2013
278On the Expansion Length Of Triple-Base Number Systems. Wei Yu, Kunpeng Wang, Bao Li, Song Tian. AFRICACRYPT 2013, 424-432. Web SearchBibTeXDownload
277Triple-Base Number System for Scalar Multiplication. Wei Yu, Kunpeng Wang, Bao Li, Song Tian. AFRICACRYPT 2013, 433-451. Web SearchBibTeXDownload
276What Can We Get from Learning Resource Comments on Engineering Pathway. Yunlu Zhang, Wei Yu, Shijun Li. APWeb 2013, 482-493. Web SearchBibTeXDownload
275On effective data aggregation techniques in Host-based Intrusion Detection in MANET. Difan Zhang, Linqiang Ge, Rommie Hardy, Wei Yu, Hanlin Zhang, Robert Reschly. CCNC 2013, 85-90. Web SearchBibTeXDownload
274Towards energy-efficient cooperative routing algorithms in wireless networks. Yu Wang, Xinyu Yang, Shusen Yang, Wei Yu, Sulabh Bhattarai, Dan Shen, Genshe Chen. CCNC 2013, 79-84. Web SearchBibTeXDownload
273Protocol-level attacks against Tor. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao. Computer Networks (57): 869-886 (2013). Web SearchBibTeXDownload
272Uplink Multi-Cell Processing: Approximate Sum Capacity under a Sum Backhaul Constraint. Yuhan Zhou, Wei Yu, Dimitris Toumpakaris. CoRR (abs/1304.7509) (2013). Web SearchBibTeXDownload
271Data Structure Lower Bounds on Random Access to Grammar-Compressed Strings. Elad Verbin, Wei Yu, Wei Yu. CPM 2013, 247-258. Web SearchBibTeXDownload
270On the Capacity of the K-User Cyclic Gaussian Interference Channel. Lei Zhou, Wei Yu. IEEE Transactions on Information Theory (59): 154-165 (2013). Web SearchBibTeXDownload
269Incremental Relaying for the Gaussian Interference Channel With a Degraded Broadcasting Relay. Lei Zhou, Wei Yu. IEEE Transactions on Information Theory (59): 2794-2815 (2013). Web SearchBibTeXDownload
268About Hash into Montgomery Form Elliptic Curves. Wei Yu, Kunpeng Wang, Bao Li, Song Tian. ISPEC 2013, 147-159. Web SearchBibTeXDownload
267Joint Triple-Base Number System for Multi-Scalar Multiplication. Wei Yu, Kunpeng Wang, Bao Li, Song Tian. ISPEC 2013, 160-173. Web SearchBibTeXDownload
266Blind detection of spread spectrum flow watermarks. Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu. Security and Communication Networks (6): 257-274 (2013). Web SearchBibTeXDownload
265Obnoxious Facility Game with a Bounded Service Range. Yukun Cheng, Qiaoming Han, Wei Yu, Guochuan Zhang. TAMC 2013, 272-281. Web SearchBibTeXDownload
2012
264How privacy leaks from bluetooth mouse?. Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu. ACM Conference on Computer and Communications Security 2012, 1013-1015. Web SearchBibTeXDownload
263The treatment effects of HET0016 on demyelinating Mice induced by cuprizone. Huina Wang, Lei Jin, Wei Yu, Li Chen, Xiaoming Ouyang, Xue Wang, Jing Yang. BHI 2012, 840-842. Web SearchBibTeXDownload
262Fair scheduling and resource allocation for wireless cellular network with shared relays. Yicheng Lin, Wei Yu. CISS 2012, 1-6. Web SearchBibTeXDownload
261A context-aware scheme for privacy-preserving location-based services. Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao. Computer Networks (56): 2551-2568 (2012). Web SearchBibTeXDownload
260HLLS: A History information based Light Location Service for MANETs. Xinyu Yang, Xiaojing Fan, Wei Yu, Xinwen Fu, Shusen Yang. Computer Networks (56): 731-744 (2012). Web SearchBibTeXDownload
259Data Structure Lower Bounds on Random Access to Grammar-Compressed Strings. Elad Verbin, Wei Yu, Wei Yu. CoRR (abs/1203.1080) (2012). Web SearchBibTeXDownload
258Uplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation. Lei Zhou, Wei Yu. CoRR (abs/1208.3024) (2012). Web SearchBibTeXDownload
257Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation. Hayssam Dahrouj, Wei Yu, Taiwen Tang. EURASIP J. Wireless Comm. and Networking (2012): 244 (2012). Web SearchBibTeXDownload
256Uplink multicell processing with limited backhaul via successive interference cancellation. Lei Zhou, Wei Yu. GLOBECOM 2012, 2322-2327. Web SearchBibTeXDownload
255Optimization of wireless access point placement in realistic urban heterogeneous networks. Yicheng Lin, Wei Yu, Yves Lostanlen. GLOBECOM 2012, 4963-4968. Web SearchBibTeXDownload
254Interference mitigation via power control under the one-power-zone constraint. Hayssam Dahrouj, Wei Yu, Jerry Chow, Radu Selea. GLOBECOM 2012, 5050-5055. Web SearchBibTeXDownload
253Fragmented skull modeling using heat kernels. Wei Yu, Maoqing Li, Xin Li. Graphical Models (74): 140-151 (2012). Web SearchBibTeXDownload
252Novel Anti-forensics Approaches for Smart Phones. Shiva Azadegan, Wei Yu, Hui Liu, Ali Sistani, Subrata Acharya. HICSS 2012, 5424-5431. Web SearchBibTeXDownload
251Two-stage channel feedback for beamforming and scheduling in network MIMO systems. Behrouz Khoshnevis, Wei Yu, Yves Lostanlen. ICC 2012, 4835-4840. Web SearchBibTeXDownload
250A novel architecture against false data injection attacks in smart grid. Sulabh Bhattarai, Linqiang Ge, Wei Yu. ICC 2012, 907-911. Web SearchBibTeXDownload
249Dynamic cooperation link selection for network MIMO systems with limited backhaul capacity. Shervin Mehryar, Aakanksha Chowdhery, Wei Yu. ICC 2012, 4410-4415. Web SearchBibTeXDownload
248Towards effective defense against pollution attacks on network coding. Donghai Zhu, Xinyu Yang, Wei Yu. ICC 2012, 830-834. Web SearchBibTeXDownload
247Opportunistic joint decoding with scheduling and power allocation in OFDMA femtocell networks. Yuhan Zhou, Wei Yu. ICC 2012, 4127-4131. Web SearchBibTeXDownload
246On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. Jie Lin, Wei Yu, Xinyu Yang, Guobin Xu, Wei Zhao. ICCPS 2012, 183-192. Web SearchBibTeXDownload
245A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao. ICDCS 2012, 92-101. Web SearchBibTeXDownload
244A New Cell-Counting-Based Attack Against Tor. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia. IEEE/ACM Trans. Netw. (20): 1245-1261 (2012). Web SearchBibTeXDownload
243Capacity of the Gaussian Relay Channel with Correlated Noises to Within a Constant Gap. Lei Zhou, Wei Yu. IEEE Communications Letters (16): 2-5 (2012). Web SearchBibTeXDownload
242Fair Scheduling and Resource Allocation for Wireless Cellular Network with Shared Relays. Yicheng Lin, Wei Yu. IEEE Journal on Selected Areas in Communications (30): 1530-1540 (2012). Web SearchBibTeXDownload
241Cross-Calibration of the Total Ozone Unit (TOU) With the Ozone Monitoring Instrument (OMI) and SBUV/2 for Environmental Applications. Weihe Wang, Lawrence E. Flynn, Xingying Zhang, Yongmei Wang, Yingjian Wang, Fang Jiang, Yan Zhang, Fuxiang Huang, Xiaojing Li, Ruixia Liu, Zhaojun Zheng, Wei Yu, Guoyang Liu. IEEE T. Geoscience and Remote Sensing (50): 4943-4955 (2012). Web SearchBibTeXDownload
240Gaussian Z-Interference Channel With a Relay Link: Achievability Region and Asymptotic Sum Capacity. Lei Zhou, Wei Yu. IEEE Transactions on Information Theory (58): 2413-2426 (2012). Web SearchBibTeXDownload
239Bit Allocation Laws for Multiantenna Channel Feedback Quantization: Multiuser Case. Behrouz Khoshnevis, Wei Yu. IEEE Transactions on Signal Processing (60): 367-382 (2012). Web SearchBibTeXDownload
238The Digital Marauder's Map: A WiFi Forensic Positioning Tool. Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao. IEEE Trans. Mob. Comput. (11): 377-389 (2012). Web SearchBibTeXDownload
237Suomi National Polar-orbiting Partnership: Verification and early operations for the Ozone Mapping and Profile Suite. Lawrence E. Flynn, Didier Rault, Glen Jaross, Irina Petropavlovskikh, Craig Long, Eric Beach, Wei Yu, Jianguo Niu, Dustin Swales, Chunhui Pan, Xiangqian Wu. IGARSS 2012, 280-283. Web SearchBibTeXDownload
236Transparent mobile service terminal: an overview. Yihong Qi, Wei Yu, Rongrong Zhang, George Shaker, Perry Jarmuszewski, George Mankaruse. IJCC (1): 302-311 (2012). Web SearchBibTeXDownload
235Pricing Strategy and Corporate Bond Value: Evidence from the Airline Industry. Min Shi, Wei Yu. IJORIS (3): 40-52 (2012). Web SearchBibTeXDownload
234Extensive analysis and large-scale empirical evaluation of tor bridge discovery. Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. INFOCOM 2012, 2381-2389. Web SearchBibTeXDownload
233A novel network delay based side-channel attack: Modeling and defense. Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu. INFOCOM 2012, 2390-2398. Web SearchBibTeXDownload
232A modified parallel optimization system for updating large-size time-evolving flow matrix. Ting Yu, Julien Ugon, Wei Yu. Inf. Sci. (194): 57-67 (2012). Web SearchBibTeXDownload
231Risk Assessment and Adaptive Group Testing of Semantic Web Services. Xiaoying Bai, Ron S. Kenett, Wei Yu. International Journal of Software Engineering and Knowledge Engineering (22): 595-620 (2012). Web SearchBibTeXDownload
230Highly Efficient Performance Portable Tracking of Evolving Surfaces. Wei Yu, Franz Franchetti, James C. Hoe, Tsuhan Chen. IPDPS 2012, 296-307. Web SearchBibTeXDownload
229Vehicle Scheduling on a Graph Revisited. Wei Yu, Mordecai Golin, Guochuan Zhang. ISAAC 2012, 362-371. Web SearchBibTeXDownload
228The Relationship between Inner Product and Counting Cycles. Xiaoming Sun, Chengu Wang, Wei Yu. LATIN 2012, 643-654. Web SearchBibTeXDownload
227A Simple Derivation to Implement Tracking Distributions. Wei Yu, Jifeng Ning, Nan Geng, Jiong Zhang. VISAPP (2) 2012, 351-354. Web SearchBibTeX
226Engineering Pathway for User Personal Knowledge Recommendation. Yunlu Zhang, Guofu Zhou, Jingxing Zhang, Ming Xie, Wei Yu, Shijun Li. WAIM 2012, 459-470. Web SearchBibTeXDownload
225Detecting Wikipedia Vandalism with a Contributing Efficiency-Based Approach. Xiaoyue Tang, Guofu Zhou, Yuchen Fu, Lin Gan, Wei Yu, Shijun Li. WISE 2012, 645-651. Web SearchBibTeXDownload
2011
224Skull Assembly and Completion Using Template-Based Surface Matching. Li Wei, Wei Yu, Maoqing Li, Xin Li. 3DIMPVT 2011, 413-420. Web SearchBibTeXDownload
223Embracement of E-Tourism in Ecotourism: A Case Study of Tourism Websites for Galapagos. Meng Zhang, Wei Yu, Jun Yuan. ACIS-ICIS 2011, 171-176. Web SearchBibTeXDownload
222On Integral Sum Numbers of Cycles. Ergen Liu, Qing Zhou, Wei Yu. CCTA (3) 2011, 136-139. Web SearchBibTeXDownload
221Mechanisms for Obnoxious Facility Game on a Path. Yukun Cheng, Wei Yu, Guochuan Zhang. COCOA 2011, 262-271. Web SearchBibTeXDownload
220On detecting active worms with varying scan rate. Wei Yu, Xun Wang, Adam C. Champion, Dong Xuan, David Lee. Computer Communications (34): 1269-1282 (2011). Web SearchBibTeXDownload
219Symmetry and template guided completion of damaged skulls. Xin Li, Zhao Yin, Li Wei, Shenghua Wan, Wei Yu, Maoqing Li. Computers & Graphics (35): 885-893 (2011). Web SearchBibTeXDownload
218Capacity of the Gaussian Relay Channel with Correlated Noises to Within a Constant Gap. Lei Zhou, Wei Yu. CoRR (abs/1110.4999) (2011). Web SearchBibTeXDownload
217Approximate Capacity Region of the $K$-User Cyclic Gaussian Interference Channel. Lei Zhou, Wei Yu. CoRR (abs/1103.5789) (2011). Web SearchBibTeXDownload
216Incremental Relaying for the Gaussian Interference Channel with a Degraded Broadcasting Relay. Lei Zhou, Wei Yu. CoRR (abs/1109.5420) (2011). Web SearchBibTeXDownload
215On Noisy Network Coding for a Gaussian Relay Chain Network with Correlated Noises. Lei Zhou, Wei Yu. CoRR (abs/1110.5000) (2011). Web SearchBibTeXDownload
214Two Birds and One Stone: Gaussian Interference Channel with a Shared Out-of-Band Relay. Peyman Razaghi, Song-Nam Hong, Lei Zhou, Wei Yu, Giuseppe Caire. CoRR (abs/1104.0430) (2011). Web SearchBibTeXDownload
213Routing open shop and flow shop scheduling problems. Wei Yu, Zhaohui Liu, Leiyang Wang, Tijun Fan. European Journal of Operational Research (213): 24-36 (2011). Web SearchBibTeXDownload
212On an Efficient Estimation of Available Bandwidth for IEEE 802.11-Based Wireless Networks. Peng Zhao, Xinyu Yang, Chiyong Dong, Shusen Yang, Sulabh Bhattarai, Wei Yu. GLOBECOM 2011, 1-5. Web SearchBibTeXDownload
211Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks. Jie Lin, Xinyu Yang, Wei Yu, Xinwen Fu. GLOBECOM 2011, 1-5. Web SearchBibTeXDownload
210A Limited-Feedback Scheduling and Beamforming Scheme for Multi-User Multi-Antenna Systems. Behrouz Khoshnevis, Wei Yu. GLOBECOM 2011, 1-5. Web SearchBibTeXDownload
209On a Hierarchical False Data Injection Attack on Power System State Estimation. Qinyu Yang, Jie Yang, Wei Yu, Nan Zhang, Wei Zhao. GLOBECOM 2011, 1-5. Web SearchBibTeXDownload
208Power spectrum optimization for interference mitigation via iterative function evaluation. Hayssam Dahrouj, Wei Yu, Taiwen Tang, Steve Beaudin. GLOBECOM Workshops 2011, 162-166. Web SearchBibTeXDownload
207Equal-Sized Cells Mean Equal-Sized Packets in Tor?. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu. ICC 2011, 1-6. Web SearchBibTeXDownload
206Cooperative Wireless Multicell OFDMA Network with Backhaul Capacity Constraints. Aakanksha Chowdhery, Wei Yu, John M. Cioffi. ICC 2011, 1-6. Web SearchBibTeXDownload
205Contextual dictionaries for image super resolution. Wei Yu, Hongxun Yao, Xianming Liu, Rongrong Ji, Xiaoshuai Sun, Pengfei Xu. ICIMCS 2011, 150-153. Web SearchBibTeXDownload
204Motion planning for steep hill climbing. Damion D. Dunlap, Wei Yu, Emmanuel G. Collins Jr., Charmane V. Caldwell. ICRA 2011, 707-714. Web SearchBibTeXDownload
203Interference Mitigation via Joint Detection. Jungwon Lee, Dimitris Toumpakaris, Wei Yu. IEEE Journal on Selected Areas in Communications (29): 1172-1184 (2011). Web SearchBibTeXDownload
202Multicell Interference Mitigation with Joint Beamforming and Common Message Decoding. Hayssam Dahrouj, Wei Yu. IEEE Transactions on Communications (59): 2264-2273 (2011). Web SearchBibTeXDownload
201Bit Allocation Law for Multiantenna Channel Feedback Quantization: Single-User Case. Behrouz Khoshnevis, Wei Yu. IEEE Transactions on Signal Processing (59): 2270-2283 (2011). Web SearchBibTeXDownload
200Modeling and Detection of Camouflaging Worm. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. IEEE Trans. Dependable Sec. Comput. (8): 377-390 (2011). Web SearchBibTeXDownload
199A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks. Yuefeng Huang, Xinyu Yang, Shusen Yang, Wei Yu, Xinwen Fu. IEEE T. Vehicular Technology (60): 1045-1058 (2011). Web SearchBibTeXDownload
198NPOESS preparatory project validation plans for the ozone mapping and profiler suite. Lawrence E. Flynn, Didier Rault, Glen Jaross, Irina Petropavlovskikh, Craig Long, Jonas Hörnstein, Eric Beach, Wei Yu, Jianguo Niu, Dustin Swales. IGARSS 2011, 4161-4163. Web SearchBibTeXDownload
197Multicell coordination via joint scheduling, beamforming and power spectrum adaptation. Wei Yu, Taesoo Kwon, Changyong Shin. INFOCOM 2011, 2570-2578. Web SearchBibTeXDownload
196A novel packet size based covert channel attack against anonymizer. Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan. INFOCOM 2011, 186-190. Web SearchBibTeXDownload
195Improved Approximation Algorithms for Routing Shop Scheduling. Wei Yu, Guochuan Zhang. ISAAC 2011, 30-39. Web SearchBibTeXDownload
194On the capacity of the K-user cyclic Gaussian interference channel. Lei Zhou, Wei Yu. ISIT 2011, 1171-1175. Web SearchBibTeXDownload
193Interference mitigation via joint detection in a fading environment. Jungwon Lee, Dimitris Toumpakaris, Wei Yu. ITA 2011, 233-239. Web SearchBibTeXDownload
192Mining Users Similarity of Interests in Web Community. Wei Yu, Shijun Li, Yunlu Zhang, Zhuo Zhang. JCP (6): 2357-2364 (2011). Web SearchBibTeXDownload
191Single-vehicle scheduling problems with release and service times on a line. Wei Yu, Zhaohui Liu. Networks (57): 128-134 (2011). Web SearchBibTeXDownload
190Are We Relying Too Much on Forensics Tools?. Hui Liu, Shiva Azadegan, Wei Yu, Subrata Acharya, Ali Sistani. SERA (selected papers) 2011, 145-156. Web SearchBibTeXDownload
189The Streaming Complexity of Cycle Counting, Sorting by Reversals, and Other Problems. Elad Verbin, Wei Yu. SODA 2011, 11-25. Web SearchBibTeXDownload
2010
188Phenopedia and Genopedia: disease-centered and gene-centered views of the evolving knowledge of human genetic associations. Wei Yu, Melinda Clyne, Muin J. Khoury, Marta Gwinn. Bioinformatics (26): 145-146 (2010). Web SearchBibTeXDownload
187Application of support vector machine modeling for prediction of common diseases: the case of diabetes and pre-diabetes. Wei Yu, Tiebin Liu, Rodolfo Valdez, Marta Gwinn, Muin J. Khoury. BMC Med. Inf. & Decision Making (10): 16 (2010). Web SearchBibTeXDownload
186Joint scheduling and dynamic power spectrum optimization for wireless multicell networks. Wei Yu, Taesoo Kwon, Changyong Shin. CISS 2010, 1-6. Web SearchBibTeXDownload
185High resolution channel quantization rules for multiuser spatial multiplexing systems. Behrouz Khoshnevis, Wei Yu. CISS 2010, 1-6. Web SearchBibTeXDownload
184On the symmetric capacity of the K-user symmetric cyclic Gaussian interference channel. Lei Zhou, Wei Yu. CISS 2010, 1-4. Web SearchBibTeXDownload
183On the Capacity of the $K$-User Cyclic Gaussian Interference Channel. Lei Zhou, Wei Yu. CoRR (abs/1010.1044) (2010). Web SearchBibTeXDownload
182Gaussian Z-Interference Channel with a Relay Link: Achievability Region and Asymptotic Sum Capacity. Lei Zhou, Wei Yu. CoRR (abs/1006.5087) (2010). Web SearchBibTeXDownload
181Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels. Behrouz Khoshnevis, Wei Yu. CoRR (abs/1003.2257) (2010). Web SearchBibTeXDownload
180Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels. Behrouz Khoshnevis, Wei Yu. CoRR (abs/1003.2259) (2010). Web SearchBibTeXDownload
179Fuzzy bi-level optimal model and its application in oilfield development. Xiaoyan Zhao, Wei Yu. FSKD 2010, 867-870. Web SearchBibTeXDownload
178Weak Laws of Large Numbers for fuzzy variables based on credibility measure. Baogui Xin, Tong Chen, Wei Yu. FSKD 2010, 377-381. Web SearchBibTeXDownload
177gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity. Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das. GameSec 2010, 58-71. Web SearchBibTeXDownload
176HLLS: A History Information Based Light Location Service for MANETs. Xiaojing Fan, Xinyu Yang, Wei Yu, Xinwen Fu. ICC 2010, 1-5. Web SearchBibTeXDownload
175Structure of Channel Quantization Codebook for Multiuser Spatial Multiplexing Systems. Behrouz Khoshnevis, Wei Yu. ICC 2010, 1-5. Web SearchBibTeXDownload
174Optimal Detector for Discrete Transmit Signals in Gaussian Interference Channels. Jungwon Lee, Jungwon Toumpakaris, Wei Yu. ICC 2010, 1-6. Web SearchBibTeXDownload
1733DLoc: Three Dimensional Wireless Localization Toolkit. Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang. ICDCS 2010, 30-39. Web SearchBibTeXDownload
172Cyber Crime Scene Investigations (C²SI) through Cloud Computing. Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo. ICDCS Workshops 2010, 26-31. Web SearchBibTeXDownload
171Fast bilateral filtering by adapting block size. Wei Yu, Franz Franchetti, James C. Hoe, Yao-Jen Chang, Tsuhan Chen. ICIP 2010, 3281-3284. Web SearchBibTeXDownload
170Fast and robust active contours for image segmentation. Wei Yu, Franz Franchetti, Yao-Jen Chang, Tsuhan Chen. ICIP 2010, 641-644. Web SearchBibTeXDownload
1693D augmented Markov random field for object recognition. Wei Yu, Ahmed Bilal Ashraf, Yao-Jen Chang, Congcong Li, Tsuhan Chen. ICIP 2010, 3889-3892. Web SearchBibTeXDownload
168Multi-Cell MIMO Cooperative Networks: A New Look at Interference. David Gesbert, Stephen V. Hanly, Howard Huang, Shlomo Shamai, Osvaldo Simeone, Wei Yu. IEEE Journal on Selected Areas in Communications (28): 1380-1408 (2010). Web SearchBibTeXDownload
167Guest Editorial Cooperative Communications in MIMO Cellular Networks. David Gesbert, Stephen V. Hanly, Howard Huang, Shlomo Shamai, Wei Yu, Michael B. Pursley. IEEE Journal on Selected Areas in Communications (28): 1377-1379 (2010). Web SearchBibTeXDownload
166Design of irregular LDPC codes with optimized performance-complexity tradeoff. Benjamin Smith, Masoud Ardakani, Wei Yu, Frank R. Kschischang. IEEE Transactions on Communications (58): 489-499 (2010). Web SearchBibTeXDownload
165Analysis and Experimental Verification for Dynamic Modeling of A Skid-Steered Wheeled Vehicle. Wei Yu, Oscar Y. Chuy, Emmaneul G. Collins, Patrick Hollis. IEEE Transactions on Robotics (26): 340-353 (2010). Web SearchBibTeXDownload
164Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks. Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das. IEEE Transactions on Systems, Man, and Cybernetics, Part B (40): 597-611 (2010). Web SearchBibTeXDownload
163Coordinated beamforming for the multicell multi-antenna wireless system. Hayssam Dahrouj, Wei Yu. IEEE Transactions on Wireless Communications (9): 1748-1759 (2010). Web SearchBibTeXDownload
162High Performance Stereo Vision Designed for Massively Data Parallel Platforms. Wei Yu, Tsuhan Chen, Franz Franchetti, James C. Hoe. IEEE Trans. Circuits Syst. Video Techn. (20): 1509-1519 (2010). Web SearchBibTeXDownload
161Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao. IEEE Trans. Computers (59): 1655-1668 (2010). Web SearchBibTeXDownload
160A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement. Zhu Ji, Wei Yu, K. J. Ray Liu. IEEE Trans. Mob. Comput. (9): 1242-1254 (2010). Web SearchBibTeXDownload
159Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao. IEEE Trans. Parallel Distrib. Syst. (21): 1501-1514 (2010). Web SearchBibTeXDownload
158Partial zero-forcing precoding for the interference channel with partially cooperating transmitters. Siddarth Hari, Wei Yu. ISIT 2010, 2283-2287. Web SearchBibTeXDownload
157Interference mitigation with joint beamforming and common message decoding in multicell systems. Hayssam Dahrouj, Wei Yu. ISIT 2010, 2068-2072. Web SearchBibTeXDownload
156Universal relaying for the interference channel. Peyman Razaghi, Wei Yu. ITA 2010, 552-557. Web SearchBibTeXDownload
155Grids-Based Data Parallel Computing for Learning Optimization in a Networked Learning Control Systems. Lijun Xu, Minrui Fei, Tai C. Yang, Wei Yu. LSMS/ICSEE (1) 2010, 221-232. Web SearchBibTeXDownload
154An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs. Wenjing Yang, Xinyu Yang, Guozheng Liu, Wei Yu. WCNIS 2010, 483-487. Web SearchBibTeXDownload
153Efficient Interactive Smart Keyword Search. Shijun Li, Wei Yu, Xiaoyan Gu, Huifu Jiang, Chuanyun Fang. WISE 2010, 204-215. Web SearchBibTeXDownload
152Generic network forensic data acquisition from household and small business wireless routers. Zhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu. WOWMOM 2010, 1-6. Web SearchBibTeXDownload
2009
151A new cell counter based attack against tor. Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia. ACM Conference on Computer and Communications Security 2009, 578-589. Web SearchBibTeXDownload
150Distance Oracles for Sparse Graphs. Christian Sommer, Elad Verbin, Wei Yu. FOCS 2009, 703-712. Web SearchBibTeXDownload
149Joint Power Control and Beamforming Codebook Design for MISO Channels with Limited Feedback. Behrouz Khoshnevis, Wei Yu. GLOBECOM 2009, 1-6. Web SearchBibTeXDownload
148Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field Fq for Some Orders. Wei Yu, Kunpeng Wang, Bao Li. IACR Cryptology ePrint Archive (2009): 638 (2009). Web SearchBibTeXDownload
147CAP: A Context-Aware Privacy Protection System for Location-Based Services. Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao. ICDCS 2009, 49-57. Web SearchBibTeXDownload
146The Digital Marauder's Map: A New Threat to Location Privacy. Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao. ICDCS 2009, 589-596. Web SearchBibTeXDownload
145Evaluation and Research on Green Strength of Reverse Logistics System. Sheng Zeng, Wei Yu. ICEBE 2009, 451-453. Web SearchBibTeXDownload
144Modeling for Sleeping Fidget Sensor Based on Multi-source Information Fusion. De-biao Wang, Wei Liu, Feng-gang Zhao, Wei Yu, Peng-fei Qu, Jing Xu. ICFIE 2009, 977-985. Web SearchBibTeXDownload
143Real time stereo vision using exponential step cost aggregation on GPU. Wei Yu, Tsuhan Chen, James C. Hoe. ICIP 2009, 4281-4284. Web SearchBibTeXDownload
142Parking space detection from video by augmenting training dataset. Wei Yu, Tsuhan Chen. ICIP 2009, 849-852. Web SearchBibTeXDownload
141Power modeling of a skid steered wheeled robotic ground vehicle. Oscar Chuy, Emmanuel G. Collins Jr., Wei Yu, Camilo Ordonez. ICRA 2009, 4118-4123. Web SearchBibTeXDownload
140Capacity of a Class of Modulo-Sum Relay Channels. Marko Aleksic, Peyman Razaghi, Wei Yu. IEEE Transactions on Information Theory (55): 921-930 (2009). Web SearchBibTeXDownload
139Parity Forwarding for Multiple-Relay Networks. Peyman Razaghi, Wei Yu. IEEE Transactions on Information Theory (55): 158-173 (2009). Web SearchBibTeXDownload
138An Invisible Localization Attack to Internet Threat Monitors. Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao. IEEE Trans. Parallel Distrib. Syst. (20): 1611-1625 (2009). Web SearchBibTeXDownload
137TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, Yong Guan. IEEE Trans. Parallel Distrib. Syst. (20): 695-709 (2009). Web SearchBibTeXDownload
136Data preparation for sample-based face detection. Wei Yu, Xudong Jiang, Bing Xiong. IJCAT (35): 10-22 (2009). Web SearchBibTeXDownload
135Blind Detection of Spread Spectrum Flow Watermarks. Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu. INFOCOM 2009, 2195-2203. Web SearchBibTeXDownload
134Dynamic modeling of a skid-steered wheeled vehicle with experimental verification. Wei Yu, Oscar Chuy, Emmanuel G. Collins Jr., Patrick Hollis. IROS 2009, 4212-4219. Web SearchBibTeXDownload
133Vehicle routing problems on a line-shaped network with release time constraints. Wei Yu, Zhaohui Liu. Oper. Res. Lett. (37): 85-88 (2009). Web SearchBibTeXDownload
132Effects of joint torque constraints on humanoid robot balance recovery in the presence of external disturbance. Wei Yu, Gang Bao, Zuwen Wang. ROBIO 2009, 2362-2367. Web SearchBibTeXDownload
131Constraint-Based Learning of Distance Functions for Object Trajectories. Wei Yu, Michael Gertz. SSDBM 2009, 627-645. Web SearchBibTeXDownload
130Using NHDPlus as the Land Base for the Noah-distributed Model. Cédric H. David, David J. Gochis, David R. Maidment, Wei Yu, David N. Yates, Zong-Liang Yang. T. GIS (13): 363-377 (2009). Web SearchBibTeXDownload
129On the energy efficiency of cooperative communications in wireless sensor networks. Ahmed K. Sadek, Wei Yu, K. J. Ray Liu. TOSN (6) (2009). Web SearchBibTeXDownload
128Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. Nan Zhang, Min Song, Xinwen Fu, Wei Yu. WASA 2009, 570-578. Web SearchBibTeXDownload
127Bandwidth and routing optimization in wireless cellular networks with relays. Jingping Ji, Wei Yu. WiOpt 2009, 1-5. Web SearchBibTeXDownload
2008
126GAPscreener: An automatic tool for screening human genetic association literature in PubMed using the support vector machine technique. Wei Yu, Melinda Clyne, Siobhan M. Dolan, Ajay Yesupriya, Anja Wulf, Tiebin Liu, Muin J. Khoury, Marta Gwinn. BMC Bioinformatics (9) (2008). Web SearchBibTeXDownload
125Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseases. Wei Yu, Anja Wulf, Tiebin Liu, Muin J. Khoury, Marta Gwinn. BMC Bioinformatics (9) (2008). Web SearchBibTeXDownload
124Coordinated beamforming for the multi-cell multi-antenna wireless system. Hayssam Dahrouj, Wei Yu. CISS 2008, 429-434. Web SearchBibTeXDownload
123Grassmannian beamforming for MIMO amplify-and-forward relaying. Behrouz Khoshnevis, Wei Yu, Raviraj Adve. CISS 2008, 161-166. Web SearchBibTeXDownload
122Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan. Computer Communications (31): 4005-4017 (2008). Web SearchBibTeXDownload
121On localization attacks to Internet Threat Monitors: An information-theoretic framework. Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao. DSN 2008, 356-365. Web SearchBibTeXDownload
120A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. Xuhua Ding, Wei Yu, Ying Pan. ICC 2008, 1605-1609. Web SearchBibTeXDownload
119A New Replay Attack Against Anonymous Communication Networks. Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao. ICC 2008, 1578-1582. Web SearchBibTeXDownload
118Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server. César A. Galindo-Legaria, Torsten Grabs, Sreenivas Gukal, Steve Herbert, Aleksandras Surna, Shirley Wang, Wei Yu, Peter Zabback, Shin Zhang. ICDE 2008, 1190-1199. Web SearchBibTeXDownload
117Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das. ICPADS 2008, 501-508. Web SearchBibTeXDownload
116Discovering Entities Relationships on the Web. Wei Yu, Junpeng Chen, Guoying Yu. ICSC 2008, 490-491. Web SearchBibTeXDownload
115EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. Luobei Kuang, Ming Xu, Wei Yu. ICYCS 2008, 599-604. Web SearchBibTeXDownload
114A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs. Zhu Ji, Wei Yu, K. J. Ray Liu. IEEE Journal on Selected Areas in Communications (26): 1204-1217 (2008). Web SearchBibTeXDownload
113Joint source coding, routing and power allocation in wireless sensor networks. Jun Yuan, Wei Yu. IEEE Transactions on Communications (56): 886-896 (2008). Web SearchBibTeXDownload
112Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach. Wei Yu, K. J. Ray Liu. IEEE Transactions on Information Forensics and Security (3): 317-330 (2008). Web SearchBibTeXDownload
111Applying the Delta model to mobile marketing management in the US marketplace. Dawn N. Jutla, Wei Yu. IJEB (6): 216-231 (2008). Web SearchBibTeXDownload
110iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao. INFOCOM 2008, 1930-1938. Web SearchBibTeXDownload
109Energy-efficient target detection in sensor networks using line proxies. Jangwon Lee, Wei Yu, Xinwen Fu. Int. J. Communication Systems (21): 251-275 (2008). Web SearchBibTeXDownload
108On performance bottleneck of anonymous communication networks. Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu. IPDPS 2008, 1-11. Web SearchBibTeXDownload
2007
107An open source infrastructure for managing knowledge and finding potential collaborators in a domain-specific subset of PubMed, with an example from human genome epidemiology. Wei Yu, Ajay Yesupriya, Anja Wulf, Junfeng Qu, Muin J. Khoury, Marta Gwinn. BMC Bioinformatics (8) (2007). Web SearchBibTeXDownload
106An automatic method to generate domain-specific investigator networks using PubMed abstracts. Wei Yu, Ajay Yesupriya, Anja Wulf, Junfeng Qu, Marta Gwinn, Muin J. Khoury. BMC Med. Inf. & Decision Making (7): 17 (2007). Web SearchBibTeXDownload
105Systems Modeling of Alveolar Morphogenesis In Vitro. Sean H. J. Kim, Sunwoo Park, Wei Yu, Keith E. Mostov, Michael A. Matthay, C. Anthony Hunt. CAINE 2007, 141-144. Web SearchBibTeX
104Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying. Behrouz Khoshnevis, Wei Yu, Raviraj Adve. CoRR (abs/0710.5758) (2007). Web SearchBibTeXDownload
103Capacity of a Class of Modulo-Sum Relay Channels. Marko Aleksic, Peyman Razaghi, Wei Yu. CoRR (abs/0704.3591) (2007). Web SearchBibTeXDownload
102Parity Forwarding for Multiple-Relay Networks. Peyman Razaghi, Wei Yu. CoRR (abs/0711.2712) (2007). Web SearchBibTeXDownload
101OS_RANK: Structure Analysis for Ontology Ranking. Wei Yu, Qing Li, Junpeng Chen, Jiaheng Cao. ICDE Workshops 2007, 339-346. Web SearchBibTeXDownload
100Joint optimization of relay strategies and resource allocations in cooperative cellular networks. Truman Chiu-Yam Ng, Wei Yu. IEEE Journal on Selected Areas in Communications (25): 328-339 (2007). Web SearchBibTeXDownload
99DSSS-Based Flow Marking Technique for Invisible Traceback. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao. IEEE Symposium on Security and Privacy 2007, 18-32. Web SearchBibTeXDownload
98Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. Wei Yu, K. J. Ray Liu. IEEE Transactions on Information Forensics and Security (2): 227-239 (2007). Web SearchBibTeXDownload
97Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. Wei Yu, Zhu Ji, K. J. Ray Liu. IEEE Transactions on Information Forensics and Security (2): 240-253 (2007). Web SearchBibTeXDownload
96Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels. Peyman Razaghi, Wei Yu, Jörg Kliewer, D. Costello Razaghi, Wei Yu. IEEE Transactions on Information Theory (53): 3723-3739 (2007). Web SearchBibTeXDownload
95Optimal Network Rate Allocation under End-to-End Quality-of-Service Requirements. Mohamed E. M. Saad, Alberto Leon-Garcia, Wei Yu. IEEE Transactions on Network and Service Management (4): 40-49 (2007). Web SearchBibTeXDownload
94Multiuser Spectrum Optimization for Discrete Multitone Systems With Asynchronous Crosstalk. Vincent M. K. Chan, Wei Yu. IEEE Transactions on Signal Processing (55): 5425-5435 (2007). Web SearchBibTeXDownload
93Transmitter Optimization for the Multi-Antenna Downlink With Per-Antenna Power Constraints. Wei Yu, Tian Lan. IEEE Transactions on Signal Processing (55): 2646-2660 (2007). Web SearchBibTeXDownload
92Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. Wei Yu, Yan Lindsay Sun, K. J. Ray Liu. IEEE Trans. Dependable Sec. Comput. (4): 228-242 (2007). Web SearchBibTeXDownload
91Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. Wei Yu, K. J. Ray Liu. IEEE Trans. Mob. Comput. (6): 507-521 (2007). Web SearchBibTeXDownload
90Detecting worms via mining dynamic program execution. Xun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan. SecureComm 2007, 412-421. Web SearchBibTeXDownload
89Differential combining for acquiring weak GPS signals. Wei Yu, Bo Zheng, Rob Watson, Gérard Lachapelle. Signal Processing (87): 824-840 (2007). Web SearchBibTeXDownload
2006
88On Detecting Camouflaging Worm. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. ACSAC 2006, 235-244. Web SearchBibTeXDownload
87Effective query aggregation for data services in sensor networks. Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan. Computer Communications (29): 3733-3744 (2006). Web SearchBibTeXDownload
86Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels. Peyman Razaghi, Wei Yu, Jörg Kliewer, D. Costello Razaghi, Wei Yu. CoRR (abs/cs/0609018) (2006). Web SearchBibTeXDownload
85On Recognizing Virtual Honeypots and Countermeasures. Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham. DASC 2006, 211-218. Web SearchBibTeXDownload
84Joint Multiuser Detection and Optimal Spectrum Balancing for Digital Subscriber Lines. Vincent M. K. Chan, Wei Yu. EURASIP J. Adv. Sig. Proc. (2006) (2006). Web SearchBibTeXDownload
83Advanced Signal Processing for Digital Subscriber Lines. Raphael Cendrillon, Iain B. Collings, Tomas Nordström, Frank Sjöberg, Michail Tsatsanis, Wei Yu. EURASIP J. Adv. Sig. Proc. (2006) (2006). Web SearchBibTeXDownload
82Near-Capacity Coding for Discrete Multitone Systems with Impulse Noise. Masoud Ardakani, Frank R. Kschischang, Wei Yu. EURASIP J. Adv. Sig. Proc. (2006) (2006). Web SearchBibTeXDownload
81Rate Allocation under Network End-to-End Quality-of-Service Requirements. Mohamed E. M. Saad, Alberto Leon-Garcia, Wei Yu. GLOBECOM 2006. Web SearchBibTeXDownload
80Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach. Jun Yuan, Wei Yu. GLOBECOM 2006. Web SearchBibTeXDownload
79Bilayer LDPC Codes for the Relay Channel. Peyman Razaghi, Wei Yu. ICC 2006, 1574-1579. Web SearchBibTeXDownload
78A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks. Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li. IEEE Journal on Selected Areas in Communications (24): 2092-2103 (2006). Web SearchBibTeXDownload
77Information theoretic framework of trust modeling and evaluation for ad hoc networks. Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu. IEEE Journal on Selected Areas in Communications (24): 305-317 (2006). Web SearchBibTeXDownload
76An Introduction to Convex Optimization for Communications and Signal Processing. Zhi-Quan Luo, Wei Yu. IEEE Journal on Selected Areas in Communications (24): 1426-1438 (2006). Web SearchBibTeXDownload
75Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems. Wei Yu, Raymond Lui. IEEE Transactions on Communications (54): 1310-1322 (2006). Web SearchBibTeXDownload
74Constant-power waterfilling: performance bound and low-complexity implementation. Wei Yu, John M. Cioffi. IEEE Transactions on Communications (54): 23-28 (2006). Web SearchBibTeXDownload
73Optimal multiuser spectrum balancing for digital subscriber lines. Raphael Cendrillon, Wei Yu, Marc Moonen, Jan Verlinden, Tom Bostoen. IEEE Transactions on Communications (54): 922-933 (2006). Web SearchBibTeXDownload
72Uplink-downlink duality via minimax duality. Wei Yu. IEEE Transactions on Information Theory (52): 361-374 (2006). Web SearchBibTeXDownload
71Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition. Wei Yu. IEEE Transactions on Information Theory (52): 754-759 (2006). Web SearchBibTeXDownload
70Efficient rate control for JPEG-2000. Wei Yu, Fangting Sun, Jason E. Fritts. IEEE Trans. Circuits Syst. Video Techn. (16): 577-589 (2006). Web SearchBibTeXDownload
69A single receiving chip for DVB data broadcasting system. Guanghui He, Ningyi Xu, Wei Yu, Zucheng Zhou. IEEE Trans. Consumer Electronics (52): 1084-1091 (2006). Web SearchBibTeXDownload
68A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu. INFOCOM 2006. Web SearchBibTeXDownload
67An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. Zhu Ji, Wei Yu, K. J. Ray Liu. INFOCOM 2006. Web SearchBibTeXDownload
66Distributed policy processing in active-service based infrastructures. Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao. Int. J. Communication Systems (19): 727-750 (2006). Web SearchBibTeXDownload
65Cooperation Enforcement in Autonomous MANETs under Noise and Imperfect Observation. Zhu Ji, Wei Yu, K. J. Ray Liu. SECON 2006, 460-468. Web SearchBibTeXDownload
64When Does Cooperation Have Better Performance in Sensor Networks?. Ahmed K. Sadek, Wei Yu, K. J. Ray Liu. SECON 2006, 188-197. Web SearchBibTeXDownload
63Effective Detection of Active Worms with Varying Scan Rate. Wei Yu, Xun Wang, Dong Xuan, David Lee. SecureComm 2006, 1-10. Web SearchBibTeXDownload
62Self-adaptive Worms and Countermeasures. Wei Yu, Nan Zhang, Wei Zhao. SSS 2006, 548-562. Web SearchBibTeXDownload
61Belief-based packet forwarding in self-organized mobile ad hoc networks with noise and imperfect observation. Zhu Ji, Wei Yu, K. J. Ray Liu. WCNC 2006, 343-348. Web SearchBibTeXDownload
60A dynamic geographic hash table for data-centric storage in sensor networks. Thang Nam Le, Wei Yu, Xiaole Bai, Dong Xuan. WCNC 2006, 2168-2174. Web SearchBibTeXDownload
59Policy-driven physical attacks in sensor networks: modeling and measurement. Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu, Dong Xuan. WCNC 2006, 671-678. Web SearchBibTeXDownload
2005
58A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web. Kin F. Li, Yali Wang, Shojiro Nishio, Wei Yu. APWeb 2005, 195-206. Cited by 6Web SearchBibTeXDownload
57A Churn-Strategy Alignment Model for Managers in Mobile Telecom. Wei Yu, Dawn N. Jutla, Shyamala C. Sivakumar. CNSR 2005, 48-53. Web SearchBibTeXDownload
56P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Wei Yu, Sriram Chellappan, Dong Xuan. Future Generation Comp. Syst. (21): 209-219 (2005). Web SearchBibTeXDownload
55On defending peer-to-peer system-based active worm attacks. Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan. GLOBECOM 2005, 5. Web SearchBibTeXDownload
54Defense against injecting traffic attacks in cooperative ad hoc networks. Wei Yu, K. J. Ray Liu. GLOBECOM 2005, 5. Web SearchBibTeXDownload
53An adaptive zone-based storage architecture for wireless sensor networks. Thang Nam Le, Dong Xuan, Wei Yu. GLOBECOM 2005, 5. Web SearchBibTeXDownload
52Anti-attack cooperation stimulation in self-organized ad hoc networks. Wei Yu, K. J. Ray Liu. GLOBECOM 2005, 5. Web SearchBibTeXDownload
51A dynamic pricing approach for self-organized mobile ad hoc networks. Zhu Ji, Wei Yu, K. J. Ray Liu. GLOBECOM 2005, 5. Web SearchBibTeXDownload
50Minimization of rekeying cost for contributory group communications. Wei Yu, Yan Sun, K. J. Ray Liu. GLOBECOM 2005, 5. Web SearchBibTeXDownload
49Trust modeling and evaluation in ad hoc networks. Yan Sun, Wei Yu, Zhu Han, K. J. Ray Liu. GLOBECOM 2005, 6. Web SearchBibTeXDownload
48Peer-to-peer system-based active worm attacks: modeling and analysis. Wei Yu, Corey Boyer, Sriram Chellappan, Dong Xuan. ICC 2005, 295-300. Web SearchBibTeXDownload
47Low-complexity near-optimal spectrum balancing for digital subscriber lines. Raymond Lui, Wei Yu. ICC 2005, 1947-1951. Web SearchBibTeXDownload
46Joint source coding, routing and resource allocation for wireless sensor networks. Wei Yu, Jun Yuan. ICC 2005, 737-741. Web SearchBibTeXDownload
45A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population. Rubin Wang, Wei Yu. ICNC (1) 2005, 490-498. Web SearchBibTeXDownload
44Attack-resistant cooperation stimulation in autonomous ad hoc networks. Wei Yu, K. J. Ray Liu. IEEE Journal on Selected Areas in Communications (23): 2260-2271 (2005). Web SearchBibTeXDownload
43Trellis and convolutional precoding for transmitter-based interference presubtraction. Wei Yu, David P. Varodayan, John M. Cioffi. IEEE Transactions on Communications (53): 1220-1230 (2005). Web SearchBibTeXDownload
42A high performance CABAC decoding architecture. Wei Yu, Yun He. IEEE Trans. Consumer Electronics (51): 1352-1359 (2005). Web SearchBibTeXDownload
41HADOF: defense against routing disruptions in mobile ad hoc networks. Wei Yu, Yan Sun, K. J. Ray Liu. INFOCOM 2005, 1252-1261. Web SearchBibTeXDownload
40Secure cooperative mobile ad hoc networks against injecting traffic attacks. Wei Yu, K. J. Ray Liu. SECON 2005, 55-64. Web SearchBibTeXDownload
39Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. Wei Yu, K. J. Ray Liu. SECON 2005, 65-75. Web SearchBibTeXDownload
38THUIR at TREC 2005: Enterprise Track. Yupeng Fu, Wei Yu, Yize Li, Yiqun Liu, Min Zhang, Shaoping Ma. TREC 2005. Web SearchBibTeXDownload
37XQuery Implementation in a Relational Database System. Shankar Pal, Istvan Cseri, Oliver Seeliger, Michael Rys, Gideon Schaller, Wei Yu, Dragan Tomic, Adrian Baras, Brandon Berg, Denis Churin, Eugene Kogan. VLDB 2005, 1175-1186. Cited by 36Web SearchBibTeXDownload
36Finding the search engine that works for you. Kin F. Li, Wei Yu, Shojiro Nishio, Yali Wang. WWW (Special interest tracks and posters) 2005, 920-921. Web SearchBibTeXDownload
2004
35Use Case Refactoring: A Tool and a Case Study. Jian Xu, Wei Yu, Kexing Rui, Gregory Butler. APSEC 2004, 484-491. Web SearchBibTeXDownload
34Refactoring Use Case Models on Episodes. Wei Yu, Jun Li, Greg Butler. ASE 2004, 328-331. Web SearchBibTeXDownload
33Integrated Rate Control and Entropy Coding for JPEG 2000. Wei Yu. Data Compression Conference 2004, 152-161. Web SearchBibTeXDownload
32Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. Fangting Sun, Wei Yu. Data Compression Conference 2004, 565. Web SearchBibTeXDownload
31Dual optimization methods for multiuser orthogonal frequency division multiplex systems. Wei Yu, R. Lui, Raphael Cendrillon. GLOBECOM 2004, 225-229. Web SearchBibTeXDownload
30Input optimization for multi-antenna broadcast channels with per-antenna power constraints. Tian Lan, Wei Yu. GLOBECOM 2004, 420-424. Web SearchBibTeXDownload
29Energy efficient JPEG 2000 image transmission over wireless sensor networks. Wei Yu, Zafer Sahinoglu, Anthony Vetro. GLOBECOM 2004, 2738-2743. Web SearchBibTeXDownload
28Analyze the Worm-Based Attack in Large Scale P2P. Wei Yu. HASE 2004, 308-309. Web SearchBibTeXDownload
27Optimal multiuser spectrum management for digital subscriber lines. Raphael Cendrillon, Marc Moonen, Jan Verlinden, Tom Bostoen, Wei Yu. ICC 2004, 1-5. Web SearchBibTeXDownload
26A Prototype Tool for Use Case Refactoring. Shengbing Ren, Gregory Butler, Kexing Rui, Jian Xu, Wei Yu, Renhang Luo. ICEIS (3) 2004, 173-178. Web SearchBibTeX
25Sum Capacity of Gaussian Vector Broadcast Channels. Wei Yu, John M. Cioffi. IEEE Transactions on Information Theory (50): 1875-1892 (2004). Web SearchBibTeXDownload
24Iterative water-filling for Gaussian vector multiple-access channels. Wei Yu, Wonjong Rhee, Stephen P. Boyd, John M. Cioffi. IEEE Transactions on Information Theory (50): 145-152 (2004). Web SearchBibTeXDownload
23The optimality of beamforming in uplink multiuser wireless systems. Wonjong Rhee, Wei Yu, John M. Cioffi. IEEE Transactions on Wireless Communications (3): 86-96 (2004). Web SearchBibTeXDownload
22P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. Wei Yu. ISPAN 2004, 514-519. Web SearchBibTeXDownload
21Inverse parametric sequence alignment. Fangting Sun, David Fernández-Baca, Wei Yu. J. Algorithms (53): 36-54 (2004). Web SearchBibTeXDownload
20Scalable network resource management for large scale Virtual Private Networks. Wei Yu, Jian Wang. Simulation Modelling Practice and Theory (12): 263-285 (2004). Web SearchBibTeXDownload
2003
19XML Restructuring and Integration for Tabular Data. Wei Yu, Z. Meral Özsoyoglu, Gultekin Özsoyoglu. DEXA 2003, 233-243. Cited by 1Web SearchBibTeXDownload
18Spatial multiplex in downlink multiuser multiple-antenna wireless environments. Wei Yu. GLOBECOM 2003, 1887-1891. Web SearchBibTeXDownload
17Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao. IAW 2003, 84-91. Web SearchBibTeX
16A byte-erasure method for improved impulse immunity in DSL systems using soft information from an inner code. Dimitris Toumpakaris, Wei Yu, John M. Cioffi, Daniel Gardan, Meryem Ouzzif. ICC 2003, 2431-2435. Web SearchBibTeXDownload
15A simple byte-erasure method for improved impulse immunity in DSL. Dimitris Toumpakaris, Wei Yu, John M. Cioffi, Daniel Gardan, Meryem Ouzzif. ICC 2003, 2426-2430. Web SearchBibTeXDownload
14Performance of asymmetric digital subscriber lines in an impulse noise environment. Wei Yu, Dimitris Toumpakaris, John M. Cioffi, Daniel Gardan, Frédéric Gauthier. IEEE Transactions on Communications (51): 1653-1657 (2003). Web SearchBibTeXDownload
13Distributed Bandwidth Allocation for the Virtual Private Network. Wei Yu, Jian Wang. International Conference on Internet Computing 2003, 486-488. Web SearchBibTeX
2002
12Inverse Parametric Sequence Alignment. Fangting Sun, David Fernández-Baca, Wei Yu. COCOON 2002, 97-106. Web SearchBibTeXDownload
11A hierarchical image segmentation algorithm. Wei Yu, Jason Fritts, Fangting Sun. ICME (2) 2002, 221-224. Web SearchBibTeXDownload
10Content-Based Image Retrieval Using Multiple-Instance Learning. Qi Zhang, Sally A. Goldman, Wei Yu, Jason E. Fritts. ICML 2002, 682-689. Web SearchBibTeX
9FDMA capacity of Gaussian multiple-access channels with ISI. Wei Yu, John M. Cioffi. IEEE Transactions on Communications (50): 102-111 (2002). Web SearchBibTeXDownload
8Advantages of motion-JPEG2000 in video processing. Wei Yu, Ruibiao Qiu, Jason E. Fritts. VCIP 2002, 635-645. Web SearchBibTeX
2001
7A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems. Weiyu Wu, Peng Pan, Hua Li, Wei Yu, Dongmei Liang. CSCWD 2001, 218-222. Web SearchBibTeXDownload
6On constant power water-filling. Wei Yu, John M. Cioffi. ICC 2001, 1665-1669. Web SearchBibTeXDownload
5Optimal power control in multiple access fading channels with multiple antennas. Wei Yu, Wonjong Rhee, John M. Cioffi. ICC 2001, 575-579. Web SearchBibTeXDownload
2000
4FDMA Capacity of the Gaussian Multiple Access Channel With ISI. Wei Yu, John M. Cioffi. ICC (3) 2000, 1365-1369. Web SearchBibTeX
1998
3Analysis of the Scenery Perceived by a Real Mobile Robot Khepera. Ryoichi Odagiri, Wei Yu, Tatsuya Asai, Kazuyuki Murase. ICES 1998, 295-302. Web SearchBibTeXDownload
2Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences. Kazuyuki Murase, Takaharu Wakida, Ryoichi Odagiri, Wei Yu, Hirotaka Akita, Tatsuya Asai. ICES 1998, 280-286. Web SearchBibTeXDownload
1993
1A new insight to the ANN-based multitarget tracking data association. Shiyi Mao, Pinxing Lin, Wei Yu. ISCAS 1993, 2423-2426. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research