default search action
Yilei Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j82]Sanhe Yang, Peichao Lai, Ruixiong Fang, Yanggeng Fu, Feiyang Ye, Yilei Wang:
FE-CFNER: Feature Enhancement-based approach for Chinese Few-shot Named Entity Recognition. Comput. Speech Lang. 90: 101730 (2025) - 2024
- [j81]Xiaoying Wang, Chunmei Li, Yilei Wang, Lin Yin, Qilin Zhou, Rui Zheng, Qingwu Wu, Yuqi Zhou, Min Dai:
An intelligent prediction model of epidemic characters based on multi-feature. CAAI Trans. Intell. Technol. 9(3): 595-607 (2024) - [j80]Yuelin Hu, Futai Zou, Jiajia Han, Xin Sun, Yilei Wang:
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model. Comput. Secur. 145: 103999 (2024) - [j79]Tao Li, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo:
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. Comput. Stand. Interfaces 89: 103834 (2024) - [j78]Peichao Lai, Feiyang Ye, Yanggeng Fu, Zhiwei Chen, Yingjie Wu, Yilei Wang:
M-Sim: Multi-level Semantic Inference Model for Chinese short answer scoring in low-resource scenarios. Comput. Speech Lang. 84: 101575 (2024) - [j77]Tong Zhou, Xingliang Wu, Yudong Wang, Yilei Wang, Shunan Zhang:
Application of artificial intelligence in physical education: a systematic review. Educ. Inf. Technol. 29(7): 8203-8220 (2024) - [j76]Peichao Lai, Feiyang Ye, Yanggeng Fu, Zhiwei Chen, Yingjie Wu, Yilei Wang, Victor Chang:
CogNLG: Cognitive graph for KG-to-text generation. Expert Syst. J. Knowl. Eng. 41(1) (2024) - [j75]Yilei Wang, Chunmei Li, Yiting Zhang, Tao Li, Jianting Ning, Keke Gai, Kim-Kwang Raymond Choo:
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT. IEEE Internet Things J. 11(11): 19564-19574 (2024) - [j74]Qichen Wang, Qiyao Luo, Yilei Wang:
Relational Algorithms for Top-k Query Evaluation. Proc. ACM Manag. Data 2(3): 168 (2024) - [j73]Bihao Hu, Longwei Zheng, Jiayi Zhu, Lishan Ding, Yilei Wang, Xiaoqing Gu:
Teaching Plan Generation and Evaluation With GPT-4: Unleashing the Potential of LLM in Instructional Design. IEEE Trans. Learn. Technol. 17: 1471-1485 (2024) - [c72]Jingyu Zhang, Kun Yang, Yilei Wang, Hanqi Wang, Peng Sun, Liang Song:
ERMVP: Communication-Efficient and Collaboration-Robust Multi-Vehicle Perception in Challenging Environments. CVPR 2024: 12575-12584 - [c71]Zhentao Xie, Jiabao Zhao, Yilei Wang, Jinxin Shi, Yanhong Bai, Xingjiao Wu, Liang He:
MindScope: Exploring Cognitive Biases in Large Language Models Through Multi-Agent Systems. ECAI 2024: 3308-3315 - [c70]Kehuan Yan, Peichao Lai, Qingwei Lyu, Yilei Wang:
Quantum-inspired Neural Network Based on Stochastic Liouville-von Neumann Equation for Sentiment Classification. IJCNN 2024: 1-8 - [c69]Zhengfeng Zhang, Peichao Lai, Ruiqing Wang, Feiyang Ye, Yilei Wang:
NCSE: Neighbor Contrastive Learning for Unsupervised Sentence Embeddings. IJCNN 2024: 1-8 - [c68]Lanlan Chen, Xiaochuan Shi, Linjiang Zhou, Yilei Wang, Chao Ma, Weiping Zhu:
Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in a JointCloud Environment. KSEM (3) 2024: 28-40 - [c67]Kehuan Yan, Peichao Lai, Yilei Wang:
Quantum-inspired Language Model with Lindblad Master Equation and Interference Measurement for Sentiment Analysis. NAACL-HLT 2024: 2112-2121 - [c66]Feiyang Ye, Peichao Lai, Sanhe Yang, Zhengfeng Zhang, Yilei Wang:
Span-Based Chinese Few-Shot NER with Contrastive and Prompt Learning. NLPCC (2) 2024: 43-55 - [c65]Xin Zhang, Yilei Wang, Xiaohan Qin, Zitian Zhang, Haibo Zhou, Xuemin Shen:
Link-Level Performance Analysis of DVB Standards in Ultra-Dense LEO Satellite-Terrestrial Networks. VTC Spring 2024: 1-5 - [c64]Zhenxing Zhang, Jun Ge, Yilei Wang, Zheng Wei:
Left Ventricular Hypertrophy Detection Algorithm Using Feature Selection and CNN-LSTM. WASA (1) 2024: 235-246 - [i12]Zhenxing Zhang, Jun Ge, Zheng Wei, Chunjie Zhou, Yilei Wang:
Feature Selection Based on Orthogonal Constraints and Polygon Area. CoRR abs/2402.16026 (2024) - [i11]Qiyao Luo, Yilei Wang, Wei Dong, Ke Yi:
Secure Query Processing with Linear Complexity. CoRR abs/2403.13492 (2024) - [i10]Zhentao Xie, Jiabao Zhao, Yilei Wang, Jinxin Shi, Yanhong Bai, Xingjiao Wu, Liang He:
MindScope: Exploring cognitive biases in large language models through Multi-Agent Systems. CoRR abs/2410.04452 (2024) - 2023
- [j72]Yilei Wang, Zhaojie Wang, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen, Minghao Zhao:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. Digit. Commun. Networks 9(5): 1053-1060 (2023) - [j71]Ting Ma, Bo Qian, Yilei Wang, Xiaoyu Liu, Haibo Zhou:
Airborne Internet: An Ultradense LEO Networks Empowered Satellite-to-Aircraft Access and Resource Management Approach. IEEE Internet Things J. 10(23): 20241-20253 (2023) - [j70]Yiting Zhang, Minghao Zhao, Tao Li, Yilei Wang, Tiancai Liang:
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis. Inf. Sci. 625: 299-313 (2023) - [j69]Yilei Wang, Ming Liu, Huawei Ma, Shuyu Fan, Huiyu Zhou, Siqi Ju, Xiaoying Wang, Qintai Yang:
Enabling scalable and unlinkable payment channel hubs with oblivious puzzle transfer. Inf. Sci. 630: 713-726 (2023) - [j68]Qiyao Luo, Yilei Wang, Ke Yi, Sheng Wang, Feifei Li:
Secure Sampling for Approximate Multi-party Query Processing. Proc. ACM Manag. Data 1(3): 219:1-219:27 (2023) - [j67]Fan Wang, Guangshun Li, Yilei Wang, Wajid Rafique, Mohammad Reza Khosravi, Guanfeng Liu, Yuwen Liu, Lianyong Qi:
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City. ACM Trans. Internet Techn. 23(3): 44:1-44:19 (2023) - [j66]Yilei Wang, Qingzhe Lv, Huang Zhang, Minghao Zhao, Yuhong Sun, Lingkai Ran, Tao Li:
Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training. World Wide Web (WWW) 26(5): 2691-2707 (2023) - [c63]Ming Liu, Mingyue Zhang, Guangshun Li, Yuemei Hu, Tao Li, Yilei Wang, Bo Lan:
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption. Inscrypt (1) 2023: 107-125 - [c62]Jun Ge, Zhenxing Zhang, Lumin Zhou, Zheng Wei, Yilei Wang:
MI Identification Algorithm Based on Feature Selection via Chi-square Test. HCCS 2023: 1-5 - [c61]Jingxin Wang, Chunmei Li, Yijia Wang, Yilei Wang:
OSPCT-Chain: A One-stop Service Blockchain Platform for Copyright Traceability Based on FISCO BCOS. HCCS 2023: 1-4 - [c60]Zheng Wei, Zhenxing Zhang, Haixin Jiang, Jun Ge, Yilei Wang:
AF Recognition Algorithm Based on Fusion Transformer Model. HCCS 2023: 1-5 - [c59]Xiaohan Qin, Ting Ma, Xin Zhang, Yilei Wang, Haibo Zhou, Lian Zhao:
A Lightweight Hierarchical Mobility Management Architecture for Ultra-Dense LEO Satellite Network. ICC 2023: 679-684 - [c58]Xin Zhang, Ting Ma, Xiaohan Qin, Yilei Wang, Haibo Zhou:
Reflecting Intelligent Surface Aided Downlink Transmission in Ultra-Dense LEO Satellite Networks. ICCT 2023: 1123-1128 - [c57]Yilei Wang, Daocheng Hong, Jun Huang:
A Diffusion of Innovation Perspective for Digital Transformation on Education. KES 2023: 2439-2448 - [i9]Yuhao Dan, Zhikai Lei, Yiyang Gu, Yong Li, Jianghao Yin, Jiaju Lin, Linhao Ye, Zhiyan Tie, Yougen Zhou, Yilei Wang, Aimin Zhou, Ze Zhou, Qin Chen, Jie Zhou, Liang He, Xipeng Qiu:
EduChat: A Large-Scale Language Model-based Chatbot System for Intelligent Education. CoRR abs/2308.02773 (2023) - [i8]Jinxin Shi, Jiabao Zhao, Yilei Wang, Xingjiao Wu, Jiawen Li, Liang He:
CGMI: Configurable General Multi-Agent Interaction Framework. CoRR abs/2308.12503 (2023) - [i7]Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, Ke Yi:
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves. IACR Cryptol. ePrint Arch. 2023: 1258 (2023) - 2022
- [j65]Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou:
An anonymous authentication and key agreement protocol in smart living. Comput. Commun. 186: 110-120 (2022) - [j64]Peng Li, Kang Li, Yilei Wang, Ying Zheng, Dongfeng Wang, Guoyu Yang, Xiaomei Yu:
A systematic mapping study for blockchain based on complex network. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j63]Fengyin Li, Rui Ge, Huiyu Zhou, Yilei Wang, Zhongxing Liu, Xiaomei Yu:
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j62]Peng Qi, Yilei Wang, Yan Sun, Hong Luo:
ScratchGAN: Network representation learning for scratch with preference-based generative adversarial nets. Int. J. Intell. Syst. 37(8): 4537-4560 (2022) - [j61]Jianan Guo, Zhaojie Wang, Hai Liang, Minghao Zhao, Hui An, Yilei Wang:
Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity. Int. J. Intell. Syst. 37(11): 9013-9036 (2022) - [j60]Yilei Wang, Yiting Zhang, Xiujuan Zhang, Hai Liang, Guangshun Li, Xiaoying Wang:
An intelligent forecast for COVID-19 based on single and multiple features. Int. J. Intell. Syst. 37(11): 9339-9356 (2022) - [j59]Zhaobo Lu, Hai Liang, Minghao Zhao, Qingzhe Lv, Tiancai Liang, Yilei Wang:
Label-only membership inference attacks on machine unlearning without dependence of posteriors. Int. J. Intell. Syst. 37(11): 9424-9441 (2022) - [j58]Yilei Wang, Tao Li, Ming Liu, Chunmei Li, Hui Wang:
STSIIML: Study on token shuffling under incomplete information based on machine learning. Int. J. Intell. Syst. 37(12): 11078-11100 (2022) - [j57]Yilei Wang, Zhaojie Wang, Minghao Zhao, Xueyang Han, Huiyu Zhou, Xiaoying Wang, Arthur Sandor Voundi Koe:
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601: 1-17 (2022) - [j56]Yanli Wang, Yilei Wang, Zhaojie Wang, Guoyu Yang, Xiaomei Yu:
Research cooperations of blockchain: toward the view of complexity network. J. Ambient Intell. Humaniz. Comput. 13(3): 1339-1352 (2022) - [j55]Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou:
Aitac: an identity-based traceable anonymous communication model. J. Ambient Intell. Humaniz. Comput. 13(3): 1353-1362 (2022) - [j54]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, Xiaomei Yu:
An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model. J. Organ. End User Comput. 34(10): 1-17 (2022) - [j53]Hongyang Yan, Nan Jiang, Kang Li, Yilei Wang, Guoyu Yang:
Collusion-free for Cloud Verification toward the View of Game Theory. ACM Trans. Internet Techn. 22(2): 33:1-33:21 (2022) - [j52]Fan Wang, Lina Wang, Guangshun Li, Yilei Wang, Chao Lv, Lianyong Qi:
Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation. World Wide Web 25(5): 1809-1829 (2022) - [c56]Yijin Cai, Yilei Wang, Weijin Wang, Wenting Chen:
RI-GCN: Review-aware Interactive Graph Convolutional Network for Review-based Item Recommendation. IEEE Big Data 2022: 475-484 - [c55]Qiyao Luo, Yilei Wang, Ke Yi:
Frequency Estimation in the Shuffle Model with Almost a Single Message. CCS 2022: 2219-2232 - [c54]Peichao Lai, Feiyang Ye, Lin Zhang, Zhiwei Chen, Yanggeng Fu, Yingjie Wu, Yilei Wang:
PCBERT: Parent and Child BERT for Chinese Few-shot NER. COLING 2022: 2199-2209 - [c53]Yilei Wang, Xiaohan Qin, Zhixuan Tang, Ting Ma, Xin Zhang, Haibo Zhou:
QoS-Centric Handover for Civil Aviation Aircraft Access in Ultra-Dense LEO Satellite Networks. ICCC 2022: 1085-1089 - [c52]Wanling Liu, Yilei Wang, Yanggeng Fu, Fuling Ye, Peichao Lai:
Intelligent Experimental Teaching Auxiliary Platform Based on BERT. ICCSE (2) 2022: 245-258 - [c51]Weijin Wang, Jin Li, Yilei Wang, Zhongwang Zhang:
RETSR: An Effective Review-Enhanced and Time-Aware Sequential Recommendation Framework. ICTAI 2022: 826-831 - [c50]Yun Luo, Yuling Chen, Tao Li, Yilei Wang:
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 338-342 - [c49]Yilei Wang, Ming Liu, Tao Li, Chunmei Li, Hui Wang:
TSHML: Token Shuffling under Haircut Policy Based on Machine Learning. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 401-405 - [c48]Yiting Zhang, Ming Liu, Jianan Guo, Zhaojie Wang, Yilei Wang, Tiancai Liang, Sunil Kumar Singh:
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process. ML4CS (2) 2022: 299-308 - [c47]Jianan Guo, Lei Shang, Yilei Wang, Tiancai Liang, Zhaojie Wang, Hui An:
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency. ML4CS (2) 2022: 575-583 - [c46]Yilei Wang, Ke Yi:
Query Evaluation by Circuits. PODS 2022: 67-78 - [c45]Lin Zhang, Peichao Lai, Feiyang Ye, Ruixiong Fang, Ruiqing Wang, Jiayong Li, Yilei Wang:
Chinese Medical Named Entity Recognition Using External Knowledge. PRICAI (2) 2022: 359-371 - [c44]Zhaobo Lu, Yilei Wang, Qingzhe Lv, Minghao Zhao, Tiancai Liang:
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning. ProvSec 2022: 167-175 - [c43]Zhaojie Wang, Willy Susilo, Jianan Guo, Yilei Wang, Minghao Zhao:
Reinforcement-Mining: Protecting Reward in Selfish Mining. ProvSec 2022: 199-209 - 2021
- [j51]Yilei Wang, Xin Xu, Qinghua Zhu:
Carbon emission reduction decisions of supply chain members under cap-and-trade regulations: A differential game analysis. Comput. Ind. Eng. 162: 107711 (2021) - [j50]Yilei Wang, Minghao Zhao, Yuemei Hu, Yijie Gao, Xinchun Cui:
Secure computation protocols under asymmetric scenarios in enterprise information system. Enterp. Inf. Syst. 15(4): 492-512 (2021) - [j49]Xinying Yu, Zhaojie Wang, Yilei Wang, Fengyin Li, Tao Li, Yuling Chen, Youliang Tian, Xiaomei Yu:
ImpSuic: A quality updating rule in mixing coins with maximum utilities. Int. J. Intell. Syst. 36(3): 1182-1198 (2021) - [j48]Yi Ding, Chao Zhang, Mingsheng Cao, Yilei Wang, Dajiang Chen, Ning Zhang, Zhiguang Qin:
ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation. Neurocomputing 462: 141-153 (2021) - [j47]Fengyin Li, Pei Ren, Guoyu Yang, Yuhong Sun, Yilei Wang, Yanli Wang, Siyuan Li, Huiyu Zhou:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Secur. Commun. Networks 2021: 6670847:1-6670847:16 (2021) - [j46]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021) - [j45]Yuling Chen, Sen Dong, Tao Li, Yilei Wang, Huiyu Zhou:
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE. IEEE Trans. Inf. Forensics Secur. 16: 5239-5249 (2021) - [j44]Lan Sun, Jinxin Hong, Junya Chen, Jianping Cai, Yilei Wang:
Equation Chapter 1 Section 1 Differentially Private High-Dimensional Binary Data Publication via Adaptive Bayesian Network. Wirel. Commun. Mob. Comput. 2021: 8693978:1-8693978:11 (2021) - [c42]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang:
Using information entropy to analyze secure multi-party computation protocol. DASC/PiCom/CBDCom/CyberSciTech 2021: 312-318 - [c41]Zhaojie Wang, Jianan Guo, Yiting Zhang, Ming Liu, Liang Yan, Yilei Wang, Hailun Liu, Yunhe Li:
BSMRL: Bribery Selfish Mining with Reinforcement Learning. DMBD (1) 2021: 1-10 - [c40]Yuanyuan Wu, Xiangzhen Fang, Jin Li, Lin Zhang, Zhiwei Chen, Yilei Wang:
A Deep Learning Approach with Conditional Random Field for Automatic Sleep Stage Scoring. EITCE 2021: 901-906 - [c39]Yuan Qiu, Yilei Wang, Ke Yi, Feifei Li, Bin Wu, Chaoqun Zhan:
Weighted Distinct Sampling: Cardinality Estimation for SPJ Queries. SIGMOD Conference 2021: 1465-1477 - [c38]Yilei Wang, Ke Yi:
Secure Yannakakis: Join-Aggregate Queries over Private Data. SIGMOD Conference 2021: 1969-1981 - [i6]Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, Xiao Wang:
Secure Machine Learning over Relational Data. CoRR abs/2109.14806 (2021) - [i5]Qiyao Luo, Yilei Wang, Ke Yi:
Frequency Estimation in the Shuffle Model with (Almost) a Single Message. CoRR abs/2111.06833 (2021) - 2020
- [j43]Yilei Wang, Andrea Bracciali, Guoyu Yang, Tao Li, Xiaomei Yu:
Adversarial behaviours in mixing coins under incomplete information. Appl. Soft Comput. 96: 106605 (2020) - [j42]Kang Li, Wang Fat Lau, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks. Comput. Electr. Eng. 86: 106721 (2020) - [j41]Kai Zheng, Xianjun Yang, Yilei Wang, Yingjie Wu, Xianghan Zheng:
Collaborative filtering recommendation algorithm based on variational inference. Int. J. Crowd Sci. 4(1): 31-44 (2020) - [j40]Guoyu Yang, Yilei Wang, Zhaojie Wang, Youliang Tian, Xiaomei Yu, Shouzhe Li:
IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers. Int. J. Intell. Syst. 35(11): 1735-1748 (2020) - [j39]Xiaozhang Liu, Xinying Yu, Haojia Zhu, Guoyu Yang, Yilei Wang, Xiaomei Yu:
A game-theoretic approach of mixing different qualities of coins. Int. J. Intell. Syst. 35(12): 1899-1911 (2020) - [j38]Yilei Wang, Guoyu Yang, Tao Li, Lifeng Zhang, Yanli Wang, Lishan Ke, Yi Dou, Shouzhe Li, Xiaomei Yu:
Optimal mixed block withholding attacks based on reinforcement learning. Int. J. Intell. Syst. 35(12): 2032-2048 (2020) - [j37]Yilei Wang, Guoyu Yang, Andrea Bracciali, Ho-fung Leung, Haibo Tian, Lishan Ke, Xiaomei Yu:
Incentive compatible and anti-compounding of wealth in proof-of-stake. Inf. Sci. 530: 85-94 (2020) - [j36]Yilei Wang, Guoyu Yang, Tao Li, Fengyin Li, Youliang Tian, Xiaomei Yu:
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices. J. Netw. Comput. Appl. 161: 102641 (2020) - [j35]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020) - [j34]Fengyin Li, Dongfeng Wang, Yilei Wang, Xiaomei Yu, Nan Wu, Jiguo Yu, Huiyu Zhou:
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8864533:1-8864533:12 (2020) - [c37]Yilei Wang, Xueqin Chen:
Personalized Mobile Information Recommendation Based on Fine-Grained User Behaviors. FSDM 2020: 562-579
2010 – 2019
- 2019
- [j33]Jianjia Wang, Chenyue Lin, Yilei Wang:
Thermodynamic Entropy in Quantum Statistics for Stock Market Networks. Complex. 2019: 1817248:1-1817248:11 (2019) - [j32]Yi-Lei Wang, Wen-Zhe Tang, Xian-Jun Yang, Yingjie Wu, Fu-Ji Chen:
An efficient method for autoencoder-based collaborative filtering. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j31]Yilei Wang, Andrea Bracciali, Tao Li, Fengyin Li, Xinchun Cui, Minghao Zhao:
Randomness invalidates criminal smart contracts. Inf. Sci. 477: 291-301 (2019) - [j30]Lifeng Zhang, Yilei Wang, Fengyin Li, Yuemei Hu, Man Ho Au:
A game-theoretic method based on Q-learning to invalidate criminal smart contracts. Inf. Sci. 498: 144-153 (2019) - [j29]Yilei Wang, Shuaifeng Zhang, Yi Tang, Qingtang Su, Beijing Chen:
Rational adversary with flexible utility in secure two-party computation. J. Ambient Intell. Humaniz. Comput. 10(8): 2913-2927 (2019) - [c36]Guoyu Yang, Yilei Wang, Banghai Xu, Xiaofeng Zhang:
An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarity. CSS (2) 2019: 501-510 - [c35]Mingqin Chen, Yilei Wang, Shan Chen, Yingjie Wu:
Counting Attention Based on Classification Confidence for Visual Question Answering. ISPA/BDCloud/SocialCom/SustainCom 2019: 1173-1179 - [c34]Xinchun Cui, Yilei Wang, Xiangwei Zheng, Yingshuai Han, Hong Qiao, Shancang Li:
A Novel Color Image Watermarking Algorithm Based on Digital Signature. iThings/GreenCom/CPSCom/SmartData 2019: 267-274 - [c33]Zengfeng Huang, Ziyue Huang, Yilei Wang, Ke Yi:
Optimal Sparsity-Sensitive Bounds for Distributed Mean Estimation. NeurIPS 2019: 6368-6378 - [c32]Liqing Chen, Yifan Zhuo, Yingjie Wu, Yilei Wang, Xianghan Zheng:
Multi-modal Feature Fusion Based on Variational Autoencoder for Visual Question Answering. PRCV (2) 2019: 657-669 - [c31]Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. ProvSec 2019: 59-76 - 2018
- [j28]Yilei Wang, Roberto Metere, Huiyu Zhou, Guanghai Cui, Tao Li:
Incentive-driven attacker for corrupting two-party protocols. Soft Comput. 22(23): 7733-7740 (2018) - [j27]Zhen Qin, Yilei Wang, Hongrong Cheng, Yingjie Zhou, Zhengguo Sheng, Victor C. M. Leung:
Demographic Information Prediction: A Portrait of Smartphone Application Users. IEEE Trans. Emerg. Top. Comput. 6(3): 432-444 (2018) - [c30]Yi-Fan Zhuo, Yi-Lei Wang:
Multilevel Features Fusion in Deep Convolutional Neural Networks. ICCCS (6) 2018: 600-610 - [i4]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. IACR Cryptol. ePrint Arch. 2018: 489 (2018) - 2017
- [j26]Hao Wang, Zhihua Zheng, Yilei Wang:
Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model. Int. J. Grid Util. Comput. 8(3): 211-221 (2017) - [j25]Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. Int. J. Netw. Secur. 19(4): 623-630 (2017) - [c29]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CCS 2017: 211-227 - [i3]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CoRR abs/1708.01171 (2017) - 2016
- [j24]Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu:
Social rational secure multi-party computation. Concurr. Comput. Pract. Exp. 28(9): 2748 (2016) - [j23]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j22]Xiaomei Yu, Hong Wang, Xiangwei Zheng, Yilei Wang:
Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 137-151 (2016) - [j21]Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. Int. J. Netw. Secur. 18(3): 481-486 (2016) - [j20]Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong:
On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 116(6): 416-418 (2016) - [j19]Wenjing Tang, Yilei Wang, Wei He:
An image segmentation algorithm based on improved multiscale random field model in wavelet domain. J. Ambient Intell. Humaniz. Comput. 7(2): 221-228 (2016) - [j18]Yilei Wang, Zhe Liu, Qiuliang Xu:
Corrigendum to "New Rational Parties Relying on Reputation". Secur. Commun. Networks 9(7): 697 (2016) - [j17]Yilei Wang, Tao Li, Lufeng Chen, Ping Li, Ho-fung Leung, Zhe Liu, Qiuliang Xu:
Rational computing protocol based on fuzzy theory. Soft Comput. 20(2): 429-438 (2016) - [j16]Yilei Wang, Leisi Chen, Ho-fung Leung, Chengyu Hu, Beijing Chen:
Fairness in secure computing protocols based on incentives. Soft Comput. 20(10): 3947-3955 (2016) - [j15]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - [c28]Wen-Zhe Tang, Yi-Lei Wang, Yingjie Wu, Xiao-Dong Wang:
A Speed up Method for Collaborative Filtering with Autoencoders. FSDM 2016: 321-326 - [c27]Minghao Zhao, Zhen Li, Yilei Wang, Qiuliang Xu:
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings. NBiS 2016: 496-499 - 2015
- [j14]Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu:
File sharing in cloud computing using win stay lose shift strategy. Int. J. High Perform. Comput. Netw. 8(2): 154-166 (2015) - [j13]Xiufeng Zhao, Xiang Wang, Hao Xu, Yilei Wang:
Cloud data integrity checking protocol from lattice. Int. J. High Perform. Comput. Netw. 8(2): 167-175 (2015) - [j12]Chanjuan Liu, Hailin Zou, Caixia Li, Ying Liu, Yilei Wang, Shixiang Jia, Shusen Zhou:
An adaptive texture-preserved image denoising model. J. Ambient Intell. Humaniz. Comput. 6(5): 689-697 (2015) - [j11]Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:
A brief survey on secure multi-party computing in the presence of rational parties. J. Ambient Intell. Humaniz. Comput. 6(6): 807-824 (2015) - [j10]Yilei Wang, Tao Li, Qianqian Liu, Jing Sun, Zhe Liu:
The impact of social cloud reputation and structure on rational computation. J. High Speed Networks 21(3): 181-194 (2015) - [j9]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - [j8]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [j7]Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [c26]Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. AINA Workshops 2015: 287-292 - [c25]Tao Li, Hao Yang, Yilei Wang, Qiuliang Xu:
The Electronic Voting in the Presence of Rational Voters. AINA Workshops 2015: 293-296 - [c24]Hao Wang, Bo Yang, Yilei Wang:
Server Aided Ciphertext-Policy Attribute-Based Encryption. AINA Workshops 2015: 440-444 - [c23]Yilei Wang, Yuanyang Tang, Jun Ma, Zhen Qin:
Gender Prediction Based on Data Streams of Smartphone Applications. BigCom 2015: 115-125 - [c22]Yuqing Zhu, Yilei Wang:
Improving transaction processing performance by consensus reduction. IEEE BigData 2015: 531-538 - [c21]Yong Yu, Jianbing Ni, Wei Wu, Yilei Wang:
Provable Data Possession Supporting Secure Data Transfer for Cloud Storage. BWCCA 2015: 38-42 - [c20]Yuqing Zhu, Yilei Wang:
SHAFT: Supporting Transactions with Serializability and Fault-Tolerance in Highly-Available Datastores. ICPADS 2015: 717-724 - [c19]Lin Li, Yilei Wang, Yanhui Ding, Yongxin Zhang:
Multi-tenants Data Duplication Secure Storage in SaaS. IMIS 2015: 233-238 - [i2]Yuqing Zhu, Yilei Wang, Fan Wang:
10 Observations on Google Cluster Trace + 2 Measures for Cluster Utilization Enhancement. CoRR abs/1508.02111 (2015) - 2014
- [j6]Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu:
Social rational secure multi-party computation. Concurr. Comput. Pract. Exp. 26(5): 1067-1083 (2014) - [j5]Yilei Wang, Zhe Liu, Qiuliang Xu:
New rational parties relying on reputation. Secur. Commun. Networks 7(7): 1128-1137 (2014) - [c18]Shengbin Meng, Jun Sun, Yilei Wang, Zongming Guo:
A PID-based quality control algorithm for SVC video streaming. ICC 2014: 1693-1698 - [c17]Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. NSS 2014: 82-95 - [c16]Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu:
Rational Secure Two-party Computation in Social Cloud. NSS 2014: 476-483 - [c15]Zhen Qin, Yilei Wang, Yong Xia, Hongrong Cheng, Yingjie Zhou, Zhengguo Sheng, Victor C. M. Leung:
Demographic information prediction based on smartphone application usage. SMARTCOMP 2014: 183-190 - 2013
- [j4]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
Short Convertible Undeniable Signature From Pairing. J. Softw. 8(12): 2983-2990 (2013) - [c14]Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. CIS 2013: 564-568 - [c13]Yilei Wang, Qiuliang Xu, Zhe Liu:
Fair Computation with Tit-for-Tat Strategy. INCoS 2013: 309-314 - [c12]Hao Wang, Zhihua Zheng, Yilei Wang:
A New Privacy-Preserving Broadcast Encryption Scheme from DPVS. INCoS 2013: 329-334 - [c11]Caixia Li, Chanjuan Liu, Yilei Wang:
Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation. INCoS 2013: 685-690 - [i1]Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang:
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 836 (2013) - 2012
- [j3]Yilei Wang, Hao Wang, Qiuliang Xu:
Repeated rational secret sharing, revisited. Int. J. Grid Util. Comput. 3(1): 12-24 (2012) - [j2]Yilei Wang, Hao Wang, Qiuliang Xu:
Rational secret sharing with semi-rational players. Int. J. Grid Util. Comput. 3(1): 59-67 (2012) - [j1]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings. J. Comput. 7(12): 2987-2996 (2012) - [c10]Yilei Wang, Bingzheng Wei, Jun Yan, Zheng Chen, Qiao Du:
Multi-objective optimization for sponsored search. AdKDD@KDD 2012: 3:1-3:9 - [c9]Yilei Wang, Bingzheng Wei, Jun Yan, Yang Hu, Zhi-Hong Deng, Zheng Chen:
A novel local patch framework for fixing supervised learning models. CIKM 2012: 1233-1242 - [c8]Yilei Wang, Qiuliang Xu, Zhe Liu:
Multi-party Computation with Social Rational Parties. INCoS 2012: 251-258 - 2011
- [c7]Yilei Wang, Qiuliang Xu:
2-out-of-2 Rational Secret Sharing in Extensive Form. CIS 2011: 847-851 - [c6]Yilei Wang, Qiuliang Xu:
Fairness with Semi-rational Players in Standard Communication Networks. INCoS 2011: 293-298
2000 – 2009
- 2009
- [c5]Tao Li, Yilei Wang, Lan Lu:
The Application of EDI Technology in Electronic Commerce System. JCAI 2009: 837-840 - [c4]Lifeng Zhang, Yilei Wang, Tao Li:
A Dynamic Programming Model about Optimized Port Transport Expense Paper. SSME 2009: 538-542 - [c3]Chanjuan Liu, Yilei Wang, Tao Li:
The Application of Saftey Audit and Monitor Technology in Power Management. SSME 2009: 548-552 - 2008
- [c2]Shengwen Tian, Hongyong Yang, Yilei Wang, Ali Li:
An Improved K-Means Clustering Algorithm Based on Spectral Method. ISICA 2008: 530-536 - 2007
- [c1]Yujuan Sun, Yilei Wang, Tao Li, Peng Liu:
A New BP Neural Network Model Based on the Random Fuzzy Theory. FSKD (1) 2007: 42-45
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint