Guiyi Wei

Orcid: 0000-0002-0635-2053

According to our database1, Guiyi Wei authored at least 93 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Equilibrium-Equation-Based Fast Recursive Principal Component Tracking With an Adaptive Forgetting Factor for Joint Spatial Division and Multiplexing Systems.
IEEE Trans. Wirel. Commun., October, 2024

Dynamic spectrum access for Internet-of-Things with joint GNN and DQN.
Ad Hoc Networks, August, 2024

Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs.
IEEE Trans. Big Data, April, 2024

Anonymous Multi-Hop Payment for Payment Channel Networks.
IEEE Trans. Dependable Secur. Comput., 2024

The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024

$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024

A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments.
Future Gener. Comput. Syst., 2024

Hyper-parameter Optimization for Wireless Network Traffic Prediction Models with A Novel Meta-Learning Framework.
CoRR, 2024

2023
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy.
IEEE/ACM Trans. Netw., December, 2023

Multi-Agent Deep Reinforcement Learning Based Downlink Beamforming in Heterogeneous Networks.
IEEE Trans. Wirel. Commun., June, 2023

A domain name management system based on account-based consortium blockchain.
Peer Peer Netw. Appl., March, 2023

Cross-Chain Virtual Payment Channels.
IEEE Trans. Inf. Forensics Secur., 2023

Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Federated Learning based Vehicular Threat Sharing: A Multi-Dimensional Contract Incentive Approach.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

2022
Principal Component Tracking for Massive MIMO Channels in High Mobility Scenarios With Diagonal Step Size Matrix.
IEEE Trans. Wirel. Commun., 2022

Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2022

Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud.
IEEE Trans. Serv. Comput., 2022

Fair Outsourcing Polynomial Computation Based on the Blockchain.
IEEE Trans. Serv. Comput., 2022

EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks.
IEEE Internet Things J., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

2021
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era.
IEEE Internet Things J., 2021

Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
IEEE Internet Things J., 2021

Achieve space-efficient key management in lightning network.
Comput. Networks, 2021

2020
Attribute-based encryption with outsourced decryption in blockchain.
Peer-to-Peer Netw. Appl., 2020

Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2020

Decoupling Offloading Decision and Resource Allocation via Deep Reinforcement Learning and Sequential Least Squares Programming.
Proceedings of the Communications and Networking, 2020

2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
Proceedings of the Network and System Security - 13th International Conference, 2019

Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Outsourced Computation in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Data Security and Privacy in Fog Computing.
IEEE Netw., 2018

Security Threats in the Data Plane of Software-Defined Networks.
IEEE Netw., 2018

Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View.
IEEE Netw., 2018

Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones.
IEEE Internet Things J., 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Gener. Comput. Syst., 2018

2017
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications.
Mob. Inf. Syst., 2016

A game-based incentive model for service cooperation in VANETs.
Concurr. Comput. Pract. Exp., 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Efficient multiple sources network coding signature in the standard model.
Concurr. Comput. Pract. Exp., 2015

SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Availability, resilience, and fault tolerance of internet and distributed computing systems.
Concurr. Comput. Pract. Exp., 2015

Social role-based secure large data objects dissemination in mobile sensing environment.
Comput. Commun., 2015

2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs.
Comput. Networks, 2014

Scheduling with Position-Based deteriorating jobs and Multiple deteriorating rate-Modifying Activities.
Asia Pac. J. Oper. Res., 2014

Scheduling Position-Based deteriorating jobs with Multiple rate-Modifying Activities and Past-sequence-dependent Delivery times.
Asia Pac. J. Oper. Res., 2014

2013
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2013

Cooperation Dynamics on Collaborative Social Networks of Heterogeneous Population.
IEEE J. Sel. Areas Commun., 2013

A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks.
Int. J. Distributed Sens. Networks, 2013

Optimal Spectrum Leasing with the Constraints of User Admission Rate and Quality of Service.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Minimizing Nested Interrupts of Secondary Users in Multi-Priority Cognitive Radio Networks.
Proceedings of the Internet and Distributed Computing Systems, 2013

Multiple Sources Network Coding Signature in the Standard Model.
Proceedings of the Internet and Distributed Computing Systems, 2013

2012
Anonymous proxy re-encryption.
Secur. Commun. Networks, 2012

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
KSII Trans. Internet Inf. Syst., 2012

Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks.
Comput. Electr. Eng., 2012

Rigorous Punishment Promotes Cooperation in Prisoners' Dilemma Game.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2012

2011
Design of QoS in Intelligent Communication Environments Based on Neural Network.
Wirel. Pers. Commun., 2011

Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter.
Comput. Commun., 2011

Unidirectional Identity-Based Proxy Re-Signature.
Proceedings of IEEE International Conference on Communications, 2011

Identity-Based Conditional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
A game-theoretic method of fair resource allocation for cloud computing services.
J. Supercomput., 2010

A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection.
Sensors, 2010

A Dependable Cluster Based Topology in P2P Networks.
J. Commun., 2010

PIVOT: An adaptive information discovery framework for computational grids.
Inf. Sci., 2010

Knowledge Sharing in Social Network Using Game Theory.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Concept, Characteristics and Defending Mechanism of Worms.
IEICE Trans. Inf. Syst., 2009

Sub-Ontology Modularization for Large-Scale Web Ontologies.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

A Budget-Based Cost-Effective Incentive Model.
Proceedings of the ICPPW 2009, 2009

LD-BSCA: A local-density based spatial clustering algorithm.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A mobile cache model with semantic locality.
Int. J. Intell. Inf. Database Syst., 2007

Multi-Level Text Classification Method Based on Latent Semantic Analysis.
Proceedings of the ICEIS 2007, 2007

Research and Design of Multimedia NSS for E-Commerce.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

2006
Design and Implementation of an Ontology Algorithm for Web Documents Classification.
Proceedings of the Computational Science and Its Applications, 2006

A Semantic-Driven Cache Management Approach for Mobile Applications.
Proceedings of the Computational Science, 2006

2005
The Design and Implementation of Extensible Information Services.
Proceedings of the Computational Science, 2005

User-Oriented Job Management in a Grid Environment.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
MASSIVE: A Multidisciplinary Applications-Oriented Simulation and Visualization Environment.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
An Engineering Computation Oriented Visual Grid Framework.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Grid Service-Based Parallel Finite Element Analysis.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...