default search action
Jie Yuan 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, School of Cybersecurity, Key Laboratory of Trustworthy Distributed Computing and Service, Beijing, China
Other persons with the same name
- Jie Yuan (aka: Yuan Jie) — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Jie Yuan, Zicong Wang, Tingting Yuan, Jing Zhang, Rui Qian:
Pimo: memory-efficient privacy protection in video streaming and analytics. Multim. Syst. 30(3): 137 (2024) - [c11]Yiyang Huang, Xiaoyong Li, Jie Yuan, Kaiguo Yuan:
A machine learning-based trust evaluation model for wireless sensor networks. CSAIDE 2024: 654-658 - [c10]Xinghai Wei, Tingting Yuan, Jie Yuan, Xiaoming Fu:
Learning to Communicate Strategically for Efficient Collective Intelligence. NAIC 2024: 4-6 - 2023
- [j15]Jie Yuan, Rui Qian, Tingting Yuan, Mingliang Sun, Jirui Li, Xiaoyong Li:
LayerCFL: an efficient federated learning with layer-wised clustering. Cybersecur. 6(1): 39 (2023) - [j14]Ximing Li, Xiaoyong Li, Jia Jia, Linghui Li, Jie Yuan, Yali Gao, Shui Yu:
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 18: 1638-1652 (2023) - [c9]Tingting Yuan, Hwei-Ming Chung, Jie Yuan, Xiaoming Fu:
DACOM: Learning Delay-Aware Communication for Multi-Agent Reinforcement Learning. AAAI 2023: 11763-11771 - [c8]Yaozheng Xing, Jie Yuan, Qixun Liu, Shihao Peng, Yan Yan, Junyi Yao:
MM-UNet: Multi-attention mechanism and multi-scale feature fusion UNet for tumor image segmentation. CACML 2023: 253-257 - [c7]Xinghai Wei, Jie Yuan, Xiaoyong Li, Dongxiao Liu:
NDRA: An Efficient Multi-Objective Optimal Routing Algorithm Using Pareto Domination. MobiArch 2023: 19-24 - 2022
- [j13]Binsi Cai, Xiaoyong Li, Wenping Kong, Jie Yuan, Shui Yu:
A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT. IEEE Internet Things J. 9(13): 10988-11003 (2022) - [j12]Wenping Kong, Xiaoyong Li, Liyang Hou, Jie Yuan, Yali Gao, Shui Yu:
A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing. IEEE Internet Things J. 9(15): 13927-13941 (2022) - [j11]Jirui Li, Xiaoyong Li, Jie Yuan, Yunquan Gao, Rui Zhang:
An Energy-Constrained Forwarding Scheme Based on Group Trustworthiness in Mobile Internet of Things. IEEE Syst. J. 16(1): 531-542 (2022) - [j10]Chuanyi Liu, Xiaoyong Li, Mingliang Sun, Yali Gao, Jie Yuan, Shaoming Duan:
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback. IEEE Trans. Cloud Comput. 10(2): 1021-1037 (2022) - [c6]Jia Jia, Xiaoyong Li, Ximing Li, Linghui Li, Jie Yuan, Hongmiao Wang, Yali Gao, Pengfei Qiu, Jialu Tang:
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1189-1194 - [i1]Tingting Yuan, Hwei-Ming Chung, Jie Yuan, Xiaoming Fu:
DACOM: Learning Delay-Aware Communication for Multi-Agent Reinforcement Learning. CoRR abs/2212.01619 (2022) - 2021
- [c5]Mingjie Sun, Xiaoyong Li, Yali Gao, Jie Yuan, Wenping Kong, Haifeng Chang:
An Improved Random Walk Algorithm for Resource Scheduling in Cloud Datacenter. ICCDE 2021: 1-7 - 2020
- [c4]Jingbing Chen, Jie Yuan, Yuewei Li, Yiqi Zhang, Yufan Yang, Ruiqi Feng:
A Malicious Web Page Detection Model based on SVM Algorithm: Research on the Enhancement of SVM Efficiency by Multiple Machine Learning Algorithms. ACAI 2020: 51:1-51:7
2010 – 2019
- 2019
- [j9]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Tingting Yuan, Xiaoyong Li:
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers. Future Internet 11(8): 168 (2019) - [j8]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li:
Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Inf. 10(8): 259 (2019) - [j7]Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li:
Erratum: Yuan, J. et al. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Information 2019, 10, 259. Inf. 10(10): 319 (2019) - [j6]Jirui Li, Xiaoyong Li, Jie Yuan, Rui Zhang, Binxing Fang:
Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things. IEEE Internet Things J. 6(2): 2778-2796 (2019) - [j5]Jirui Li, Xiaoyong Li, Xianglong Cheng, Jie Yuan, Rui Zhang:
A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things. J. Netw. Comput. Appl. 140: 40-53 (2019) - [j4]Xiaoyong Li, Jie Yuan, Erxia Li, Wenbin Yao, Junping Du:
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service. IEEE Trans. Netw. Serv. Manag. 16(3): 1240-1254 (2019) - 2018
- [j3]Jie Yuan, Xiaoyong Li:
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion. IEEE Access 6: 23626-23638 (2018) - [j2]Jirui Li, Xiaoyong Li, Yunquan Gao, Jie Yuan, Binxing Fang:
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things. IEEE Access 6: 74579-74597 (2018) - [j1]Xiaoyong Li, Jie Yuan, Huadong Ma, Wenbin Yao:
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. IEEE Trans. Inf. Forensics Secur. 13(8): 1917-1931 (2018) - [c3]Tingting Yuan, Xiaohong Huang, Maode Ma, Jie Yuan:
Balance-Based SDN Controller Placement and Assignment with Minimum Weight Matching. ICC 2018: 1-6 - [c2]Jie Yuan, Xiaoyong Li:
A multi-source feedback based trust calculation mechanism for edge computing. INFOCOM Workshops 2018: 819-824 - [c1]Jie Yuan, Xiaoyong Li:
A Broker-guided Trust Calculation Model for Mobile Devices of D2D Communications. ISCC 2018: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint