Guiyi Wei

According to our database1, Guiyi Wei authored at least 58 papers between 2003 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2018

Secure Outsourced Computation in Connected Vehicular Cloud Computing.
IEEE Network, 2018

Security Threats in the Data Plane of Software-Defined Networks.
IEEE Network, 2018

Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View.
IEEE Network, 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Generation Comp. Syst., 2018

2017
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications.
Mobile Information Systems, 2016

A game-based incentive model for service cooperation in VANETs.
Concurrency and Computation: Practice and Experience, 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Detecting stepping stones by abnormal causality probability.
Security and Communication Networks, 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Efficient multiple sources network coding signature in the standard model.
Concurrency and Computation: Practice and Experience, 2015

SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Availability, resilience, and fault tolerance of internet and distributed computing systems.
Concurrency and Computation: Practice and Experience, 2015

Social role-based secure large data objects dissemination in mobile sensing environment.
Computer Communications, 2015

2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distrib. Syst., 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs.
Computer Networks, 2014

Scheduling with Position-Based deteriorating jobs and Multiple deteriorating rate-Modifying Activities.
APJOR, 2014

Scheduling Position-Based deteriorating jobs with Multiple rate-Modifying Activities and Past-sequence-dependent Delivery times.
APJOR, 2014

2013
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Information Forensics and Security, 2013

Cooperation Dynamics on Collaborative Social Networks of Heterogeneous Population.
IEEE Journal on Selected Areas in Communications, 2013

A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks.
IJDSN, 2013

Optimal Spectrum Leasing with the Constraints of User Admission Rate and Quality of Service.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Minimizing Nested Interrupts of Secondary Users in Multi-Priority Cognitive Radio Networks.
Proceedings of the Internet and Distributed Computing Systems, 2013

Multiple Sources Network Coding Signature in the Standard Model.
Proceedings of the Internet and Distributed Computing Systems, 2013

2012
Anonymous proxy re-encryption.
Security and Communication Networks, 2012

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
TIIS, 2012

Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks.
Computers & Electrical Engineering, 2012

Rigorous Punishment Promotes Cooperation in Prisoners' Dilemma Game.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2012

2011
Design of QoS in Intelligent Communication Environments Based on Neural Network.
Wireless Personal Communications, 2011

Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter.
Computer Communications, 2011

Unidirectional Identity-Based Proxy Re-Signature.
Proceedings of IEEE International Conference on Communications, 2011

Identity-Based Conditional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
A game-theoretic method of fair resource allocation for cloud computing services.
The Journal of Supercomputing, 2010

A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection.
Sensors, 2010

A Dependable Cluster Based Topology in P2P Networks.
JCM, 2010

PIVOT: An adaptive information discovery framework for computational grids.
Inf. Sci., 2010

Knowledge Sharing in Social Network Using Game Theory.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Concept, Characteristics and Defending Mechanism of Worms.
IEICE Transactions, 2009

Sub-Ontology Modularization for Large-Scale Web Ontologies.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

A Budget-Based Cost-Effective Incentive Model.
Proceedings of the ICPPW 2009, 2009

LD-BSCA: A local-density based spatial clustering algorithm.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A mobile cache model with semantic locality.
IJIIDS, 2007

Multi-Level Text Classification Method Based on Latent Semantic Analysis.
Proceedings of the ICEIS 2007, 2007

Research and Design of Multimedia NSS for E-Commerce.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

2006
Design and Implementation of an Ontology Algorithm for Web Documents Classification.
Proceedings of the Computational Science and Its Applications, 2006

A Semantic-Driven Cache Management Approach for Mobile Applications.
Proceedings of the Computational Science, 2006

2005
The Design and Implementation of Extensible Information Services.
Proceedings of the Computational Science, 2005

User-Oriented Job Management in a Grid Environment.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
MASSIVE: A Multidisciplinary Applications-Oriented Simulation and Visualization Environment.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
An Engineering Computation Oriented Visual Grid Framework.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Grid Service-Based Parallel Finite Element Analysis.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...