Guiyi Wei
Guiyi Wei
Zhejiang Gongshang University
zjgsu.edu.cn의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
A game-theoretic method of fair resource allocation for cloud computing services
G Wei, AV Vasilakos, Y Zheng, N Xiong
The journal of supercomputing 54 (2), 252-269, 2010
5572010
Fog computing: Focusing on mobile users at the edge
TH Luan, L Gao, Z Li, Y Xiang, G Wei, L Sun
arXiv preprint arXiv:1502.01815, 2015
5102015
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter
G Wei, Y Ling, B Guo, B Xiao, AV Vasilakos
Computer Communications 34 (6), 793-802, 2011
2232011
CCA-secure ABE with outsourced decryption for fog computing
C Zuo, J Shao, G Wei, M Xie, M Ji
Future Generation Computer Systems 78, 730-738, 2018
1152018
GA-based task scheduler for the cloud computing systems
Y Ge, G Wei
2010 International conference on web information systems and mining 2, 181-186, 2010
1132010
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
982013
Identity-based conditional proxy re-encryption
J Shao, G Wei, Y Ling, M Xie
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
652011
Data security and privacy in fog computing
Y Guan, J Shao, G Wei, M Xie
IEEE Network 32 (5), 106-111, 2018
562018
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
G Wei, J Shao, Y Xiang, P Zhu, R Lu
Information Sciences 318, 111-122, 2015
562015
Fine-grained two-factor protection mechanism for data sharing in cloud storage
C Zuo, J Shao, JK Liu, G Wei, Y Ling
IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017
492017
Security threats in the data plane of software-defined networks
S Gao, Z Li, B Xiao, G Wei
IEEE network 32 (4), 108-113, 2018
442018
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
432013
Anonymous proxy re‐encryption
J Shao, P Liu, G Wei, Y Ling
Security and Communication Networks 5 (5), 439-449, 2012
432012
Multi-use unidirectional proxy re-encryption
J Shao, P Liu, Z Cao, G Wei
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
292011
Concept, characteristics and defending mechanism of worms
Y Tang, J Luo, B Xiao, G Wei
IEICE TRANSACTIONS on Information and Systems 92 (5), 799-809, 2009
292009
Scheduling parallel cloud computing services: An evolutional game
G Wei, AV Vasilakos, N Xiong
2009 First International Conference on Information Science and Engineering …, 2009
262009
Efficient certificateless authenticated asymmetric group key agreement protocol
G Wei, X Yang, J Shao
KSII Transactions on Internet and Information Systems (TIIS) 6 (12), 3352-3365, 2012
252012
Unidirectional identity-based proxy re-signature
J Shao, G Wei, Y Ling, M Xie
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
242011
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
G Wei, R Lu, J Shao
Journal of Computer and System Sciences 80 (8), 1549-1562, 2014
212014
Collaborative security in vehicular cloud computing: A game theoretic view
A Alamer, Y Deng, G Wei, X Lin
IEEE Network 32 (3), 72-77, 2018
192018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20