Dawei Wang

According to our database1, Dawei Wang authored at least 87 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fast Reconstruction for Monte Carlo Rendering Using Deep Convolutional Networks.
IEEE Access, 2019

2018
A machine learning approach for feature selection traffic classification using security analysis.
The Journal of Supercomputing, 2018

Cooperative Secure Communication in Two-Hop Buffer-Aided Networks.
IEEE Trans. Communications, 2018

Design of distributed PID-type dynamic matrix controller for fractional-order systems.
Int. J. Systems Science, 2018

Secure Energy Efficiency for NOMA Based Cognitive Radio Networks With Nonlinear Energy Harvesting.
IEEE Access, 2018

HERO: Accelerating Autonomous Robotic Tasks with FPGA.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

An Efficient Image Formation Algorithm for Spaceborne Video SAR.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Process Mining the Trauma Resuscitation Patient Cohorts.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2018

Identifying Influential Factors of CDN Performance with Large-scale Data Analysis.
Proceedings of the 2018 International Conference on Computing, 2018

Channel-Aware Secure Communication via Hybrid Wiretap Encoding and Secret Key Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Secondary Encrypted Secure Transmission in Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Energy-Efficient Primary Security Provisioning for the Full-Duplex Cognitive Radio Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Model Accuracy and Sensitivity Assessment Based on Dual-Band Large-Scale Channel Measurement.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2017
Security Provisioning for MISO Vehicular Relay Networks via Cooperative Jamming and Signal Superposition.
IEEE Trans. Vehicular Technology, 2017

Achieving Full Secrecy Rate With Energy-Efficient Transmission Control.
IEEE Trans. Communications, 2017

Effective Feature Selection for 5G IM Applications Traffic Classification.
Mobile Information Systems, 2017

Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks.
IEEE Access, 2017

Joint Channel Access Mechanism and Scheduling Design for Licensed Assisted Access System.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Cooperative Secure Transmission for Two-Hop Relay Networks with Limited Feedback.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Understanding IP address multiplexing with large-scale SSL/TLS flow analysis.
Proceedings of the 2017 International Conference on Computing, 2017

Robust Feature Selection for IM Applications at Early Stage Traffic Classification Using Machine Learning Algorithms.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

2016
Three-Dimensional ISAR Imaging Method for High-Speed Targets in Short-Range Using Impulse Radar Based on SIMO Array.
Sensors, 2016

Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks.
Sensors, 2016

A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system.
Inf. Sci., 2016

Two-path successive relaying and jamming for securing the primary system.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

Primary Secure Communication with the Cooperation of Energy Harvesting Secondary System.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

An evaluation of big data analytics in feature selection for long-lead extreme floods forecasting.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Optimal power allocation for cognitive radio sensor networks under primary secrecy outage constraint.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

Web-based, multi-platform, centralized, offline-compatible supply chain management system for emergency responses.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2016

2015
Resource Allocation and Performance Analysis for Multiuser Video Transmission Over Doubly Selective Channels.
IEEE Trans. Wireless Communications, 2015

Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks.
IJDSN, 2015

Reciprocally Benefited Spectrum Access Scheme With Joint Power and Subcarrier Allocation in a Software-Defined Network.
IEEE Access, 2015

Tornado Forecasting with Multiple Markov Boundaries.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Cooperative jamming with untrusted SUs for secure communication of two-hop primary system.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Contrast Pattern Based Methods for Visualizing and Predicting Spatiotemporal Events.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

A Hierarchical Pattern Learning Framework for Forecasting Extreme Weather Events.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Interference cancellation based transmission strategy using primary ARQ for cooperative CRNs.
Proceedings of the IEEE International Conference on Communication, 2015

Improved delay-dependent stability analysis for uncertain T-S fuzzy systems with time-varying delay.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
APC: A Novel Memory Metric and Measurement Methodology for Modern Memory Systems.
IEEE Trans. Computers, 2014

Advanced DSP Techniques Enabling High Spectral Efficiency and Flexible Transmissions: Toward elastic optical networks.
IEEE Signal Process. Mag., 2014

Concurrent Average Memory Access Time.
IEEE Computer, 2014

Joint subcarrier and power allocation for reciprocally-benefited spectrum sharing in cognitive radio networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Characterizing Application Behaviors for classifying P2P traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Energy cooperation for reciprocally-benefited spectrum access in cognitive radio networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
Cross Layer Resource Allocation For Multiple User Video Communication Systems.
PhD thesis, 2013

Understanding the spatial distribution of crime based on its related variables using geospatial discriminative patterns.
Computers, Environment and Urban Systems, 2013

Optimal Power Allocation for Hybrid Overlay/Underlay Spectrum Sharing in Multiband Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2013

Uplink Resource Management for Multiuser OFDM Video Transmission Systems: Analysis and Algorithm Design.
IEEE Trans. Communications, 2013

Variant in OXTR gene and functional connectivity of the hypothalamus in normal subjects.
NeuroImage, 2013

KIBRA gene variants are associated with synchronization within the default-mode and executive control networks.
NeuroImage, 2013

Traffic Classification: Issues and Challenges.
JCM, 2013

Crime hotspot mapping using the crime related factors - a spatial data mining approach.
Appl. Intell., 2013

Towards long-lead forecasting of extreme flood events: a data mining framework for precipitation cluster precursors identification.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Traffic classification: Issues and challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Accelerating Allreduce Operation: A Switch-Based Solution.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
APC: a performance metric of memory systems.
SIGMETRICS Performance Evaluation Review, 2012

White organic light-emitting devices with a solution-processed small molecular emission layer.
Displays, 2012

Efficient cross-layer resource allocation for H.264/SVC video transmission over downlink of an LTE system.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Optimization of Criminal HotSpots Based on Underlying Crime Controlling Factors Using Geospatial Discriminative Pattern.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

An improved programming model for optimization problem of product assembly process in Pinggao Group Co., Ltd.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Phase plane-based variable structure control for switched reluctance motor direct torque control.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

New delay-independent stability analysis for discrete fuzzy time-delay control systems.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

BCBPI: A noval behavior chain based protocol identification method.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Subcarrier mapping based on slice visibility for video transmission over OFDM channels.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
A High-Throughput, High-Accuracy System-Level Simulation Framework for System on Chips.
VLSI Design, 2011

RFS: a network file system for mobile devices and the cloud.
Operating Systems Review, 2011

Anomaly Detection Using Neighborhood Negative Selection.
Intelligent Automation & Soft Computing, 2011

Evolving boundary detector for anomaly detection.
Expert Syst. Appl., 2011

EthSpeeder: A High-performance Scalable Fault-Tolerant Ethernet Network Architecture for Data Center.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores.
Proceedings of the Global Communications Conference, 2011

Cross Layer Resource Allocation Design for Uplink Video OFDMA Wireless Systems.
Proceedings of the Global Communications Conference, 2011

2010
Design of Innovation Service Platform Based on Bayesian Network.
Proceedings of the International Conference on E-Business and E-Government, 2010

Effective classification for crater detection: A case study on Mars.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
Loop Kernel Pipelining Mapping onto Coarse-Grained Reconfigurable Architecture for Data-Intensive Applications.
JSW, 2009

Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-on-Chip.
JCP, 2009

System Level Distributed Cooperative Design of Media SoC Using Application Profiling.
JCP, 2009

Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2009

2008
Layered Approx-Regular LDPC: Code Construction and Encoder/Decoder Design.
IEEE Trans. on Circuits and Systems, 2008

Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

HPP Switch: A Novel High Performance Switch for HPC.
Proceedings of the 16th Annual IEEE Symposium on High Performance Interconnects (HOTI 2008), 2008

Application-driven System-on-Chip system model extraction approach.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Collaborative hardware/software partition of coarse-grained reconfigurable system using evolutionary ant colony optimization.
Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008

2007
Distributed Collaborative Partition Method of Reconfigurable SoC Using Ant Colony Optimization.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Mapping Applications on Coarse-Grained Reconfigurable Systems Using Architecture Template Modeling.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007


  Loading...