2009 |
86 | EE | Peyman Razaghi,
Wei Yu:
Parity Forwarding for Multiple-Relay Networks.
IEEE Transactions on Information Theory 55(1): 158-173 (2009) |
85 | EE | Marko Aleksic,
Peyman Razaghi,
Wei Yu:
Capacity of a Class of Modulo-Sum Relay Channels.
IEEE Transactions on Information Theory 55(3): 921-930 (2009) |
2008 |
84 | EE | Behrouz Khoshnevis,
Wei Yu,
Raviraj Adve:
Grassmannian beamforming for MIMO amplify-and-forward relaying.
CISS 2008: 161-166 |
83 | EE | Hayssam Dahrouj,
Wei Yu:
Coordinated beamforming for the multi-cell multi-antenna wireless system.
CISS 2008: 429-434 |
82 | EE | Wei Yu,
Nan Zhang,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
DSN 2008: 356-365 |
81 | EE | Ryan Pries,
Wei Yu,
Xinwen Fu,
Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks.
ICC 2008: 1578-1582 |
80 | EE | Xuhua Ding,
Wei Yu,
Ying Pan:
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks.
ICC 2008: 1605-1609 |
79 | EE | César A. Galindo-Legaria,
Torsten Grabs,
Sreenivas Gukal,
Steve Herbert,
Aleksandras Surna,
Shirley Wang,
Wei Yu,
Peter Zabback,
Shin Zhang:
Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server.
ICDE 2008: 1190-1199 |
78 | EE | Nan Zhang,
Wei Yu,
Xinwen Fu,
Sajal K. Das:
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
ICPADS 2008: 501-508 |
77 | EE | Wei Yu,
Junpeng Chen,
Guoying Yu:
Discovering Entities Relationships on the Web.
ICSC 2008: 490-491 |
76 | EE | Luobei Kuang,
Ming Xu,
Wei Yu:
EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint.
ICYCS 2008: 599-604 |
75 | EE | Xun Wang,
Wei Yu,
Xinwen Fu,
Dong Xuan,
Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
INFOCOM 2008: 1930-1938 |
74 | EE | Ryan Pries,
Wei Yu,
Steve Graham,
Xinwen Fu:
On performance bottleneck of anonymous communication networks.
IPDPS 2008: 1-11 |
73 | EE | Wei Yu,
Sriram Chellappan,
Xun Wang,
Dong Xuan:
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Computer Communications 31(17): 4005-4017 (2008) |
72 | EE | Zhu Ji,
Wei Yu,
K. J. Ray Liu:
A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs.
IEEE Journal on Selected Areas in Communications 26(7): 1204-1217 (2008) |
71 | EE | Behrouz Khoshnevis,
Wei Yu,
Raviraj Adve:
Grassmannian beamforming for MIMO amplify-and-forward relaying.
IEEE Journal on Selected Areas in Communications 26(8): 1397-1407 (2008) |
70 | EE | Jun Yuan,
Wei Yu:
Joint source coding, routing and power allocation in wireless sensor networks.
IEEE Transactions on Communications 56(6): 886-896 (2008) |
69 | EE | Wei Yu,
K. J. Ray Liu:
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach.
IEEE Transactions on Information Forensics and Security 3(2): 317-330 (2008) |
68 | EE | Dawn N. Jutla,
Wei Yu:
Applying the Delta model to mobile marketing management in the US marketplace.
IJEB 6(3): 216-231 (2008) |
67 | EE | Jangwon Lee,
Wei Yu,
Xinwen Fu:
Energy-efficient target detection in sensor networks using line proxies.
Int. J. Communication Systems 21(3): 251-275 (2008) |
2007 |
66 | | Sean H. J. Kim,
Sunwoo Park,
Wei Yu,
Keith E. Mostov,
Michael A. Matthay,
C. Anthony Hunt:
Systems Modeling of Alveolar Morphogenesis In Vitro.
CAINE 2007: 141-144 |
65 | EE | Wei Yu,
Qing Li,
Junpeng Chen,
Jiaheng Cao:
OS_RANK: Structure Analysis for Ontology Ranking.
ICDE Workshops 2007: 339-346 |
64 | EE | Wei Yu,
Xinwen Fu,
Steve Graham,
Dong Xuan,
Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback.
IEEE Symposium on Security and Privacy 2007: 18-32 |
63 | EE | Marko Aleksic,
Peyman Razaghi,
Wei Yu:
Capacity of a Class of Modulo-Sum Relay Channels
CoRR abs/0704.3591: (2007) |
62 | EE | Behrouz Khoshnevis,
Wei Yu,
Raviraj Adve:
Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying
CoRR abs/0710.5758: (2007) |
61 | EE | Peyman Razaghi,
Wei Yu:
Parity Forwarding for Multiple-Relay Networks
CoRR abs/0711.2712: (2007) |
60 | EE | Truman Chiu-Yam Ng,
Wei Yu:
Joint optimization of relay strategies and resource allocations in cooperative cellular networks.
IEEE Journal on Selected Areas in Communications 25(2): 328-339 (2007) |
59 | EE | Wei Yu,
Yan Lindsay Sun,
K. J. Ray Liu:
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes.
IEEE Trans. Dependable Sec. Comput. 4(3): 228-242 (2007) |
58 | EE | Wei Yu,
K. J. Ray Liu:
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 6(5): 507-521 (2007) |
57 | EE | Wei Yu,
K. J. Ray Liu:
Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks.
IEEE Transactions on Information Forensics and Security 2(2): 227-239 (2007) |
56 | EE | Wei Yu,
Zhu Ji,
K. J. Ray Liu:
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis.
IEEE Transactions on Information Forensics and Security 2(2): 240-253 (2007) |
55 | EE | Lei Xiao,
Thomas E. Fuja,
Jörg Kliewer,
D. Costello Razaghi,
Wei Yu:
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels.
IEEE Transactions on Information Theory 53(10): 3723-3739 (2007) |
54 | EE | V. M. K. Chan,
Wei Yu:
Multiuser Spectrum Optimization for Discrete Multitone Systems With Asynchronous Crosstalk.
IEEE Transactions on Signal Processing 55(11): 5425-5435 (2007) |
53 | EE | Wei Yu,
Tian Lan:
Transmitter Optimization for the Multi-Antenna Downlink With Per-Antenna Power Constraints.
IEEE Transactions on Signal Processing 55(6-1): 2646-2660 (2007) |
52 | EE | Wei Yu,
Bo Zheng,
Rob Watson,
Gérard Lachapelle:
Differential combining for acquiring weak GPS signals.
Signal Processing 87(5): 824-840 (2007) |
2006 |
51 | EE | Wei Yu,
Xun Wang,
Prasad Calyam,
Dong Xuan,
Wei Zhao:
On Detecting Camouflaging Worm.
ACSAC 2006: 235-244 |
50 | EE | Xinwen Fu,
Wei Yu,
Dan Cheng,
Xuejun Tan,
Kevin Streff,
Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures.
DASC 2006: 211-218 |
49 | EE | Jun Yuan,
Wei Yu:
Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach.
GLOBECOM 2006 |
48 | EE | Mohamed Saad,
Alberto Leon-Garcia,
Wei Yu:
Rate Allocation under Network End-to-End Quality-of-Service Requirements.
GLOBECOM 2006 |
47 | EE | Yan Lindsay Sun,
Zhu Han,
Wei Yu,
K. J. Ray Liu:
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.
INFOCOM 2006 |
46 | EE | Zhu Ji,
Wei Yu,
K. J. Ray Liu:
An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks.
INFOCOM 2006 |
45 | EE | Wei Yu,
Nan Zhang,
Wei Zhao:
Self-adaptive Worms and Countermeasures.
SSS 2006: 548-562 |
44 | EE | Peyman Razaghi,
Wei Yu:
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
CoRR abs/cs/0609018: (2006) |
43 | EE | Wei Yu,
Thang Nam Le,
Jangwon Lee,
Dong Xuan:
Effective query aggregation for data services in sensor networks.
Computer Communications 29(18): 3733-3744 (2006) |
42 | EE | Jun Yuan,
Zongpeng Li,
Wei Yu,
Baochun Li:
A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks.
IEEE Journal on Selected Areas in Communications 24(11): 2092-2103 (2006) |
41 | EE | Yan Lindsay Sun,
Wei Yu,
Zhu Han,
K. J. Ray Liu:
Information theoretic framework of trust modeling and evaluation for ad hoc networks.
IEEE Journal on Selected Areas in Communications 24(2): 305-317 (2006) |
40 | EE | Zhi-Quan Luo,
Wei Yu:
An Introduction to Convex Optimization for Communications and Signal Processing.
IEEE Journal on Selected Areas in Communications 24(8): 1426-1438 (2006) |
39 | EE | Wei Yu,
Fangting Sun,
Jason E. Fritts:
Efficient rate control for JPEG-2000.
IEEE Trans. Circuits Syst. Video Techn. 16(5): 577-589 (2006) |
38 | EE | Wei Yu,
John M. Cioffi:
Constant-power waterfilling: performance bound and low-complexity implementation.
IEEE Transactions on Communications 54(1): 23-28 (2006) |
37 | EE | Raphael Cendrillon,
Wei Yu,
Marc Moonen,
Jan Verlinden,
Tom Bostoen:
Optimal multiuser spectrum balancing for digital subscriber lines.
IEEE Transactions on Communications 54(5): 922-933 (2006) |
36 | EE | Wei Yu,
Raymond Lui:
Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems.
IEEE Transactions on Communications 54(7): 1310-1322 (2006) |
35 | EE | Wei Yu:
Uplink-downlink duality via minimax duality.
IEEE Transactions on Information Theory 52(2): 361-374 (2006) |
34 | EE | Wei Yu:
Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition.
IEEE Transactions on Information Theory 52(2): 754-759 (2006) |
33 | EE | Wei Yu,
Sriram Chellappan,
Dong Xuan,
Wei Zhao:
Distributed policy processing in active-service based infrastructures.
Int. J. Communication Systems 19(7): 727-750 (2006) |
2005 |
32 | EE | Kin F. Li,
Yali Wang,
Shojiro Nishio,
Wei Yu:
A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web.
APWeb 2005: 195-206 |
31 | EE | Wei Yu,
Dawn N. Jutla,
Shyamala C. Sivakumar:
A Churn-Strategy Alignment Model for Managers in Mobile Telecom.
CNSR 2005: 48-53 |
30 | EE | Rubin Wang,
Wei Yu:
A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population.
ICNC (1) 2005: 490-498 |
29 | EE | Wei Yu,
Yan Sun,
K. J. Ray Liu:
HADOF: defense against routing disruptions in mobile ad hoc networks.
INFOCOM 2005: 1252-1261 |
28 | EE | Shankar Pal,
Istvan Cseri,
Oliver Seeliger,
Michael Rys,
Gideon Schaller,
Wei Yu,
Dragan Tomic,
Adrian Baras,
Brandon Berg,
Denis Churin,
Eugene Kogan:
XQuery Implementation in a Relational Database System.
VLDB 2005: 1175-1186 |
27 | EE | Kin F. Li,
Wei Yu,
Shojiro Nishio,
Yali Wang:
Finding the search engine that works for you.
WWW (Special interest tracks and posters) 2005: 920-921 |
26 | EE | Wei Yu,
Sriram Chellappan,
Dong Xuan:
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Generation Comp. Syst. 21(1): 209-219 (2005) |
25 | EE | Wei Yu,
K. J. Ray Liu:
Attack-resistant cooperation stimulation in autonomous ad hoc networks.
IEEE Journal on Selected Areas in Communications 23(12): 2260-2271 (2005) |
24 | EE | Wei Yu,
David P. Varodayan,
John M. Cioffi:
Trellis and convolutional precoding for transmitter-based interference presubtraction.
IEEE Transactions on Communications 53(7): 1220-1230 (2005) |
2004 |
23 | EE | Jian Xu,
Wei Yu,
Kexing Rui,
Gregory Butler:
Use Case Refactoring: A Tool and a Case Study.
APSEC 2004: 484-491 |
22 | EE | Wei Yu,
Jun Li,
Greg Butler:
Refactoring Use Case Models on Episodes.
ASE 2004: 328-331 |
21 | EE | Wei Yu:
Integrated Rate Control and Entropy Coding for JPEG 2000.
Data Compression Conference 2004: 152-161 |
20 | EE | Fangting Sun,
Wei Yu:
Optimal Buffer-Constrained Bit Allocation using Marginal Analysis.
Data Compression Conference 2004: 565 |
19 | EE | Wei Yu:
Analyze the Worm-Based Attack in Large Scale P2P.
HASE 2004: 308-309 |
18 | | Shengbing Ren,
Gregory Butler,
Kexing Rui,
Jian Xu,
Wei Yu,
Renhang Luo:
A Prototype Tool for Use Case Refactoring.
ICEIS (3) 2004: 173-178 |
17 | EE | Wei Yu:
P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks.
ISPAN 2004: 514-519 |
16 | | Wei Yu,
Wonjong Rhee,
Stephen P. Boyd,
John M. Cioffi:
Iterative water-filling for Gaussian vector multiple-access channels.
IEEE Transactions on Information Theory 50(1): 145-152 (2004) |
15 | | Wei Yu,
John M. Cioffi:
Sum Capacity of Gaussian Vector Broadcast Channels.
IEEE Transactions on Information Theory 50(9): 1875-1892 (2004) |
14 | EE | Wonjong Rhee,
Wei Yu,
John M. Cioffi:
The optimality of beamforming in uplink multiuser wireless systems.
IEEE Transactions on Wireless Communications 3(1): 86-96 (2004) |
13 | EE | Fangting Sun,
David Fernández-Baca,
Wei Yu:
Inverse parametric sequence alignment.
J. Algorithms 53(1): 36-54 (2004) |
12 | EE | Wei Yu,
Jian Wang:
Scalable network resource management for large scale Virtual Private Networks.
Simulation Modelling Practice and Theory 12(3-4): 263-285 (2004) |
2003 |
11 | EE | Wei Yu,
Z. Meral Özsoyoglu,
Gultekin Özsoyoglu:
XML Restructuring and Integration for Tabular Data.
DEXA 2003: 233-243 |
10 | | Wei Yu,
Dong Xuan,
Sandeep K. Reddy,
Riccardo Bettati,
Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
IAW 2003: 84-91 |
9 | | Wei Yu,
Jian Wang:
Distributed Bandwidth Allocation for the Virtual Private Network.
International Conference on Internet Computing 2003: 486-488 |
2002 |
8 | EE | Fangting Sun,
David Fernández-Baca,
Wei Yu:
Inverse Parametric Sequence Alignment.
COCOON 2002: 97-106 |
7 | | Qi Zhang,
Sally A. Goldman,
Wei Yu,
Jason E. Fritts:
Content-Based Image Retrieval Using Multiple-Instance Learning.
ICML 2002: 682-689 |
6 | | Wei Yu,
Ruibiao Qiu,
Jason E. Fritts:
Advantages of motion-JPEG2000 in video processing.
VCIP 2002: 635-645 |
2001 |
5 | EE | Weiyu Wu,
Peng Pan,
Hua Li,
Wei Yu,
Dongmei Liang:
A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems.
CSCWD 2001: 218-222 |
2000 |
4 | | Wei Yu,
John M. Cioffi:
FDMA Capacity of the Gaussian Multiple Access Channel With ISI.
ICC (3) 2000: 1365-1369 |
1998 |
3 | EE | Kazuyuki Murase,
Takaharu Wakida,
Ryoichi Odagiri,
Wei Yu,
Hirotaka Akita,
Tatsuya Asai:
Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences.
ICES 1998: 280-286 |
2 | EE | Ryoichi Odagiri,
Wei Yu,
Tatsuya Asai,
Kazuyuki Murase:
Analysis of the Scenery Perceived by a Real Mobile Robot Khepera.
ICES 1998: 295-302 |
1993 |
1 | | Shiyi Mao,
Pinxing Lin,
Wei Yu:
A new insight to the ANN-based multitarget tracking data association.
ISCAS 1993: 2423-2426 |