Lili Wei

Orcid: 0000-0002-2428-4111

According to our database1, Lili Wei authored at least 81 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dynamic Event-Triggered Consensus Cost-Based Switching Control for UAV Formation With Disturbances.
IEEE Trans. Intell. Veh., February, 2024

StubCoder: Automated Generation and Repair of Stub Code for Mock Objects.
ACM Trans. Softw. Eng. Methodol., January, 2024

Programming by Example Made Easy.
ACM Trans. Softw. Eng. Methodol., January, 2024

RL-SeqISP: Reinforcement Learning-Based Sequential Optimization for Image Signal Processing.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
SSR-Net: A Spatial Structural Relation Network for Vehicle Re-identification.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023

Integrating topology beyond descriptions for zero-shot learning.
Pattern Recognit., November, 2023

A method to improve full-resolution remote sensing pansharpening image quality assessment via feature combination.
Signal Process., July, 2023

Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation.
IEEE Trans. Software Eng., June, 2023

Towards Modeling Software Quality of Virtual Reality Applications from Users' Perspectives.
CoRR, 2023

ωTest: WebView-Oriented Testing for Android Applications.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Weakly Supervised Video Object Segmentation via Dual-attention Cross-branch Fusion.
ACM Trans. Intell. Syst. Technol., 2022

Fine-grained facial expression recognition via relational reasoning and hierarchical relation optimization.
Pattern Recognit. Lett., 2022

Intelligent analysis of e-government influence factors based on improved machine learning.
Neural Comput. Appl., 2022

Pedestrian attribute recognition based on attribute correlation.
Multim. Syst., 2022

Front-Running Attack Benchmark Construction and Vulnerability Detection Technique Evaluation.
CoRR, 2022

Distributed DETMs-based internal collision avoidance control for UAV formation with lumped disturbances.
Appl. Math. Comput., 2022

2021
Disturbance-observer-based formation-containment control for UAVs via distributed adaptive event -triggered mechanisms.
J. Frankl. Inst., 2021

A CNN-Based Optimal CTU λ Decision for HEVC Intra Rate Control.
IEICE Trans. Inf. Syst., 2021

Trajectory Optimization for Age of Information Minimization in UAV Communication Systems.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model.
Proceedings of the 30th USENIX Security Symposium, 2021

ÐArcher: detecting on-chain-off-chain synchronization bugs in decentralized applications.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Logging Practices with Mobile Analytics: An Empirical Study on Firebase.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Characterizing and Detecting Configuration Compatibility Issues in Android Apps.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps.
IEEE Trans. Software Eng., 2020

Increasing Security Degree of Freedom in Multi-user and Multi-eve Systems.
CoRR, 2020

Law of the iterated logarithm for estimators of parameters in partially linear errors-in-variables models.
Comput. Math. Methods, 2020

Fault Tolerant Control of Five-Level Inverter Based on Redundancy Space Vector Optimization and Topology Reconfigruation.
IEEE Access, 2020

MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

HSS-GCN: A Hierarchical Spatial Structural Graph Convolutional Network for Vehicle Re-identification.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

2019
Intelligent Sensor-Cloud in Fog Computer: A Novel Hierarchical Data Job Scheduling Strategy.
Sensors, 2019

DroidLeaks: a comprehensive database of resource leaks in Android apps.
Empir. Softw. Eng., 2019

Study on the application of cloud computing and speech recognition technology in English teaching.
Clust. Comput., 2019

An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs.
IEEE Access, 2019

An Event-Driven Mechanism Coverage Algorithm Based on Sensing-Cloud-Computing in Sensor Networks.
IEEE Access, 2019

Pivot: learning API-device correlations to facilitate Android compatibility issue detection.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Quantized Stabilization for T-S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks.
IEEE Trans. Fuzzy Syst., 2018

Understanding and detecting callback compatibility issues for Android applications.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

A tale of two cities: how WebView induces bugs to Android applications.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Initial Access Techniques for 5G NR: Omni/Beam SYNC and RACH designs.
Proceedings of the 2018 International Conference on Computing, 2018

ELEGANT: Towards Effective Location of Fragmentation-Induced Compatibility Issues for Android Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
<i>H</i><sub>∞</sub> filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks.
J. Frankl. Inst., 2017

Exhaustive, Iterative and Hybrid Initial Access Techniques in mmWave Communications.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Direction of Arrival Estimation with Uniform Planar Array.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

OASIS: prioritizing static analysis warnings for Android apps based on app user reviews.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

An IDL-Based Parallel Model for Scientific Computations on Multi-core Computers.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

2016
Energy Efficiency and Spectrum Efficiency of Multihop Device-to-Device Communications Underlaying Cellular Networks.
IEEE Trans. Veh. Technol., 2016

DroidLeaks: Benchmarking Resource Leak Bugs for Android Applications.
CoRR, 2016

Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Dynamic scheduling in system-level simulations for multi-hop D2D communications in LTE networks.
Proceedings of the 1st International Workshop on Link- and System Level Simulations, 2016

System-level simulations for multi-hop D2D communications overlay LTE networks.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Optimal multiuser spread-spectrum data hiding in digital images.
Secur. Commun. Networks, 2015

Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication.
Secur. Commun. Networks, 2015

Multi-pair device-to-device communications with space-time analog network coding.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Sum-capacity optimal spread-spectrum data hiding in video streams.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Key elements to enable millimeter wave communications for 5G wireless systems.
IEEE Wirel. Commun., 2014

Enable device-to-device communications underlaying cellular networks: challenges and research aspects.
IEEE Commun. Mag., 2014

Study of Track Irregularity Time Series Calibration and Variation Pattern at Unit Section.
Comput. Intell. Neurosci., 2014

Network coding in multiple access relay channel with multiple antenna relay.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Advances in multiuser data embedding in digital media: Orthogonal sum-SINR-optimal carriers.
Proceedings of the IEEE International Conference on Communications, 2014

Energy-efficiency of multi-hop device-to-device communications underlaying cellular networks.
Proceedings of the IEEE International Conference on Communications, 2014

QoE-aware mobile association and resource allocation over wireless heterogeneous networks.
Proceedings of the IEEE Global Communications Conference, 2014

Optimal multiuser spread-spectrum data embedding in video streams.
Proceedings of the IEEE Global Communications Conference, 2014

A Low-Cost PKC-based RFID Authentication Protocol and its Implementation.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Integer-Forcing Linear Receiver Design with Slowest Descent Method.
IEEE Trans. Wirel. Commun., 2013

Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing.
IEEE Trans. Wirel. Commun., 2013

Increasing Security Degree of Freedom in Multiuser and Multieve Systems.
IEEE Trans. Inf. Forensics Secur., 2013

Space-time analog network coding for multiple access relay channels.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Design of Convergence-Optimized Non-Binary LDPC Codes over Binary Erasure Channel.
IEEE Wirel. Commun. Lett., 2012

Compute-and-Forward Network Coding Design over Multi-Source Multi-Relay Channels.
IEEE Trans. Wirel. Commun., 2012

Optimal Orthogonal Carriers and Sum-SINR/Sum-Capacity of the Multiple-Access Vector Channel.
IEEE Trans. Commun., 2012

Comments on "A New Parity-Check Stopping Criterion for Turbo Decoding".
IEEE Commun. Lett., 2012

Joint Shortening and Puncturing Optimization for Structured LDPC Codes.
IEEE Commun. Lett., 2012

Efficient Compute-and-Forward Network Codes Search for Two-Way Relay Channel.
IEEE Commun. Lett., 2012

Optimal Upward Scaling of Minimum-TSC Binary Signature Sets.
IEEE Commun. Lett., 2012

Linear transceiver and receiver design methods for multiuser MIMO channels.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Network coding in wireless cooperative networks with multiple antenna relays.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Integer-forcing linear receiver design over MIMO channels.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2008
Adaptive binary signature design for code-division multiplexing.
IEEE Trans. Wirel. Commun., 2008

2007
Upward Scaling of Minimum-TSC Binary Signature Sets.
IEEE Commun. Lett., 2007

2006
SINR-optimized Binary Signatures by Linear Search.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006


  Loading...