Weijia Jia
Weijia Jia
FIEEE, Chair Professor, Beijing Normal University and UIC
Verified email at - Homepage
Cited by
Cited by
Vertex cover: further observations and further improvements
J Chen, IA Kanj, W Jia
Journal of Algorithms 41 (2), 280-301, 2001
Novel p–n heterojunction photocatalyst constructed by porous graphite-like C 3 N 4 and nanostructured BiOI: facile synthesis and enhanced photocatalytic activity
D Jiang, L Chen, J Zhu, M Chen, W Shi, J Xie
Dalton Transactions 42 (44), 15726-15734, 2013
Rendezvous design algorithms for wireless sensor networks with a mobile base station
G Xing, T Wang, W Jia, M Li
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
Influence analysis in social networks: A survey
S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia
Journal of Network and Computer Applications 106, 17-32, 2018
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
Rendezvous planning in wireless sensor networks with mobile elements
G Xing, T Wang, Z Xie, W Jia
IEEE Transactions on Mobile Computing 7 (12), 1430-1443, 2008
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
Migration modeling and learning algorithms for containers in fog computing
Z Tang, X Zhou, F Zhang, W Jia, W Zhao
IEEE Transactions on Services Computing 12 (5), 712-725, 2018
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
B Han, W Jia, L Lin
Computer Communications 30 (4), 782-792, 2007
Complete optimal deployment patterns for full-coverage and k-connectivity (k≤ 6) wireless sensor networks
X Bai, D Xuan, Z Yun, TH Lai, W Jia
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things
T Wang, H Luo, W Jia, A Liu, M Xie
IEEE Transactions on Industrial Informatics 16 (3), 2054-2062, 2019
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
Optimal Deployment Patterns for Full Coverage and-ConnectivityWireless Sensor Networks
Z Yun, X Bai, D Xuan, TH Lai, W Jia
IEEE/ACM transactions on networking 18 (3), 934-947, 2010
Fog-based computing and storage offloading for data synchronization in IoT
T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia
IEEE Internet of Things Journal 6 (3), 4272-4282, 2018
A novel trust mechanism based on fog computing in sensor–cloud system
T Wang, G Zhang, MZA Bhuiyan, A Liu, W Jia, M Xie
Future Generation Computer Systems 109, 573-582, 2020
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
Deploying four-connectivity and full-coverage wireless sensor networks
X Bai, Z Yun, D Xuan, T Lai, W Jia
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 296-300, 2008
VC-MAC: A cooperative MAC protocol in vehicular networks
J Zhang, Q Zhang, W Jia
IEEE Transactions on Vehicular Technology 58 (3), 1561-1571, 2008
A routing protocol for anycast messages
D Xuan, W Jia, W Zhao, H Zhu
IEEE Transactions on Parallel and Distributed Systems 11 (6), 571-588, 2000
Legal judgment prediction via multi-perspective bi-feedback network
W Yang, W Jia, X Zhou, Y Luo
arXiv preprint arXiv:1905.03969, 2019
The system can't perform the operation now. Try again later.
Articles 1–20