default search action
Wei You
Publications
- 2024
- [j61]Deqiang Zhou, Xinsheng Ji, Wei You, Hang Qiu, Yu Zhao, Mingyan Xu:
DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks. Comput. Networks 254: 110748 (2024) - [i7]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou:
Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network. CoRR abs/2402.00002 (2024) - 2023
- [j55]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou:
Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network. Comput. Networks 228: 109716 (2023) - [j54]Zhimo Cheng, Xinsheng Ji, Wei You, Yu Zhao, Zhongfu Guo:
SECHO: A deep reinforcement learning-based scheme for secure handover in mobile edge computing. Comput. Networks 229: 109769 (2023) - [j53]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou, Lingwei Wang:
LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network. Entropy 25(7): 966 (2023) - [j52]Zhimo Cheng, Xinsheng Ji, Wei You, Yi Bai, Yunjie Chen, Xiaogang Qin:
FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing. Entropy 25(11): 1551 (2023) - 2022
- [j44]Hang Qiu, Hongbo Tang, Yu Zhao, Wei You, Xinsheng Ji:
Traffic Forecast Assisted Adaptive VNF Dynamic Scaling. KSII Trans. Internet Inf. Syst. 16(11): 3584-3602 (2022) - [j43]Xinsheng Ji, Jiangxing Wu, Liang Jin, Kaizhi Huang, Yajun Chen, Xiaoli Sun, Wei You, Shumin Huo, Jing Yang:
Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers Inf. Technol. Electron. Eng. 23(10): 1421-1450 (2022) - 2020
- [j32]Quan Yuan, Xinsheng Ji, Hongbo Tang, Wei You:
Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC. IEEE Access 8: 41649-41658 (2020) - 2019
- [j22]Senyou Li, Xinsheng Ji, Wei You, Xing Zhao:
一种基于差分隐私的数据查询分级控制策略 (Hierarchical Control Strategy for Data Querying Based on Differential Privacy). 计算机科学 46(11): 130-136 (2019) - 2018
- [j18]Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi:
Overview of 5G security technology. Sci. China Inf. Sci. 61(8): 081301:1-081301:25 (2018)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint