Yulai Xie

Orcid: 0000-0003-0764-6579

According to our database1, Yulai Xie authored at least 46 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2024

Global-Shared Text Representation Based Multi-Stage Fusion Transformer Network for Multi-Modal Dense Video Captioning.
IEEE Trans. Multim., 2024

SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks.
IEEE Internet Things J., 2024

Bridge the gap between simulated and real-world data in optical fiber mode decomposition for accuracy improvement: A deep learning-based co-learning framework with visual similarity-based matching.
Expert Syst. Appl., 2024

Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the Physical World.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Disease Simulation in Airport Scenario Based on Individual Mobility Model.
ACM Trans. Intell. Syst. Technol., October, 2023

A Novel Hybrid Model for Docker Container Workload Prediction.
IEEE Trans. Netw. Serv. Manag., September, 2023

Interior Individual Trajectory Simulation with Population Distribution Constraint.
ACM Trans. Intell. Syst. Technol., February, 2023

Efficient Storage Management for Social Network Events Based on Clustering and Hot/Cold Data Classification.
IEEE Trans. Comput. Soc. Syst., February, 2023

Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection.
IEEE Trans. Dependable Secur. Comput., 2023

3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Digital Defect Simulation-based Data Generation for Visual Quality Inspection.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023

Internet Public Safety Event Grading and Hybrid Storage Based on Multi-feature Fusion for Social Media Texts.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
Multisize Patched Spatial-Temporal Transformer Network for Short- and Long-Term Crowd Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2022

A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest.
IEEE Trans. Cloud Comput., 2022

Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing.
IEEE Trans. Cloud Comput., 2022

EGC: A novel event-oriented graph clustering framework for social media text.
Inf. Process. Manag., 2022

Tri-Modal Dense Video Captioning Based on Fine-Grained Aligned Text and Anchor-Free Event Proposals Generator.
Int. J. Pattern Recognit. Artif. Intell., 2022

Temporal-enhanced graph convolution network for skeleton-based action recognition.
IET Comput. Vis., 2022

VSSum: A Virtual Surveillance Dataset for Video Summary.
Proceedings of the 2022 The 5th International Conference on Control and Computer Vision, 2022

2021
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing.
IEEE Trans. Netw. Sci. Eng., 2021

P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases.
IEEE Trans. Dependable Secur. Comput., 2021

Trustworthy and Context-Aware Distributed Online Learning With Autoscaling for Content Caching in Collaborative Mobile Edge Computing.
IEEE Trans. Cogn. Commun. Netw., 2021

A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach.
IEEE Internet Things J., 2021

Temporal-Aware Graph Convolution Network for Skeleton-based Action Recognition.
Proceedings of the ICCCV 2021: 4th International Conference on Control and Computer Vision, Macau, SAR, China, August 13, 2021

Context-Aware Biaffine Localizing Network for Temporal Sentence Grounding.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments.
IEEE Trans. Dependable Secur. Comput., 2020

Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments.
IEEE Trans. Big Data, 2020

2019
Feature Fusion-Based Multi-Task ConvNet for Simultaneous Optical Performance Monitoring and Bit-Rate/Modulation Format Identification.
IEEE Access, 2019

2018
Detection rate and false alarm rate for Pagoda.
Dataset, November, 2018

Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead.
Digit. Investig., 2018

2017
Passenger flow estimation based on convolutional neural network in public transportation system.
Knowl. Based Syst., 2017

2016
Unifying intrusion detection and forensic analysis via provenance awareness.
Future Gener. Comput. Syst., 2016

Oasis: An active storage framework for object storage platform.
Future Gener. Comput. Syst., 2016

2013
Evaluation of a Hybrid Approach for Efficient Provenance Storage.
ACM Trans. Storage, 2013

Anatomy-Based Variational Modeling of Digital Hand and Its Verification.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management. Human Body Modeling and Ergonomics, 2013

2012
Review of applied algebra: codes, ciphers and discrete algorithms, by Darel W. Hardy, Fred Richman, and Carol L. Walker.
SIGACT News, 2012

An In-Depth Analysis of TCP and RDMA Performance on Modern Server Platform.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

A hybrid approach for efficient provenance storage.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Some Results on Minimum Discrete Bending Energy Path in Simple Polygon.
Comput. J., 2011

Compressing Provenance Graphs.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Design and evaluation of Oasis: An active storage framework based on T10 OSD standard.
Proceedings of the IEEE 27th Symposium on Mass Storage Systems and Technologies, 2011

2010
Approximating Minimum Bending Energy Path in a Simple Corridor.
Proceedings of the Algorithms and Computation - 21st International Symposium, 2010

2007
Minimum Spanning Tree with Neighborhoods.
Proceedings of the Algorithmic Aspects in Information and Management, 2007

2006
Efficient algorithm for approximating maximum inscribed sphere in high dimensional polytope.
Proceedings of the 22nd ACM Symposium on Computational Geometry, 2006


  Loading...