default search action
Wei Yu 0003
Person information
- affiliation: Microsoft Corporation, Redmond, USA
- affiliation: University of Maryland, College Park
Other persons with the same name
- Wei Yu — disambiguation page
- Wei Yu 0001 — University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (and 1 more)
- Wei Yu 0002 — Towson University, Department of Computer & Information Sciences (and 1 more)
- Wei Yu 0004 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Wei Yu 0005 — Citadel Investment Group, Chicago, USA (and 1 more)
- Wei Yu 0006 — Centers for Disease Control and Prevention, Atlanta, USA
- Wei Yu 0007 — Tsinghua University, National Laboratory for Information Science and Technology (and 2 more)
- Wei Yu 0008 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Wei Yu 0009 — Wuhan University, Computer School, China
- Wei Yu 0010 — Zhijiang University, Hangzhou, China
- Wei Yu 0011 — East China University of Science and Technology, Shanghai, China
- Wei Yu 0012 — Xiamen University, China
- Wei Yu 0013 — Earth Resources Technology, Inc., Laurel, MD, USA
- Wei Yu 0014 — Graz University of Technology, Austria
- Wei Yu 0015 — Nanjing Forestry University, College of Automobile and Transport Engineering, China
- Wei Yu 0016 — Tianjin University, School of Computer Science and Technology, China
- Wei Yu 0017 — Nantong University, School of Electronics and Information / Engineering Training Center, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j12]Zhu Ji, Wei Yu, K. J. Ray Liu:
A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement. IEEE Trans. Mob. Comput. 9(9): 1242-1254 (2010)
2000 – 2009
- 2009
- [j11]Ahmed K. Sadek, Wei Yu, K. J. Ray Liu:
On the energy efficiency of cooperative communications in wireless sensor networks. ACM Trans. Sens. Networks 6(1): 5:1-5:21 (2009) - 2008
- [j10]Zhu Ji, Wei Yu, K. J. Ray Liu:
A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs. IEEE J. Sel. Areas Commun. 26(7): 1204-1217 (2008) - [j9]Wei Yu, K. J. Ray Liu:
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 3(2): 317-330 (2008) - 2007
- [j8]Wei Yu, Yan Sun, K. J. Ray Liu:
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Trans. Dependable Secur. Comput. 4(3): 228-242 (2007) - [j7]Wei Yu, K. J. Ray Liu:
Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2(2): 227-239 (2007) - [j6]Wei Yu, Zhu Ji, K. J. Ray Liu:
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. IEEE Trans. Inf. Forensics Secur. 2(2): 240-253 (2007) - [j5]Wei Yu, K. J. Ray Liu:
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(5): 507-521 (2007) - 2006
- [b1]Wei Yu:
Securing Wireless Ad Hoc Networks under noise and Imperfect Monitoring. University of Maryland, College Park, MD, USA, 2006 - [j4]Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu:
Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 305-317 (2006) - [j3]Wei Yu, Fangting Sun, Jason E. Fritts:
Efficient rate control for JPEG-2000. IEEE Trans. Circuits Syst. Video Technol. 16(5): 577-589 (2006) - [c22]Wei Yu, Kuo J. Ray Liu:
On Optimal and Cheat-Proof Packets Forwarding Strategies in Autonomous Ad Hoc Networks. CISS 2006: 1455-1460 - [c21]Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu:
Attacks on Trust Evaluation in Distributed Networks. CISS 2006: 1461-1466 - [c20]Zhu Ji, Wei Yu, K. J. Ray Liu:
An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. INFOCOM 2006 - [c19]Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu:
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. INFOCOM 2006 - [c18]Ahmed K. Sadek, Wei Yu, K. J. Ray Liu:
When Does Cooperation Have Better Performance in Sensor Networks? SECON 2006: 188-197 - [c17]Zhu Ji, Wei Yu, K. J. Ray Liu:
Cooperation Enforcement in Autonomous MANETs under Noise and Imperfect Observation. SECON 2006: 460-468 - [c16]Zhu Ji, Wei Yu, K. J. Ray Liu:
Belief-based packet forwarding in self-organized mobile ad hoc networks with noise and imperfect observation. WCNC 2006: 343-348 - 2005
- [j2]Wei Yu, K. J. Ray Liu:
Attack-resistant cooperation stimulation in autonomous ad hoc networks. IEEE J. Sel. Areas Commun. 23(12): 2260-2271 (2005) - [c15]Zhu Ji, Wei Yu, K. J. Ray Liu:
A dynamic pricing approach for self-organized mobile ad hoc networks. GLOBECOM 2005: 5 - [c14]Wei Yu, K. J. Ray Liu:
Defense against injecting traffic attacks in cooperative ad hoc networks. GLOBECOM 2005: 5 - [c13]Wei Yu, K. J. Ray Liu:
Anti-attack cooperation stimulation in self-organized ad hoc networks. GLOBECOM 2005: 5 - [c12]Wei Yu, Yan Sun, K. J. Ray Liu:
Minimization of rekeying cost for contributory group communications. GLOBECOM 2005: 5 - [c11]Yan Sun, Wei Yu, Zhu Han, K. J. Ray Liu:
Trust modeling and evaluation in ad hoc networks. GLOBECOM 2005: 6 - [c10]Wei Yu, Yan Sun, K. J. Ray Liu:
HADOF: defense against routing disruptions in mobile ad hoc networks. INFOCOM 2005: 1252-1261 - [c9]Wei Yu, K. J. Ray Liu:
Secure cooperative mobile ad hoc networks against injecting traffic attacks. SECON 2005: 55-64 - [c8]Wei Yu, K. J. Ray Liu:
Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. SECON 2005: 65-75 - 2004
- [j1]Fangting Sun, David Fernández-Baca, Wei Yu:
Inverse parametric sequence alignment. J. Algorithms 53(1): 36-54 (2004) - [c7]Wei Yu:
Integrated Rate Control and Entropy Coding for JPEG 2000. Data Compression Conference 2004: 152-161 - [c6]Fangting Sun, Wei Yu:
Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. Data Compression Conference 2004: 565 - [c5]Wei Yu, K. J. Ray Liu, Zoltan Safar:
Scalable cross-layer rate allocation for image transmission over heterogeneous wireless networks. ICASSP (4) 2004: 593-596 - 2002
- [c4]Fangting Sun, David Fernández-Baca, Wei Yu:
Inverse Parametric Sequence Alignment. COCOON 2002: 97-106 - [c3]Wei Yu, Jason E. Fritts, Fangting Sun:
A hierarchical image segmentation algorithm. ICME (2) 2002: 221-224 - [c2]Qi Zhang, Sally A. Goldman, Wei Yu, Jason E. Fritts:
Content-Based Image Retrieval Using Multiple-Instance Learning. ICML 2002: 682-689 - [c1]Wei Yu, Ruibiao Qiu, Jason E. Fritts:
Advantages of motion-JPEG2000 in video processing. VCIP 2002: 635-645
Coauthor Index
aka: Kuo J. Ray Liu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint