2009 | ||
---|---|---|
86 | EE | Peyman Razaghi, Wei Yu: Parity Forwarding for Multiple-Relay Networks. IEEE Transactions on Information Theory 55(1): 158-173 (2009) |
85 | EE | Marko Aleksic, Peyman Razaghi, Wei Yu: Capacity of a Class of Modulo-Sum Relay Channels. IEEE Transactions on Information Theory 55(3): 921-930 (2009) |
2008 | ||
84 | EE | Behrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian beamforming for MIMO amplify-and-forward relaying. CISS 2008: 161-166 |
83 | EE | Hayssam Dahrouj, Wei Yu: Coordinated beamforming for the multi-cell multi-antenna wireless system. CISS 2008: 429-434 |
82 | EE | Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao: On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 |
81 | EE | Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao: A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582 |
80 | EE | Xuhua Ding, Wei Yu, Ying Pan: A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. ICC 2008: 1605-1609 |
79 | EE | César A. Galindo-Legaria, Torsten Grabs, Sreenivas Gukal, Steve Herbert, Aleksandras Surna, Shirley Wang, Wei Yu, Peter Zabback, Shin Zhang: Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server. ICDE 2008: 1190-1199 |
78 | EE | Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das: Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508 |
77 | EE | Wei Yu, Junpeng Chen, Guoying Yu: Discovering Entities Relationships on the Web. ICSC 2008: 490-491 |
76 | EE | Luobei Kuang, Ming Xu, Wei Yu: EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. ICYCS 2008: 599-604 |
75 | EE | Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao: iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 |
74 | EE | Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu: On performance bottleneck of anonymous communication networks. IPDPS 2008: 1-11 |
73 | EE | Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan: Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Computer Communications 31(17): 4005-4017 (2008) |
72 | EE | Zhu Ji, Wei Yu, K. J. Ray Liu: A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs. IEEE Journal on Selected Areas in Communications 26(7): 1204-1217 (2008) |
71 | EE | Behrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian beamforming for MIMO amplify-and-forward relaying. IEEE Journal on Selected Areas in Communications 26(8): 1397-1407 (2008) |
70 | EE | Jun Yuan, Wei Yu: Joint source coding, routing and power allocation in wireless sensor networks. IEEE Transactions on Communications 56(6): 886-896 (2008) |
69 | EE | Wei Yu, K. J. Ray Liu: Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach. IEEE Transactions on Information Forensics and Security 3(2): 317-330 (2008) |
68 | EE | Dawn N. Jutla, Wei Yu: Applying the Delta model to mobile marketing management in the US marketplace. IJEB 6(3): 216-231 (2008) |
67 | EE | Jangwon Lee, Wei Yu, Xinwen Fu: Energy-efficient target detection in sensor networks using line proxies. Int. J. Communication Systems 21(3): 251-275 (2008) |
2007 | ||
66 | Sean H. J. Kim, Sunwoo Park, Wei Yu, Keith E. Mostov, Michael A. Matthay, C. Anthony Hunt: Systems Modeling of Alveolar Morphogenesis In Vitro. CAINE 2007: 141-144 | |
65 | EE | Wei Yu, Qing Li, Junpeng Chen, Jiaheng Cao: OS_RANK: Structure Analysis for Ontology Ranking. ICDE Workshops 2007: 339-346 |
64 | EE | Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao: DSSS-Based Flow Marking Technique for Invisible Traceback. IEEE Symposium on Security and Privacy 2007: 18-32 |
63 | EE | Marko Aleksic, Peyman Razaghi, Wei Yu: Capacity of a Class of Modulo-Sum Relay Channels CoRR abs/0704.3591: (2007) |
62 | EE | Behrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying CoRR abs/0710.5758: (2007) |
61 | EE | Peyman Razaghi, Wei Yu: Parity Forwarding for Multiple-Relay Networks CoRR abs/0711.2712: (2007) |
60 | EE | Truman Chiu-Yam Ng, Wei Yu: Joint optimization of relay strategies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications 25(2): 328-339 (2007) |
59 | EE | Wei Yu, Yan Lindsay Sun, K. J. Ray Liu: Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Trans. Dependable Sec. Comput. 4(3): 228-242 (2007) |
58 | EE | Wei Yu, K. J. Ray Liu: Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(5): 507-521 (2007) |
57 | EE | Wei Yu, K. J. Ray Liu: Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. IEEE Transactions on Information Forensics and Security 2(2): 227-239 (2007) |
56 | EE | Wei Yu, Zhu Ji, K. J. Ray Liu: Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. IEEE Transactions on Information Forensics and Security 2(2): 240-253 (2007) |
55 | EE | Lei Xiao, Thomas E. Fuja, Jörg Kliewer, D. Costello Razaghi, Wei Yu: Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels. IEEE Transactions on Information Theory 53(10): 3723-3739 (2007) |
54 | EE | V. M. K. Chan, Wei Yu: Multiuser Spectrum Optimization for Discrete Multitone Systems With Asynchronous Crosstalk. IEEE Transactions on Signal Processing 55(11): 5425-5435 (2007) |
53 | EE | Wei Yu, Tian Lan: Transmitter Optimization for the Multi-Antenna Downlink With Per-Antenna Power Constraints. IEEE Transactions on Signal Processing 55(6-1): 2646-2660 (2007) |
52 | EE | Wei Yu, Bo Zheng, Rob Watson, Gérard Lachapelle: Differential combining for acquiring weak GPS signals. Signal Processing 87(5): 824-840 (2007) |
2006 | ||
51 | EE | Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao: On Detecting Camouflaging Worm. ACSAC 2006: 235-244 |
50 | EE | Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham: On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218 |
49 | EE | Jun Yuan, Wei Yu: Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach. GLOBECOM 2006 |
48 | EE | Mohamed Saad, Alberto Leon-Garcia, Wei Yu: Rate Allocation under Network End-to-End Quality-of-Service Requirements. GLOBECOM 2006 |
47 | EE | Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. INFOCOM 2006 |
46 | EE | Zhu Ji, Wei Yu, K. J. Ray Liu: An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. INFOCOM 2006 |
45 | EE | Wei Yu, Nan Zhang, Wei Zhao: Self-adaptive Worms and Countermeasures. SSS 2006: 548-562 |
44 | EE | Peyman Razaghi, Wei Yu: Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels CoRR abs/cs/0609018: (2006) |
43 | EE | Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan: Effective query aggregation for data services in sensor networks. Computer Communications 29(18): 3733-3744 (2006) |
42 | EE | Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li: A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(11): 2092-2103 (2006) |
41 | EE | Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2): 305-317 (2006) |
40 | EE | Zhi-Quan Luo, Wei Yu: An Introduction to Convex Optimization for Communications and Signal Processing. IEEE Journal on Selected Areas in Communications 24(8): 1426-1438 (2006) |
39 | EE | Wei Yu, Fangting Sun, Jason E. Fritts: Efficient rate control for JPEG-2000. IEEE Trans. Circuits Syst. Video Techn. 16(5): 577-589 (2006) |
38 | EE | Wei Yu, John M. Cioffi: Constant-power waterfilling: performance bound and low-complexity implementation. IEEE Transactions on Communications 54(1): 23-28 (2006) |
37 | EE | Raphael Cendrillon, Wei Yu, Marc Moonen, Jan Verlinden, Tom Bostoen: Optimal multiuser spectrum balancing for digital subscriber lines. IEEE Transactions on Communications 54(5): 922-933 (2006) |
36 | EE | Wei Yu, Raymond Lui: Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems. IEEE Transactions on Communications 54(7): 1310-1322 (2006) |
35 | EE | Wei Yu: Uplink-downlink duality via minimax duality. IEEE Transactions on Information Theory 52(2): 361-374 (2006) |
34 | EE | Wei Yu: Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition. IEEE Transactions on Information Theory 52(2): 754-759 (2006) |
33 | EE | Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao: Distributed policy processing in active-service based infrastructures. Int. J. Communication Systems 19(7): 727-750 (2006) |
2005 | ||
32 | EE | Kin F. Li, Yali Wang, Shojiro Nishio, Wei Yu: A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web. APWeb 2005: 195-206 |
31 | EE | Wei Yu, Dawn N. Jutla, Shyamala C. Sivakumar: A Churn-Strategy Alignment Model for Managers in Mobile Telecom. CNSR 2005: 48-53 |
30 | EE | Rubin Wang, Wei Yu: A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population. ICNC (1) 2005: 490-498 |
29 | EE | Wei Yu, Yan Sun, K. J. Ray Liu: HADOF: defense against routing disruptions in mobile ad hoc networks. INFOCOM 2005: 1252-1261 |
28 | EE | Shankar Pal, Istvan Cseri, Oliver Seeliger, Michael Rys, Gideon Schaller, Wei Yu, Dragan Tomic, Adrian Baras, Brandon Berg, Denis Churin, Eugene Kogan: XQuery Implementation in a Relational Database System. VLDB 2005: 1175-1186 |
27 | EE | Kin F. Li, Wei Yu, Shojiro Nishio, Yali Wang: Finding the search engine that works for you. WWW (Special interest tracks and posters) 2005: 920-921 |
26 | EE | Wei Yu, Sriram Chellappan, Dong Xuan: P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Generation Comp. Syst. 21(1): 209-219 (2005) |
25 | EE | Wei Yu, K. J. Ray Liu: Attack-resistant cooperation stimulation in autonomous ad hoc networks. IEEE Journal on Selected Areas in Communications 23(12): 2260-2271 (2005) |
24 | EE | Wei Yu, David P. Varodayan, John M. Cioffi: Trellis and convolutional precoding for transmitter-based interference presubtraction. IEEE Transactions on Communications 53(7): 1220-1230 (2005) |
2004 | ||
23 | EE | Jian Xu, Wei Yu, Kexing Rui, Gregory Butler: Use Case Refactoring: A Tool and a Case Study. APSEC 2004: 484-491 |
22 | EE | Wei Yu, Jun Li, Greg Butler: Refactoring Use Case Models on Episodes. ASE 2004: 328-331 |
21 | EE | Wei Yu: Integrated Rate Control and Entropy Coding for JPEG 2000. Data Compression Conference 2004: 152-161 |
20 | EE | Fangting Sun, Wei Yu: Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. Data Compression Conference 2004: 565 |
19 | EE | Wei Yu: Analyze the Worm-Based Attack in Large Scale P2P. HASE 2004: 308-309 |
18 | Shengbing Ren, Gregory Butler, Kexing Rui, Jian Xu, Wei Yu, Renhang Luo: A Prototype Tool for Use Case Refactoring. ICEIS (3) 2004: 173-178 | |
17 | EE | Wei Yu: P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. ISPAN 2004: 514-519 |
16 | Wei Yu, Wonjong Rhee, Stephen P. Boyd, John M. Cioffi: Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 50(1): 145-152 (2004) | |
15 | Wei Yu, John M. Cioffi: Sum Capacity of Gaussian Vector Broadcast Channels. IEEE Transactions on Information Theory 50(9): 1875-1892 (2004) | |
14 | EE | Wonjong Rhee, Wei Yu, John M. Cioffi: The optimality of beamforming in uplink multiuser wireless systems. IEEE Transactions on Wireless Communications 3(1): 86-96 (2004) |
13 | EE | Fangting Sun, David Fernández-Baca, Wei Yu: Inverse parametric sequence alignment. J. Algorithms 53(1): 36-54 (2004) |
12 | EE | Wei Yu, Jian Wang: Scalable network resource management for large scale Virtual Private Networks. Simulation Modelling Practice and Theory 12(3-4): 263-285 (2004) |
2003 | ||
11 | EE | Wei Yu, Z. Meral Özsoyoglu, Gultekin Özsoyoglu: XML Restructuring and Integration for Tabular Data. DEXA 2003: 233-243 |
10 | Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao: Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 | |
9 | Wei Yu, Jian Wang: Distributed Bandwidth Allocation for the Virtual Private Network. International Conference on Internet Computing 2003: 486-488 | |
2002 | ||
8 | EE | Fangting Sun, David Fernández-Baca, Wei Yu: Inverse Parametric Sequence Alignment. COCOON 2002: 97-106 |
7 | Qi Zhang, Sally A. Goldman, Wei Yu, Jason E. Fritts: Content-Based Image Retrieval Using Multiple-Instance Learning. ICML 2002: 682-689 | |
6 | Wei Yu, Ruibiao Qiu, Jason E. Fritts: Advantages of motion-JPEG2000 in video processing. VCIP 2002: 635-645 | |
2001 | ||
5 | EE | Weiyu Wu, Peng Pan, Hua Li, Wei Yu, Dongmei Liang: A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems. CSCWD 2001: 218-222 |
2000 | ||
4 | Wei Yu, John M. Cioffi: FDMA Capacity of the Gaussian Multiple Access Channel With ISI. ICC (3) 2000: 1365-1369 | |
1998 | ||
3 | EE | Kazuyuki Murase, Takaharu Wakida, Ryoichi Odagiri, Wei Yu, Hirotaka Akita, Tatsuya Asai: Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences. ICES 1998: 280-286 |
2 | EE | Ryoichi Odagiri, Wei Yu, Tatsuya Asai, Kazuyuki Murase: Analysis of the Scenery Perceived by a Real Mobile Robot Khepera. ICES 1998: 295-302 |
1993 | ||
1 | Shiyi Mao, Pinxing Lin, Wei Yu: A new insight to the ANN-based multitarget tracking data association. ISCAS 1993: 2423-2426 |