Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei Li 0059
@article{DBLP:journals/tcs/XuLC23, author = {Honghui Xu and Wei Li and Zhipeng Cai}, title = {Analysis on methods to effectively improve transfer learning performance}, journal = {Theor. Comput. Sci.}, volume = {940}, number = {Part}, pages = {90--107}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2022.09.023}, doi = {10.1016/J.TCS.2022.09.023}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/XuLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiongCHTL23, author = {Zuobin Xiong and Zhipeng Cai and Chunqiang Hu and Daniel Takabi and Wei Li}, title = {Towards Neural Network-Based Communication System: Attack and Defense}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3238--3250}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3203965}, doi = {10.1109/TDSC.2022.3203965}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiongCHTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/Xiong0023, author = {Zuobin Xiong and Wei Li and Zhipeng Cai}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {Federated Generative Model on Multi-Source Heterogeneous Data in IoT}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {10537--10545}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i9.26252}, doi = {10.1609/AAAI.V37I9.26252}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/Xiong0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/Xu0X023, author = {Honghui Xu and Zhipeng Cai and Zuobin Xiong and Wei Li}, editor = {Guihai Chen and Latifur Khan and Xiaofeng Gao and Meikang Qiu and Witold Pedrycz and Xindong Wu}, title = {Backdoor Attack on 3D Grey Image Segmentation}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023, Shanghai, China, December 1-4, 2023}, pages = {708--717}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDM58522.2023.00080}, doi = {10.1109/ICDM58522.2023.00080}, timestamp = {Tue, 13 Feb 2024 11:46:18 +0100}, biburl = {https://dblp.org/rec/conf/icdm/Xu0X023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/Xiong0L023, author = {Zuobin Xiong and Wei Li and Yingshu Li and Zhipeng Cai}, editor = {Guihai Chen and Latifur Khan and Xiaofeng Gao and Meikang Qiu and Witold Pedrycz and Xindong Wu}, title = {Exact-Fun: An Exact and Efficient Federated Unlearning Approach}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023, Shanghai, China, December 1-4, 2023}, pages = {1439--1444}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDM58522.2023.00188}, doi = {10.1109/ICDM58522.2023.00188}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/Xiong0L023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CaiXXWLP21, author = {Zhipeng Cai and Zuobin Xiong and Honghui Xu and Peng Wang and Wei Li and Yi Pan}, title = {Generative Adversarial Networks: {A} Survey Toward Private and Secure Applications}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {6}, pages = {132:1--132:38}, year = {2022}, url = {https://doi.org/10.1145/3459992}, doi = {10.1145/3459992}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CaiXXWLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuCTL22, author = {Honghui Xu and Zhipeng Cai and Daniel Takabi and Wei Li}, title = {Audio-Visual Autoencoding for Privacy-Preserving Video Streaming}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {3}, pages = {1749--1761}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3089080}, doi = {10.1109/JIOT.2021.3089080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuCTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/XiongCTL22, author = {Zuobin Xiong and Zhipeng Cai and Daniel Takabi and Wei Li}, title = {Privacy Threat and Defense for Federated Learning With Non-i.i.d. Data in AIoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {2}, pages = {1310--1321}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3073925}, doi = {10.1109/TII.2021.3073925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/XiongCTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/XuCLL22, author = {Honghui Xu and Zhipeng Cai and Ruinian Li and Wei Li}, title = {Efficient CityCam-to-Edge Cooperative Learning for Vehicle Counting in {ITS}}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {9}, pages = {16600--16611}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3149657}, doi = {10.1109/TITS.2022.3149657}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/XuCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/XuCL22, author = {Honghui Xu and Zhipeng Cai and Wei Li}, title = {Privacy-Preserving Mechanisms for Multi-Label Image Recognition}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {16}, number = {4}, pages = {69:1--69:21}, year = {2022}, url = {https://doi.org/10.1145/3491231}, doi = {10.1145/3491231}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/XuCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/Han00L22, author = {Jinkun Han and Wei Li and Zhipeng Cai and Yingshu Li}, editor = {Mohammad Al Hasan and Li Xiong}, title = {Multi-Aggregator Time-Warping Heterogeneous Graph Neural Network for Personalized Micro-Video Recommendation}, booktitle = {Proceedings of the 31st {ACM} International Conference on Information {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022}, pages = {676--685}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511808.3557403}, doi = {10.1145/3511808.3557403}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/Han00L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuXM022, author = {Guangxi Lu and Zuobin Xiong and Jing Meng and Wei Li}, title = {Pairwise Gaussian Graph Convolutional Networks: Defense Against Graph Adversarial Attack}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {4371--4376}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001601}, doi = {10.1109/GLOBECOM48099.2022.10001601}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LuXM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicon/LuXL022, author = {Guangxi Lu and Zuobin Xiong and Ruinian Li and Wei Li}, editor = {Zygmunt J. Haas and Ravi Prakash and Habib M. Ammari and Weili Wu}, title = {Decentralized Federated Learning: {A} Defense Against Gradient Inversion Attack}, booktitle = {Wireless Internet - 15th {EAI} International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {464}, pages = {44--56}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-27041-3\_4}, doi = {10.1007/978-3-031-27041-3\_4}, timestamp = {Tue, 25 Jul 2023 08:39:12 +0200}, biburl = {https://dblp.org/rec/conf/wicon/LuXL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SunXQL21, author = {Gaofei Sun and Xiaoshuang Xing and Zhenjiang Qian and Wei (Lisa) Li}, title = {Edge computing assisted privacy-preserving data computation for IoT devices}, journal = {Comput. Commun.}, volume = {166}, pages = {208--215}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2020.11.018}, doi = {10.1016/J.COMCOM.2020.11.018}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SunXQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLYLJC21, author = {Kaiyang Li and Guangchun Luo and Yang Ye and Wei Li and Shihao Ji and Zhipeng Cai}, title = {Adversarial Privacy-Preserving Graph Embedding Against Inference Attack}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6904--6915}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3036583}, doi = {10.1109/JIOT.2020.3036583}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiLYLJC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangLWCB21, author = {Yan Huang and Wei Li and Jinbao Wang and Zhipeng Cai and Anu G. Bourgeois}, title = {Privacy protection among three antithetic-parties for context-aware services}, journal = {J. Netw. Comput. Appl.}, volume = {191}, pages = {103115}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103115}, doi = {10.1016/J.JNCA.2021.103115}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HuangLWCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/LiCTWBY21, author = {Wei Li and Xiuzhen Cheng and Zhi Tian and Shengling Wang and Rongfang Bie and Jiguo Yu}, title = {Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {7}, number = {1}, pages = {157--170}, year = {2021}, url = {https://doi.org/10.1109/TCCN.2020.2996602}, doi = {10.1109/TCCN.2020.2996602}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tccn/LiCTWBY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/XiongCHAL21, author = {Zuobin Xiong and Zhipeng Cai and Qilong Han and Arwa Alrawais and Wei Li}, title = {{ADGAN:} Protect Your Location Privacy in Camera Data of Auto-Driving Vehicles}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {9}, pages = {6200--6210}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3032352}, doi = {10.1109/TII.2020.3032352}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/XiongCHAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/CaiDL21, author = {Zhipeng Cai and Zhuojun Duan and Wei Li}, title = {Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowdsensing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {8}, pages = {2576--2591}, year = {2021}, url = {https://doi.org/10.1109/TMC.2020.2987881}, doi = {10.1109/TMC.2020.2987881}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/CaiDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XiongXLC21, author = {Zuobin Xiong and Honghui Xu and Wei Li and Zhipeng Cai}, title = {Multi-Source Adversarial Sample Attack on Autonomous Vehicles}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {3}, pages = {2822--2835}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3061065}, doi = {10.1109/TVT.2021.3061065}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/XiongXLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/WangCKL21, author = {Peng Wang and Zhipeng Cai and Donghyun Kim and Wei Li}, title = {Detection Mechanisms of One-Pixel Attack}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {8891204:1--8891204:8}, year = {2021}, url = {https://doi.org/10.1155/2021/8891204}, doi = {10.1155/2021/8891204}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/WangCKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoa/XuCL21, author = {Honghui Xu and Zhipeng Cai and Wei Li}, editor = {Ding{-}Zhu Du and Donglei Du and Chenchen Wu and Dachuan Xu}, title = {Which Option Is a Better Way to Improve Transfer Learning Performance?}, booktitle = {Combinatorial Optimization and Applications - 15th International Conference, {COCOA} 2021, Tianjin, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13135}, pages = {61--74}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92681-6\_6}, doi = {10.1007/978-3-030-92681-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoa/XuCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2020, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68851-6}, doi = {10.1007/978-3-030-68851-6}, isbn = {978-3-030-68850-9}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2020w, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12383}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68884-4}, doi = {10.1007/978-3-030-68884-4}, isbn = {978-3-030-68883-7}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-03785, author = {Zhipeng Cai and Zuobin Xiong and Honghui Xu and Peng Wang and Wei Li and Yi Pan}, title = {Generative Adversarial Networks: {A} Survey Towards Private and Secure Applications}, journal = {CoRR}, volume = {abs/2106.03785}, year = {2021}, url = {https://arxiv.org/abs/2106.03785}, eprinttype = {arXiv}, eprint = {2106.03785}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-03785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhuCHLL20, author = {Saide Zhu and Zhipeng Cai and Huafu Hu and Yingshu Li and Wei Li}, title = {zkCrowd: {A} Hybrid Blockchain-Based Crowdsourcing Platform}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {6}, pages = {4196--4205}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2941735}, doi = {10.1109/TII.2019.2941735}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhuCHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot2/YangHPXL20, author = {Jishen Yang and Yan Huang and Junjie Pang and Zhenzhen Xie and Wei Li}, editor = {Wei Song and Kisung Lee and Zhisheng Yan and Liang{-}Jie Zhang and Huan Chen}, title = {Image Privacy Protection by Particle Swarm Optimization Based Pivot Pixel Modification}, booktitle = {Internet of Things - {ICIOT} 2020 - 5th International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12405}, pages = {1--16}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59615-6\_1}, doi = {10.1007/978-3-030-59615-6\_1}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciot2/YangHPXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhangZLLML20, author = {Lu Zhang and Saide Zhu and Fengyin Li and Ruinian Li and Jing Meng and Wei Li}, editor = {Dongxiao Yu and Falko Dressler and Jiguo Yu}, title = {A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous {LBS} Queries}, booktitle = {Wireless Algorithms, Systems, and Applications - 15th International Conference, {WASA} 2020, Qingdao, China, September 13-15, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12384}, pages = {704--715}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59016-1\_58}, doi = {10.1007/978-3-030-59016-1\_58}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/ZhangZLLML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-13072, author = {Kaiyang Li and Guangchun Luo and Yang Ye and Wei Li and Shihao Ji and Zhipeng Cai}, title = {Adversarial Privacy Preserving Graph Embedding against Inference Attack}, journal = {CoRR}, volume = {abs/2008.13072}, year = {2020}, url = {https://arxiv.org/abs/2008.13072}, eprinttype = {arXiv}, eprint = {2008.13072}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-13072.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiTLLC19, author = {Kaiyang Li and Ling Tian and Wei Li and Guangchun Luo and Zhipeng Cai}, title = {Incorporating social interaction into three-party game towards privacy protection in IoT}, journal = {Comput. Networks}, volume = {150}, pages = {90--101}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.036}, doi = {10.1016/J.COMNET.2018.11.036}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiTLLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/WangLLLZS19, author = {Zhihao Wang and Hong Li and Qiang Li and Wei Li and Hongsong Zhu and Limin Sun}, title = {Towards {IP} geolocation with intermediate routers based on topology discovery}, journal = {Cybersecur.}, volume = {2}, number = {1}, pages = {13}, year = {2019}, url = {https://doi.org/10.1186/s42400-019-0030-2}, doi = {10.1186/S42400-019-0030-2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/WangLLLZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhuLLTLC19, author = {Saide Zhu and Wei Li and Hong Li and Ling Tian and Guangchun Luo and Zhipeng Cai}, title = {Coin Hopping Attack in Blockchain-Based IoT}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4614--4626}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2872458}, doi = {10.1109/JIOT.2018.2872458}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhuLLTLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TianLLRC19, author = {Ling Tian and Jiaxin Li and Wei Li and Balasubramaniam Ramesh and Zhipeng Cai}, title = {Optimal Contract-Based Mechanisms for Online Data Trading Markets}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {7800--7810}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2902528}, doi = {10.1109/JIOT.2019.2902528}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TianLLRC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaHHL19, author = {Liran Ma and Yan Huo and Chunqiang Hu and Wei Li}, title = {Security and Privacy for Smart Cyber-Physical Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7045862:1--7045862:2}, year = {2019}, url = {https://doi.org/10.1155/2019/7045862}, doi = {10.1155/2019/7045862}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaHHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/ZhuHL019, author = {Saide Zhu and Huafu Hu and Yingshu Li and Wei Li}, title = {Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {26--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00013}, doi = {10.1109/BLOCKCHAIN.2019.00013}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/ZhuHL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Duan0ZC19, author = {Zhuojun Duan and Wei Li and Xu Zheng and Zhipeng Cai}, title = {Mutual-Preference Driven Truthful Auction Mechanism in Mobile Crowdsensing}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1233--1242}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00124}, doi = {10.1109/ICDCS.2019.00124}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/Duan0ZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/Xiong0HC19, author = {Zuobin Xiong and Wei Li and Qilong Han and Zhipeng Cai}, editor = {Jianyong Wang and Kyuseok Shim and Xindong Wu}, title = {Privacy-Preserving Auto-Driving: {A} GAN-Based Approach to Protect Vehicular Camera Data}, booktitle = {2019 {IEEE} International Conference on Data Mining, {ICDM} 2019, Beijing, China, November 8-11, 2019}, pages = {668--677}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDM.2019.00077}, doi = {10.1109/ICDM.2019.00077}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/Xiong0HC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/SooksatraLLGL19, author = {Korn Sooksatra and Ruinian Li and Yingshu Li and Xin Guan and Wei Li}, editor = {Edoardo S. Biagioni and Yao Zheng and Siyao Cheng}, title = {Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing}, booktitle = {Wireless Algorithms, Systems, and Applications - 14th International Conference, {WASA} 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11604}, pages = {310--321}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23597-0\_25}, doi = {10.1007/978-3-030-23597-0\_25}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/SooksatraLLGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WeiLLLW19, author = {Qianwen Wei and Shujun Li and Wei Li and Hong Li and Mingsheng Wang}, editor = {Edoardo S. Biagioni and Yao Zheng and Siyao Cheng}, title = {Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain}, booktitle = {Wireless Algorithms, Systems, and Applications - 14th International Conference, {WASA} 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11604}, pages = {358--369}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23597-0\_29}, doi = {10.1007/978-3-030-23597-0\_29}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/WeiLLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/HuLM0AB18, author = {Chunqiang Hu and Ruinian Li and Bo Mei and Wei Li and Arwa Alrawais and Rongfang Bie}, title = {Privacy-preserving combinatorial auction without an auctioneer}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {38}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1047-z}, doi = {10.1186/S13638-018-1047-Z}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/HuLM0AB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mfc/ZhuLLHC18, author = {Saide Zhu and Wei Li and Hong Li and Chunqiang Hu and Zhipeng Cai}, title = {A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining}, journal = {Math. Found. Comput.}, volume = {1}, number = {4}, pages = {393--414}, year = {2018}, url = {https://doi.org/10.3934/mfc.2018020}, doi = {10.3934/MFC.2018020}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mfc/ZhuLLHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/HuLCYWB18, author = {Chunqiang Hu and Wei Li and Xiuzhen Cheng and Jiguo Yu and Shengling Wang and Rongfang Bie}, title = {A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds}, journal = {{IEEE} Trans. Big Data}, volume = {4}, number = {3}, pages = {341--355}, year = {2018}, url = {https://doi.org/10.1109/TBDATA.2016.2621106}, doi = {10.1109/TBDATA.2016.2621106}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbd/HuLCYWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HuWHHLC18, author = {Qin Hu and Shengling Wang and Chunqiang Hu and Jian{-}Hui Huang and Wei Li and Xiuzhen Cheng}, title = {Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {67}, number = {8}, pages = {7698--7711}, year = {2018}, url = {https://doi.org/10.1109/TVT.2018.2838041}, doi = {10.1109/TVT.2018.2838041}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/HuWHHLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/LiHSYXC18, author = {Wei Li and Chunqiang Hu and Tianyi Song and Jiguo Yu and Xiaoshuang Xing and Zhipeng Cai}, title = {Privacy-Preserving Data Collection in Context-Aware Applications}, booktitle = {2018 {IEEE} Symposium on Privacy-Aware Computing, {PAC} 2018, Washington, DC, USA, September 26-28, 2018}, pages = {75--85}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PAC.2018.00014}, doi = {10.1109/PAC.2018.00014}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pac/LiHSYXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/SooksatraLMAWY18, author = {Korn Sooksatra and Wei Li and Bo Mei and Arwa Alrawais and Shengling Wang and Jiguo Yu}, editor = {Sriram Chellappan and Wei Cheng and Wei Li}, title = {Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy}, booktitle = {Wireless Algorithms, Systems, and Applications - 13th International Conference, {WASA} 2018, Tianjin, China, June 20-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10874}, pages = {425--437}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94268-1\_35}, doi = {10.1007/978-3-319-94268-1\_35}, timestamp = {Wed, 11 Nov 2020 16:58:36 +0100}, biburl = {https://dblp.org/rec/conf/wasa/SooksatraLMAWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhangYLCYZ17, author = {Xiujuan Zhang and Jiguo Yu and Wei Li and Xiuzhen Cheng and Dongxiao Yu and Feng Zhao}, title = {Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under {SINR}}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {4}, pages = {2459--2472}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2688484}, doi = {10.1109/TNET.2017.2688484}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ZhangYLCYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/DuanLC17, author = {Zhuojun Duan and Wei Li and Zhipeng Cai}, editor = {Kisung Lee and Ling Liu}, title = {Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {635--644}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.121}, doi = {10.1109/ICDCS.2017.121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/DuanLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/AlhothailyAHL17, author = {Abdulrahman Alhothaily and Arwa Alrawais and Chunqiang Hu and Wei Li}, editor = {Rongfang Bie and Yunchuan Sun and Jiguo Yu}, title = {One-Time-Username: {A} Threshold-based Authentication System}, booktitle = {2017 International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2017, Shandong, China, October 19-21, 2017}, series = {Procedia Computer Science}, volume = {129}, pages = {426--432}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2018.03.019}, doi = {10.1016/J.PROCS.2018.03.019}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/AlhothailyAHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/LiSLMYC17, author = {Wei Li and Tianyi Song and Yingshu Li and Liran Ma and Jiguo Yu and Xiuzhen Cheng}, title = {A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {176--177}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.26}, doi = {10.1109/PAC.2017.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/LiSLMYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/Lu00BZ17, author = {Lei Lu and Wei Li and Shengling Wang and Rongfang Bie and Bowu Zhang}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {83--95}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_8}, doi = {10.1007/978-3-319-60033-8\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/Lu00BZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiLHLCB16, author = {Wei Li and Maya Larson and Chunqiang Hu and Ruinian Li and Xiuzhen Cheng and Rongfang Bie}, title = {Secure multi-unit sealed first-price auction mechanisms}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3833--3843}, year = {2016}, url = {https://doi.org/10.1002/sec.1522}, doi = {10.1002/SEC.1522}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiLHLCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/LiYCBZ16, author = {Wei Li and Jiguo Yu and Xiuzhen Cheng and Rongfang Bie and Feng Zhao}, title = {An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {2}, number = {4}, pages = {427--441}, year = {2016}, url = {https://doi.org/10.1109/TCCN.2016.2620973}, doi = {10.1109/TCCN.2016.2620973}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tccn/LiYCBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/HuLLYTB16, author = {Chunqiang Hu and Ruinian Li and Wei Li and Jiguo Yu and Zhi Tian and Rongfang Bie}, editor = {Xiuzhen Cheng and Zhenkai Liang}, title = {Efficient privacy-preserving schemes for dot-product computation in mobile computing}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Privacy-Aware Mobile Computing, Paderborn, Germany, July, 2016}, pages = {51--59}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2940343.2948717}, doi = {10.1145/2940343.2948717}, timestamp = {Thu, 10 Mar 2022 09:31:34 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/HuLLYTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/JingZM0CH15, author = {Tao Jing and Fan Zhang and Liran Ma and Wei Li and Xuhao Chen and Yan Huo}, title = {{TORA:} {A} Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {28}, number = {3-4}, pages = {347--362}, year = {2015}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-28-number-3-4-2015/ahswn-28-3-4-p-347-362/}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/JingZM0CH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/JingLCCXHCCZ15, author = {Tao Jing and Wei Li and Xiuying Chen and Xiuzhen Cheng and Xiaoshuang Xing and Yan Huo and Tao Chen and Hyeong{-}Ah Choi and Taieb Znati}, title = {Achievable transmission capacity of cognitive radio networks with cooperative relaying}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2015}, pages = {94}, year = {2015}, url = {https://doi.org/10.1186/s13638-015-0311-8}, doi = {10.1186/S13638-015-0311-8}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/JingLCCXHCCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YuJ0CWBY15, author = {Jiguo Yu and Lili Jia and Wei Li and Xiuzhen Cheng and Shengling Wang and Rongfang Bie and Dongxiao Yu}, title = {A Self-Stabilizing Algorithm for {CDS} Construction with Constant Approximation in Wireless Networks under {SINR} Model}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {792--793}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.112}, doi = {10.1109/ICDCS.2015.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YuJ0CWBY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/LarsonHLLC15, author = {Maya Larson and Chunqiang Hu and Ruinian Li and Wei Li and Xiuzhen Cheng}, editor = {Xinwen Fu and Nan Zhang}, title = {Secure Auctions without an Auctioneer via Verifiable Secret Sharing}, booktitle = {Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, PAMCO@MobiHoc 2015, Hangzhou, China, June 22, 2015}, pages = {1--6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2757302.2757305}, doi = {10.1145/2757302.2757305}, timestamp = {Mon, 20 Mar 2023 18:04:56 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/LarsonHLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LarsonLHLCB15, author = {Maya Larson and Ruinian Li and Chunqiang Hu and Wei Li and Xiuzhen Cheng and Rongfang Bie}, editor = {Kuai Xu and Haojin Zhu}, title = {A Bidder-Oriented Privacy-Preserving {VCG} Auction Scheme}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {284--294}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_28}, doi = {10.1007/978-3-319-21837-3\_28}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/LarsonLHLCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LarsonLHLCB15a, author = {Maya Larson and Wei Li and Chunqiang Hu and Ruinian Li and Xiuzhen Cheng and Rongfang Bie}, editor = {Kuai Xu and Haojin Zhu}, title = {A Secure Multi-unit Sealed First-Price Auction Mechanism}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {295--304}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_29}, doi = {10.1007/978-3-319-21837-3\_29}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/LarsonLHLCB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/LiWCB14, author = {Wei Li and Shengling Wang and Xiuzhen Cheng and Rongfang Bie}, title = {Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {18}, number = {1}, pages = {3--13}, year = {2014}, url = {https://doi.org/10.1145/2581555.2581557}, doi = {10.1145/2581555.2581557}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmobile/LiWCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiWCCXAA14, author = {Wei Li and Shengling Wang and Yong Cui and Xiuzhen Cheng and Ran Xin and Mznah Al{-}Rodhaan and Abdullah Al{-}Dhelaan}, title = {{AP} Association for Proportional Fairness in Multirate WLANs}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {22}, number = {1}, pages = {191--202}, year = {2014}, url = {https://doi.org/10.1109/TNET.2013.2245145}, doi = {10.1109/TNET.2013.2245145}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/LiWCCXAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/LiCBZ14, author = {Wei Li and Xiuzhen Cheng and Rongfang Bie and Feng Zhao}, editor = {Jie Wu and Xiuzhen Cheng and Xiang{-}Yang Li and Saswati Sarkar}, title = {An extensible and flexible truthful auction framework for heterogeneous spectrum markets}, booktitle = {The Fifteenth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'14, Philadelphia, PA, USA, August 11-14, 2014}, pages = {175--184}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2632951.2632968}, doi = {10.1145/2632951.2632968}, timestamp = {Thu, 10 Mar 2022 09:31:34 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/LiCBZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/0059CJCXW13, author = {Wei Li and Xiuzhen Cheng and Tao Jing and Yong Cui and Kai Xing and Wendong Wang}, title = {Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {11}, pages = {2483--2493}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.131103}, doi = {10.1109/JSAC.2013.131103}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/0059CJCXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JingZXHLC13, author = {Tao Jing and Chenyu Zhao and Xiaoshuang Xing and Yan Huo and Wei Li and Xiuzhen Cheng}, title = {A multi-unit truthful double auction framework for secondary market}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2817--2822}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654967}, doi = {10.1109/ICC.2013.6654967}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/JingZXHLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiCJX13, author = {Wei Li and Xiuzhen Cheng and Tao Jing and Xiaoshuang Xing}, title = {Cooperative multi-hop relaying via network formation games in cognitive radio networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {971--979}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566886}, doi = {10.1109/INFCOM.2013.6566886}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiCJX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/LiWC13, author = {Wei Li and Shengling Wang and Xiuzhen Cheng}, editor = {Yi Shi and Yalin Evren Sagduyu and Charles Clancy}, title = {Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks}, booktitle = {Proceedings of the 1st {ACM} workshop on Cognitive radio architectures for broadband, CRAB@MobiCom 2013, Miami, Florida, USA, October 4, 2013}, pages = {21--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508478.2508482}, doi = {10.1145/2508478.2508482}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/LiWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/JingZMLCH13, author = {Tao Jing and Fan Zhang and Liran Ma and Wei Li and Xuhao Chen and Yan Huo}, editor = {Kui Ren and Xue Liu and Weifa Liang and Ming Xu and Xiaohua Jia and Kai Xing}, title = {Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 8th International Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7992}, pages = {512--523}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39701-1\_42}, doi = {10.1007/978-3-642-39701-1\_42}, timestamp = {Mon, 01 May 2023 19:52:19 +0200}, biburl = {https://dblp.org/rec/conf/wasa/JingZMLCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crowncom/ChenJH0CC12, author = {Xiuying Chen and Tao Jing and Yan Huo and Wei Li and Xiuzhen Cheng and Tao Chen}, editor = {Jens Zander and Riku J{\"{a}}ntti and Min Song}, title = {Achievable transmission capacity of cognitive radio networks with cooperative relaying}, booktitle = {7th International Conference on Cognitive Radio Oriented Wireless Networks, {CROWNCOM} 2012, Stockholm, Sweden, June 18-20, 2012}, pages = {1--6}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.crowncom.2012.248588}, doi = {10.4108/ICST.CROWNCOM.2012.248588}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crowncom/ChenJH0CC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LiSCJXZ12, author = {Wei Li and Tianyi Song and Xiuzhen Cheng and Tao Jing and Xiaoshuang Xing and Taieb Znati}, title = {Delay modeling in mobile cognitive radio networks}, booktitle = {2012 1st {IEEE} International Conference on Communications in China (ICCC), Beijing, China, August 15-17, 2012}, pages = {30--35}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCChina.2012.6356858}, doi = {10.1109/ICCCHINA.2012.6356858}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/LiSCJXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WangCDLW11, author = {Shengling Wang and Yong Cui and Sajal K. Das and Wei Li and Jianping Wu}, title = {Mobility in IPv6: Whether and How to Hierarchize the Network?}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {10}, pages = {1722--1729}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2011.71}, doi = {10.1109/TPDS.2011.71}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WangCDLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/LiCCAA11, author = {Wei Li and Yong Cui and Xiuzhen Cheng and Mznah Al{-}Rodhaan and Abdullah Al{-}Dhelaan}, title = {Achieving Proportional Fairness via {AP} Power Control in Multi-Rate WLANs}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {11}, pages = {3784--3792}, year = {2011}, url = {https://doi.org/10.1109/TWC.2011.091411.101899}, doi = {10.1109/TWC.2011.091411.101899}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/LiCCAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CuiLC11, author = {Yong Cui and Wei Li and Xiuzhen Cheng}, title = {Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {361--365}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935182}, doi = {10.1109/INFCOM.2011.5935182}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/CuiLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LiCWC10, author = {Wei Li and Yong Cui and Shengling Wang and Xiuzhen Cheng}, editor = {Gopal Pandurangan and V. S. Anil Kumar and Gu Ming and Yunhao Liu and Yingshu Li}, title = {Approximate Optimization for Proportional Fair {AP} Association in Multi-rate WLANs}, booktitle = {Wireless Algorithms, Systems, and Applications, 5th International Conference, {WASA} 2010, Beijing, China, August 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6221}, pages = {36--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14654-1\_5}, doi = {10.1007/978-3-642-14654-1\_5}, timestamp = {Tue, 20 Dec 2022 21:20:03 +0100}, biburl = {https://dblp.org/rec/conf/wasa/LiCWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.