Xianglin Wei
Orcid: 0000-0002-6181-4441
According to our database1,
Xianglin Wei
authored at least 101 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Ambient Intell. Humaniz. Comput., February, 2024
J. Ambient Intell. Humaniz. Comput., January, 2024
2023
Request pattern change-based cache pollution attack detection and defense in edge computing.
Digit. Commun. Networks, October, 2023
Comput. Commun., October, 2023
Ad Hoc Networks, October, 2023
Joint UAV Trajectory Planning, DAG Task Scheduling, and Service Function Deployment Based on DRL in UAV-Empowered Edge Computing.
IEEE Internet Things J., July, 2023
Universal Attack Against Automatic Modulation Classification DNNs Under Frequency and Data Constraints.
IEEE Internet Things J., July, 2023
Joint UAV deployment, SF placement, and collaborative task scheduling in heterogeneous multi-UAV-empowered edge intelligence.
IET Commun., March, 2023
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint.
Frontiers Comput. Sci., 2023
2022
Joint service-function deployment and task scheduling in UAVFog-assisted data-driven disaster response architecture.
World Wide Web, 2022
Joint Optimization of AoI, SINR, Completeness, and Energy in UAV-Aided SDCNs: Coalition Formation Game and Cooperative Order.
IEEE Trans. Green Commun. Netw., 2022
IEEE Internet Things J., 2022
2021
Channel Access-Based Joint Optimization of AoI and SINR under Attack: Game Theory and Distributed Approach.
Wirel. Commun. Mob. Comput., 2021
Flocking Control Algorithms Based on the Diffusion Model for Unmanned Aerial Vehicle Systems.
IEEE Trans. Green Commun. Netw., 2021
Secur. Commun. Networks, 2021
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks.
Mob. Networks Appl., 2021
J. Syst. Archit., 2021
Int. J. Circuit Theory Appl., 2021
IET Inf. Secur., 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
IEEE Trans. Veh. Technol., 2020
Ad Hoc Networks, 2020
Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency.
IEEE Access, 2020
Intelligent Resource Allocation for Utility Optimization in RSU-Empowered Vehicular Network.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
UAVFog-Assisted Data-Driven Disaster Response: Architecture, Use Case, and Challenges.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020
Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
2019
J. Ambient Intell. Humaniz. Comput., 2019
IEEE Internet Things J., 2019
A jamming detection method for multi-hop wireless networks based on association graph.
Int. J. High Perform. Comput. Netw., 2019
IEEE Access, 2019
IEEE Access, 2019
Equivalence Checking of Scheduling in High-Level Synthesis Using Deep State Sequences.
IEEE Access, 2019
IEEE Access, 2019
Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks.
IEEE Access, 2019
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the ICIT 2019, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Sustain. Comput. Informatics Syst., 2018
Secur. Commun. Networks, 2018
Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints.
Peer-to-Peer Netw. Appl., 2018
Flow scheduling strategies for minimizing flow completion times in data center networks.
J. High Speed Networks, 2018
IET Inf. Secur., 2018
Future Gener. Comput. Syst., 2018
Distributed Parallel Databases, 2018
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
Layout-Independent Wireless Facility Constructing and Scheduling for Data Center Networks.
Wirel. Commun. Mob. Comput., 2017
IEEE Commun. Surv. Tutorials, 2017
The number of boundary H-points of H-triangles.
Ars Comb., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Efficient application scheduling in mobile cloud computing based on MAX-MIN ant system.
Soft Comput., 2016
VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming.
J. High Speed Networks, 2016
2015
Defending DDoS attacks in software defined networking based on improved Shiryaev-Roberts detection algorithm.
J. High Speed Networks, 2015
Informatica (Slovenia), 2015
2014
Int. J. Mob. Comput. Multim. Commun., 2014
Discret. Math., 2014
A note on the value about a disjoint convex partition problem.
Ars Comb., 2014
A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree Distribution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Wirel. Pers. Commun., 2013
iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems.
Telecommun. Syst., 2013
Simul., 2013
J. Appl. Math., 2013
Int. J. Commun. Networks Inf. Secur., 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Int. J. Commun. Networks Inf. Secur., 2012
No 4-isosceles set with eight points on a circle.
Ars Comb., 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
2011
Classification of eleven-point five-distance sets in the plane.
Ars Comb., 2011
2009
Discret. Comput. Geom., 2009
2008
2007
On Relatively Short Sides of Convex Hexagons.
Ars Comb., 2007
2006
A 4-isosceles 7-point Set with Both Circle and Linear Restrictions.
Ars Comb., 2006