Yong Wang

Orcid: 0000-0002-5383-5736

Affiliations:
  • Guilin University of Electronic Technology, China
  • East China University of Science and Technology, Shanghai, China (PhD 2005)


According to our database1, Yong Wang authored at least 60 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A New Segment Routing method with Swap Node Selection Strategy Based on Deep Reinforcement Learning for Software Defined Network.
CoRR, March, 2025

A Novel Spatiotemporal Correlation Anomaly Detection Method Based on Time-Frequency-Domain Feature Fusion and a Dynamic Graph Neural Network in Wireless Sensor Network.
CoRR, March, 2025

In-network aggregation enabled multiple sub-blocks parallel repair in erasure-coded storage system.
Comput. Networks, 2025

2024
DHRL-FNMR: An Intelligent Multicast Routing Approach Based on Deep Hierarchical Reinforcement Learning in SDN.
IEEE Trans. Netw. Serv. Manag., October, 2024

Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure.
Clust. Comput., September, 2024

Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN.
Wirel. Networks, July, 2024

Symmetrical Data Recovery: FPGA-Based Multi-Dimensional Elastic Recovery Acceleration for Multiple Block Failures in Ceph Systems.
Symmetry, June, 2024

A Novel Self-Supervised Learning-Based Anomalous Node Detection Method Based on an Autoencoder for Wireless Sensor Networks.
IEEE Syst. J., March, 2024

A new intelligent cross-domain routing method in SDN based on a proposed multiagent reinforcement learning algorithm.
Int. J. Intell. Comput. Cybern., 2024

MA-CDMR: An Intelligent Cross-domain Multicast Routing Method based on Multiagent Deep Reinforcement Learning in Multi-domain SDWN.
CoRR, 2024

Attopo: An SDN Non-Protocol Topology Discovery Method Based on Attention Mechanism and Network Flow Analysis.
IEEE Access, 2024

Research on Detection and Mitigation Methods of Adaptive Flow Table Overflow Attacks in Software-Defined Networks.
IEEE Access, 2024

2023
ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio-temporal correlation for routing optimization in software-defined networking.
Peer Peer Netw. Appl., September, 2023

An Intelligent SDWN Routing Algorithm Based on Network Situational Awareness and Deep Reinforcement Learning.
CoRR, 2023

Intelligent multicast routing method based on multi-agent deep reinforcement learning in SDWN.
CoRR, 2023

A New Intelligent Cross-Domain Routing Method in SDN Based on a Proposed Multiagent Reinforcement Learning Algorithm.
CoRR, 2023

POAGuard: A Defense Mechanism Against Preemptive Table Overflow Attack in Software-Defined Networks.
IEEE Access, 2023

An Intelligent SDWN Routing Algorithm Based on Network Situational Awareness and Deep Reinforcement Learning.
IEEE Access, 2023

A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization.
IEEE Access, 2023

Reliable Placement of Erasure-coded Data in Distributed Cloud Data Centers under Disaster Risks: A Multi-Objective Optimization Approach.
Proceedings of the 5th International Conference on Internet of Things, 2023

TDC: Pool-Level Object Cache Replacement Algorithm Based on Temperature Density.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
DRL-M4MR: An intelligent multicast routing approach based on DQN deep reinforcement learning in SDN.
Phys. Commun., 2022

A Novel Self-Supervised Learning-Based Anomaly Node Detection Method Based on an Autoencoder in Wireless Sensor Networks.
CoRR, 2022

A Novel Anomaly Detection Method for Multimodal WSN Data Flow via a Dynamic Graph Neural Network.
CoRR, 2022

2021
A New Method for Reconstructing Data on a Single Failure Node in the Distributed Storage System Based on the MSR Code.
Wirel. Commun. Mob. Comput., 2021

Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Publicly verifiable outsourced data migration scheme supporting efficient integrity checking.
J. Netw. Comput. Appl., 2021

A method of repairing single node failure in the distributed storage system based on the regenerating-code and a hybrid genetic algorithm.
Neurocomputing, 2021

A Priority-Based Multicast Flow Scheduling Method for a Collaborative Edge Storage Datacenter Network.
IEEE Access, 2021

2020
Mining moving object gathering pattern based on Resilient Distributed Datasets and R-tree index.
Neurocomputing, 2020

SLA-aware resource scheduling algorithm for cloud storage.
EURASIP J. Wirel. Commun. Netw., 2020

2019
A New Node Selection Method for the Ceph Storage System based on Software-defined Network and Fuzzy Multi-attribute Decision-making.
J. Inf. Hiding Multim. Signal Process., 2019

A new path planning strategy of a data collection problem utilising multi-mobile nodes in wireless sensor networks.
Int. J. Sens. Networks, 2019

A New Outsourced Data Deletion Scheme with Public Verifiability.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Network Traffic Outlier Detection Based on Full Convolutional Network.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

A Multi-Controller Deployment Method of SDN Network Based on FPGA.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

Improvement Research of PBFT Consensus Algorithm Based on Credit.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Data integrity checking with reliable data transfer for secure cloud storage.
Int. J. Web Grid Serv., 2018

A parallel algorithm for network traffic anomaly detection based on Isolation Forest.
Int. J. Distributed Sens. Networks, 2018

Graph database-based network security situation awareness data storage method.
EURASIP J. Wirel. Commun. Netw., 2018

A Method of CNN Traffic Classification Based on Sppnet.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

Network Traffic Classification Method Based on Improved Capsule Neural Network.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

An Improved Small File Storage Strategy in Ceph File System.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Probability-based prediction query algorithm.
Ad Hoc Networks, 2017

Probability-Based Location Prediction Algorithm.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Cell Image Classification Based on the Support Vector Machine and D-S Evidence Theory.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
A parallelized network traffic classification framework based on selective ensemble and diversity measures.
J. High Speed Networks, 2016

A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark.
Inf., 2016

Publish/Subscribe and JXTA based Cloud Service Management with QoS.
Int. J. Grid High Perform. Comput., 2016

A novel minimal exposure path problem in wireless sensor networks and its solution algorithm.
Int. J. Distributed Sens. Networks, 2016

A new usage control protocol for data protection of cloud environment.
EURASIP J. Inf. Secur., 2016

Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurr. Comput. Pract. Exp., 2016

A Novel Delay Analysis for Polling Schemes with Power Management Under Heterogeneous Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

2015
An FPGA Based High-speed Network Performance Measurement for RFC 2544.
EURASIP J. Wirel. Commun. Netw., 2015

Overview of cyber-security of industrial control system.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
Topic Detection and Evolution Analysis on Microblog.
Proceedings of the Intelligent Information Processing VII, 2014

2012
Analysis on Limitation Origins of Information Theory.
Proceedings of the Intelligent Information Processing VI, 2012

2005
Model Selection for Regularized Least-Squares Classification.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...