Yahui Li

Orcid: 0000-0002-0148-5965

According to our database1, Yahui Li authored at least 87 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Achieving High Availability in Inter-DC WAN Traffic Engineering.
IEEE/ACM Trans. Netw., December, 2023

Edge Intelligence-Assisted Asymmetrical Network Control and Video Decoding in the Industrial IoT with Speculative Parallelization.
Symmetry, August, 2023

Harmonic Modeling of the Series-Connected Multipulse Rectifiers Under Unbalanced Conditions.
IEEE Trans. Ind. Electron., July, 2023

A General Approach to Generate Test Packets With Network Configurations.
IEEE Trans. Parallel Distributed Syst., April, 2023

Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN.
IEEE Trans. Inf. Forensics Secur., 2023

SWDet: Anchor-Based Object Detector for Solid Waste Detection in Aerial Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN.
Future Gener. Comput. Syst., 2023

Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking.
Comput. Syst. Sci. Eng., 2023

Exploring semantic awareness via graph representation for text classification.
Appl. Intell., 2023

Network-Centric Distributed Tracing with DeepFlow: Troubleshooting Your Microservices in Zero Code.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass.
Proceedings of the IFIP Networking Conference, 2023

VICTOR: Video Content-aware Partially Reliable Transmission over Multipath QUIC.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Delay Based Congestion Control for Cross-Datacenter Networks.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Knocking Cells: Latency-Based Identification of IPv6 Cellular Addresses on the Internet.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors.
Proceedings of the IEEE International Conference on Communications, 2023

Data-Driven Based FDIAs Detection and Sensitive Feature Identification for Cyberattack Defending of Renewable Energy.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2023

2022
Simple and Robust Deep Learning Approach for Fast Fluorescence Lifetime Imaging.
Sensors, 2022

A Lightweight Object Detection Method in Aerial Images Based on Dense Feature Fusion Path Aggregation Network.
ISPRS Int. J. Geo Inf., 2022

The Catastrophe Analysis of Shanghai Crude Oil Futures Price from the Perspective of Volatility Factors.
Complex., 2022

Path stability in partially deployed secure BGP routing.
Comput. Networks, 2022

Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process.
Proceedings of the International Conference on Networking and Network Applications, 2022

ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

A Comparative Study on Power Quality Standards and Interaction Analysis for LVDC Systems.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022

Harmonic Power Flow Calculation Based on Unified Harmonic State-Space Model of Converter.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022

2021
Analysis and Suppression of Voltage Violation and Fluctuation with Distributed Photovoltaic Integration.
Symmetry, 2021

Freshness constraints of an age of information based event-triggered Kalman consensus filter algorithm over a wireless sensor network.
Frontiers Inf. Technol. Electron. Eng., 2021

An empirical investigation of the utilitarian, social benefits in LBS information disclosure - The moderating effect of the gender based social role theory.
Int. J. Inf. Manag., 2021

A Novel Dynamic Routing Approach to Distributed Wireless Sensor Network in Aircraft Environment.
Complex., 2021

Multisensor-Weighted Fusion Algorithm Based on Improved AHP for Aircraft Fire Detection.
Complex., 2021

Aircraft Detection for Remote Sensing Image Based on Bidirectional and Dense Feature Fusion.
Comput. Intell. Neurosci., 2021

cDNA cloning, expression and bioinformatical analysis of <i>Tssk</i> genes in tree shrews.
Comput. Biol. Chem., 2021

Network Traffic Classification by Program Synthesis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2021

Non-functional Attribute Modeling and Verification Method for Integrated Modular Avionics System.
Proceedings of the 4th International Conference on Complex Systems Design & Management Asia, 2021

2020
Session-layer Attack Traffic Classification by Program Synthesis.
CoRR, 2020

Security-Constrained Multi-Objective Optimal Power Flow for a Hybrid AC/VSC-MTDC System with Lasso-based Contingency Filtering.
CoRR, 2020

An Evaluation on Investment of Research Funds with a Neural Network Algorithm in "Double First-Class" Universities.
Complex., 2020

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning.
Comput. Networks, 2020

Assisting reachability verification of network configurations updates with NUV.
Comput. Networks, 2020

Security-Constrained Multi-Objective Optimal Power Flow for a Hybrid AC/VSC-MTDC System With Lasso-Based Contingency Filtering.
IEEE Access, 2020

The Airborne Information Processing System Development Research.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

2019
Efficient Scheduling of Weighted Coflows in Data Centers.
IEEE Trans. Parallel Distributed Syst., 2019

DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs.
IEEE/ACM Trans. Netw., 2019

Barrier Lyapunov functions-based localized adaptive neural control for nonlinear systems with state and asymmetric control constraints.
Trans. Inst. Meas. Control, 2019

A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges.
IEEE Commun. Surv. Tutorials, 2019

MSAID: Automated detection of interference in multiple SDN applications.
Comput. Networks, 2019

Microservice Architecture Design for Big Data in Tactical Cloud.
Proceedings of the Big Data and Security - First International Conference, 2019

Resource-Visualization-based Cooperative Architecture and Mechanisms within the Tactical Clouds*.
Proceedings of the 18th IEEE/ACIS International Conference on Computer and Information Science, 2019

2018
A Temperature Drift Compensation Method for Pulsed Eddy Current Technology.
Sensors, 2018

Online Static Security Assessment of Power Systems Based on Lasso Algorithm.
CoRR, 2018

Visual-inertial State Estimation for the Civil Aircraft Landing in Low Visibility Conditions.
Proceedings of the International Conference on Networking and Network Applications, 2018

The Distributed Computing Framework Research for Avionics Cloud.
Proceedings of the International Conference on Networking and Network Applications, 2018

Efficient network configuration verification using optimized datalog.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
An Empirical Study on Incorporating Prior Knowledge into BLSTM Framework in Answer Selection.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

Testing Black-Box SDN Applications with Formal Behavior Models.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

MSAID: Automated interference detection for multiple SDN applications.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

2016
Scaling of FAPAR from the Field to the Satellite.
Remote. Sens., 2016

面向无人装置协同操作的安全认证协议 (Authentication Protocol for Cooperation of Unmanned Vehicles).
计算机科学, 2016

面向嵌入式软件开发的UML到Simulink模型转换方法 (UML Model to Simulink Model Transformation Method in Design of Embedded Software).
计算机科学, 2016

H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSD.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Methods to Capability Improvement for Multiple UAVs' Control.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

The Role of Espoused National Cultural Values in Information Disclosure from the Perspective of Dual-calculus.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
A New Method to Evaluate Surface Defects with an Electromagnetic Acoustic Transducer.
Sensors, 2015

Modification of Huff Model and ITS Application in County Market: A Case of Pharmacy Siting in Huanghua City, Hebei Province.
Proceedings of the International Conference on Service Science, 2015

Intelligence Computing Technology for UAV's Autonomy.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

An Efficient Trusted Chain Model for Real-Time Embedded Systems.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

An Efficient Address Mapping Algorithm for Multichannel Structure SSD.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Video segment retrieval based on affine hulls.
Proceedings of the 10th Asian Control Conference, 2015

2014
Influence of the Lift-Off Effect on the Cut-Off Frequency of the EMAT-Generated Rayleigh Wave Signal.
Sensors, 2014

Test oriented formal model of SDN applications.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Study on Factors to Adopt Mobile Payment for Tourism E-Business: Based on Valence Theory and Trust Transfer Theory.
Proceedings of the Information and Communication Technologies in Tourism 2014, 2014

Model Based Black-Box Testing of SDN Applications.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Information Flow Control Model and Method in Distribute MILS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

An Improved Method of Access Control Based on BLP Model in MILS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A UML Model to Simulink Model Transformation Method in the Design of Embedded Software.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
An Investigation of the Factors Influencing Information Quality: From the Expectation-Perception Perspective.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Visually-aided smart kitchen environment for senior citizens suffering from dementia.
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013

2012
Security Information Flow Control Model and Method in MILS.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2010

A Method of Privacy Preserving in Mobile Wireless Environments.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Efficient security transmission protocol with identity-based encryption in wireless mesh networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2008
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2004
Robust and adaptive backstepping control for nonlinear systems using RBF neural networks.
IEEE Trans. Neural Networks, 2004

2003
Adaptive backstepping control for nonlinear systems using RBF neural networks.
Proceedings of the American Control Conference, 2003


  Loading...