Wei Shi

ORCID: 0000-0002-3071-8350
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Cooperative Communication and Network Coding
  • Millimeter-Wave Propagation and Modeling
  • Mobile Agent-Based Network Management
  • Advanced Computational Techniques and Applications
  • Anomaly Detection Techniques and Applications
  • Advanced MIMO Systems Optimization
  • Service-Oriented Architecture and Web Services
  • Cloud Computing and Resource Management
  • Indoor and Outdoor Localization Technologies
  • IoT and Edge/Fog Computing
  • Distributed systems and fault tolerance
  • Advanced Data Storage Technologies
  • Mobile Ad Hoc Networks
  • Energy Harvesting in Wireless Networks
  • Blockchain Technology Applications and Security
  • Peer-to-Peer Network Technologies
  • Distributed and Parallel Computing Systems
  • Advanced Malware Detection Techniques
  • Microwave Engineering and Waveguides
  • Optimization and Search Problems
  • Complex Network Analysis Techniques

Carleton University
2010-2025

University of Electronic Science and Technology of China
2025

Kyushu University
2018-2024

Hezhou University
2017-2024

Shandong University of Technology
2023-2024

Nantong Science and Technology Bureau
2024

Xidian University
2013-2023

University of California, Santa Barbara
2022-2023

Deakin University
2005-2023

Yonsei University
2022-2023

The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively network field is monitored by its nodes. This has attracted lot interest over the years and result, many protocols were proposed. In this survey, we first propose taxonomy for classifying WSNs. Then, classify into three categories (i.e., coverageaware deployment protocols, sleep scheduling flat networks, cluster-based protocols) based on stage where optimized. For each category,...

10.1109/jcn.2019.000005 article EN Journal of Communications and Networks 2019-02-01

Edge computing provides high-class intelligent services and capabilities at the edge of networks. The aim is to ease backhaul impacts offer an improved user experience. However, artificial intelligence exacerbates security cloud environment due dissociation data, access control, service stages. In order prevent users from carrying out lateral movement attacks in edge-cloud environment, this paper we propose a real-time detection method, named CloudSEC, based on evidence reasoning network for...

10.1109/tii.2019.2907754 article EN IEEE Transactions on Industrial Informatics 2019-03-27

Voltage regulation in distribution networks is increasingly challenged by the penetration of distributed energy resources (DERs). This paper develops a voltage control (DVC) scheme to achieve globally optimal settings reactive power provided DERs' electronic interfaces. Based on unbalanced network flow modeling, alternating direction method multipliers algorithm used develop proposed design. To simplify communication network, coupling linearized involve only neighboring buses. Interestingly,...

10.1109/tsg.2017.2703642 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2017-05-15

Internet of Things (IoT) has become one the fastest-growing technologies and been broadly applied in various fields. IoT networks contain millions devices with capability interacting each other providing functionalities that were never available to us before. These are designed provide friendly intelligent operations through big data analysis information generated or collected from an abundance real time. However, diversity makes networks' environments more complex vulnerable web attacks...

10.1109/tii.2020.3038761 article EN IEEE Transactions on Industrial Informatics 2020-11-17

Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric Networks. In dynamic environment such as the Internet of Things (IoT), which is vulnerable to various types attacks, fast and robust solutions are demand handle fast-changing threats thus ever-increasing difficulty detection. this paper, we present novel framework for detection anomalies, which, particular, supports intrusion The anomaly-detection propose combines reinforcement learning with class-imbalance...

10.1109/tnse.2020.3004312 article EN IEEE Transactions on Network Science and Engineering 2020-06-24

We report XLINK, a multi-path QUIC video transport solution with experiments in Taobao short videos. XLINK is designed to meet two operational challenges at the same time: (1) Optimized user-perceived quality of experience (QoE) terms robustness, smoothness, responsiveness, and mobility (2) Minimized cost overhead for service providers (typically CDNs). The core take opportunity as user-space protocol directly capture QoE intent control scheduling management. overcome major hurdles such...

10.1145/3452296.3472893 article EN 2021-08-09

For the demonstration of ultra-wideband bandwidth and pencil-beamforming, terahertz (THz)-band has been envisioned as one key enabling technologies for sixth generation networks. However, acquisition THz channel entails several unique challenges such severe path loss beam-split. Prior works usually employ ultra-massive arrays additional hardware components comprised time-delayers to compensate these loses. In order provide a cost-effective solution, this paper introduces...

10.1109/ojcoms.2023.3263625 article EN cc-by IEEE Open Journal of the Communications Society 2023-01-01

In this paper, we consider task-level scheduling algorithms with respect to budget and deadline constraints for a batch of MapReduce jobs on set provisioned heterogeneous (virtual) machines in cloud platforms. The heterogeneity is manifested the popular "pay-as-you-go" charging model where service different performance would have rates. We organize as k-stage workflow study two related optimization problems, depending whether are monetary or length workflow. First, given total B, by...

10.1109/tcc.2014.2316812 article EN IEEE Transactions on Cloud Computing 2014-04-11

Voltage regulation in distribution networks is challenged by increasing penetration of distributed energy resources (DERs). Thanks to advancement power electronics, DERs can be leveraged regulate the grid voltage quickly changing their reactive outputs. This paper develops a hybrid control (HVC) strategy that seamlessly integrate both local and designs effectively coordinate network-wide DERs. By minimizing special mismatch objective, we achieve proposed HVC design adopting partial...

10.1109/tsg.2018.2797692 article EN publisher-specific-oa IEEE Transactions on Smart Grid 2018-01-24

Voltage control in power distribution networks has been greatly challenged by the increasing penetration of volatile and intermittent devices. These devices can also provide limited reactive resources that be used to regulate network-wide voltage. A decentralized voltage strategy designed minimizing a quadratic mismatch error objective using gradient-projection (GP) updates. Coupled with network flow, local instantaneous gradient information. This paper aims analyze performance this GP-based...

10.1109/tsipn.2016.2631886 article EN publisher-specific-oa IEEE Transactions on Signal and Information Processing over Networks 2016-11-23

Large language models (LLMs) have been widely studied for their ability to store and utilize positive knowledge. However, negative knowledge, such as "lions don't live in the ocean", is also ubiquitous world but rarely mentioned explicitly text.What do LLMs know about knowledge?This work examines of on commonsense knowledge.We design a constrained keywords-to-sentence generation task (CG) Boolean question answering (QA) probe LLMs.Our experiments reveal that frequently fail generate valid...

10.18653/v1/2023.acl-long.550 article EN cc-by 2023-01-01

Terahertz (THz) band is expected to be one of the key enabling technologies sixth generation (6G) wireless networks because its abundant available bandwidth and very narrow beam width. Due high frequency operations, electrically small array apertures are employed, signal wavefront becomes spherical in near-field. Therefore, near-field model should considered for channel acquisition THz systems. Unlike prior works which mostly ignore impact beam-split (NB) consider either narrowband scenario...

10.1109/access.2023.3266297 article EN cc-by-nc-nd IEEE Access 2023-01-01

Pseudo-random number generators that can quickly generate noise-like noise have high value in engineering applications. However, the methods currently used many signal do not produce with enough randomness to satisfy Based on properties possessed by memristor, a novel method is proposed this paper. A 3D discrete memristor model constructed coupling system, and its complex dynamical behavior, which depends system parameters initial values, analyzed. The results show 3D-DM exhibits...

10.1049/icp.2024.2912 article EN IET conference proceedings. 2025-01-01

In the dynamic realm of machine learning (ML), federated (FL) emerges as a pivotal method for training models on decentralized devices without need central data aggregation. This technique confronts challenges heterogeneity, which disrupts independent and identically distributed (IID) assumptions, adversely affecting accuracy overall model. To tackle this issue, we introduce non-performing-node-resilient neural selector (FNNS), an advanced client selection algorithm grounded in combinatorial...

10.1145/3721480 article EN ACM Transactions on Modeling and Performance Evaluation of Computing Systems 2025-03-03

10.1016/j.jde.2005.06.024 article EN publisher-specific-oa Journal of Differential Equations 2005-08-23
Coming Soon ...