Xianglin Wei

Orcid: 0000-0002-6181-4441

According to our database1, Xianglin Wei authored at least 101 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mobile jammer localization and tracking in multi-hop wireless network.
J. Ambient Intell. Humaniz. Comput., February, 2024

Adaptive design and implementation of automatic modulation recognition accelerator.
J. Ambient Intell. Humaniz. Comput., January, 2024

2023
Request pattern change-based cache pollution attack detection and defense in edge computing.
Digit. Commun. Networks, October, 2023

NFV-empowered digital twin cyber platform: Architecture, prototype, and a use case.
Comput. Commun., October, 2023

UAV relay network deployment through the area with barriers.
Ad Hoc Networks, October, 2023

Joint UAV Trajectory Planning, DAG Task Scheduling, and Service Function Deployment Based on DRL in UAV-Empowered Edge Computing.
IEEE Internet Things J., July, 2023

Universal Attack Against Automatic Modulation Classification DNNs Under Frequency and Data Constraints.
IEEE Internet Things J., July, 2023

Joint UAV deployment, SF placement, and collaborative task scheduling in heterogeneous multi-UAV-empowered edge intelligence.
IET Commun., March, 2023

Jointly beam stealing attackers detection and localization without training: an image processing viewpoint.
Frontiers Comput. Sci., 2023

2022
Joint service-function deployment and task scheduling in UAVFog-assisted data-driven disaster response architecture.
World Wide Web, 2022

Joint Optimization of AoI, SINR, Completeness, and Energy in UAV-Aided SDCNs: Coalition Formation Game and Cooperative Order.
IEEE Trans. Green Commun. Netw., 2022

Game-Based Channel Access for AoI-Oriented Data Transmission Under Dynamic Attack.
IEEE Internet Things J., 2022

2021
Channel Access-Based Joint Optimization of AoI and SINR under Attack: Game Theory and Distributed Approach.
Wirel. Commun. Mob. Comput., 2021

Flocking Control Algorithms Based on the Diffusion Model for Unmanned Aerial Vehicle Systems.
IEEE Trans. Green Commun. Netw., 2021

Security-Oriented Indoor Robots Tracking: An Object Recognition Viewpoint.
Secur. Commun. Networks, 2021

Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks.
Mob. Networks Appl., 2021

Wireless edge caching based on content similarity in dynamic environments.
J. Syst. Archit., 2021

A 24-hour operational single-phase quasi-Z-source photovoltaic power system.
Int. J. Circuit Theory Appl., 2021

Is low-rate distributed denial of service a great threat to the Internet?
IET Inf. Secur., 2021

Overage and Staleness Metrics for Status Update Systems.
CoRR, 2021

Failure-resilient DAG task scheduling in edge computing.
Comput. Networks, 2021

AIGSA-based multi-jammer localization in wireless networks.
Appl. Soft Comput., 2021

Timely Probabilistic Data Preprocessing in Mobile Edge Computing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Task Offloading and Caching for Mobile Edge Computing.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Task Caching in Vehicular Edge Computing.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Mobile Vehicles as Fog Nodes for Latency Optimization in Smart Cities.
IEEE Trans. Veh. Technol., 2020

A cost-efficient elastic UAV relay network construction method with guaranteed QoS.
Ad Hoc Networks, 2020

Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency.
IEEE Access, 2020

Intelligent Resource Allocation for Utility Optimization in RSU-Empowered Vehicular Network.
IEEE Access, 2020

Obstacle Recognition and Avoidance for UAVs Under Resource-Constrained Environments.
IEEE Access, 2020

SIDR: A Swarm Intelligence-Based Damage-Resilient Mechanism for UAV Swarm Networks.
IEEE Access, 2020

UAVFog-Assisted Data-Driven Disaster Response: Architecture, Use Case, and Challenges.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Energy-Efficient UAV Deployment and Task Scheduling in Multi-UAV Edge Computing.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use Cases.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

A Game Theoretical Pricing Scheme for Vehicles in Vehicular Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

UAV Placement Optimization for Internet of Medical Things.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

RSU-Empowered Resource Pooling for Task Scheduling in Vehicular Fog Computing.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Similarity-aware popularity-based caching in wireless edge computing.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020

2019
A reliable routing protocol against hotspots and burst for UASN-based fog systems.
J. Ambient Intell. Humaniz. Comput., 2019

Joint Optimization of Energy Consumption and Delay in Cloud-to-Thing Continuum.
IEEE Internet Things J., 2019

A jamming detection method for multi-hop wireless networks based on association graph.
Int. J. High Perform. Comput. Netw., 2019

Phase Timing Optimization for Smart Traffic Control Based on Fog Computing.
IEEE Access, 2019

Tolerable Data Transmission of Mobile Edge Computing Under Internet of Things.
IEEE Access, 2019

Equivalence Checking of Scheduling in High-Level Synthesis Using Deep State Sequences.
IEEE Access, 2019

Swarm Intelligence-Inspired Autonomous Flocking Control in UAV Networks.
IEEE Access, 2019

Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks.
IEEE Access, 2019

Integration of UAV and Fog-Enabled Vehicle: Application in Post-Disaster Relief.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images.
Proceedings of the ICIT 2019, 2019

Location Consistency-Based MITM Attack Detection in 802.11ad Networks.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Dynamic tasks scheduling based on weighted bi-graph in Mobile Cloud Computing.
Sustain. Comput. Informatics Syst., 2018

Jammer Localization in Multihop Wireless Networks Based on Gravitational Search.
Secur. Commun. Networks, 2018

Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints.
Peer-to-Peer Netw. Appl., 2018

Flow scheduling strategies for minimizing flow completion times in data center networks.
J. High Speed Networks, 2018

Sequential opening multi-jammers localisation in multi-hop wireless network.
IET Inf. Secur., 2018

Collaborative mobile jammer tracking in Multi-Hop Wireless Network.
Future Gener. Comput. Syst., 2018

Energy-aware task scheduling in mobile cloud computing.
Distributed Parallel Databases, 2018

Adaptive jammer localization in wireless networks.
Comput. Networks, 2018

Towards Smart Parking Based on Fog Computing.
IEEE Access, 2018

A Mobile Cloud Based Scheduling Strategy for Industrial Internet of Things.
IEEE Access, 2018

Traffic Signal Phase Scheduling Based on Device-to-Device Communication.
IEEE Access, 2018

Application of Sensor-Cloud Systems: Smart Traffic Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Delay Step Based Geolocation Data Verification Method.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

IPFRA: An Online Protocol Reverse Analysis Mechanism.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Layout-Independent Wireless Facility Constructing and Scheduling for Data Center Networks.
Wirel. Commun. Mob. Comput., 2017

Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2017

The number of boundary H-points of H-triangles.
Ars Comb., 2017

Deadline-Aware Task Scheduling in a Tiered IoT Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Wireless Facility Scheduling for Data Center Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Association Graph Based Jamming Detection in Multi-Hop Wireless Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

GSA-Based Jammer Localization in Multi-Hop Wireless Network.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Efficient application scheduling in mobile cloud computing based on MAX-MIN ant system.
Soft Comput., 2016

VAStream: Virtual adaptive substream partition and scheduling in data-driven P2P live streaming.
J. High Speed Networks, 2016

2015
Defending DDoS attacks in software defined networking based on improved Shiryaev-Roberts detection algorithm.
J. High Speed Networks, 2015

A Novel Scheme for Improving Quality of Service of Live Streaming.
Informatica (Slovenia), 2015

2014
Jammer Location-Oriented Noise Node Elimination Method for MHWN.
Int. J. Mob. Comput. Multim. Commun., 2014

On the relative distances of eleven points in the boundary of a plane convex body.
Discret. Math., 2014

A note on the value about a disjoint convex partition problem.
Ars Comb., 2014

A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree Distribution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
RIS: A Reciprocal Incentive Scheme in Selfish Opportunistic Networks.
Wirel. Pers. Commun., 2013

iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems.
Telecommun. Syst., 2013

Efficient and effective automated surveillance agents using kernel tricks.
Simul., 2013

Multi-manifold model of the Internet delay space.
J. Netw. Comput. Appl., 2013

Application Scheduling in Mobile Cloud Computing with Load Balancing.
J. Appl. Math., 2013

SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems.
Int. J. Commun. Networks Inf. Secur., 2013

Bio-inspired Application Scheduling Algorithm for Mobile Cloud Computing.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Automated Intruder Detection from Image Sequences using Minimum Volume Sets.
Int. J. Commun. Networks Inf. Secur., 2012

A Proof of Erdős-Fishburn's Conjecture for g(6)=13.
Electron. J. Comb., 2012

No 4-isosceles set with eight points on a circle.
Ars Comb., 2012

BSU: A Biased Seed Unchoking Algorithm for P2P Systems.
Proceedings of the Internet and Distributed Computing Systems, 2012

PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Classification of eleven-point five-distance sets in the plane.
Ars Comb., 2011

2009
More on an Erdos-Szekeres-Type Problem for Interior Points.
Discret. Comput. Geom., 2009

2008
H-triangles with k interior H-points.
Discret. Math., 2008

2007
On Relatively Short Sides of Convex Hexagons.
Ars Comb., 2007

2006
A 4-isosceles 7-point Set with Both Circle and Linear Restrictions.
Ars Comb., 2006


  Loading...