Guangxue Yue

Orcid: 0000-0001-8035-8309

According to our database1, Guangxue Yue authored at least 68 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A scalable multimodal ensemble learning framework for automatic modulation recognition.
Int. J. Wirel. Mob. Comput., 2024

2023
CFCS: A Robust and Efficient Collaboration Framework for Automatic Modulation Recognition.
J. Commun. Inf. Networks, September, 2023

A Task Offloading Scheme in Maritime Edge Computing Network.
J. Commun. Inf. Networks, March, 2023

A blind receiver for OFDM communications.
Int. J. Wirel. Mob. Comput., 2023

An optimised multi-channel neural network model based on CLDNN for automatic modulation recognition.
Int. J. Wirel. Mob. Comput., 2023

2022
Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud.
IEEE Internet Things J., 2022

Automatic Modulation Recognition Based on Multi-Channel Neural Network Model.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

2021
Compressed Beam Alignment with Out-of-Band Assistance in Millimeter Wave Cellular Networks.
IEEE Trans. Mob. Comput., 2021

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud.
IEEE Internet Things J., 2021

IRLNet: A Short-Time and Robust Architecture for Automatic Modulation Recognition.
IEEE Access, 2021

Dual-Channel Hybrid Neural Network for Modulation Recognition.
IEEE Access, 2021

2018
网络信任研究进展 (Research Progress of Network Trust).
计算机科学, 2018

Data sharing in VANETs based on evolutionary fuzzy game.
Future Gener. Comput. Syst., 2018

2015
A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud.
Appl. Soft Comput., 2015

2014
Chaotic Cuckoo Search Algorithm for High-dimensional Functions.
J. Comput., 2014

BFGS-GSO for Global Optimization Problems.
J. Comput., 2014

Coverage Capacity Optimization for Mobile Sensor Networks Based on Evolutionary Games.
Int. J. Distributed Sens. Networks, 2014

2013
A P2P Network Model Based on Hierarchical Interest Clustering Algorithm.
J. Softw., 2013

The System Design of a Node of P2P Networks for Intrusion Detection.
J. Networks, 2013

2012
Research on Intrusion Detection Model of Heterogeneous Attributes Clustering.
J. Softw., 2012

2011
A Novel Intelligent Technique for Recognition of Coke Optical Texture.
J. Softw., 2011

A Content-based Classified Hierarchical Vector Quantization Algorithm for Volume Compression.
J. Softw., 2011

A Framework of Transferring Mobile Services with Agent Based Middleware.
J. Softw., 2011

Assigning Method for Decision Power Based on Linguisitc 2-tuple Judgment Matrices.
J. Softw., 2011

Research on Mobile Agent System for Agile Supply Chain Management.
J. Softw., 2011

Survey on Scheduling Technologies of P2P Media Streaming.
J. Networks, 2011

Underlying Technology of P2P Media Streaming.
J. Networks, 2011

Guest Editorial.
J. Networks, 2011

Survey: Research on QoS of P2P Reliable Streaming Media.
J. Networks, 2011

A Survey of Game Theory in Wireless Sensor Networks Security.
J. Networks, 2011

Application Layer Multicast Technology of Streaming Media.
J. Networks, 2011

2010
A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing.
J. Softw., 2010

Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Networks, 2010

Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation.
J. Networks, 2010

Guest Editorial.
J. Multim., 2010

A New Judging and Revising Method for Ordinal Consistency of Fuzzy Judgment Matrix.
J. Comput., 2010

Guest Editorial.
J. Comput., 2010

Almost periodic solutions for a class of fourth-order nonlinear differential equations with a deviating argument.
Comput. Math. Appl., 2010

A novel and fast parallel solution for the vertex cover problem on DNA-based supercomputing.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

A novel solution for the P2P network observer placement problem on DNA-based supercomputing.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Editorial.
J. Softw., 2009

Editorial.
J. Softw., 2009

Editorial.
J. Networks, 2009

Research of Secure Intranet/Internet Access Platform Based on Ontology.
J. Networks, 2009

Editorial.
J. Comput., 2009

The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
J. Comput., 2009

2008
Editorial.
J. Commun., 2008

Unified Certificate Validation System DNS-OCSP.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Texture and Color Based Method for Color Image Segmentation.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A Method of Color Image Segmentation Based on DPCNN.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2007
EMMP: a highly efficient membership management protocol.
Frontiers Comput. Sci. China, 2007

An Improved Algorithm of Pattern Matching for Information Security Audit System.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Brief Analysis about Boundary Region Partition Reduction Standard.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

An Access Control Model in Lager-Scale P2P File Sharing Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Advanced Distributed Learning by Using SCORM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Speech Emotion Recognition System in E-Learning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
Proceedings of the 2006 International Conference on Semantics, 2006

Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor.
Proceedings of the 2006 International Conference on Semantics, 2006

Research on User Authentication for Grid Computing Security.
Proceedings of the 2006 International Conference on Semantics, 2006

Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
Proceedings of the 2006 International Conference on Semantics, 2006

Intrusion Detection Based on Fuzzy Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Worm Intrusion Alarm Modeling Based on Network Traffic Character.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Privacy Policy of P3P Based on Relational Database.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005


  Loading...