default search action
Yunkai Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yunkai Wei, Zikang Wan, Yinan Xiao, Supeng Leng, Kezhi Wang, Kun Yang:
Joint Split Offloading and Trajectory Scheduling for UAV-Enabled Mobile Edge Computing in IoT Network. IEEE Trans. Netw. Sci. Eng. 11(6): 6180-6193 (2024) - [j11]Yunkai Wei, Yuxin Lu, Pengcheng Zhao, Supeng Leng, Kun Yang:
Minimizing Age of Information in UAV-Assisted Data Collection With Limited Charging Facilities. IEEE Wirel. Commun. Lett. 13(5): 1463-1467 (2024) - 2023
- [j10]Yunkai Wei, Zixian An, Supeng Leng, Kun Yang:
Evolved PoW: Integrating the Matrix Computation in Machine Learning Into Blockchain Mining. IEEE Internet Things J. 10(8, April 15): 6689-6702 (2023) - [c22]Pengcheng Zhao, Yuxin Lu, Yunkai Wei, Supeng Leng:
Blockchain and DQN Enabled Co-Evolutionary Routing Scheme in UAV Networks. INFOCOM Workshops 2023: 1-6 - 2022
- [j9]Yijin Chen, Ye Su, Mingyue Zhang, Haoye Chai, Yunkai Wei, Shui Yu:
FedTor: An Anonymous Framework of Federated Learning in Internet of Things. IEEE Internet Things J. 9(19): 18620-18631 (2022) - [j8]Hanwen Zhang, Supeng Leng, Yunkai Wei, Jianhua He:
A Blockchain Enhanced Coexistence of Heterogeneous Networks on Unlicensed Spectrum. IEEE Trans. Veh. Technol. 71(7): 7613-7624 (2022) - [c21]Zhangxinyu Chen, Yunkai Wei, Supeng Leng:
Augmented Twin Empowered Intelligence for Lightweight Device in Internet of Things. ICCT 2022: 892-898 - [c20]Luhan Zou, Yunkai Wei, Lixiang Ma, Supeng Leng:
Feature-Attended Multi-Flow LSTM for Anomaly Detection in Internet of Things. INFOCOM Workshops 2022: 1-6 - 2021
- [j7]Yunkai Wei, Sipei Zhou, Supeng Leng, Sabita Maharjan, Yan Zhang:
Federated Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet Security. IEEE Netw. 35(2): 88-94 (2021) - [c19]Zixian An, Tingting Zhang, Yunkai Wei, Meie Peng:
Low Latency Multi - Dimensional Offloading in Intelligent Transportation System. ICCT 2021: 1072-1077 - [c18]Xiwen Liao, Supeng Leng, Kai Xiong, Yunkai Wei:
An Optimal Packet Delivery Strategy Based on Deep Reinforcement Learning in IoV. UCET 2021: 146-151 - [c17]Zhihong Wang, Yunkai Wei, Fan Wu:
Knowledge Distillation based Cooperative Reinforcement Learning for Connectivity Preservation in UAV Networks. UCET 2021: 171-176 - [i2]Yunkai Wei, Zixian An, Supeng Leng, Kun Yang:
Connecting AI Learning and Blockchain Mining in 6G Systems. CoRR abs/2104.14088 (2021) - 2020
- [j6]Yijin Chen, Yuming Mao, Haoyang Liang, Shui Yu, Yunkai Wei, Supeng Leng:
Data Poison Detection Schemes for Distributed Machine Learning. IEEE Access 8: 7442-7454 (2020) - [j5]Yunkai Wei, Mingyue Xiao, Ning Yang, Supeng Leng:
Block Mining or Service Providing: A Profit Optimizing Game of the PoW-Based Miners. IEEE Access 8: 134800-134816 (2020) - [j4]Yunkai Wei, Yijin Chen, Mingyue Xiao, Sabita Maharjan, Yan Zhang:
Protecting Machine Learning Integrity in Distributed Big Data Networking. IEEE Netw. 34(4): 84-90 (2020) - [c16]Longyu Zhou, Qiang Liu, Fan Wu, Yunkai Wei:
Deep Learning Based Sensing Resource Allocation for Mobile Target Tracking. ICCT 2020: 430-435 - [c15]Weizhong Wang, Yunkai Wei, Qiang Liu, Supeng Leng:
Deep Reinforcement Learning Empowered Destination Driven Computation Offloading in IoT. ICCT 2020: 834-840 - [c14]Yiwen Wu, Sipei Zhou, Yunkai Wei, Supeng Leng:
Deep Reinforcement Learning for Controller Placement in Software Defined Network. INFOCOM Workshops 2020: 1254-1259 - [c13]Yiwen Wu, Yilin Wang, Yunkai Wei, Supeng Leng:
Intelligent Deployment of Dedicated Servers: Rebalancing the Computing Resource in IoT. WCNC Workshops 2020: 1-6
2010 – 2019
- 2019
- [j3]Yunkai Wei, Yue Tao, Ning Yang, Supeng Leng:
On Modeling Malware Propagation in Interest-Based Overlapping Communities. IEEE Access 7: 121374-121387 (2019) - [c12]Yunkai Wei, Jie Zhang, Ning Yang, Supeng Leng:
Destination Driven Computation Offloading in Internet of Things. GLOBECOM 2019: 1-6 - [c11]Yijin Chen, Dongpo Chen, Yunkai Wei, Supeng Leng, Yuming Mao, Jing Lin:
Data Manipulation Avoidance Schemes for Distributed Machine Learning. ICC 2019: 1-6 - [c10]Yunkai Wei, Yue Tao, Ning Yang, Supeng Leng:
On Modeling Malware Propagation in Interest-Based Overlapping Communities. ICC 2019: 1-6 - [c9]Qun Du, Yunkai Wei, Yuming Mao:
Distributed Deployment of Anomaly Detection Scheme in Resource-Limited IoT Devices. ICCT 2019: 323-329 - [c8]Sipei Zhou, Yiliang Tang, Yiwen Wu, Yunkai Wei, Supeng Leng:
Capability Modeling of Information Deceiving and Achieving in Message Tampering Confrontations. ICCT 2019: 1311-1316 - 2018
- [c7]Yijin Chen, Yuming Mao, Lei Cui, Supeng Leng, Yunkai Wei, Xiaosha Chen:
A two layer model of malware propagation in a search engine context. INFOCOM Workshops 2018: 21-26 - 2017
- [j2]Yunkai Wei, Xiaohui Ma, Ning Yang, Yijin Chen:
Energy-Saving Traffic Scheduling in Hybrid Software Defined Wireless Rechargeable Sensor Networks. Sensors 17(9): 2126 (2017) - [c6]Xiaohui Ma, Yunkai Wei, Ning Yang:
Energy-saving traffic scheduling in hybrid software defined rechargeable WSNs. PIMRC 2017: 1-6 - [c5]Feng Zhang, Yunkai Wei, Lixiang Ma:
A dynamic detecting function deployment in unsafe wireless networks. PIMRC 2017: 1-5 - 2016
- [j1]Yunkai Wei, Xiaoning Zhang, Lei Xie, Supeng Leng:
Energy-aware traffic engineering in hybrid SDN/IP backbone networks. J. Commun. Networks 18(4): 559-566 (2016) - [c4]Yunkai Wei, Zhoucha Hu, Yuming Mao, Supeng Leng, Jiechen Yin:
Priority-based real-time stream coding over multi-channel under sliding window erasures. ICCC 2016: 1-6 - [i1]Yunkai Wei, Xiaoning Zhang, Lei Xie, Supeng Leng:
Energy-aware Traffic Engineering in Hybrid SDN/IP Backbone Networks. CoRR abs/1605.03678 (2016) - 2015
- [c3]Yunkai Wei, Yuming Mao, Supeng Leng, Tracey Ho:
Priority-Based Real-Time Stream Coding under Burst Erasures. GLOBECOM 2015: 1-7 - 2014
- [c2]Yunkai Wei, Yuming Mao, Wentao Huang, Pak Hou Che:
A novel channel aware stage ARQ in wide area Wireless Sensor Networks. ISSNIP 2014: 1-5 - 2013
- [c1]Yunkai Wei, Tracey Ho:
On prioritized coding for real-time streaming under packet erasures. Allerton 2013: 327-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint