A game-theoretic method of fair resource allocation for cloud computing services G Wei, AV Vasilakos, Y Zheng, N Xiong The journal of supercomputing 54 (2), 252-269, 2010 | 538 | 2010 |
Fog computing: Focusing on mobile users at the edge TH Luan, L Gao, Z Li, Y Xiang, G Wei, L Sun arXiv preprint arXiv:1502.01815, 2015 | 453 | 2015 |
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter G Wei, Y Ling, B Guo, B Xiao, AV Vasilakos Computer Communications 34 (6), 793-802, 2011 | 201 | 2011 |
GA-based task scheduler for the cloud computing systems Y Ge, G Wei 2010 International conference on web information systems and mining 2, 181-186, 2010 | 103 | 2010 |
CCA-secure ABE with outsourced decryption for fog computing C Zuo, J Shao, G Wei, M Xie, M Ji Future Generation Computer Systems 78, 730-738, 2018 | 97 | 2018 |
Internet traffic classification using constrained clustering Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013 | 90 | 2013 |
Identity-based conditional proxy re-encryption J Shao, G Wei, Y Ling, M Xie 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | 54 | 2011 |
Obtain confidentiality or/and authenticity in big data by ID-based generalized signcryption G Wei, J Shao, Y Xiang, P Zhu, R Lu Information Sciences 318, 111-122, 2015 | 49 | 2015 |
Data security and privacy in fog computing Y Guan, J Shao, G Wei, M Xie IEEE Network 32 (5), 106-111, 2018 | 44 | 2018 |
Anonymous proxy re‐encryption J Shao, P Liu, G Wei, Y Ling Security and Communication Networks 5 (5), 439-449, 2012 | 42 | 2012 |
Fine-grained two-factor protection mechanism for data sharing in cloud storage C Zuo, J Shao, JK Liu, G Wei, Y Ling IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017 | 38 | 2017 |
Unreconciled collisions uncover cloning attacks in anonymous RFID systems K Bu, X Liu, J Luo, B Xiao, G Wei IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013 | 36 | 2013 |
Security threats in the data plane of software-defined networks S Gao, Z Li, B Xiao, G Wei IEEE network 32 (4), 108-113, 2018 | 32 | 2018 |
Multi-use unidirectional proxy re-encryption J Shao, P Liu, Z Cao, G Wei 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | 27 | 2011 |
Concept, characteristics and defending mechanism of worms Y Tang, J Luo, B Xiao, G Wei IEICE TRANSACTIONS on Information and Systems 92 (5), 799-809, 2009 | 27 | 2009 |
Scheduling parallel cloud computing services: An evolutional game G Wei, AV Vasilakos, N Xiong 2009 First International Conference on Information Science and Engineering …, 2009 | 25 | 2009 |
Efficient certificateless authenticated asymmetric group key agreement protocol G Wei, X Yang, J Shao KSII Transactions on Internet and Information Systems (TIIS) 6 (12), 3352-3365, 2012 | 23 | 2012 |
Unidirectional identity-based proxy re-signature J Shao, G Wei, Y Ling, M Xie 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | 23 | 2011 |
Stochastic heterogeneous interaction promotes cooperation in spatial prisoner's dilemma game P Zhu, G Wei PLoS One 9 (4), e95169, 2014 | 19 | 2014 |
Cooperation dynamics on collaborative social networks of heterogeneous population G Wei, P Zhu, AV Vasilakos, Y Mao, J Luo, Y Ling IEEE Journal on Selected Areas in Communications 31 (6), 1135-1146, 2013 | 19 | 2013 |