Xuetao Wei

Orcid: 0000-0002-4450-2251

According to our database1, Xuetao Wei authored at least 89 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SC-Chef: Turboboosting Smart Contract Concurrent Execution for High Contention Workloads via Chopping Transactions.
IEEE Trans. Reliab., March, 2024

ICOE: A Lightweight Group-Consensus-Based Off-Chain Execution Model for Smart Contract-Based Industrial Applications.
IEEE Trans. Ind. Informatics, February, 2024

Ultrareliable Low-Latency Slicing in Space-Air-Ground Multiaccess Edge Computing Networks for Next-Generation Internet of Things and Mobile Applications.
IEEE Internet Things J., February, 2024

An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains.
IEEE Trans. Serv. Comput., 2024

Reducing Storage Requirement in Blockchain via Node-Oriented Block Placement.
IEEE Trans. Netw. Sci. Eng., 2024

Copyleft for Alleviating AIGC Copyright Dilemma: What-if Analysis, Public Perception and Implications.
CoRR, 2024

Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
EfShard: Toward Efficient State Sharding Blockchain via Flexible and Timely State Allocation.
IEEE Trans. Netw. Serv. Manag., September, 2023

Efficient crowdsourced best objects finding via superiority probability based ordering for decision support systems.
Expert Syst. Appl., August, 2023

Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities.
Sensors, July, 2023

EAQ: Enabling Authenticated Complex Query Services in Sustainable-Storage Blockchain.
IEEE Trans. Sustain. Comput., 2023

Indoor Passive Visible Light Localization: A Case of the Novel Rake RGB-LED Series Detector.
IEEE Trans. Instrum. Meas., 2023

CopyScope: Model-level Copyright Infringement Quantification in the Diffusion Workflow.
CoRR, 2023

Towards Function Space Mesh Watermarking: Protecting the Copyright of Signed Distance Fields.
CoRR, 2023

EFFL: Egalitarian Fairness in Federated Learning for Mitigating Matthew Effect.
CoRR, 2023

WM-NET: Robust Deep 3D Watermarking with Limited Data.
CoRR, 2023

ItoV: Efficiently Adapting Deep Learning-based Image Watermarking to Video Watermarking.
CoRR, 2023

Do NFTs' Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility.
Proceedings of the ACM Web Conference 2023, 2023

Ethereum DeFi Apps in the Wild: Profiling and Implications.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2022
EBSF: Node Characteristics-Based Block Allocation Plans for Efficient Blockchain Storage.
IEEE Trans. Netw. Serv. Manag., December, 2022

Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee.
IEEE Trans. Emerg. Top. Comput., 2022

Rational Task Assignment and Path Planning Based on Location and Task Characteristics in Mobile Crowdsensing.
IEEE Trans. Comput. Soc. Syst., 2022

Visible Light Positioning Based on Collaborative LEDs and Edge Computing.
IEEE Trans. Comput. Soc. Syst., 2022

Cognitive Indoor Positioning Using Sparse Visible Light Source.
IEEE Trans. Comput. Soc. Syst., 2022

DarkVLP: "Lights-Off" Visible-Light Positioning.
IEEE Internet Things J., 2022

Cost-effective crowdsourced join queries for entity resolution without prior knowledge.
Future Gener. Comput. Syst., 2022

Deep Boosting Robustness of DNN-based Image Watermarking via DBMark.
CoRR, 2022

DPCN: Towards Deadline-aware Payment Channel Networks.
CoRR, 2022

2021
Indoor Visible Light Applications for Communication, Positioning, and Security.
Wirel. Commun. Mob. Comput., 2021

EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications.
IEEE/ACM Trans. Netw., 2021

Correlation-Based Task Processing Plans in Crowdsensing Platforms.
IEEE Trans. Netw. Sci. Eng., 2021

2020
An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications.
IEEE Trans. Ind. Informatics, 2020

LSTM Learning With Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism.
Digit. Commun. Networks, 2020

Fingerprinting encrypted voice traffic on smart speakers with deep learning.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications.
IEEE Internet Things J., 2019

DIMLOC: Enabling High-Precision Visible Light Localization Under Dimmable LEDs in Smart Buildings.
IEEE Internet Things J., 2019

Finding the informative and concise set through approximate skyline queries.
Expert Syst. Appl., 2019

Exploring multiamplitude voltage modulation to improve spectrum efficiency in low-complexity visible-light communication.
Sci. China Inf. Sci., 2019

Finding the most influential product under distribution constraints through dominance tests.
Appl. Intell., 2019

Turning the Signal Interference Into Benefits: Towards Indoor Self-Powered Visible Light Communication for IoT Devices in Industrial Radio-Hostile Environments.
IEEE Access, 2019

SecLight: A New and Practical VLC Eavesdropping-Resilient Framework for IoT Devices.
IEEE Access, 2019

A Behavior-Aware Profiling of Smart Contracts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A cost-efficient framework for finding prospective customers based on reverse skyline queries.
Knowl. Based Syst., 2018

FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Measuring and Understanding RRC State Machine Optimization in Light of Recent Advancements.
IEEE Trans. Mob. Comput., 2017

Improving Smartphone Security and Reliability.
J. Interconnect. Networks, 2017

Characterizing the behavior of handheld devices and its implications.
Comput. Networks, 2017

DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Special issue on "cloud optical network".
Photonic Netw. Commun., 2016

Virtual network embedding for power savings of servers and switches in elastic data center networks.
Sci. China Inf. Sci., 2016

Location-Recommendation-Aware Virtual Network Embedding in Energy-Efficient Optical-Wireless Hybrid Networks Supporting 5G Models.
IEEE Access, 2016

Unified Profiling of Attackers via Domain Modeling.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

A new virtual network embedding framework based on QoS satisfaction and network reconfiguration for fiber-wireless access network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A New Eavesdropping-Resilient Framework for Indoor Visible Light Communication.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Experience: Rethinking RRC State Machine Optimization in Light of Recent Advancements.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

A behavior-aware profiling of handheld devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Joint admission control and provisioning for virtual machines.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Whom Does Your Android App Talk To?
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2013
Understanding and Improving the Smartphone Ecosystem: Measurements, Security and Tools.
PhD thesis, 2013

Virtual network planning for converged optical and data centers: ideas and challenges.
IEEE Netw., 2013

Competing Memes Propagation on Networks: A Network Science Perspective.
IEEE J. Sel. Areas Commun., 2013

An energy-balanced cooperative MAC protocol based on opportunistic relaying in MANETs.
Comput. Electr. Eng., 2013

Smartphone viruses propagation on heterogeneous composite networks.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Entelecheia: Detecting P2P botnets in their waiting stage.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

2012
A Cost Efficient Design of Virtual Infrastructures with Joint Node and Link Mapping.
J. Netw. Syst. Manag., 2012

Multi-granularity and robust grooming in power- and port-cost-efficient IP over WDM networks.
Comput. Networks, 2012

Competing memes propagation on networks: a case study of composite networks.
Comput. Commun. Rev., 2012

ProfileDroid: multi-layer profiling of android applications.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

OBOF: A protection scheme for survivable Fiber-Wireless broadband access network.
Proceedings of IEEE International Conference on Communications, 2012

Permission evolution in the Android ecosystem.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Joint port-cost and power-consumption savings in hybrid hierarchical optical networks.
Opt. Switch. Netw., 2011

XLR: Tackling the Inefficiency of Landmark-Based Routing in Large Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Communication Networks Survivable routing algorithm with mixed shared protection in fault-tolerant GMPLS multi-layered optical networks.
Eur. Trans. Telecommun., 2010

2009
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks.
J. Syst. Softw., 2009

Erratum to "New routing algorithms in trustworthy Internet" [Computer Communications 31 (2008) 3533-3536].
Comput. Commun., 2009

2008
An improved shared-path protection algorithm for double-link failures in meshed WDM optical networks.
J. Commun. Networks, 2008

Availability guarantee in survivable WDM mesh networks: A time perspective.
Inf. Sci., 2008

New insights on survivability in multi-domain optical networks.
Inf. Sci., 2008

An improved lightpath allocation for grade of services in survivable WDM mesh networks.
Comput. Commun., 2008

Survivability in waveband switching optical networks: Challenges and new ideas.
Comput. Commun., 2008

A New Link-Based Hamiltonian Cycle Protection in Survivable WDM Optical Networks.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

2007
Dynamic Preemptive Multi-class Routing Scheme Under Dynamic Traffic in Survivable WDM Mesh Networks.
Proceedings of the High Performance Computing and Communications, 2007

2006
Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006


  Loading...