default search action
Wei Yin 0002
Person information
- affiliation: North China Institute of Computing Technology, Beijing, China
- affiliation (PhD 2012): The University of Queensland, School of Information Technology and Electrical Engineering, Brisbane, QLD, Australia
Other persons with the same name
- Wei Yin — disambiguation page
- Wei Yin 0001 — Graduate University of Chinese Academy of Sciences, Research Center on Data Technology and Knowledge Economy, Beijing, China
- Wei Yin 0003 — Nankai University, Institute of Robotics and Automatic Information System, Tianjin, China
- Wei Yin 0004 — Beijing University of Posts and Telecommunications, State key Laboratory of Networking and Switching Technology, China
- Wei Yin 0005 — Beijing Institute of Technology, School of Information and Electronics, Radar Research Lab, China
- Wei Yin 0006 — University of Adelaide, Adelaide, SA, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Wei Yin, Peizhao Hu, Hongjian Zhou, Guoqiang Xing, Jiahui Wen:
Jamming attacks and defenses for fast association in IEEE 802.11ah networks. Comput. Networks 208: 108890 (2022) - 2021
- [j9]Xiaoxue Liu, Jiexin Zhang, Peidong Zhu, Qingping Tan, Wei Yin:
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput. Secur. 102: 102138 (2021) - 2020
- [j8]Wei Yin, Peizhao Hu, Jiahui Wen, Hongjian Zhou:
ACK spoofing on MAC-layer rate control: Attacks and defenses. Comput. Networks 171: 107133 (2020) - [j7]Wei Yin, Peizhao Hu, Wenbo Wang, Jiahui Wen, Hongjian Zhou:
FASUS: A fast association mechanism for 802.11ah networks. Comput. Networks 175: 107287 (2020) - [j6]Jiahui Wen, Guangda Zhang, Hongyun Zhang, Wei Yin, Jingwei Ma:
Speculative text mining for document-level sentiment classification. Neurocomputing 412: 52-62 (2020) - [j5]Jiahui Wen, Jingwei Ma, Hongkui Tu, Mingyang Zhong, Guangda Zhang, Wei Yin, Jian Fang:
Hierarchical text interaction for rating prediction. Knowl. Based Syst. 206: 106344 (2020) - [j4]Wei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Ying Mao:
MAC-layer rate control for 802.11 networks: a survey. Wirel. Networks 26(5): 3793-3830 (2020) - [i2]Jiahui Wen, Jingwei Ma, Hongkui Tu, Wei Yin, Jian Fang:
Hierarchical Text Interaction for Rating Prediction. CoRR abs/2010.07628 (2020)
2010 – 2019
- 2019
- [j3]Jiahui Wen, Hongkui Tu, Xiaohui Cheng, Renquan Xie, Wei Yin:
Joint modeling of users, questions and answers for answer selection in CQA. Expert Syst. Appl. 118: 563-572 (2019) - 2018
- [i1]Wei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Ying Mao:
MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward. CoRR abs/1807.02827 (2018) - 2017
- [j2]Wei Yin, Jadwiga Indulska, Hongjian Zhou:
Protecting Private Data by Honey Encryption. Secur. Commun. Networks 2017: 6760532:1-6760532:9 (2017) - [c5]Wei Yin, Hongjian Zhou, Chunlei Yang:
A Honeyfarm Data Control Mechanism and Forensic Study. ChinaCom (2) 2017: 362-372 - 2015
- [j1]Wei Yin, Peizhao Hu, Jadwiga Indulska:
Rate control in the mac80211 framework: Overview, evaluation and improvements. Comput. Networks 81: 289-307 (2015) - 2012
- [c4]Wei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Jonathan Guerin:
Robust MAC-layer rate control mechanism for 802.11 wireless networks. LCN 2012: 419-427 - 2011
- [c3]Wei Yin, Peizhao Hu, Jadwiga Indulska, Konstanty Bialkowski:
Performance of mac80211 rate control mechanisms. MSWiM 2011: 427-436 - 2010
- [c2]Wei Yin, Konstanty Bialkowski, Jadwiga Indulska, Peizhao Hu:
Evaluations of MadWifi MAC layer rate control mechanisms. IWQoS 2010: 1-9 - [c1]Wei Yin, Peizhao Hu, Jadwiga Indulska, Konstanty Bialkowski:
A Method to Improve Adaptability of the Minstrel MAC Rate Control Algorithm. UIC 2010: 504-518
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint