UM

Browse/Search Results:  1-10 of 92 Help

Selected(0)Clear Items/Page:    Sort:
NOMA Assisted Two-Tier VR Content Transmission: A Tile-based Approach for QoE Optimization Journal article
Li Yang, Dou Chenglong, Wu Yuan, Jia Weijia, Lu Rongxing. NOMA Assisted Two-Tier VR Content Transmission: A Tile-based Approach for QoE Optimization[J]. IEEE Transactions on Mobile Computing, 2024, 23(5), 3769 - 3784.
Authors:  Li Yang;  Dou Chenglong;  Wu Yuan;  Jia Weijia;  Lu Rongxing
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:7.7/6.5 | Submit date:2023/08/03
And Qoe-aware Cost Minimization  Non-orthogonal Multiple Access  Tile-based Content Transmission For Virtual Reality  Uav-based Two-tier Transmission  
Joint Resource Overbooking and Container Scheduling in Edge Computing Journal article
Tang Zhiqing, Mou Fangyi, Lou Jiong, Jia Weijia, Wu Yuan, Zhao Wei. Joint Resource Overbooking and Container Scheduling in Edge Computing[J]. IEEE Transactions on Mobile Computing, 2024, 23(12), 10903 - 10917.
Authors:  Tang Zhiqing;  Mou Fangyi;  Lou Jiong;  Jia Weijia;  Wu Yuan; et al.
Favorite | TC[Scopus]:1  IF:7.7/6.5 | Submit date:2024/05/16
Container Scheduling  Edge Computing  Resource Overbooking  Soft Actor-critic Reinforcement Learning  
Multi-User Layer-Aware Online Container Migration in Edge-Assisted Vehicular Networks Journal article
Tang Zhiqing, Mou Fangyi, Lou Jiong, Jia Weijia, Wu Yuan, Zhao Wei. Multi-User Layer-Aware Online Container Migration in Edge-Assisted Vehicular Networks[J]. IEEE/ACM Transactions on Networking, 2024, 32(2), 1807-1822.
Authors:  Tang Zhiqing;  Mou Fangyi;  Lou Jiong;  Jia Weijia;  Wu Yuan; et al.
Favorite | TC[WOS]:3 TC[Scopus]:6  IF:3.0/3.6 | Submit date:2024/02/22
Layer-aware Scheduling  Container Migration  Edge Computing  Vehicular Networks  
Dynamic User-Scheduling and Power Allocation for SWIPT Aided Federated Learning: A Deep Learning Approach Journal article
Li Yang, Wu Yuan, Song Yuxiao, Qian Liping, Jia Weijia. Dynamic User-Scheduling and Power Allocation for SWIPT Aided Federated Learning: A Deep Learning Approach[J]. IEEE Transactions on Mobile Computing, 2023, 22(12), 6956-6969.
Authors:  Li Yang;  Wu Yuan;  Song Yuxiao;  Qian Liping;  Jia Weijia
Favorite | TC[WOS]:12 TC[Scopus]:13  IF:7.7/6.5 | Submit date:2023/01/30
Federated Learning  Swipt  Dynamic User-scheduling  Stochastic Shortest Path  Deep Reinforcement Learning  Proximal Policy Optimization  
Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue Journal article
Rufan Bai, Haoxing Lin, Xinyu Yang, Xiaowei Wu, Minming Li, Weijia Jia. Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue[J]. Journal of Artificial Intelligence Research, 2023, 77, 487-515.
Authors:  ; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:4.5/4.4 | Submit date:2023/06/28
Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition Journal article
Zhou, Mingliang, Leng, Hongyue, Fang, Bin, Xiang, Tao, Wei, Xuekai, Jia, Weijia. Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19(6), 187.
Authors:  Zhou, Mingliang;  Leng, Hongyue;  Fang, Bin;  Xiang, Tao;  Wei, Xuekai; et al.
Favorite | TC[WOS]:5 TC[Scopus]:10  IF:5.2/4.9 | Submit date:2023/09/28
Denosing  Low-light Image Enhancement  Retinex Theory  
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning Journal article
Qian Liping, Wu Yuan, Yu Ningning, Wang Daohang, Jiang Fuli, Jia Weijia. Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning[J]. IEEE Transactions on Mobile Computing, 2023, 22(1), 237-252.
Authors:  Qian Liping;  Wu Yuan;  Yu Ningning;  Wang Daohang;  Jiang Fuli; et al.
Favorite |   IF:7.7/6.5 | Submit date:2024/07/19
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning Journal article
Qian Liping, Wu Yuan, Yu Ningning, Wang Daohang, Jiang Fuli, Jia Weijia. Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning[J]. IEEE Transactions on Mobile Computing, 2023, 22(1), 237-252.
Authors:  Qian Liping;  Wu Yuan;  Yu Ningning;  Wang Daohang;  Jiang Fuli; et al.
Favorite | TC[WOS]:15 TC[Scopus]:17  IF:7.7/6.5 | Submit date:2021/09/10
Multi-access Mobile Edge Computing  Secrecydriven Computation Offloading  Joint Computation And Communication Resource Allocations  
Mixed Strategies for Security Games with General Defending Requirements Conference paper
Bai Rufan, Lin Haoxing, Yang Xinyu, Wu Xiaowei, Li Minming, Jia Weijia. Mixed Strategies for Security Games with General Defending Requirements[C]. De Raedt L., De Raedt L.:International Joint Conferences on Artificial Intelligence, 2022, 46-52.
Authors:  Bai Rufan;  Lin Haoxing;  Yang Xinyu;  Wu Xiaowei;  Li Minming; et al.
Favorite |  | Submit date:2022/07/18
Security Game  Mixed Strategy  Defending Threshold  
Representation and Reinforcement Learning for Task Scheduling in Edge Computing Journal article
Tang, Zhiqing, Jia, Weijia, Zhou, Xiaojie, Yang, Wenmian, You, Yongjian. Representation and Reinforcement Learning for Task Scheduling in Edge Computing[J]. IEEE Transactions on Big Data, 2022, 8(3), 795-808.
Authors:  Tang, Zhiqing;  Jia, Weijia;  Zhou, Xiaojie;  Yang, Wenmian;  You, Yongjian
Favorite | TC[WOS]:19 TC[Scopus]:22  IF:7.5/5.8 | Submit date:2023/01/30
Edge Computing  Reinforcement Learning  Representation Learning  Task Scheduling