default search action
Le Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Xinglong Pei, Penghao Sun, Yuxiang Hu, Dan Li, Bo Chen, Le Tian:
Enabling efficient routing for traffic engineering in SDN with Deep Reinforcement Learning. Comput. Networks 241: 110220 (2024) - [j22]Xinglong Pei, Penghao Sun, Yuxiang Hu, Dan Li, Le Tian, Ziyong Li:
Multi-resource interleaving for task scheduling in cloud-edge system by deep reinforcement learning. Future Gener. Comput. Syst. 160: 522-536 (2024) - [j21]Ziyong Li, Yuxiang Hu, Jiangxing Wu, Le Tian, Tao Hu, Zehua Guo:
Building Scalable and Flexible Virtual Networks on Programmable Data Plane. IEEE Netw. 38(2): 193-201 (2024) - [c27]Zixi Cui, Saifeng Hou, Le Tian, Yu Wang, Xiaoyu Yi, Yongjie Wang, Peng Yi, Hongchang Chen:
P4-Ace: Resource-Efficient Optimization and Verification for Programmable Switches. FMANO@SIGCOMM 2024 - [c26]Ying Yao, Zixi Cui, Le Tian, Menglong Li, Fan Pan, Yuxiang Hu:
Scaver: A Scalable Verification System for Programmable Network. FMANO@SIGCOMM 2024 - [i3]Jieyu Zheng, Hong Zhang, Le Tian, Zhuo Zhang, Hanyu Wei, Zhiwei Chu, Yafang Yang, Yunlei Zhao:
ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2. CoRR abs/2404.12675 (2024) - [i2]Yuan Liu, Le Tian, Xiao Zhou, Jie Zhou:
Rethinking Overlooked Aspects in Vision-Language Models. CoRR abs/2405.11850 (2024) - [i1]Yuan Liu, Zhongyin Zhao, Ziyuan Zhuang, Le Tian, Xiao Zhou, Jie Zhou:
POINTS: Improving Your Vision-language Model with Affordable Strategies. CoRR abs/2409.04828 (2024) - 2023
- [j20]Yanying Wang, Yu Huang, Le Tian, Chunhui Zhang, Hui Wang:
Shuttle Bus Line Planning in Response to Unexpected Disruption in Urban Rail Transit Networks. IEEE Access 11: 54398-54407 (2023) - [j19]Yu Huang, Yanying Wang, Le Tian, Chunhui Zhang:
The Effect of Age on Motorcyclist Injury Severities in Multi-Vehicle Motorcycle Crashes: Accounting for Unobserved Heterogeneity and Insights From Out-of-Sample Prediction. IEEE Access 11: 77240-77253 (2023) - [j18]Ziyong Li, Yuxiang Hu, Le Tian, Zhao Lv:
Packet rank-aware active queue management for programmable flow scheduling. Comput. Networks 225: 109632 (2023) - [j17]Saifeng Hou, Yuxiang Hu, Le Tian:
Named data network dynamic cache placement strategy based on programmable data plane. IET Networks 12(1): 27-35 (2023) - [j16]Huiyun Wang, Maozu Guo, Le Tian:
A Deep Learning Model with Signal Decomposition and Informer Network for Equipment Vibration Trend Prediction. Sensors 23(13): 5819 (2023) - [c25]Ziyong Li, Le Tian, Jiqiang Xia, Yuxiang Hu:
A Multipath Routing Mechanism by Packet Replication and Elimination for Reliable Communications. ICCT 2023: 1364-1369 - 2022
- [j15]Saifeng Hou, Yuxiang Hu, Le Tian, Zhiguang Dang:
NFD.P4: NDN In-Networking Cache Implementation Scheme with P4. IEICE Trans. Inf. Syst. 105-D(4): 820-823 (2022) - [c24]Jie Zhou, Le Tian, Houjin Yu, Xiao Zhou, Hui Su, Jie Zhou:
Dual Context-Guided Continuous Prompt Tuning for Few-Shot Learning. ACL (Findings) 2022: 79-84 - 2021
- [j14]Weitao Han, Le Tian, Fengyu Zhang, Peng Yi:
Robustness of interdependent multi-model addressing networks. Sci. China Inf. Sci. 64(6) (2021) - [j13]Le Tian, Serena Santi, Amina Seferagic, Julong Lan, Jeroen Famaey:
Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research. J. Netw. Comput. Appl. 182: 103036 (2021) - [j12]Xin Li, Peng Yi, Wei Wei, Yiming Jiang, Le Tian:
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. Secur. Commun. Networks 2021: 8830431:1-8830431:22 (2021) - [c23]Chang Nie, Huan Wang, Le Tian:
Adaptive Tensor Networks Decomposition. BMVC 2021: 148 - 2020
- [j11]Wenjian Zhang, Shuai Wei, Le Tian, Ke Song, Zhengbin Zhu:
Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense "In Prepress". J. Web Eng. 19(7-8): 54-78 (2020) - [c22]Hui Wang, Feng Li, Xiaojing Chen, Le Tian, Dongdong Song:
A Two-stage Improving Scheme on Intelligent Aircraft Trajectory Optimization. ICARCV 2020: 118-123 - [c21]Le Tian, Nicolas Huot, Olivier Chef, Jeroen Famaey:
Self-Organising LEO Small Satellite Constellation for 5G MTC and IoT Applications. NOF 2020: 100-104
2010 – 2019
- 2019
- [b1]Le Tian:
Scalable Low-Power Wi-Fi for the Internet of Things. University of Antwerp, Belgium, 2019 - [j10]Penghao Sun, Yuxiang Hu, Julong Lan, Le Tian, Min Chen:
TIDE: Time-relevant deep reinforcement learning for routing optimization. Future Gener. Comput. Syst. 99: 401-409 (2019) - [j9]Le Tian, Elena López-Aguilera, Eduard Garcia Villegas, Michael Tetemke Mehari, Eli De Poorter, Steven Latré, Jeroen Famaey:
Optimization-Oriented RAW Modeling of IEEE 802.11ah Heterogeneous Networks. IEEE Internet Things J. 6(6): 10597-10609 (2019) - [j8]Le Tian, Michael T. Mehari, Serena Santi, Steven Latré, Eli De Poorter, Jeroen Famaey:
Multi-objective surrogate modeling for real-time energy-efficient station grouping in IEEE 802.11ah. Pervasive Mob. Comput. 57: 33-48 (2019) - [j7]Serena Santi, Le Tian, Evgeny M. Khorov, Jeroen Famaey:
Accurate Energy Modeling and Characterization of IEEE 802.11ah RAW and TWT. Sensors 19(11): 2614 (2019) - [c20]Serena Santi, Le Tian, Jeroen Famaey:
Evaluation of the Co-existence of RAW and TWT Stations in IEEE 802.11ah using ns-3. WNGW@WNS3 2019: 9-12 - 2018
- [j6]Yufeng Li, Le Tian, Han Qiu, Chuanhao Zhang:
Research Notes: Distributed Shadow for Router Security Defense. Int. J. Softw. Eng. Knowl. Eng. 28(2): 193-206 (2018) - [j5]Amina Sljivo, Dwight Kerkhove, Le Tian, Jeroen Famaey, Adrian Munteanu, Ingrid Moerman, Jeroen Hoebeke, Eli De Poorter:
Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic. Sensors 18(2): 325 (2018) - [j4]Dmitry Bankov, Evgeny M. Khorov, Andrey I. Lyakhov, Ekaterina Stepanova, Le Tian, Jeroen Famaey:
What Is the Fastest Way to Connect Stations to a Wi-Fi HaLow Network? Sensors 18(9): 2744 (2018) - [c19]Le Tian, Amina Sljivo, Serena Santi, Eli De Poorter, Jeroen Hoebeke, Jeroen Famaey:
Extension of the IEEE 802.11ah ns-3 simulation module. WNS3 2018: 53-60 - [c18]Le Tian, Michael T. Mehari, Serena Santi, Steven Latré, Eli De Poorter, Jeroen Famaey:
IEEE 802.11ah Restricted Access Window Surrogate Model for Real-Time Station Grouping. WOWMOM 2018: 14-22 - 2017
- [j3]Le Tian, Evgeny M. Khorov, Steven Latré, Jeroen Famaey:
Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah. Sensors 17(7): 1559 (2017) - [c17]Ben Bellekens, Le Tian, Pepijn Boer, Maarten Weyn, Jeroen Famaey:
Outdoor IEEE 802.11ah Range Characterization Using Validated Propagation Models. GLOBECOM 2017: 1-6 - [c16]Le Tian, Huayi Yin:
A model recognition approach for solving interactive dynamic influence diagrams. IECON 2017: 5395-5399 - [c15]Le Tian, Serena Santi, Steven Latré, Jeroen Famaey:
Accurate Sensor Traffic Estimation for Station Grouping in Highly Dense IEEE 802.11ah Networks. FAILSAFE@SenSys 2017: 1-9 - [c14]Serena Santi, Amina Sljivo, Le Tian, Eli De Poorter, Jeroen Hoebeke, Jeroen Famaey:
Supporting Heterogeneous IoT Traffic using the IEEE 802.11ah Restricted Access Window. SenSys 2017: 32:1-32:2 - 2016
- [j2]Le Tian, Jian Luo, Yifeng Zeng, He Wu:
Modeling and Algorithms for Multiagent Communication through Interactive Dynamic Influence Diagrams. Appl. Artif. Intell. 30(4): 352-377 (2016) - [j1]Gang Xiong, Yuxiang Hu, Le Tian, Julong Lan, Junfei Li, Qiao Zhou:
A virtual service placement approach based on improved quantum genetic algorithm. Frontiers Inf. Technol. Electron. Eng. 17(7): 661-671 (2016) - [c13]Yangyang Shi, Kaisheng Yao, Le Tian, Daxin Jiang:
Deep LSTM based Feature Mapping for Query Classification. HLT-NAACL 2016: 1501-1511 - [c12]Le Tian, Sébastien Deronne, Steven Latré, Jeroen Famaey:
Implementation and Validation of an IEEE 802.11ah Module for ns-3. WNS3 2016: 49-56 - [c11]Le Tian, Jeroen Famaey, Steven Latré:
Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks. WoWMoM 2016: 1-9 - 2014
- [c10]Le Tian, Jianbo Wang:
An algorithm for carrier frequency offset estimation in BPSK burst transmission. ICADIWT 2014: 50-53 - 2013
- [c9]Xipeng Qiu, Le Tian, Xuanjing Huang:
Latent Semantic Tensor Indexing for Community-based Question Answering. ACL (2) 2013: 434-439 - [c8]Le Tian, Xipeng Qiu, Xuanjing Huang:
Chinese Word Segmentation with Character Abstraction. CCL 2013: 36-43 - [c7]Le Tian, Xipeng Qiu, Xuanjing Huang:
Feature Abstraction for Lightweight and Accurate Chinese Word Segmentation. IALP 2013: 231-234 - [c6]Le Tian, Xipeng Qiu, Xuanjing Huang:
Question identification in Chinese micro-texts. ICMLC 2013: 1910-1915 - [c5]Le Tian, Yide Ma, Li Liu, Kun Zhan:
Antinoise Texture Retrieval Based on PCNN and One-Class SVM. IWANN (1) 2013: 291-298
2000 – 2009
- 2007
- [c4]Yu Zhang, Haila Wang, Le Tian:
Energy and Data Aware Clustering for Data Aggregation in Wireless Sensor Networks. MASS 2007: 1-6 - 2006
- [c3]Le Tian, Dongliang Xie, Lei Zhang, Shiduan Cheng:
Quasi-Bottleneck Nodes: A Potential Threat to the Lifetime of Wireless Sensor Networks. APWeb Workshops 2006: 241-248 - [c2]Bing Han, Dongliang Xie, Le Tian, Biao Ren, Shiduan Cheng:
An Adaptive Location Service for Wireless Sensor Networks with Mobile Sinks. ICWMC 2006: 5 - 2005
- [c1]Shihong Zou, Le Tian, Shiduan Cheng, Yu Lin:
A Service Discovery Protocol with Maximal Area Disjoint Paths for Mobile Ad Hoc Networks. ADHOC-NOW 2005: 349-357
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint