default search action
Weili Wang 0001
Person information
- affiliation: Chongqing University of Posts and Telecommunications, Key Laboratory of Mobile Communication, China
Other persons with the same name
- Weili Wang — disambiguation page
- Weili Wang 0002 — Shanghai Maritime University, Logistics Research Center, China (and 1 more)
- Weili Wang 0003 — South China Agricultural University, College of Mathematics and Informatics, Guangzhou, China
- Weili Wang 0004 — North University of China, School of Instrument and Electronics, Taiyuan, China
- Weili Wang 0005 — Southern University of Science and Technology, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Weili Wang, Lun Tang, Tong Liu, Xiaoqiang He, Chengchao Liang, Qianbin Chen:
Toward Reliability-Enhanced, Delay-Guaranteed Dynamic Network Slicing: A Multiagent DQN Approach With an Action Space Reduction Strategy. IEEE Internet Things J. 11(6): 9282-9297 (2024) - [j12]Weili Wang, Omid Abbasi, Halim Yanikomeroglu, Chengchao Liang, Lun Tang, Qianbin Chen:
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT. IEEE Netw. 38(6): 170-177 (2024) - [j11]Weili Wang, Omid Abbasi, Halim Yanikomeroglu, Chengchao Liang, Lun Tang, Qianbin Chen:
A Vertical Heterogeneous Network (VHetNet)-Enabled Asynchronous Federated Learning-Based Anomaly Detection Framework for Ubiquitous IoT. IEEE Open J. Commun. Soc. 5: 332-348 (2024) - 2023
- [j10]Xiaoqiang He, Qianbin Chen, Lun Tang, Weili Wang, Tong Liu:
CGAN-Based Collaborative Intrusion Detection for UAV Networks: A Blockchain-Empowered Distributed Federated Learning Approach. IEEE Internet Things J. 10(1): 120-132 (2023) - [j9]Xiaoqiang He, Qianbin Chen, Lun Tang, Weili Wang, Tong Liu, Li Li, Qinghai Liu, Jia Luo:
Federated Continuous Learning Based on Stacked Broad Learning System Assisted by Digital Twin Networks: An Incremental Learning Approach for Intrusion Detection in UAV Networks. IEEE Internet Things J. 10(22): 19825-19838 (2023) - [j8]Weili Wang, Chengchao Liang, Lun Tang, Halim Yanikomeroglu, Qianbin Chen:
Federated Multi-Discriminator BiWGAN-GP based Collaborative Anomaly Detection for Virtualized Network Slicing. IEEE Trans. Mob. Comput. 22(11): 6445-6459 (2023) - [c4]Xiaoqiang He, Qianbin Chen, Weili Wang, Tong Li, Li Li, Lun Tang, Qinghai Liu:
Stacked Broad Learning System Empowered FCL Assisted by DTN for Intrusion Detection in UAV Networks. GLOBECOM 2023: 5372-5377 - [i4]Weili Wang, Omid Abbasi, Halim Yanikomeroglu, Chengchao Liang, Lun Tang, Qianbin Chen:
A VHetNet-Enabled Asynchronous Federated Learning-Based Anomaly Detection Framework for Ubiquitous IoT. CoRR abs/2303.02948 (2023) - 2022
- [j7]Tong Liu, Lun Tang, Weili Wang, Qianbin Chen, Xiaoping Zeng:
Digital-Twin-Assisted Task Offloading Based on Edge Collaboration in the Digital Twin Edge Network. IEEE Internet Things J. 9(2): 1427-1444 (2022) - [j6]Tong Liu, Lun Tang, Weili Wang, Xiaoqiang He, Qianbin Chen, Xiaoping Zeng, Haitao Jiang:
Resource Allocation in DT-Assisted Internet of Vehicles via Edge Intelligent Cooperation. IEEE Internet Things J. 9(18): 17608-17626 (2022) - [j5]Weili Wang, Lun Tang, Chenmeng Wang, Qianbin Chen:
Real-Time Analysis of Multiple Root Causes for Anomalies Assisted by Digital Twin in NFV Environment. IEEE Trans. Netw. Serv. Manag. 19(2): 905-921 (2022) - [j4]Weili Wang, Chengchao Liang, Qianbin Chen, Lun Tang, Halim Yanikomeroglu, Tong Liu:
Distributed Online Anomaly Detection for Virtualized Network Slicing Environment. IEEE Trans. Veh. Technol. 71(11): 12235-12249 (2022) - [i3]Weili Wang, Chengchao Liang, Qianbin Chen, Lun Tang, Halim Yanikomeroglu:
Distributed Online Anomaly Detection for Virtualized Network Slicing Environment. CoRR abs/2201.01900 (2022) - [i2]Weili Wang, Chengchao Liang, Lun Tang, Halim Yanikomeroglu, Qianbin Chen:
Federated Multi-Discriminator BiWGAN-GP based Collaborative Anomaly Detection for Virtualized Network Slicing. CoRR abs/2208.07985 (2022) - [i1]Weili Wang, Omid Abbasi, Halim Yanikomeroglu, Chengchao Liang, Lun Tang, Qianbin Chen:
VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT. CoRR abs/2210.08132 (2022) - 2021
- [c3]Tong Liu, Lun Tang, Weili Wang, Xiaoqiang He, Qianbin Chen:
Resource Allocation via Edge Cooperation in Digital Twin Assisted Internet of Vehicle. GLOBECOM 2021: 1-6 - [c2]Weili Wang, Qianbin Chen, Tong Liu, Xiaoqiang He, Lun Tang:
A Distributed Online Learning Approach to Detect Anomalies for Virtualized Network Slicing. GLOBECOM 2021: 1-6 - [c1]Weili Wang, Qianbin Chen, Tong Liu, Lun Tang:
Digital-Twin assisted Root Cause Analysis of Anomalies in NFV Environment. ICC 2021: 1-6
2010 – 2019
- 2019
- [j3]Weili Wang, Qianbin Chen, Xiaoqiang He, Lun Tang:
Cooperative Anomaly Detection With Transfer Learning-Based Hidden Markov Model in Virtualized Network Slicing. IEEE Commun. Lett. 23(9): 1534-1537 (2019) - 2018
- [j2]Lun Tang, Weili Wang, Qianbin Chen:
Energy-Saving Oriented On/Off Strategies in Heterogeneous Networks : an Asynchronous Approach with Dynamic Traffic Variations. KSII Trans. Internet Inf. Syst. 12(11): 5449-5464 (2018) - 2017
- [j1]Lun Tang, Weili Wang, Yang Wang, Qianbin Chen:
An Energy-Saving Algorithm With Joint User Association, Clustering, and On/Off Strategies in Dense Heterogeneous Networks. IEEE Access 5: 12988-13000 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint