×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
THE STATE KEY L... [32]
Faculty of Scie... [32]
Institute of Chi... [1]
INSTITUTE OF APP... [1]
Faculty of Healt... [1]
THE STATE KEY LA... [1]
More...
Authors
JIA WEI JIA [26]
WU YUAN [12]
WU XIAOWEI [3]
ZHOU JIANTAO [2]
GONG ZHIGUO [1]
MA SHAODAN [1]
More...
Document Type
Journal article [51]
Conference pape... [35]
Other [3]
Book [2]
Review article [1]
Date Issued
2024 [3]
2023 [5]
2022 [5]
2021 [10]
2020 [25]
2019 [21]
More...
Language
英語English [88]
中文Chinese [2]
Source Publication
IEEE Transaction... [5]
Lecture Notes in... [4]
IEEE Internet of... [3]
IEEE Transaction... [3]
IEEE Access [2]
IEEE Transaction... [2]
More...
Indexed By
SCIE [46]
CPCI-S [18]
CPCI-SSH [3]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 92
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
NOMA Assisted Two-Tier VR Content Transmission: A Tile-based Approach for QoE Optimization
Journal article
Li Yang, Dou Chenglong, Wu Yuan, Jia Weijia, Lu Rongxing. NOMA Assisted Two-Tier VR Content Transmission: A Tile-based Approach for QoE Optimization[J]. IEEE Transactions on Mobile Computing, 2024, 23(5), 3769 - 3784.
Authors:
Li Yang
;
Dou Chenglong
;
Wu Yuan
;
Jia Weijia
;
Lu Rongxing
Favorite
|
TC[WOS]:
4
TC[Scopus]:
5
IF:
7.7
/
6.5
|
Submit date:2023/08/03
And Qoe-aware Cost Minimization
Non-orthogonal Multiple Access
Tile-based Content Transmission For Virtual Reality
Uav-based Two-tier Transmission
Joint Resource Overbooking and Container Scheduling in Edge Computing
Journal article
Tang Zhiqing, Mou Fangyi, Lou Jiong, Jia Weijia, Wu Yuan, Zhao Wei. Joint Resource Overbooking and Container Scheduling in Edge Computing[J]. IEEE Transactions on Mobile Computing, 2024, 23(12), 10903 - 10917.
Authors:
Tang Zhiqing
;
Mou Fangyi
;
Lou Jiong
;
Jia Weijia
;
Wu Yuan
; et al.
Favorite
|
TC[Scopus]:
1
IF:
7.7
/
6.5
|
Submit date:2024/05/16
Container Scheduling
Edge Computing
Resource Overbooking
Soft Actor-critic Reinforcement Learning
Multi-User Layer-Aware Online Container Migration in Edge-Assisted Vehicular Networks
Journal article
Tang Zhiqing, Mou Fangyi, Lou Jiong, Jia Weijia, Wu Yuan, Zhao Wei. Multi-User Layer-Aware Online Container Migration in Edge-Assisted Vehicular Networks[J]. IEEE/ACM Transactions on Networking, 2024, 32(2), 1807-1822.
Authors:
Tang Zhiqing
;
Mou Fangyi
;
Lou Jiong
;
Jia Weijia
;
Wu Yuan
; et al.
Favorite
|
TC[WOS]:
3
TC[Scopus]:
6
IF:
3.0
/
3.6
|
Submit date:2024/02/22
Layer-aware Scheduling
Container Migration
Edge Computing
Vehicular Networks
Dynamic User-Scheduling and Power Allocation for SWIPT Aided Federated Learning: A Deep Learning Approach
Journal article
Li Yang, Wu Yuan, Song Yuxiao, Qian Liping, Jia Weijia. Dynamic User-Scheduling and Power Allocation for SWIPT Aided Federated Learning: A Deep Learning Approach[J]. IEEE Transactions on Mobile Computing, 2023, 22(12), 6956-6969.
Authors:
Li Yang
;
Wu Yuan
;
Song Yuxiao
;
Qian Liping
;
Jia Weijia
Favorite
|
TC[WOS]:
12
TC[Scopus]:
13
IF:
7.7
/
6.5
|
Submit date:2023/01/30
Federated Learning
Swipt
Dynamic User-scheduling
Stochastic Shortest Path
Deep Reinforcement Learning
Proximal Policy Optimization
Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue
Journal article
Rufan Bai, Haoxing Lin, Xinyu Yang, Xiaowei Wu, Minming Li, Weijia Jia. Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue[J]. Journal of Artificial Intelligence Research, 2023, 77, 487-515.
Authors:
Rufan Bai
;
Haoxing Lin
;
Xinyu Yang
;
Xiaowei Wu
;
Minming Li
; et al.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
4.5
/
4.4
|
Submit date:2023/06/28
Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition
Journal article
Zhou, Mingliang, Leng, Hongyue, Fang, Bin, Xiang, Tao, Wei, Xuekai, Jia, Weijia. Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19(6), 187.
Authors:
Zhou, Mingliang
;
Leng, Hongyue
;
Fang, Bin
;
Xiang, Tao
;
Wei, Xuekai
; et al.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
10
IF:
5.2
/
4.9
|
Submit date:2023/09/28
Denosing
Low-light Image Enhancement
Retinex Theory
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning
Journal article
Qian Liping, Wu Yuan, Yu Ningning, Wang Daohang, Jiang Fuli, Jia Weijia. Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning[J]. IEEE Transactions on Mobile Computing, 2023, 22(1), 237-252.
Authors:
Qian Liping
;
Wu Yuan
;
Yu Ningning
;
Wang Daohang
;
Jiang Fuli
; et al.
Favorite
|
IF:
7.7
/
6.5
|
Submit date:2024/07/19
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning
Journal article
Qian Liping, Wu Yuan, Yu Ningning, Wang Daohang, Jiang Fuli, Jia Weijia. Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning[J]. IEEE Transactions on Mobile Computing, 2023, 22(1), 237-252.
Authors:
Qian Liping
;
Wu Yuan
;
Yu Ningning
;
Wang Daohang
;
Jiang Fuli
; et al.
Favorite
|
TC[WOS]:
15
TC[Scopus]:
17
IF:
7.7
/
6.5
|
Submit date:2021/09/10
Multi-access Mobile Edge Computing
Secrecydriven Computation Offloading
Joint Computation And Communication Resource Allocations
Mixed Strategies for Security Games with General Defending Requirements
Conference paper
Bai Rufan, Lin Haoxing, Yang Xinyu, Wu Xiaowei, Li Minming, Jia Weijia. Mixed Strategies for Security Games with General Defending Requirements[C]. De Raedt L., De Raedt L.:International Joint Conferences on Artificial Intelligence, 2022, 46-52.
Authors:
Bai Rufan
;
Lin Haoxing
;
Yang Xinyu
;
Wu Xiaowei
;
Li Minming
; et al.
Favorite
|
|
Submit date:2022/07/18
Security Game
Mixed Strategy
Defending Threshold
Representation and Reinforcement Learning for Task Scheduling in Edge Computing
Journal article
Tang, Zhiqing, Jia, Weijia, Zhou, Xiaojie, Yang, Wenmian, You, Yongjian. Representation and Reinforcement Learning for Task Scheduling in Edge Computing[J]. IEEE Transactions on Big Data, 2022, 8(3), 795-808.
Authors:
Tang, Zhiqing
;
Jia, Weijia
;
Zhou, Xiaojie
;
Yang, Wenmian
;
You, Yongjian
Favorite
|
TC[WOS]:
19
TC[Scopus]:
22
IF:
7.5
/
5.8
|
Submit date:2023/01/30
Edge Computing
Reinforcement Learning
Representation Learning
Task Scheduling