Follow
Wushao Wen
Wushao Wen
Verified email at mail.sysu.edu.cn
Title
Cited by
Cited by
Year
Ridge and lasso regression models for cross-version defect prediction
X Yang, W Wen
IEEE Transactions on Reliability 67 (3), 885-896, 2018
1142018
Joint optimization method for task scheduling time and energy consumption in mobile cloud computing environment
H Peng, WS Wen, ML Tseng, LL Li
Applied Soft Computing 80, 534-545, 2019
842019
Multi-scale feature fusion residual network for single image super-resolution
J Qin, Y Huang, W Wen
Neurocomputing 379, 334-342, 2020
832020
Phishing URL detection via CNN and attention-based hierarchical RNN
Y Huang, Q Yang, J Qin, W Wen
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
832019
Joint optimization for task offloading in edge computing: An evolutionary game approach
C Dong, W Wen
Sensors 19 (3), 740, 2019
502019
A generalized protection framework using a new link-State availability model for reliable optical networks
YG Huang, W Wen, JP Heritage, B Mukherjee
Journal of Lightwave Technology 22 (11), 2536, 2004
372004
Non-access-stratum request attack in E-UTRAN
D Yu, W Wen
2012 Computing, Communications and Applications Conference, 48-53, 2012
362012
Signal-quality consideration for dynamic connection provisioning in all-optical wavelength-routed networks
YR Huang, W Wen, JP Heritage, B Mukherjee
OptiComm 2003: Optical Networking and Communications 5285, 163-173, 2003
352003
Joint optimization with DNN partitioning and resource allocation in mobile edge computing
C Dong, S Hu, X Chen, W Wen
IEEE Transactions on Network and Service Management 18 (4), 3973-3986, 2021
292021
Phishing URL detection via capsule-based neural network
Y Huang, J Qin, W Wen
2019 IEEE 13th International Conference on Anti-counterfeiting, Security …, 2019
282019
Quality-of-service based protection in MPLS control WDM mesh networks
W Wen, SJ Ben Yoo, B Mukherjee
Photonic Network Communications 4, 297-320, 2002
282002
Energy-efficient offloading policy for resource allocation in distributed mobile edge computing
C Wang, C Dong, J Qin, X Yang, W Wen
2018 IEEE Symposium on Computers and Communications (ISCC), 00366-00372, 2018
262018
1+ 1 Mesh protection
W Wen, S Ramam, PD Desai, N Gulati, JS Brenneman
US Patent 7,027,388, 2006
262006
Application-layer ddos detection based on a one-class support vector machine
C She, W Wen, Z Lin, K Zheng
International Journal of Network Security Its Applications 9, 13-24, 2017
242017
Availability-guaranteed service provisioning with shared-path protection in optical WDM networks
YG Huang, JP Heritage, B Mukherjee, W Wen
Optical Fiber Communication Conference, MF95, 2004
212004
Sur-adapter: Enhancing text-to-image pre-trained diffusion models with large language models
S Zhong, Z Huang, W Wen, J Qin, L Lin
Proceedings of the 31st ACM International Conference on Multimedia, 567-578, 2023
192023
Joint optimization of data-center selection and video-streaming distribution for crowdsourced live streaming in a geo-distributed cloud platform
C Dong, W Wen, T Xu, X Yang
IEEE Transactions on Network and Service Management 16 (2), 729-742, 2019
192019
A novel distribution service policy for crowdsourced live streaming in cloud platform
C Dong, Y Jia, H Peng, X Yang, W Wen
IEEE Transactions on Network and Service Management 15 (2), 679-692, 2018
182018
A cloud load forecasting model with nonlinear changes using whale optimization algorithm hybrid strategy
H Peng, WS Wen, ML Tseng, LL Li
Soft Computing 25 (15), 10205-10220, 2021
162021
Difficulty-aware image super resolution via deep adaptive dual-network
J Qin, Z Xie, Y Shi, W Wen
2019 IEEE International Conference on Multimedia and Expo (ICME), 586-591, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20