie:
Deep Reinforcement Learning for Channel State Information Prediction in Internet of Vehicles. CCNC 2024: 388-391 - [c170]Cheng Qian, Mian Qian, Kun Hua, Hengshuo Liang, Guobin Xu, Wei Yu:
Digital Twin based Internet of Vehicles. ICCCN 2024: 1-6 - [c169]Xupeng Wang, Zhuo Xiang, Weiling Chen, Chuan-Ming Liu, Xiaoyu Tian, Cheng Zhao, Shumin Fan, Wei Yu, Xunyi Chen, Tianfu Wang, Bei Xia, Baiying Lei:
Key Point Guide Network for Infant Echocardiographic Segmentation. ISBI 2024: 1-4 - 2023
- [j122]Ayodeji Falayi, Qianlong Wang, Weixian Liao, Wei Yu:
Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology. Future Internet 15(5): 178 (2023) - [j121]Abubakar Ahmad Musa, Adamu Hussaini, Weixian Liao, Fan Liang, Wei Yu:
Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey. Future Internet 15(6): 199 (2023) - [j120]Abubakar Ahmad Musa, Adamu Hussaini, Cheng Qian, Yifan Guo, Wei Yu:
Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions. Future Internet 15(12): 380 (2023) - [j119]Zheyi Chen, Pu Tian, Weixian Liao, Xuhui Chen, Guobin Xu, Wei Yu:
Resource-Aware Knowledge Distillation for Federated Learning. IEEE Trans. Emerg. Top. Comput. 11(3): 706-719 (2023) - [j118]Xing Liu, Cheng Qian, Wei Yu, David W. Griffith, Avi M. Gopstein, Nada Golmie:
Using Deep Reinforcement Learning to Automate Network Configurations for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(12): 15948-15958 (2023) - [c168]Usman Shuaibu Musa, Yifan Guo, Cheng Qian, Wei Yu:
Optimal sampling for Moving Object Trajectory Tracking in Smart Transportation Systems: A Transformer-based Approach. IEEE Big Data 2023: 1230-1235 - [c167]William Duckworth, Weixian Liao, Wei Yu:
Deblurring as a Defense against Adversarial Attacks. CloudNet 2023: 61-67 - [c166]Fan Liang, Xing Liu, Nuri Alperen Kose, Kubra Gundogan, Wei Yu:
Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation Systems. ICCCN 2023: 1-9 - [c165]James H. Nguyen, Weixian Liao, Wei Yu:
Towards Secure Communications in Heterogeneous Internet of Things. ICNC 2023: 426-430 - [c164]Jianchao Song, Cheng Qian, Yifan Guo, Kun Hua, Wei Yu:
Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT Systems. INFOCOM Workshops 2023: 1-6 - [c163]Hengshuo Liang, Cheng Qian, Chao Lu, Lauren Burgess, John Mulo, Wei Yu:
Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems. SERA 2023: 122-127 - [c162]Adamu Hussaini, Cheng Qian, Yifan Guo, Chao Lu, Wei Yu:
Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis. SERA 2023: 132-137 - [c161]John Mulo, Pu Tian, Adamu Hussaini, Hengshuo Liang, Wei Yu:
Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems. SERA 2023: 138-143 - [c160]Turhan Kimbrough, Pu Tian, Weixian Liao, Wei Yu:
Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images. SERA 2023: 335-340 - 2022
- [j117]Cheng Qian, Xing Liu, Colin Ripley, Mian Qian, Fan Liang, Wei Yu:
Digital Twin - Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. Future Internet 14(2): 64 (2022) - [j116]Zheyi Chen, Weixian Liao, Pu Tian, Qianlong Wang, Wei Yu:
A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices. Future Internet 14(5): 138 (2022) - [j115]Fan Liang, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
Toward Deep Q-Network-Based Resource Allocation in Industrial Internet of Things. IEEE Internet Things J. 9(12): 9138-9150 (2022) - [j114]William Grant Hatcher, Cheng Qian, Fan Liang, Weixian Liao, Erik Philip Blasch, Wei Yu:
Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction. IEEE Internet Things J. 9(18): 16807-16823 (2022) - [j113]Cheng Qian, Wei Yu, Chao Lu, David W. Griffith, Nada Golmie:
Toward Generative Adversarial Networks for the Industrial Internet of Things. IEEE Internet Things J. 9(19): 19147-19159 (2022) - [j112]Pu Tian, Weixian Liao, Wei Yu, Erik Blasch:
WSCC: A Weight-Similarity-Based Client Clustering Approach for Non-IID Federated Learning. IEEE Internet Things J. 9(20): 20243-20256 (2022) - [j111]Cheng Zhao, Weiling Chen, Jing Qin, Peng Yang, Zhuo Xiang, Alejandro F. Frangi, Minsi Chen, Shumin Fan, Wei Yu, Xunyi Chen, Bei Xia, Tianfu Wang, Baiying Lei:
IFT-Net: Interactive Fusion Transformer Network for Quantitative Analysis of Pediatric Echocardiography. Medical Image Anal. 82: 102648 (2022) - [j110]Dou An, Qingyu Yang, Donghe Li, Wei Yu, Wei Zhao, Chao-Bo Yan:
Where Am I Parking: Incentive Online Parking-Space Sharing Mechanism With Privacy Protection. IEEE Trans Autom. Sci. Eng. 19(1): 143-162 (2022) - [j109]Qingyu Yang, Donghe Li, Dou An, Wei Yu, Xinwen Fu, Xinyu Yang, Wei Zhao:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. IEEE Trans. Dependable Secur. Comput. 19(1): 131-148 (2022) - [j108]Jingyi Zheng, Mingli Liang, Sujata Sinha, Linqiang Ge, Wei Yu, Arne D. Ekstrom, Fushing Hsieh:
Time-Frequency Analysis of Scalp EEG With Hilbert-Huang Transform and Deep Learning. IEEE J. Biomed. Health Informatics 26(4): 1549-1559 (2022) - [j107]Teng Wang, Xinyu Yang, Xuebin Ren, Wei Yu, Shusen Yang:
Locally Private High-Dimensional Crowdsourced Data Release Based on Copula Functions. IEEE Trans. Serv. Comput. 15(2): 778-792 (2022) - [j106]Peng Zhao, Wei Yu, Xinyu Yang, Duolun Meng, Li Wang, Shusen Yang, Jie Lin:
Context-Aware Multi-Criteria Handover at the Software Defined Network Edge for Service Differentiation in Next Generation Wireless Networks. IEEE Trans. Serv. Comput. 15(4): 2032-2046 (2022) - [c159]Xing Liu, Wei Yu, Cheng Qian, David W. Griffith, Nada Golmie:
Integrated Simulation Platform for Internet of Vehicles. ICC 2022: 2756-2761 - [c158]Turhan Kimbrough, Pu Tian, Weixian Liao, Erik Blasch, Wei Yu:
Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous Datasets. INFOCOM Workshops 2022: 1-6 - [c157]Jianchao Song, Cheng Qian, Xing Liu, Hengshuo Liang, Chao Lu, Wei Yu:
Performance Assessment of Deep Neural Network on Activity Recognition in WiFi Sensing. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 510-517 - [c156]Adamu Hussaini, Cheng Qian, Weixian Liao, Wei Yu:
A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 597-604 - [c155]Pu Tian, Turhan Kimbrough, Weixian Liao, Erik Blasch, Wei Yu:
Transformations as Denoising: A Robust Approach to Weaken Adversarial Facial Images. NAS 2022: 1-8 - [c154]Honghe Zhou, Lin Deng, Weifeng Xu, Wei Yu, Josh Dehlinger, Suranjan Chakraborty:
Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems. SERA 2022: 91-98 - 2021
- [j105]William Grant Hatcher, Cheng Qian, Weichao Gao, Fan Liang, Kun Hua, Wei Yu:
Towards Efficient and Intelligent Internet of Things Search Engine. IEEE Access 9: 15778-15795 (2021) - [j104]Xing Liu, Wei Yu, Fan Liang, David W. Griffith, Nada Golmie:
On deep reinforcement learning security for Industrial Internet of Things. Comput. Commun. 168: 20-32 (2021) - [j103]Pu Tian, Zheyi Chen, Wei Yu, Weixian Liao:
Towards asynchronous federated learning based threat detection: A DC-Adam approach. Comput. Secur. 108: 102344 (2021) - [j102]Zheyi Chen, Weixian Liao, Kun Hua, Chao Lu, Wei Yu:
Towards asynchronous federated learning for heterogeneous edge-powered internet of things. Digit. Commun. Networks 7(3): 317-326 (2021) - [j101]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data. IEEE Internet Things J. 8(4): 2775-2791 (2021) - [j100]Wei Yu, Wei Zhao, Anke Schmeink, Houbing Song, Guido Dartmann:
Guest Editorial: Special Issue on AI-Enabled Internet of Dependable and Controllable Things. IEEE Internet Things J. 8(5): 3053-3056 (2021) - [j99]Hansong Xu, Xing Liu, William Grant Hatcher, Guobin Xu, Weixian Liao, Wei Yu:
Priority-Aware Reinforcement-Learning-Based Integrated Design of Networking and Control for Industrial Internet of Things. IEEE Internet Things J. 8(6): 4668-4680 (2021) - [j98]Fan Liang, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
Toward Computing Resource Reservation Scheduling in Industrial Internet of Things. IEEE Internet Things J. 8(10): 8210-8222 (2021) - [j97]Xing Liu, Wei Yu, Fan Liang, David W. Griffith, Nada Golmie:
Toward Deep Transfer Learning in Industrial Internet of Things. IEEE Internet Things J. 8(15): 12163-12175 (2021) - [j96]Fei Chen, Donghong Wang, Qiuzhen Lin, Jianyong Chen, Zhong Ming, Wei Yu, Jing Qin:
Towards Dynamic Verifiable Pattern Matching. IEEE Trans. Big Data 7(2): 421-435 (2021) - [j95]Xinyu Yang, Teng Wang, Xuebin Ren, Wei Yu:
Survey on Improving Data Utility in Differentially Private Sequential Data Publishing. IEEE Trans. Big Data 7(4): 729-749 (2021) - [j94]Zheyi Chen, Pu Tian, Weixian Liao, Wei Yu:
Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning. IEEE Trans. Netw. Sci. Eng. 8(2): 1070-1083 (2021) - [c153]Pu Tian, William Grant Hatcher, Weixian Liao, Wei Yu, Erik Blasch:
FALIoTSE: Towards Federated Adversarial Learning for IoT Search Engine Resiliency. DASC/PiCom/CBDCom/CyberSciTech 2021: 290-297 - [c152]Weichao Gao, Cheng Qian, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Towards Scalability of the IoT Search Engine. DASC/PiCom/CBDCom/CyberSciTech 2021: 521-528 - [c151]Cheng Qian, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
Towards Online Continuous Reinforcement Learning on Industrial Internet of Things. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 280-287 - [c150]Jin Zhang, Fan Liang, Wei Yu, David W. Griffith, Wenqi Guo, Avi M. Gopstein:
Towards An Adaptive Time-Triggered Protocol in Wireless Networks. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 614-621 - 2020
- [j93]Hengshuo Liang, Weichao Gao, James H. Nguyen, Mont F. Orpilla, Wei Yu:
Internet of Things Data Collection Using Unmanned Aerial Vehicles in Infrastructure Free Environments. IEEE Access 8: 3932-3944 (2020) - [j92]James H. Nguyen, Wei Yu:
Towards to Inter-domain Network Operations for Dynamic Networks with Software Defined Networking (SDN). EAI Endorsed Trans. Wirel. Spectr. 4(13): e1 (2020) - [j91]Jin Zhang, Yalong Wu, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku:
On Performance Improvement of Centroid Topology Optimization Schemes in LTE Networks. EAI Endorsed Trans. Wirel. Spectr. 4(13): e3 (2020) - [j90]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Wei Zhao:
LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging. Future Gener. Comput. Syst. 107: 394-407 (2020) - [j89]Fan Liang, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
Toward Edge-Based Deep Learning in Industrial Internet of Things. IEEE Internet Things J. 7(5): 4329-4341 (2020) - [j88]Hansong Xu, Xing Liu, Wei Yu, David W. Griffith, Nada Golmie:
Reinforcement Learning-Based Control and Networking Co-Design for Industrial Internet of Things. IEEE J. Sel. Areas Commun. 38(5): 885-898 (2020) - [j87]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Yang Zhang, Wei Zhao:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. IEEE Trans. Inf. Forensics Secur. 15: 971-986 (2020) - [j86]Yalong Wu, Wei Yu, David W. Griffith, Nada Golmie:
Modeling and Performance Assessment of Dynamic Rate Adaptation for M2M Communications. IEEE Trans. Netw. Sci. Eng. 7(1): 285-303 (2020) - [j85]Weichao Gao, Wei Yu, Fan Liang, William Grant Hatcher, Chao Lu:
Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption. IEEE Trans. Netw. Sci. Eng. 7(2): 776-791 (2020) - [j84]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. ACM Trans. Internet Techn. 20(4): 38:1-38:24 (2020) - [j83]Jie Lin, Wei Yu, Xinyu Yang, Peng Zhao, Hanlin Zhang, Wei Zhao:
An Edge Computing Based Public Vehicle System for Smart Transportation. IEEE Trans. Veh. Technol. 69(11): 12635-12651 (2020) - [c149]Hansong Xu, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
On Data Integrity Attacks against Industrial Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2020: 21-28 - [c148]Cheng Qian, Weichao Gao, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Search Engine for Heterogeneous Internet of Things Systems and Optimization. DASC/PiCom/CBDCom/CyberSciTech 2020: 475-482 - [c147]Yalong Wu, Wei Yu, Yunwei Cui, Chao Lu:
Data Integrity Attacks against Traffic Modeling and Forecasting in M2M Communications. ICC 2020: 1-6 - [i3]Xuebin Ren, Chia-Mu Yu, Wei Yu, Xinyu Yang, Jun Zhao, Shusen Yang:
DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data. CoRR abs/2009.14125 (2020)
2010 – 2019
- 2019
- [j82]Xing Liu, Cheng Qian, William G. Hatcher, Hansong Xu, Weixian Liao, Wei Yu:
Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities. IEEE Access 7: 79523-79544 (2019) - [j81]Fan Liang, Cheng Qian, William Grant Hatcher, Wei Yu:
Search Engine for the Internet of Things: Lessons From Web Search, Vision, and Opportunities. IEEE Access 7: 104673-104691 (2019) - [j80]Fan Liang, William Grant Hatcher, Weixian Liao, Weichao Gao, Wei Yu:
Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly. IEEE Access 7: 158126-158147 (2019) - [j79]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Towards Deep Learning-Based Approach for Detecting Android Malware. Int. J. Softw. Innov. 7(4): 1-24 (2019) - [j78]Peng Zhao, Xinyu Yang, Jie Lin, Shusen Yang, Wei Yu:
Energy-Efficient Analytics for Geographically Distributed Big Data. IEEE Internet Comput. 23(3): 18-29 (2019) - [j77]Yang Zhang, Qingyu Yang, Wei Yu, Dou An, Donghe Li, Wei Zhao:
An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging. IEEE Internet Things J. 6(2): 2907-2921 (2019) - [j76]Donghe Li, Qingyu Yang, Dou An, Wei Yu, Xinyu Yang, Xinwen Fu:
On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids. IEEE Internet Things J. 6(4): 5902-5915 (2019) - [c146]Jin Zhang, Wei Yu, Chao Lu:
Performance Assessment of LTE/LTE-A Based Wireless Networks for Internet-of-Things. ICIS 2019: 18-23 - [c145]Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu:
I Know What You Enter on Gear VR. CNS 2019: 241-249 - [c144]Peng Zhao, Dekui Quan, Wei Yu, Xinyu Yang, Xinwen Fu:
Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems. ICCCN 2019: 1-9 - [c143]Fan Liang, William Grant Hatcher, Guobin Xu, James H. Nguyen, Weixian Liao, Wei Yu:
Towards Online Deep Learning-Based Energy Forecasting. ICCCN 2019: 1-9 - [c142]Amirshahram Hematian, Wei Yu, David W. Griffith, Nada Golmie:
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed. ICNC 2019: 408-412 - [c141]Josh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu, Erik Blasch, Chao Lu:
Towards Multimodal Learning for Android Malware Detection. ICNC 2019: 432-436 - [c140]James H. Nguyen, Yalong Wu, Jin Zhang, Wei Yu, Chao Lu:
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things. ICNC 2019: 642-646 - [c139]Jarrett Booz, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie:
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis. ICNC 2019: 697-701 - [c138]Yalong Wu, Yunwei Cui, Wei Yu, Chao Lu, Wei Zhao:
Modeling and Forecasting of Timescale Network Traffic Dynamics in M2M Communications. ICDCS 2019: 711-721 - [c137]Xing Liu, Hansong Xu, Weixian Liao, Wei Yu:
Reinforcement Learning for Cyber-Physical Systems. ICII 2019: 318-327 - [c136]Xuebin Ren, Shuyang Wang, Xianghua Yao, Chia-Mu Yu, Wei Yu, Xinyu Yang:
Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee. WASA 2019: 272-284 - 2018
- [j75]Wei Yu, Fan Liang, Xiaofei He, William G. Hatcher, Chao Lu, Jie Lin, Xinyu Yang:
A Survey on the Edge Computing for the Internet of Things. IEEE Access 6: 6900-6919 (2018) - [j74]Fan Liang, Wei Yu, Dou An, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Survey on Big Data Market: Pricing, Trading and Protection. IEEE Access 6: 15132-15154 (2018) - [j73]William G. Hatcher, Wei Yu:
A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends. IEEE Access 6: 24411-24432 (2018) - [j72]Wei Yu, Hansong Xu, James H. Nguyen, Erik Blasch, Amirshahram Hematian, Weichao Gao:
Survey of Public Safety Communications: User-Side and Network-Side Solutions and Future Directions. IEEE Access 6: 70397-70425 (2018) - [j71]Hansong Xu, Wei Yu, David W. Griffith, Nada Golmie:
A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective. IEEE Access 6: 78238-78259 (2018) - [j70]Zhijiang Chen, Sixiao Wei, Wei Yu, James H. Nguyen, William G. Hatcher:
A cloud/edge computing streaming system for network traffic monitoring and threat detection. Int. J. Secur. Networks 13(3): 169-186 (2018) - [j69]Zheng Liu, Xinyu Yang, Wei Yu:
On reliable data delivery in stochastic energy harvesting wireless sensor networks. Int. J. Sens. Networks 26(2): 101-114 (2018) - [j68]Peng Zhao, Wei Yu, Xinyu Yang, Duolun Meng, Li Wang:
Buffer Data-Driven Adaptation of Mobile Video Streaming Over Heterogeneous Wireless Networks. IEEE Internet Things J. 5(5): 3430-3441 (2018) - [j67]Xiaofei He, Xinyu Yang, Wei Yu, Jie Lin, Qingyu Yang:
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. Sensors 18(2): 674 (2018) - [j66]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
User Differentiated Verifiable File Search on the Cloud. IEEE Trans. Serv. Comput. 11(6): 948-961 (2018) - [j65]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding. IEEE Trans. Syst. Man Cybern. Syst. 48(7): 1177-1190 (2018) - [j64]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Linqiang Ge:
Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense. IEEE Trans. Veh. Technol. 67(9): 8738-8753 (2018) - [j63]Jaime Lloret, Syed Hassan Ahmed, Danda B. Rawat, Waleed Ejaz, Wei Yu:
Editorial on Wireless Networking Technologies for Smart Cities. Wirel. Commun. Mob. Comput. 2018: 1865908:1-1865908:3 (2018) - [j62]Mali Cai, Hui Liu, Wei Yu:
From Act to Utterance: A Research on Linguistic Act Convergence. Wirel. Pers. Commun. 102(2): 1853-1865 (2018) - [c135]Qinggang Yue, Zupei Li, Chao Gao, Wei Yu, Xinwen Fu, Wei Zhao:
The Peeping Eye in the Sky. GLOBECOM 2018: 1-7 - [c134]Peng Zhao, Xinyu Yang, Wei Yu, Jie Lin, Duolun Meng:
Context-Aware Multi-Criteria Handover with Fuzzy Inference in Software Defined 5G HetNets. ICC 2018: 1-6 - [c133]Joshua Kraunelis, Xinwen Fu, Wei Yu, Wei Zhao:
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic. ICC 2018: 1-6 - [c132]Yalong Wu, Wei Yu, David W. Griffith, Nada Golmie:
A Dynamic Rate Adaptation Scheme for M2M Communications. ICC 2018: 1-6 - [c131]Weichao Gao, William G. Hatcher, Wei Yu:
A Survey of Blockchain: Techniques, Applications, and Challenges. ICCCN 2018: 1-11 - [c130]Xiaofei He, Wei Yu, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu, Xinwen Fu:
Towards 3D Deployment of UAV Base Stations in Uneven Terrain. ICCCN 2018: 1-9 - [c129]James H. Nguyen, Wei Yu, Daniel T. Ku:
Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM). ICNC 2018: 361-366 - [c128]Fan Liang, James H. Nguyen, Weichao Gao, William G. Hatcher, Wei Yu:
Towards UAV Assisted Multi-Path Data Streaming in Mobile Ad-Hoc Networks. ICNC 2018: 599-603 - [c127]Wei Yu, Hanlin Zhang, Yalong Wu, David W. Griffith, Nada Golmie:
A Framework to Enable Multiple Coexisting Internet of Things Applications. ICNC 2018: 637-641 - [c126]Hansong Xu, Wei Yu, Amirshahram Hematian, David W. Griffith, Nada Golmie:
Performance Evaluation of Energy Efficiency with Sleep Mode in Ultra Dense Networks. ICNC 2018: 747-751 - [c125]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinwen Fu:
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee. IPCCC 2018: 1-8 - [c124]Yalong Wu, Wei Yu, Jin Zhang, David W. Griffith, Nada Golmie, Chao Lu:
A 3D Topology Optimization Scheme for M2M Communications. SNPD 2018: 15-20 - [c123]James H. Nguyen, Wei Yu:
An SDN-Based Approach to Support Dynamic Operations of Multi-Domain Heterogeneous MANETs. SNPD 2018: 21-26 - [c122]Jarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu, James H. Nguyen, Chao Lu:
Tuning Deep Learning Performance for Android Malware Detection. SNPD 2018: 140-145 - [c121]Jingyi Zheng, Mingli Liang, Arne D. Ekstrom, Linqiang Ge, Wei Yu, Fushing Hsieh:
On Association Study of Scalp EEG Data Channels Under Different Circumstances. WASA 2018: 683-695 - 2017
- [j61]Peng Zhao, Wei Yu, Shusen Yang, Xinyu Yang, Jie Lin:
On Minimizing Energy Cost in Internet-Scale Systems With Dynamic Data. IEEE Access 5: 20068-20082 (2017) - [j60]Yalong Wu, Wei Yu, Fang Yuan, Jin Zhang, Chao Lu, James H. Nguyen, Daniel T. Ku:
A Cross-Domain Optimization Scheme for MANET Communications in Heterogeneous Networks. EAI Endorsed Trans. Wirel. Spectr. 3(12): e3 (2017) - [j59]Xinyu Yang, Peng Zhao, Xialei Zhang, Jie Lin, Wei Yu:
Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid. IEEE Internet Things J. 4(1): 147-161 (2017) - [j58]Guobin Xu, Wei Yu, David W. Griffith, Nada Golmie, Paul Moulema:
Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid. IEEE Internet Things J. 4(1): 192-204 (2017) - [j57]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao:
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 4(5): 1125-1142 (2017) - [j56]Weichao Gao, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku, William G. Hatcher:
Toward Emulation-Based Performance Assessment of Constrained Application Protocol in Dynamic Networks. IEEE Internet Things J. 4(5): 1597-1610 (2017) - [j55]Qingyu Yang, Dongheng Li, Wei Yu, Yuanke Liu, Dou An, Xinyu Yang, Jie Lin:
Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid. IEEE Internet Things J. 4(5): 1726-1738 (2017) - [j54]Wei Yu, Xinwen Fu, Houbing Song, Anastasios A. Economides, Minho Jo, Wei Zhao:
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems. IEEE Internet Things J. 4(6): 1798-1801 (2017) - [j53]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids. IEEE Internet Things J. 4(6): 2260-2274 (2017) - [j52]Kai Dong, Wenjia Wu, Haibo Ye, Ming Yang, Zhen Ling, Wei Yu:
Canoe: An Autonomous Infrastructure-Free Indoor Navigation System. Sensors 17(5): 996 (2017) - [j51]Qingyu Yang, Dou An, Rui Min, Wei Yu, Xinyu Yang, Wei Zhao:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. IEEE Trans. Inf. Forensics Secur. 12(7): 1735-1750 (2017) - [j50]Xialei Zhang, Xinyu Yang, Jie Lin, Guobin Xu, Wei Yu:
On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems. IEEE Trans. Parallel Distributed Syst. 28(1): 170-187 (2017) - [j49]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 66(3): 2551-2566 (2017) - [j48]Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c120]Sriharsha Mallapuram, Nnatubemugo Ngwum, Fang Yuan, Chao Lu, Wei Yu:
Smart city: The state of the art, datasets, and evaluation platforms. ICIS 2017: 447-452 - [c119]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang:
Towards double auction for assisting electric vehicles demand response in smart grid. CASE 2017: 1604-1609 - [c118]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Linqiang Ge:
On data integrity attacks against route guidance in transportation-based cyber-physical systems. CCNC 2017: 313-318 - [c117]Cong Zhao, Xinyu Yang, Wei Yu, Xianghua Yao, Jie Lin, Xin Li:
Cheating-resilient incentive scheme for mobile crowdsensing systems. CCNC 2017: 377-382 - [c116]Qingyu Yang, Yuanke Liu, Wei Yu, Dou An, Xinyu Yang, Jie Lin:
On data integrity attacks against optimal power flow in power grid systems. CCNC 2017: 1008-1009 - [c115]Xinyu Yang, Teng Wang, Xuebin Ren, Wei Yu:
Copula-Based Multi-Dimensional Crowdsourced Data Synthesis and Release with Local Privacy. GLOBECOM 2017: 1-6 - [c114]Zupei Li, Qinggang Yue, Chuta Sano, Wei Yu, Xinwen Fu:
3D vision attack against authentication. ICC 2017: 1-6 - [c113]Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks. ICCCN 2017: 1-9 - [c112]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Yang Zhang, Wei Zhao:
Towards truthful auction for big data trading. IPCCC 2017: 1-7 - [c111]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang, Wei Zhao:
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. IPCCC 2017: 1-8 - [c110]Sriharsha Mallapuram, Wei Yu, Paul Moulema, David W. Griffith, Nada Golmie, Fan Liang:
An Integrated Simulation Study on Reliable and Effective Distributed Energy Resources in Smart Grid. RACS 2017: 140-145 - [c109]Amirshahram Hematian, James H. Nguyen, Chao Lu, Wei Yu, Daniel T. Ku:
Software Defined Radio Testbed Setup and Experimentation. RACS 2017: 172-177 - [c108]Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. WASA 2017: 716-728 - [c107]Xinyu Yang, Cong Zhao, Wei Yu, Xianghua Yao, Xinwen Fu:
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems. WASA 2017: 755-767 - [c106]James H. Nguyen, Yalong Wu, Weichao Gao, Wei Yu, Chao Lu, Daniel T. Ku:
On Optimal Relay Nodes Position and Selection for Multi-Path Data Streaming. WCNC 2017: 1-6 - [i2]Cong Zhao, Xinyu Yang, Wei Yu, Xianghua Yao, Jie Lin, Xin Li:
Cheating-Resilient Incentive Scheme for Mobile Crowdsensing Systems. CoRR abs/1701.01928 (2017) - [i1]Peng Zhao, Shusen Yang, Xinyu Yang, Wei Yu, Jie Lin:
Energy-efficient Analytics for Geographically Distributed Big Data. CoRR abs/1708.03184 (2017) - 2016
- [j47]Zhijiang Chen, Guobin Xu, Vivek Mahalingam, Linqiang Ge, James H. Nguyen, Wei Yu, Chao Lu:
A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures. Big Data Res. 3: 10-23 (2016) - [j46]Donghai Zhu, Xinyu Yang, Peng Zhao, Wei Yu:
Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks. EAI Endorsed Trans. Wirel. Spectr. 2(7): e2 (2016) - [j45]Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
Disjoint multi mobile agent itinerary planning for big data analytics. EURASIP J. Wirel. Commun. Netw. 2016: 99 (2016) - [j44]Zheng Liu, Xinyu Yang, Peng Zhao, Wei Yu:
On energy-balanced backpressure routing mechanisms for stochastic energy harvesting wireless sensor networks. Int. J. Distributed Sens. Networks 12(8) (2016) - [j43]Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. Int. J. Secur. Networks 11(1/2): 66-81 (2016) - [j42]Qingyu Yang, Liguo Chang, Wei Yu:
On false data injection attacks against Kalman filtering in power system dynamic state estimation. Secur. Commun. Networks 9(9): 833-849 (2016) - [j41]Qingyu Yang, Dou An, Wei Yu, Zhengan Tan, Xinyu Yang:
Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid. Sensors 16(6): 907 (2016) - [j40]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, Xinwen Fu:
Password Extraction via Reconstructed Wireless Mouse Trajectory. IEEE Trans. Dependable Secur. Comput. 13(4): 461-473 (2016) - [j39]Jie Lin, Wei Yu, Xinyu Yang:
Towards Multistep Electricity Prices in Smart Grid Electricity Markets. IEEE Trans. Parallel Distributed Syst. 27(1): 286-302 (2016) - [j38]Xinyu Yang, Xuebin Ren, Jie Lin, Wei Yu:
On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems. IEEE Trans. Parallel Distributed Syst. 27(10): 2967-2983 (2016) - [c105]Qingyu Yang, Rui Min, Dou An, Wei Yu, Xinyu Yang:
Towards optimal PMU placement against data integrity attacks in smart grid. CISS 2016: 54-58 - [c104]Wei Yu, Hansong Xu, Hanlin Zhang, David W. Griffith, Nada Golmie:
Ultra-Dense Networks: Survey of State of the Art and Future Directions. ICCCN 2016: 1-10 - [c103]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Peng Zhao:
A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid. ICCCN 2016: 1-9 - [c102]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu:
Secure fingertip mouse for mobile devices. INFOCOM 2016: 1-9 - [c101]Wei Yu, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada Golmie:
Towards energy efficiency in ultra dense networks. IPCCC 2016: 1-8 - [c100]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Data integrity attacks against the distributed real-time pricing in the smart grid. IPCCC 2016: 1-8 - [c99]Shiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu:
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students. ISI 2016: 285 - [c98]Amirshahram Hematian, Wei Yu, Chao Lu, David W. Griffith, Nada Golmie:
A Clustering-Based Device-to-Device Communication to Support Diverse Applications. RACS 2016: 97-102 - [c97]Weichao Gao, James H. Nguyen, Wei Yu, Chao Lu, Daniel T. Ku:
Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation. RACS 2016: 103-108 - [c96]Zhijiang Chen, Hanlin Zhang, William G. Hatcher, James H. Nguyen, Wei Yu:
A streaming-based network monitoring and threat detection system. SERA 2016: 31-37 - [c95]William G. Hatcher, David Maloney, Wei Yu:
Machine learning-based mobile threat monitoring and detection. SERA 2016: 67-73 - [c94]Qingyu Yang, Zhengan Tan, Dou An, Wei Yu, Xinyu Yang:
On optimal electric vehicles penetration in a novel Archipelago microgrids. SNPD 2016: 331-336 - [c93]Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A novel microgrid based resilient Demand Response scheme in smart grid. SNPD 2016: 337-342 - [c92]Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A Game-Theoretic Model on Coalitional Attacks in Smart Grid. Trustcom/BigDataSE/ISPA 2016: 435-442 - [e1]Qing Yang, Wei Yu, Yacine Challal:
Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings. Lecture Notes in Computer Science 9798, Springer 2016, ISBN 978-3-319-42835-2 [contents] - 2015
- [j37]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu:
De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun. Mag. 53(4): 60-66 (2015) - [j36]Donghai Zhu, Xinyu Yang, Wei Yu:
SPAIS: A novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks. Comput. Networks 91: 376-389 (2015) - [j35]Hongli Zhang, Qiang Zhang, Zhigang Zhou, Xiaojiang Du, Wei Yu, Mohsen Guizani:
Processing geo-dispersed big data in an advanced mapreduce framework. IEEE Netw. 29(5): 24-30 (2015) - [j34]Guobin Xu, Wei Yu, Zhijiang Chen, Hanlin Zhang, Paul Moulema, Xinwen Fu, Chao Lu:
A cloud computing based system for cyber security management. Int. J. Parallel Emergent Distributed Syst. 30(1): 29-45 (2015) - [j33]Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada Golmie:
An integrated detection system against false data injection attacks in the Smart Grid. Secur. Commun. Networks 8(2): 91-109 (2015) - [j32]Xinyu Yang, Xiaofei He, Wei Yu, Jie Lin, Rui Li, Qingyu Yang, Houbing Song:
Towards a Low-Cost Remote Memory Attestation for the Smart Grid. Sensors 15(8): 20799-20824 (2015) - [j31]Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Computers 64(1): 4-18 (2015) - [j30]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor. IEEE Trans. Inf. Forensics Secur. 10(12): 2515-2530 (2015) - [j29]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation. IEEE Trans. Parallel Distributed Syst. 26(7): 1887-1899 (2015) - [c91]Fei Chen, Tao Xiang, Jianyong Chen, Wei Yu, Xinwen Fu, Shengyu Zhang:
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. CBD 2015: 219-226 - [c90]Xialei Zhang, Xinyu Yang, Jie Lin, Guobin Xu, Wei Yu:
Towards Efficient and Secured Real-Time Pricing in the Smart Grid. GLOBECOM 2015: 1-6 - [c89]Longfei Wu, Xiaojiang Du, Hongli Zhang, Wei Yu, Chonggang Wang:
Effective task scheduling in proximate mobile device based communication systems. ICC 2015: 3503-3508 - [c88]Donghai Zhu, Xinyu Yang, Wei Yu, Chao Lu, Xinwen Fu:
INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks. ICC 2015: 3666-3671 - [c87]Nnanna Ekedebe, Chao Lu, Wei Yu:
Towards experimental evaluation of intelligent Transportation System safety and traffic efficiency. ICC 2015: 3757-3762 - [c86]Xuebin Ren, Xinyu Yang, Jie Lin, Wei Yu:
On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems. ICC 2015: 7083-7088 - [c85]Xialei Zhang, Xinyu Yang, Jie Lin, Wei Yu:
On false data injection attacks against the dynamic microgrid partition in the smart grid. ICC 2015: 7222-7227 - [c84]Paul Moulema, Wei Yu, David W. Griffith, Nada Golmie:
On Effectiveness of Smart Grid Applications Using Co-Simulation. ICCCN 2015: 1-8 - [c83]Donghai Zhu, Xinyu Yang, Peng Zhao, Wei Yu:
Towards Effective Intra-Flow Network Coding in Software Defined Wireless Mesh Networks. ICCCN 2015: 1-8 - [c82]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - [c81]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada Golmie:
Optimizing the location deployment of dynamic mobile base stations. ICNC 2015: 579-583 - [c80]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. ICDCS 2015: 61-72 - [c79]Xiaofei He, Xinyu Yang, Jie Lin, Linqiang Ge, Wei Yu, Qingyu Yang:
Defending against Energy Dispatching Data integrity attacks in smart grid. IPCCC 2015: 1-8 - [c78]Qingyu Yang, Dou An, Wei Yu, Xinyu Yang, Xinwen Fu:
On stochastic optimal bidding strategy for microgrids. IPCCC 2015: 1-8 - [c77]Qinggang Yue, Zhen Ling, Wei Yu, Benyuan Liu, Xinwen Fu:
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing. PAMCO@MobiHoc 2015: 19-24 - [c76]Yevgeniy Cole, Hanlin Zhang, Linqiang Ge, Sixiao Wei, Wei Yu, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham:
ScanMe mobile: a local and cloud hybrid service for analyzing APKs. RACS 2015: 268-273 - [c75]Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor Networks. WASA 2015: 366-376 - [c74]Zheng Liu, Xinyu Yang, Peng Zhao, Wei Yu:
Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs. WASA 2015: 767-777 - 2014
- [j28]Donghai Zhu, Xinyu Yang, Wei Yu, Xinwen Fu:
Network coding versus traditional routing in adversarial wireless networks. Ad Hoc Networks 20: 119-131 (2014) - [j27]Peng Zhao, Xinyu Yang, Wei Yu, Chiyong Dong, Shusen Yang, Sulabh Bhattarai:
Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks. J. Netw. Comput. Appl. 40: 116-125 (2014) - [j26]Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, Wei Zhao:
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. IEEE Trans. Parallel Distributed Syst. 25(3): 717-729 (2014) - [c73]Donghai Zhu, Xinyu Yang, Wei Yu:
A novel self-checking pollution attackers identification scheme in wireless network coding. CCNC 2014: 345-350 - [c72]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
Towards verifiable file search on the cloud. CNS 2014: 346-354 - [c71]Sulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu:
On simulation studies of cyber attacks against LTE networks. ICCCN 2014: 1-8 - [c70]Shuang Liang, Xiaojiang Du, Chiu C. Tan, Wei Yu:
An effective online scheme for detecting Android malware. ICCCN 2014: 1-8 - [c69]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery of malicious traffic over Tor. INFOCOM 2014: 1402-1410 - [c68]Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu:
On statistical modeling and forecasting of energy usage in smart grid. RACS 2014: 12-17 - [c67]Xing Chen, Wei Yu, David W. Griffith, Nada Golmie, Guobin Xu:
On cascading failures and countermeasures based on energy storage in the smart grid. RACS 2014: 291-296 - [p1]Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu:
Towards Neural Network Based Malware Detection on Android Mobile Devices. Cybersecurity Systems for Human Cognition Augmentation 2014: 99-117 - 2013
- [j25]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. Comput. Networks 57(4): 869-886 (2013) - [j24]Wei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu:
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. Int. J. Networked Distributed Comput. 1(3): 144-158 (2013) - [j23]Wei Yu, Linqiang Ge, Difan Zhang, Rommie L. Hardy, Robert J. Reschly:
On effective sampling techniques in host-based intrusion detection in tactical MANET. Int. J. Secur. Networks 8(3): 154-168 (2013) - [j22]Difan Zhang, Linqiang Ge, Wei Yu, Hanlin Zhang, Rommie L. Hardy, Robert J. Reschly:
On effective data aggregation techniques in host-based intrusion detection in MANET. Int. J. Secur. Networks 8(4): 179-193 (2013) - [j21]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind detection of spread spectrum flow watermarks. Secur. Commun. Networks 6(3): 257-274 (2013) - [j20]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. IEEE Trans. Computers 62(12): 2411-2426 (2013) - [j19]Peng Zhao, Xinyu Yang, Wei Yu, Xinwen Fu:
A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs. IEEE Trans. Veh. Technol. 62(5): 2290-2302 (2013) - [c66]Yu Wang, Xinyu Yang, Shusen Yang, Wei Yu, Sulabh Bhattarai, Dan Shen, Genshe Chen:
Towards energy-efficient cooperative routing algorithms in wireless networks. CCNC 2013: 79-84 - [c65]Difan Zhang, Linqiang Ge, Rommie L. Hardy, Wei Yu, Hanlin Zhang, Robert J. Reschly:
On effective data aggregation techniques in Host-based Intrusion Detection in MANET. CCNC 2013: 85-90 - [c64]Fan Yang, Xi Zhang, Wei Yu, Genshe Chen:
Coarse symbol timing for OFDM systems by ranking preamble cross-correlations. CISS 2013: 1-6 - [c63]Wei Yu, Guobin Xu, Zhijiang Chen, Paul Moulema:
A cloud computing based architecture for cyber security situation awareness. CNS 2013: 488-492 - [c62]Jie Lin, Wei Yu, Xinyu Yang:
On false data injection attack against Multistep Electricity Price in electricity market in smart grid. GLOBECOM 2013: 760-765 - [c61]Wei Yu, Hanlin Zhang, Linqiang Ge, Rommie L. Hardy:
On behavior-based detection of malware on Android platform. GLOBECOM 2013: 814-819 - [c60]Wei Yu, Sixiao Wei, Guanhui Ma, Xinwen Fu, Nan Zhang:
On effective localization attacks against Internet Threat monitors. ICC 2013: 2011-2015 - [c59]Jie Lin, Wei Yu, Xinyu Yang, Cong Zhao, Qingyu Yang:
On effectiveness of integrating intermittent resources and electricity vehicles in the smart grid. ICC 2013: 4266-4270 - [c58]Xuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, Wei Yu:
On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems. ICCCN 2013: 1-7 - [c57]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu:
How Privacy Leaks From Bluetooth Mouse? NDSS 2013 - [c56]Paul Moulema, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie, Chao Lu, David H. Su:
On simulation study of mesh-based protocols for smart grid communication networks. RACS 2013: 202-207 - [c55]Wei Yu, Zhijiang Chen, Guobin Xu, Sixiao Wei, Nnanna Ekedebe:
A threat monitoring system for smart mobiles in enterprise networks. RACS 2013: 300-305 - [c54]Wei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu:
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. SNPD 2013: 101-106 - 2012
- [j18]Xinyu Yang, Xiaojing Fan, Wei Yu, Xinwen Fu, Shusen Yang:
HLLS: A History information based Light Location Service for MANETs. Comput. Networks 56(2): 731-744 (2012) - [j17]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
A context-aware scheme for privacy-preserving location-based services. Comput. Networks 56(11): 2551-2568 (2012) - [j16]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A WiFi Forensic Positioning Tool. IEEE Trans. Mob. Comput. 11(3): 377-389 (2012) - [j15]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A New Cell-Counting-Based Attack Against Tor. IEEE/ACM Trans. Netw. 20(4): 1245-1261 (2012) - [c53]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu:
How privacy leaks from bluetooth mouse? CCS 2012: 1013-1015 - [c52]Shiva Azadegan, Wei Yu, Hui Liu, Ali Sistani, Subrata Acharya:
Novel Anti-forensics Approaches for Smart Phones. HICSS 2012: 5424-5431 - [c51]Donghai Zhu, Xinyu Yang, Wei Yu:
Towards effective defense against pollution attacks on network coding. ICC 2012: 830-834 - [c50]Sulabh Bhattarai, Linqiang Ge, Wei Yu:
A novel architecture against false data injection attacks in smart grid. ICC 2012: 907-911 - [c49]Jie Lin, Wei Yu, Xinyu Yang, Guobin Xu, Wei Zhao:
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. ICCPS 2012: 183-192 - [c48]Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. ICDCS 2012: 92-101 - [c47]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Extensive analysis and large-scale empirical evaluation of tor bridge discovery. INFOCOM 2012: 2381-2389 - [c46]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu:
A novel network delay based side-channel attack: Modeling and defense. INFOCOM 2012: 2390-2398 - [c45]Linqiang Ge, Hui Liu, Difan Zhang, Wei Yu, Rommie L. Hardy, Robert J. Reschly:
On effective sampling techniques for host-based intrusion detection in MANET. MILCOM 2012: 1-6 - 2011
- [j14]Wei Yu, Xun Wang, Adam C. Champion, Dong Xuan, David Lee:
On detecting active worms with varying scan rate. Comput. Commun. 34(11): 1269-1282 (2011) - [j13]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
Modeling and Detection of Camouflaging Worm. IEEE Trans. Dependable Secur. Comput. 8(3): 377-390 (2011) - [j12]Yuefeng Huang, Xinyu Yang, Shusen Yang, Wei Yu, Xinwen Fu:
A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks. IEEE Trans. Veh. Technol. 60(3): 1045-1058 (2011) - [c44]Jie Lin, Xinyu Yang, Wei Yu, Xinwen Fu:
Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c43]Qinyu Yang, Jie Yang, Wei Yu, Nan Zhang, Wei Zhao:
On a Hierarchical False Data Injection Attack on Power System State Estimation. GLOBECOM 2011: 1-5 - [c42]Peng Zhao, Xinyu Yang, Chiyong Dong, Shusen Yang, Sulabh Bhattarai, Wei Yu:
On an Efficient Estimation of Available Bandwidth for IEEE 802.11-Based Wireless Networks. GLOBECOM 2011: 1-5 - [c41]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu:
Equal-Sized Cells Mean Equal-Sized Packets in Tor? ICC 2011: 1-6 - [c40]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. INFOCOM 2011: 186-190 - [c39]Difan Zhang, Wei Yu, Rommie L. Hardy:
A distributed network-sensor based intrusion detection framework in enterprise networks. MILCOM 2011: 1195-1200 - [c38]Hui Liu, Shiva Azadegan, Wei Yu, Subrata Acharya, Ali Sistani:
Are We Relying Too Much on Forensics Tools? SERA (selected papers) 2011: 145-156 - 2010
- [j11]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Trans. Computers 59(12): 1655-1668 (2010) - [j10]Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 21(10): 1501-1514 (2010) - [j9]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks. IEEE Trans. Syst. Man Cybern. Part B 40(3): 597-611 (2010) - [c37]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity. GameSec 2010: 58-71 - [c36]Xiaojing Fan, Xinyu Yang, Wei Yu, Xinwen Fu:
HLLS: A History Information Based Light Location Service for MANETs. ICC 2010: 1-5 - [c35]Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang:
3DLoc: Three Dimensional Wireless Localization Toolkit. ICDCS 2010: 30-39 - [c34]Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo:
Cyber Crime Scene Investigations (C²SI) through Cloud Computing. ICDCS Workshops 2010: 26-31 - [c33]Wenjing Yang, Xinyu Yang, Guozheng Liu, Wei Yu:
An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs. WCNIS 2010: 483-487 - [c32]Zhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu:
Generic network forensic data acquisition from household and small business wireless routers. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j8]Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, Yong Guan:
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 20(5): 695-709 (2009) - [j7]Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao:
An Invisible Localization Attack to Internet Threat Monitors. IEEE Trans. Parallel Distributed Syst. 20(11): 1611-1625 (2009) - [c31]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A new cell counter based attack against tor. CCS 2009: 578-589 - [c30]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
CAP: A Context-Aware Privacy Protection System for Location-Based Services. ICDCS 2009: 49-57 - [c29]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A New Threat to Location Privacy. ICDCS 2009: 589-596 - [c28]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind Detection of Spread Spectrum Flow Watermarks. INFOCOM 2009: 2195-2203 - [c27]Nan Zhang, Min Song, Xinwen Fu, Wei Yu:
Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. WASA 2009: 570-578 - 2008
- [j6]Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan:
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Comput. Commun. 31(17): 4005-4017 (2008) - [j5]Jangwon Lee, Wei Yu, Xinwen Fu:
Energy-efficient target detection in sensor networks using line proxies. Int. J. Commun. Syst. 21(3): 251-275 (2008) - [c26]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 - [c25]Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582 - [c24]Xuhua Ding, Wei Yu, Ying Pan:
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. ICC 2008: 1605-1609 - [c23]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508 - [c22]Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 - [c21]Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu:
On performance bottleneck of anonymous communication networks. IPDPS 2008: 1-11 - 2007
- [c20]Xinwen Fu, Shu Jiang, Wei Yu, Steve Graham, Yong Guan:
On TCP Performance in Flow-Based Mix Networks. DASC 2007: 145-152 - [c19]Xun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan:
Detecting worms via mining dynamic program execution. SecureComm 2007: 412-421 - [c18]Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback. S&P 2007: 18-32 - 2006
- [j4]Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan:
Effective query aggregation for data services in sensor networks. Comput. Commun. 29(18): 3733-3744 (2006) - [j3]Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao:
Distributed policy processing in active-service based infrastructures. Int. J. Commun. Syst. 19(7): 727-750 (2006) - [c17]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
On Detecting Camouflaging Worm. ACSAC 2006: 235-244 - [c16]Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218 - [c15]Wei Yu, Xun Wang, Dong Xuan, David Lee:
Effective Detection of Active Worms with Varying Scan Rate. SecureComm 2006: 1-10 - [c14]Wei Yu, Nan Zhang, Wei Zhao:
Self-adaptive Worms and Countermeasures. SSS 2006: 548-562 - [c13]Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu, Dong Xuan:
Policy-driven physical attacks in sensor networks: modeling and measurement. WCNC 2006: 671-678 - [c12]Thang Nam Le, Wei Yu, Xiaole Bai, Dong Xuan:
A dynamic geographic hash table for data-centric storage in sensor networks. WCNC 2006: 2168-2174 - 2005
- [j2]Wei Yu, Sriram Chellappan, Dong Xuan:
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener. Comput. Syst. 21(1): 209-219 (2005) - [c11]Thang Nam Le, Dong Xuan, Wei Yu:
An adaptive zone-based storage architecture for wireless sensor networks. GLOBECOM 2005: 5 - [c10]Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan:
On defending peer-to-peer system-based active worm attacks. GLOBECOM 2005: 5 - [c9]Wei Yu, Corey Boyer, Sriram Chellappan, Dong Xuan:
Peer-to-peer system-based active worm attacks: modeling and analysis. ICC 2005: 295-300 - [c8]Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu, Dong Xuan:
Search-based physical attacks in sensor networks. ICCCN 2005: 489-496 - 2004
- [j1]Wei Yu, Jian Wang:
Scalable network resource management for large scale Virtual Private Networks. Simul. Model. Pract. Theory 12(3-4): 263-285 (2004) - [c7]Wei Yu:
Analyze the Worm-Based Attack in Large Scale P2P. HASE 2004: 308-309 - [c6]Wei Yu:
Analyzing the Performance of Internet Worm Attack Approaches. ICCCN 2004: 501-506 - [c5]Wei Yu:
Providing efficient virtual cooperation services for large scale networks. ICON 2004: 160-164 - [c4]Wei Yu:
P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. ISPAN 2004: 514-519 - [c3]Wei Yu, Thang Nam Le, Dong Xuan, Wei Zhao:
Query aggregation for providing efficient data services in sensor networks. MASS 2004: 31-40 - 2003
- [c2]Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - [c1]Wei Yu:
Peer-to-peer approach for global deployment of voice over IP service. ICCCN 2003: 109-114
Coauthor Index
aka: Erik Philip Blasch
aka: William G. Hatcher
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint