Yong Wang
Orcid: 0000-0002-5383-5736Affiliations:
- Guilin University of Electronic Technology, China
- East China University of Science and Technology, Shanghai, China (PhD 2005)
According to our database1,
Yong Wang
authored at least 60 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A New Segment Routing method with Swap Node Selection Strategy Based on Deep Reinforcement Learning for Software Defined Network.
CoRR, March, 2025
A Novel Spatiotemporal Correlation Anomaly Detection Method Based on Time-Frequency-Domain Feature Fusion and a Dynamic Graph Neural Network in Wireless Sensor Network.
CoRR, March, 2025
In-network aggregation enabled multiple sub-blocks parallel repair in erasure-coded storage system.
Comput. Networks, 2025
2024
DHRL-FNMR: An Intelligent Multicast Routing Approach Based on Deep Hierarchical Reinforcement Learning in SDN.
IEEE Trans. Netw. Serv. Manag., October, 2024
Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure.
Clust. Comput., September, 2024
Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN.
Wirel. Networks, July, 2024
Symmetrical Data Recovery: FPGA-Based Multi-Dimensional Elastic Recovery Acceleration for Multiple Block Failures in Ceph Systems.
Symmetry, June, 2024
A Novel Self-Supervised Learning-Based Anomalous Node Detection Method Based on an Autoencoder for Wireless Sensor Networks.
IEEE Syst. J., March, 2024
A new intelligent cross-domain routing method in SDN based on a proposed multiagent reinforcement learning algorithm.
Int. J. Intell. Comput. Cybern., 2024
MA-CDMR: An Intelligent Cross-domain Multicast Routing Method based on Multiagent Deep Reinforcement Learning in Multi-domain SDWN.
CoRR, 2024
Attopo: An SDN Non-Protocol Topology Discovery Method Based on Attention Mechanism and Network Flow Analysis.
IEEE Access, 2024
Research on Detection and Mitigation Methods of Adaptive Flow Table Overflow Attacks in Software-Defined Networks.
IEEE Access, 2024
2023
ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio-temporal correlation for routing optimization in software-defined networking.
Peer Peer Netw. Appl., September, 2023
An Intelligent SDWN Routing Algorithm Based on Network Situational Awareness and Deep Reinforcement Learning.
CoRR, 2023
Intelligent multicast routing method based on multi-agent deep reinforcement learning in SDWN.
CoRR, 2023
A New Intelligent Cross-Domain Routing Method in SDN Based on a Proposed Multiagent Reinforcement Learning Algorithm.
CoRR, 2023
POAGuard: A Defense Mechanism Against Preemptive Table Overflow Attack in Software-Defined Networks.
IEEE Access, 2023
An Intelligent SDWN Routing Algorithm Based on Network Situational Awareness and Deep Reinforcement Learning.
IEEE Access, 2023
A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization.
IEEE Access, 2023
Reliable Placement of Erasure-coded Data in Distributed Cloud Data Centers under Disaster Risks: A Multi-Objective Optimization Approach.
Proceedings of the 5th International Conference on Internet of Things, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
DRL-M4MR: An intelligent multicast routing approach based on DQN deep reinforcement learning in SDN.
Phys. Commun., 2022
A Novel Self-Supervised Learning-Based Anomaly Node Detection Method Based on an Autoencoder in Wireless Sensor Networks.
CoRR, 2022
A Novel Anomaly Detection Method for Multimodal WSN Data Flow via a Dynamic Graph Neural Network.
CoRR, 2022
2021
A New Method for Reconstructing Data on a Single Failure Node in the Distributed Storage System Based on the MSR Code.
Wirel. Commun. Mob. Comput., 2021
Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model.
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking.
J. Netw. Comput. Appl., 2021
A method of repairing single node failure in the distributed storage system based on the regenerating-code and a hybrid genetic algorithm.
Neurocomputing, 2021
A Priority-Based Multicast Flow Scheduling Method for a Collaborative Edge Storage Datacenter Network.
IEEE Access, 2021
2020
Mining moving object gathering pattern based on Resilient Distributed Datasets and R-tree index.
Neurocomputing, 2020
EURASIP J. Wirel. Commun. Netw., 2020
2019
A New Node Selection Method for the Ceph Storage System based on Software-defined Network and Fuzzy Multi-attribute Decision-making.
J. Inf. Hiding Multim. Signal Process., 2019
A new path planning strategy of a data collection problem utilising multi-mobile nodes in wireless sensor networks.
Int. J. Sens. Networks, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Int. J. Web Grid Serv., 2018
A parallel algorithm for network traffic anomaly detection based on Isolation Forest.
Int. J. Distributed Sens. Networks, 2018
EURASIP J. Wirel. Commun. Netw., 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017
Cell Image Classification Based on the Support Vector Machine and D-S Evidence Theory.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
A parallelized network traffic classification framework based on selective ensemble and diversity measures.
J. High Speed Networks, 2016
A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark.
Inf., 2016
Int. J. Grid High Perform. Comput., 2016
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm.
Int. J. Distributed Sens. Networks, 2016
EURASIP J. Inf. Secur., 2016
Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurr. Comput. Pract. Exp., 2016
A Novel Delay Analysis for Polling Schemes with Power Management Under Heterogeneous Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
2015
EURASIP J. Wirel. Commun. Netw., 2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
2014
Proceedings of the Intelligent Information Processing VII, 2014
2012
Proceedings of the Intelligent Information Processing VI, 2012
2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005