Skip to main content

Profile

Photo of Dr Yulei Wu

Dr Yulei Wu

Publications

Copyright Notice: Any articles made available for download are for personal use only. Any other use requires prior permission of the author and the copyright holder.

Copyright Notice: Any articles made available for download are for personal use only. Any other use requires prior permission of the author and the copyright holder.

| To Appear | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 |

To Appear

2022

2021

2020

2019

2018

  • Sa PK, Sahoo MN, Murugappan M, Wu Y, Majhi B. (2018) Erratum to: Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, e3-e3, DOI:10.1007/978-981-10-3376-6_62.
  • Ma Y, Wu Y, Ge J, Li J. (2018) A Flow-Level Architecture for Balancing Accountability and Privacy, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pages 984-989, DOI:10.1109/TrustCom/BigDataSE.2018.00138.
  • Wu Y, Xiang Y, Ge J, Muller P. (2018) High-Performance Computing for Big Data Processing, FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, volume 88, pages 693-695, DOI:10.1016/j.future.2018.07.054. [PDF]
  • Zou Z, Ge J, Zheng H, Wu Y, Han C, Yao Z. (2018) Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network, The 20th IEEE International Conference on High Performance Computing and Communications.
  • Yao Z, Ge J, Wu Y, Zhang X, Li Q, Zhang L, Zou Z. (2018) Meek-based Tor Traffic Identification with Hidden Markov Model, The 20th IEEE International Conference on High Performance Computing and Communications.
  • Ma Y, Wu Y, Li J, Ge J. (2018) A New Architecture for Distributed Computing in Named Data Networking, The 20th IEEE International Conference on High Performance Computing and Communications.
  • Huang C, Wu Y, Zuo Y, Pei K, Min G. (2018) Towards Experienced Anomaly Detector through Reinforcement Learning, The 32nd AAAI Conference on Artificial Intelligence.
  • Huang C, Wu Y, Min G, Ying Y. (2018) Kernelized Convex Hull Approximation and its Applications in Data Description Tasks, 2018 International Joint Conference on Neural Networks.
  • Tang H, Wu Y, Li T, Han C, Ge J, Zhao X. (2018) Efficient Identification of TOP-K Heavy Hitters over Sliding Windows, Mobile Networks and Applications, DOI:10.1007/s11036-018-1051-x.
  • Cheng X, Wu Y, Min G, Zomaya A. (2018) Network Function Virtualization in Dynamic Networks: A Stochastic Perspective, IEEE Journal on Selected Areas in Communications.
  • Zhao Z, Min G, Gao W, Wu Y, Duan H, Ni Q. (2018) Deploying Edge Computing Nodes for Large-Scale IoT: A Diversity Aware Approach, IEEE Internet of Things Journal, volume 5, no. 5, pages 3606-3614, DOI:10.1109/JIOT.2018.2823498.
  • Huang H, Yin H, Min G, Zhang J, Wu Y, Zhang X. (2018) Energy-aware Dual-path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, volume 17, pages 1339-1352, DOI:10.1109/TMC.2017.2771424. [PDF]

2017

2016

2015

  • E Y, Zhi C, GE J, WU Y. (2015) 一种高效的OpenFlow流表存储与查找实现方法, Scientia Sinica Informationis, volume 45, no. 10, pages 1280-1288, DOI:10.1360/n112014-00353.
  • Panda DK. (2015) Message from the program chairs, Proceedings of ESPM2 2015: 1st International Workshop on Extreme Scale Programming Models and Middleware - Held in conjunction with SC 2015: The International Conference for High Performance Computing, Networking, Storage and Analysis.
  • Seelam S, Wu Y, Choudhary AN, Calvo RA. (2015) Message from the CIT 2015 program chairs, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.366.
  • Xiang Y, Xia M, Wu Y, Atzori L. (2015) Message from the DASC 2015 general chairs, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.373.
  • Wu Y, Ko R, Javadi B, Al-Dubai A. (2015) Message from the ITA 2015 symposium chairs, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.389.
  • Ren J, Ali S, Liao X, Wu Y. (2015) Message from the PICom 2015 general chairs, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.377.
  • Wu Y, Al-Dubai A. (2015) Message from the WNM 2015 workshop chairs, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.381.
  • Ge J, Wang S, Wu Y, Tang H, E Y. (2015) Performance improvement for source mobility in named data networking based on global–local FIB updates, Peer-to-Peer Networking and Applications, volume 9, no. 4, pages 670-680, DOI:10.1007/s12083-015-0353-z.
  • Miao W, Min G, Wu Y, Wang H. (2015) Performance modelling of preemption-based packet scheduling for data plane in software defined networks, Proceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015, pages 60-65, DOI:10.1109/SmartCity.2015.48.
  • Lin H, Hu J, Liu J, Xu L, Wu Y. (2015) A context aware reputation mechanism for enhancing big data veracity in mobile cloud computing, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pages 2049-2054, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.304.
  • Li T, Zhang X, Liu Z, Ge J, Yao Z, Yuepeng E, Wu Y, Zhang L. (2015) Performance investigation and comparison between virtual networks and physical networks based on an advanced testbed network, Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, pages 1216-1221, DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.181.
  • Huang H, Yin H, Min G, Wu DO, Wu Y, Zuo T, Li K. (2015) Network distance prediction for enabling service-oriented applications over large-scale networks, IEEE Communications Magazine, volume 53, no. 8, pages 166-174, DOI:10.1109/MCOM.2015.7180524.

2014

2013

2012

2011

2010

2009

2008

2007

  • Wu Y, Min G, Ould-Khaoua M, Yin H. (2007) An Analytical Model for Torus Networks in the Presence of Hot-Spot Traffic with Batch Arrivals, Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2007. MASCOTS '07. 15th International Symposium on, pages 395-401.
  • Min G, Wu Y, Wang L, Ould-Khaoua M. (2007) Performance Modelling of Adaptive Routing in Hypercubic Networks under Non-Uniform and Batch Arrival Traffic, Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on, pages 583-590.
  • Min G, Wu Y, Wang L, Ould-Khaoua M. (2007) Performance modelling of adaptive routing in hypercubic networks under non-uniform and batch arrival traffic, Proceedings - Conference on Local Computer Networks, LCN, pages 583-590, DOI:10.1109/LCN.2007.125.
  • Wu Y, Min G, Wang L. (2007) Performance analysis of interconnection networks under bursty and batch arrival Traffic, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 4494 LNCS, pages 25-36, DOI:10.1007/978-3-540-72905-1_3.

Showing 165 publications from Symplectic.