Guiyi Wei
Guiyi Wei
Zhejiang Gongshang University
Correu electrònic verificat a zjgsu.edu.cn - Pàgina d'inici
Títol
Citada per
Citada per
Any
A game-theoretic method of fair resource allocation for cloud computing services
G Wei, AV Vasilakos, Y Zheng, N Xiong
The journal of supercomputing 54 (2), 252-269, 2010
5382010
Fog computing: Focusing on mobile users at the edge
TH Luan, L Gao, Z Li, Y Xiang, G Wei, L Sun
arXiv preprint arXiv:1502.01815, 2015
4532015
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter
G Wei, Y Ling, B Guo, B Xiao, AV Vasilakos
Computer Communications 34 (6), 793-802, 2011
2012011
GA-based task scheduler for the cloud computing systems
Y Ge, G Wei
2010 International conference on web information systems and mining 2, 181-186, 2010
1032010
CCA-secure ABE with outsourced decryption for fog computing
C Zuo, J Shao, G Wei, M Xie, M Ji
Future Generation Computer Systems 78, 730-738, 2018
972018
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
902013
Identity-based conditional proxy re-encryption
J Shao, G Wei, Y Ling, M Xie
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
542011
Obtain confidentiality or/and authenticity in big data by ID-based generalized signcryption
G Wei, J Shao, Y Xiang, P Zhu, R Lu
Information Sciences 318, 111-122, 2015
492015
Data security and privacy in fog computing
Y Guan, J Shao, G Wei, M Xie
IEEE Network 32 (5), 106-111, 2018
442018
Anonymous proxy re‐encryption
J Shao, P Liu, G Wei, Y Ling
Security and Communication Networks 5 (5), 439-449, 2012
422012
Fine-grained two-factor protection mechanism for data sharing in cloud storage
C Zuo, J Shao, JK Liu, G Wei, Y Ling
IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017
382017
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
362013
Security threats in the data plane of software-defined networks
S Gao, Z Li, B Xiao, G Wei
IEEE network 32 (4), 108-113, 2018
322018
Multi-use unidirectional proxy re-encryption
J Shao, P Liu, Z Cao, G Wei
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
272011
Concept, characteristics and defending mechanism of worms
Y Tang, J Luo, B Xiao, G Wei
IEICE TRANSACTIONS on Information and Systems 92 (5), 799-809, 2009
272009
Scheduling parallel cloud computing services: An evolutional game
G Wei, AV Vasilakos, N Xiong
2009 First International Conference on Information Science and Engineering …, 2009
252009
Efficient certificateless authenticated asymmetric group key agreement protocol
G Wei, X Yang, J Shao
KSII Transactions on Internet and Information Systems (TIIS) 6 (12), 3352-3365, 2012
232012
Unidirectional identity-based proxy re-signature
J Shao, G Wei, Y Ling, M Xie
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
232011
Stochastic heterogeneous interaction promotes cooperation in spatial prisoner's dilemma game
P Zhu, G Wei
PLoS One 9 (4), e95169, 2014
192014
Cooperation dynamics on collaborative social networks of heterogeneous population
G Wei, P Zhu, AV Vasilakos, Y Mao, J Luo, Y Ling
IEEE Journal on Selected Areas in Communications 31 (6), 1135-1146, 2013
192013
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20