default search action
Guangxue Yue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Jian Shi, Guangxue Yue, Shengyu Ma, Tianjun Peng, Bolin Ma:
A scalable multimodal ensemble learning framework for automatic modulation recognition. Int. J. Wirel. Mob. Comput. 26(2): 182-197 (2024) - 2023
- [j46]Yan Gao, Shengyu Ma, Jian Shi, Xiangbai Liao, Guangxue Yue:
An optimised multi-channel neural network model based on CLDNN for automatic modulation recognition. Int. J. Wirel. Mob. Comput. 24(2): 144-158 (2023) - [j45]Min Lu, Min Zhang, Guangxue Yue, Bolin Ma, Wei Li:
A blind receiver for OFDM communications. Int. J. Wirel. Mob. Comput. 24(3/4): 203-216 (2023) - [j44]Guangxue Yue, Chunlan Huang, Xiaofeng Xiong:
A Task Offloading Scheme in Maritime Edge Computing Network. J. Commun. Inf. Networks 8(1): 171-186 (2023) - [j43]Jian Shi, Xiaohui Yang, Jia Ma, Guangxue Yue:
CFCS: A Robust and Efficient Collaboration Framework for Automatic Modulation Recognition. J. Commun. Inf. Networks 8(3): 283-294 (2023) - 2022
- [j42]Jianhua Liu, Xin Wang, Shigen Shen, Zhaoxi Fang, Shui Yu, Guangxue Yue, Minglu Li:
Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud. IEEE Internet Things J. 9(6): 4356-4370 (2022) - [c21]Xianchao Zhang, Shengyu Ma, Jian Shi, Panpan Li, Guangxue Yue:
Automatic Modulation Recognition Based on Multi-Channel Neural Network Model. WCSP 2022: 1-5 - 2021
- [j41]Min Lu, Tianjun Peng, Guangxue Yue, Bolin Ma, Xiangbai Liao:
Dual-Channel Hybrid Neural Network for Modulation Recognition. IEEE Access 9: 76260-76269 (2021) - [j40]Huogen Yang, Lingzhu Zhao, Guangxue Yue, Bolin Ma, Wei Li:
IRLNet: A Short-Time and Robust Architecture for Automatic Modulation Recognition. IEEE Access 9: 143661-143676 (2021) - [j39]Jianhua Liu, Xin Wang, Shigen Shen, Guangxue Yue, Shui Yu, Minglu Li:
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud. IEEE Internet Things J. 8(9): 7546-7561 (2021) - [j38]Jie Zhao, Xin Wang, Harish Viswanathan, Arjuna Madanayake, Guangxue Yue:
Compressed Beam Alignment with Out-of-Band Assistance in Millimeter Wave Cellular Networks. IEEE Trans. Mob. Comput. 20(1): 117-129 (2021)
2010 – 2019
- 2018
- [j37]Jianhua Liu, Xin Wang, Guangxue Yue, Shigen Shen:
Data sharing in VANETs based on evolutionary fuzzy game. Future Gener. Comput. Syst. 81: 141-155 (2018) - [j36]Jiansheng Liu, Zhenxu You, Guangxue Yue, Jietai Wang, Jianhua Liu:
网络信任研究进展 (Research Progress of Network Trust). 计算机科学 45(11): 13-28 (2018) - 2015
- [j35]Jianhua Liu, Shigen Shen, Guangxue Yue, Risheng Han, Hongjie Li:
A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud. Appl. Soft Comput. 30: 123-135 (2015) - 2014
- [j34]Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li:
Coverage Capacity Optimization for Mobile Sensor Networks Based on Evolutionary Games. Int. J. Distributed Sens. Networks 10 (2014) - [j33]Aijia Ouyang, Libin Liu, Guangxue Yue, Xu Zhou, Kenli Li:
BFGS-GSO for Global Optimization Problems. J. Comput. 9(4): 966-973 (2014) - [j32]Aijia Ouyang, Guo Pan, Guangxue Yue, Jiayi Du:
Chaotic Cuckoo Search Algorithm for High-dimensional Functions. J. Comput. 9(5): 1282-1290 (2014) - 2013
- [j31]Lei Ding, Fei Yu, Zhenghua Yang, Guangxue Yue:
The System Design of a Node of P2P Networks for Intrusion Detection. J. Networks 8(8): 1920-1927 (2013) - [j30]Fanbin Meng, Lei Ding, Sheng Peng, Guangxue Yue:
A P2P Network Model Based on Hierarchical Interest Clustering Algorithm. J. Softw. 8(5): 1262-1267 (2013) - 2012
- [j29]Linquan Xie, Ying Wang, Fei Yu, Chen Xu, Guangxue Yue:
Research on Intrusion Detection Model of Heterogeneous Attributes Clustering. J. Softw. 7(12): 2823-2831 (2012) - 2011
- [j28]Shigen Shen, Guangxue Yue, Qiying Cao, Fei Yu:
A Survey of Game Theory in Wireless Sensor Networks Security. J. Networks 6(3): 521-532 (2011) - [j27]Xiaofeng Xiong, Jiajia Song, Guangxue Yue, Jiansheng Liu, Linquan Xie:
Survey: Research on QoS of P2P Reliable Streaming Media. J. Networks 6(8): 1114-1121 (2011) - [j26]Jiansheng Liu, Jiajia Wei, Guangxue Yue, Linquan Xie, Xiaofeng Xiong:
Application Layer Multicast Technology of Streaming Media. J. Networks 6(8): 1122-1128 (2011) - [j25]Guangxue Yue, Nanqing Wei, Jiansheng Liu, Xiaofeng Xiong, Linquan Xie:
Survey on Scheduling Technologies of P2P Media Streaming. J. Networks 6(8): 1129-1136 (2011) - [j24]Guangxue Yue, Tao Jiang, Jiajin Wang, Zhi Chen, Jiajia Song, Cheng Xu:
Underlying Technology of P2P Media Streaming. J. Networks 6(8): 1195-1205 (2011) - [j23]Fei Yu, Yiqin Lu, Jian Shu, Guangxue Yue, Chin-Chen Chang:
Guest Editorial. J. Networks 6(10): 1387-1389 (2011) - [j22]Liping Zhao, Guangxue Yue, Degui Xiao, Xu Zhou, Xiang Yu, Fei Yu:
A Content-based Classified Hierarchical Vector Quantization Algorithm for Volume Compression. J. Softw. 6(2): 322-330 (2011) - [j21]Xixiang Zhang, Guangxue Yue, Xiajie Zheng, Fei Yu:
Assigning Method for Decision Power Based on Linguisitc 2-tuple Judgment Matrices. J. Softw. 6(3): 508-515 (2011) - [j20]Fang Zhou, Guangxue Yue, Jianguo Jiang, Peizhen Wang:
A Novel Intelligent Technique for Recognition of Coke Optical Texture. J. Softw. 6(8): 1476-1483 (2011) - [j19]Wenjuan Wang, Weihui Dai, Weidong Zhao, Tong Li, Guangxue Yue, Chen Xu:
Research on Mobile Agent System for Agile Supply Chain Management. J. Softw. 6(8): 1498-1505 (2011) - [j18]Weidong Zhao, Haifeng Wu, Weihui Dai, Wenjuan Wang, Guangxue Yue:
A Framework of Transferring Mobile Services with Agent Based Middleware. J. Softw. 6(8): 1578-1585 (2011) - 2010
- [j17]Wanmin Xiong, Guangxue Yue:
Almost periodic solutions for a class of fourth-order nonlinear differential equations with a deviating argument. Comput. Math. Appl. 60(5): 1184-1190 (2010) - [j16]Fei Yu, Chin-Chen Chang, Guangxue Yue, Jiexian Zeng, Wen Chen:
Guest Editorial. J. Comput. 5(4): 489-491 (2010) - [j15]Xixiang Zhang, Guangxue Yue, Xiaojing Liu, Fei Yu:
A New Judging and Revising Method for Ordinal Consistency of Fuzzy Judgment Matrix. J. Comput. 5(4): 573-580 (2010) - [j14]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Jun Zhang:
Guest Editorial. J. Multim. 5(3): 197-199 (2010) - [j13]Yiqin Lu, Guangxue Yue, Jiajin Wang:
Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation. J. Networks 5(5): 603-613 (2010) - [j12]Fei Yu, Chin-Chen Chang, Wen Chen, Jun Zhang, Guangxue Yue:
Guest Editorial. J. Networks 5(6): 631-633 (2010) - [j11]Fei Yu, Chin-Chen Chang, Jian Shu, Guiping Liao, Guangxue Yue:
Guest Editorial. J. Softw. 5(5): 455-457 (2010) - [j10]Xu Zhou, Guangxue Yue, ZhiBang Yang, Kenli Li:
A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing. J. Softw. 5(6): 662-670 (2010) - [j9]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Naiping Hu:
Guest Editorial. J. Softw. 5(9): 923-925 (2010) - [c20]Guangxue Yue, Xu Zhou, Kenli Li, Renfa Li, Liping Zhao, Xiang Yu:
A novel solution for the P2P network observer placement problem on DNA-based supercomputing. BIC-TA 2010: 185-189 - [c19]Xu Zhou, Guangxue Yue, Kenli Li, Xiang Yu, Renfa Li:
A novel and fast parallel solution for the vertex cover problem on DNA-based supercomputing. BIC-TA 2010: 190-194
2000 – 2009
- 2009
- [j8]Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue:
Editorial. J. Comput. 4(1): 1-2 (2009) - [j7]Xiaojun Jia, Guangxue Yue, Fang Mei:
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting. J. Comput. 4(1): 53-60 (2009) - [j6]Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, Guangxue Yue:
Editorial. J. Networks 4(4): 225-227 (2009) - [j5]Shigen Shen, Lihua Ye, Guangxue Yue, Fei Yu:
Research of Secure Intranet/Internet Access Platform Based on Ontology. J. Networks 4(10): 1009-1016 (2009) - [j4]Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue:
Editorial. J. Softw. 4(1): 1-2 (2009) - [j3]Jiexian Zeng, Fei Yu, Limin Sun, Mingwen Wang, Guangxue Yue:
Editorial. J. Softw. 4(4): 271-273 (2009) - 2008
- [j2]Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, Guangxue Yue:
Editorial. J. Commun. 3(7): 1-2 (2008) - [c18]Haiming Yin, Xiaoyan Lou, Mangxian Qiu, Guangxue Yue:
A Texture and Color Based Method for Color Image Segmentation. CW 2008: 714-717 - [c17]Yonggang Li, Haiming Yin, Meihong Shi, Guangxue Yue:
A Method of Color Image Segmentation Based on DPCNN. CW 2008: 725-729 - [c16]Shigen Shen, Guangxue Yue:
Unified Certificate Validation System DNS-OCSP. ISECS 2008: 394-397 - 2007
- [j1]Renfa Li, Yunlong Xie, Jigang Wen, Guangxue Yue:
EMMP: a highly efficient membership management protocol. Frontiers Comput. Sci. China 1(2): 208-212 (2007) - [c15]Zaimei Zhang, Renfa Li, Zhongsheng Li, Haiyan Zhang, Guangxue Yue:
An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea. FSKD (3) 2007: 119-123 - [c14]Fei Yu, Yue Shen, Guangxue Yue, Ronghui Wu, Cheng Xu:
Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. International Conference on Computational Science (3) 2007: 109-112 - [c13]Ken Chen, Guangxue Yue, Fei Yu, Yue Shen, Aiqing Zhu:
Research on Speech Emotion Recognition System in E-Learning. International Conference on Computational Science (3) 2007: 555-558 - [c12]Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu:
Research on Advanced Distributed Learning by Using SCORM. International Conference on Computational Science (3) 2007: 571-574 - [c11]Guangxue Yue, Fei Yu, Li-ping Chen, Yi-jun Chen:
An Access Control Model in Lager-Scale P2P File Sharing Systems. International Conference on Computational Science (4) 2007: 741-744 - [c10]Weifeng Du, Guangxue Yue, Cheng Xu:
A Brief Analysis about Boundary Region Partition Reduction Standard. IITA 2007: 34-37 - [c9]Lei Ding, Fei Yu, Guangxue Yue, Cheng Xu:
An Improved Algorithm of Pattern Matching for Information Security Audit System. IMECS 2007: 459-463 - 2006
- [c8]Guang Lu, Fei Yu, Guangxue Yue, Miaoliang Zhu:
Worm Intrusion Alarm Modeling Based on Network Traffic Character. IMSCCS (2) 2006: 142-147 - [c7]Bin Jiang, Da-fung Zhang, Chao Yang, Guangxue Yue, Fei Yu:
A Privacy Policy of P3P Based on Relational Database. IMSCCS (2) 2006: 510-515 - [c6]Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li:
Intrusion Detection Based on Fuzzy Neural Networks. ISNN (2) 2006: 231-239 - [c5]Cheng Xu, Fei Yu, Zhenghui Dai, Guangxue Yue, Renfa Li:
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor. SKG 2006: 27 - [c4]Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu:
Research on User Authentication for Grid Computing Security. SKG 2006: 72 - [c3]Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. SKG 2006: 74 - [c2]Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen:
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. SKG 2006: 75 - 2005
- [c1]Guangxue Yue, Renfa Li, Zude Zhou, Ronghui Wu:
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks. GCC 2005: 776-786
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint