scispace - formally typeset
W

Wei Yu

Researcher at University of Maryland, College Park

Publications -  36
Citations -  2247

Wei Yu is an academic researcher from University of Maryland, College Park. The author has contributed to research in topics: Wireless ad hoc network & Mobile ad hoc network. The author has an hindex of 18, co-authored 36 publications receiving 2203 citations. Previous affiliations of Wei Yu include Microsoft & University of Washington.

Papers
More filters
Journal ArticleDOI

Information theoretic framework of trust modeling and evaluation for ad hoc networks

TL;DR: Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Proceedings ArticleDOI

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

TL;DR: Simulations show that the proposed framework to quantitatively measure trust, model trust propagation, and defend trust evaluation systems against malicious attacks can significantly improve network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Proceedings Article

Content-Based Image Retrieval Using Multiple-Instance Learning

TL;DR: The multiple-instance (MI) learning model is applied to use a small number of training images to learn what images from the database are of interest to the user.
Journal ArticleDOI

On the energy efficiency of cooperative communications in wireless sensor networks

TL;DR: An analytical framework for studying the energy efficiency trade-off of cooperation in sensor networks is presented and it is revealed that for small distance separation between the source and destination, direct transmission is more energy efficient than relaying.
Journal ArticleDOI

Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks

TL;DR: A joint analysis of cooperation stimulation and security in autonomous mobile ad hoc networks under a game theoretic framework and derives a set of reputation-based cheat-proof and attack-resistant cooperation stimulation strategies.