<?xml version="1.0"?>
<dblpperson name="Wei Yu 0003" pid="82/2790-3" n="35">
<person key="homepages/82/2790-3" mdate="2016-04-13">
<author pid="82/2790-3">Wei Yu 0003</author>
<url>https://www.linkedin.com/in/weiyu77</url>
<note type="affiliation">Microsoft Corporation, Redmond, USA</note>
<note type="affiliation">University of Maryland, College Park</note>
</person>
<homonyms n="28">
<h f="y/Yu:Wei"><person publtype="disambiguation" key="homepages/82/2790" mdate="2018-01-11">
<author pid="82/2790">Wei Yu</author>
</person>
</h>
<h f="y/Yu_0001:Wei"><person key="homepages/82/2790-1" mdate="2025-06-07">
<author pid="82/2790-1">Wei Yu 0001</author>
<url>http://www.comm.toronto.edu/~weiyu/</url>
<url>https://scholar.google.com/citations?user=agJYLEQAAAAJ</url>
<url>https://en.wikipedia.org/wiki/Wei_Yu</url>
<url>https://orcid.org/0000-0002-7453-422X</url>
<url>https://www.wikidata.org/entity/Q29359829</url>
<note type="affiliation">University of Toronto, Department of Electrical and Computer Engineering, ON, Canada</note>
<note label="PhD 2002" type="affiliation">Stanford University, Electrical Engineering Department, CA, USA</note>
</person>
</h>
<h f="y/Yu_0002:Wei"><person key="homepages/82/2790-2" mdate="2025-01-10">
<author pid="82/2790-2">Wei Yu 0002</author>
<note type="affiliation">Towson University, Department of Computer &#38; Information Sciences</note>
<note type="affiliation">Texas A&#38;M University, College Station, Department of Computer Science</note>
<url>http://pages.towson.edu/wyu/</url>
<url>https://orcid.org/0000-0003-4522-7340</url>
<url>https://ieeexplore.ieee.org/author/37279841200</url>
<url>https://www.wikidata.org/entity/Q131116919</url>
</person>
</h>
<h f="y/Yu_0004:Wei"><person key="homepages/82/2790-4" mdate="2025-01-10">
<author pid="82/2790-4">Wei Yu 0004</author>
<note type="affiliation">Harbin Institute of Technology, School of Computer Science and Technology, China</note>
<url>https://orcid.org/0000-0002-4805-3115</url>
<url>https://www.wikidata.org/entity/Q130811932</url>
</person>
</h>
<h f="y/Yu_0005:Wei"><person key="homepages/82/2790-5" mdate="2016-04-13">
<author pid="82/2790-5">Wei Yu 0005</author>
<url>https://www.linkedin.com/in/wei-yu-a5631a12</url>
<note type="affiliation">Citadel Investment Group, Chicago, USA</note>
<note type="affiliation">Carnegie Mellon University, Pittsburgh, Department of Electrical and Computer Engineering</note>
</person>
</h>
<h f="y/Yu_0006:Wei"><person key="homepages/82/2790-6" mdate="2016-04-13">
<author pid="82/2790-6">Wei Yu 0006</author>
<note type="affiliation">Centers for Disease Control and Prevention, Atlanta, USA</note>
</person>
</h>
<h f="y/Yu_0007:Wei"><person key="homepages/82/2790-7" mdate="2016-04-13">
<author pid="82/2790-7">Wei Yu 0007</author>
<url>http://www.weiyu.org/</url>
<url>http://itcs.tsinghua.edu.cn/weiyu/</url>
<note type="affiliation">Tsinghua University, National Laboratory for Information Science and Technology</note>
<note type="affiliation">Aarhus University, Center for the Theory of Interactive Computation</note>
<note type="affiliation">Tsinghua University, Institute for Theoretical Computer Science</note>
</person>
</h>
<h f="y/Yu_0008:Wei"><person key="homepages/82/2790-8" mdate="2022-09-12">
<author pid="82/2790-8">Wei Yu 0008</author>
<note type="affiliation">Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China</note>
<note type="affiliation">University of Science and Technology of China, Hefei</note>
<url>https://orcid.org/0000-0002-9015-9351</url>
</person>
</h>
<h f="y/Yu_0009:Wei"><person key="homepages/82/2790-9" mdate="2025-03-04">
<author pid="82/2790-9">Wei Yu 0009</author>
<note type="affiliation">Wuhan University, Computer School, China</note>
<url>https://orcid.org/0009-0003-3564-4965</url>
<url type="deprecated">https://orcid.org/0000-0003-0815-1818</url>
</person>
</h>
<h f="y/Yu_0010:Wei"><person key="homepages/82/2790-10" mdate="2016-04-13">
<author pid="82/2790-10">Wei Yu 0010</author>
<note type="affiliation">Zhijiang University, Hangzhou, China</note>
</person>
</h>
<h f="y/Yu_0011:Wei"><person key="homepages/82/2790-11" mdate="2021-04-30">
<author pid="82/2790-11">Wei Yu 0011</author>
<note type="affiliation">East China University of Science and Technology, Shanghai, China</note>
<url>https://orcid.org/0000-0002-6127-1264</url>
</person>
</h>
<h f="y/Yu_0012:Wei"><person key="homepages/82/2790-12" mdate="2017-02-16">
<author pid="82/2790-12">Wei Yu 0012</author>
<note type="affiliation">Xiamen University, China</note>
</person>
</h>
<h f="y/Yu_0013:Wei"><person key="homepages/82/2790-13" mdate="2017-02-16">
<author pid="82/2790-13">Wei Yu 0013</author>
<note type="affiliation">Earth Resources Technology, Inc., Laurel, MD, USA</note>
</person>
</h>
<h f="y/Yu_0014:Wei"><person key="homepages/82/2790-14" mdate="2017-04-05">
<author pid="82/2790-14">Wei Yu 0014</author>
<note type="affiliation">Graz University of Technology, Austria</note>
</person>
</h>
<h f="y/Yu_0015:Wei"><person key="homepages/82/2790-15" mdate="2020-08-31">
<author pid="82/2790-15">Wei Yu 0015</author>
<note type="affiliation">Nanjing Forestry University, College of Automobile and Transport Engineering, China</note>
<url>https://orcid.org/0000-0003-2610-8952</url>
<url>https://www.wikidata.org/entity/Q98618459</url>
</person>
</h>
<h f="y/Yu_0016:Wei"><person key="homepages/82/2790-16" mdate="2018-02-22">
<author pid="82/2790-16">Wei Yu 0016</author>
<note type="affiliation">Tianjin University, School of Computer Science and Technology, China</note>
<url>https://orcid.org/0000-0003-3459-3695</url>
</person>
</h>
<h f="y/Yu_0017:Wei"><person key="homepages/82/2790-17" mdate="2018-09-25">
<author pid="82/2790-17">Wei Yu 0017</author>
<note type="affiliation">Nantong University, School of Electronics and Information / Engineering Training Center, China</note>
<url>https://orcid.org/0000-0001-8922-6783</url>
</person>
</h>
<h f="y/Yu_0018:Wei"><person key="homepages/82/2790-18" mdate="2025-05-09">
<author pid="82/2790-18">Wei Yu 0018</author>
<note type="affiliation">China University of Geosciences, School of Automation, Wuhan, China</note>
<note label="former" type="affiliation">Wuhan University, Electronic Information School, China</note>
</person>
</h>
<h f="y/Yu_0019:Wei"><person key="homepages/82/2790-19" mdate="2025-08-18">
<author pid="82/2790-19">Wei Yu 0019</author>
<url>https://orcid.org/0000-0002-2718-532X</url>
<note type="affiliation">Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China</note>
</person>
</h>
<h f="y/Yu_0020:Wei"><person key="homepages/82/2790-20" mdate="2025-08-18">
<author pid="82/2790-20">Wei Yu 0020</author>
<url>https://orcid.org/0000-0002-3135-0148</url>
<note type="affiliation">Shanghai Jiao Tong University, Shanghai, China</note>
</person>
</h>
<h f="y/Yu_0021:Wei"><person key="homepages/82/2790-21" mdate="2025-08-18">
<author pid="82/2790-21">Wei Yu 0021</author>
<url>https://orcid.org/0000-0003-1933-5380</url>
<note type="affiliation">Nanjing University, Qixia, Nanjing, China</note>
</person>
</h>
<h f="y/Yu_0022:Wei"><person key="homepages/82/2790-22" mdate="2025-09-12">
<author pid="82/2790-22">Wei Yu 0022</author>
<note type="affiliation">Southwest Jiaotong University, Chengdu, China</note>
<url>https://orcid.org/0000-0001-6694-9655</url>
<url type="deprecated">https://orcid.org/0000-0001-6889-3229</url>
</person>
</h>
<h f="y/Yu_0024:Wei"><person key="homepages/82/2790-24" mdate="2025-08-18">
<author pid="82/2790-24">Wei Yu 0024</author>
<url>https://orcid.org/0000-0002-6882-0043</url>
<note type="affiliation">General Test Systems Inc., Shenzhen, China</note>
</person>
</h>
<h f="y/Yu_0025:Wei"><person key="homepages/82/2790-25" mdate="2025-08-18">
<author pid="82/2790-25">Wei Yu 0025</author>
<url>https://orcid.org/0000-0002-7888-0576</url>
<note type="affiliation">Foshan University, Foshan, China</note>
</person>
</h>
<h f="y/Yu_0026:Wei"><person key="homepages/82/2790-26" mdate="2025-08-18">
<author pid="82/2790-26">Wei Yu 0026</author>
<url>https://orcid.org/0000-0002-9683-1209</url>
<note type="affiliation">Hubei University of Science and Technology, Xianning, China</note>
</person>
</h>
<h f="y/Yu_0027:Wei"><person key="homepages/82/2790-27" mdate="2025-08-18">
<author pid="82/2790-27">Wei Yu 0027</author>
<url>https://orcid.org/0000-0001-8111-7654</url>
<note type="affiliation">Chongqing University, Chongqing, China</note>
</person>
</h>
<h f="y/Yu_0028:Wei"><person key="homepages/82/2790-28" mdate="2025-10-05">
<author pid="82/2790-28">Wei Yu 0028</author>
<url>https://orcid.org/0000-0002-3380-0114</url>
<url>https://www.wikidata.org/entity/Q84421288</url>
<note type="affiliation">University of Auckland, Auckland, New Zealand</note>
</person>
</h>
<h f="y/Yu_0029:Wei"><person key="homepages/82/2790-29" mdate="2025-10-05">
<author pid="82/2790-29">Wei Yu 0029</author>
<url>https://orcid.org/0000-0002-6740-0485</url>
<url>https://www.wikidata.org/entity/Q130980786</url>
<note type="affiliation">National University of Defense Technology, China</note>
</person>
</h>
</homonyms>
<r><article key="journals/tmc/JiYL10" mdate="2017-05-28">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement.</title>
<pages>1242-1254</pages>
<year>2010</year>
<volume>9</volume>
<journal>IEEE Trans. Mob. Comput.</journal>
<number>9</number>
<ee>https://doi.org/10.1109/TMC.2010.87</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TMC.2010.87</ee>
<url>db/journals/tmc/tmc9.html#JiYL10</url>
</article>
</r>
<r><article key="journals/tosn/SadekYL09" mdate="2021-10-14">
<author orcid="0000-0002-1345-9633" pid="46/4583">Ahmed K. Sadek</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>On the energy efficiency of cooperative communications in wireless sensor networks.</title>
<year>2009</year>
<volume>6</volume>
<journal>ACM Trans. Sens. Networks</journal>
<number>1</number>
<ee>https://doi.org/10.1145/1653760.1653765</ee>
<url>db/journals/tosn/tosn6.html#SadekYL09</url>
<pages>5:1-5:21</pages>
</article>
</r>
<r><article key="journals/jsac/JiYL08" mdate="2020-04-02">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs.</title>
<pages>1204-1217</pages>
<year>2008</year>
<volume>26</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/JSAC.2008.080917</ee>
<url>db/journals/jsac/jsac26.html#JiYL08</url>
</article>
</r>
<r><article key="journals/tifs/YuL08" mdate="2020-08-06">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach.</title>
<pages>317-330</pages>
<year>2008</year>
<volume>3</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIFS.2008.922453</ee>
<url>db/journals/tifs/tifs3.html#YuL08</url>
</article>
</r>
<r><article key="journals/tdsc/YuSL07" mdate="2020-04-09">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="s/YanLindsaySun">Yan Sun 0001</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes.</title>
<pages>228-242</pages>
<year>2007</year>
<volume>4</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TDSC.2007.1006</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2007.1006</ee>
<url>db/journals/tdsc/tdsc4.html#YuSL07</url>
</article>
</r>
<r><article key="journals/tifs/YuL07" mdate="2020-08-06">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks.</title>
<pages>227-239</pages>
<year>2007</year>
<volume>2</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIFS.2007.897269</ee>
<url>db/journals/tifs/tifs2.html#YuL07</url>
</article>
</r>
<r><article key="journals/tifs/YuJL07" mdate="2020-08-06">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="39/1298">Zhu Ji</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis.</title>
<pages>240-253</pages>
<year>2007</year>
<volume>2</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIFS.2007.897270</ee>
<url>db/journals/tifs/tifs2.html#YuJL07</url>
</article>
</r>
<r><article key="journals/tmc/YuL07" mdate="2017-05-28">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks.</title>
<pages>507-521</pages>
<year>2007</year>
<volume>6</volume>
<journal>IEEE Trans. Mob. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TMC.2007.1026</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TMC.2007.1026</ee>
<url>db/journals/tmc/tmc6.html#YuL07</url>
</article>
</r>
<r><phdthesis key="phd/basesearch/Yu06" mdate="2022-05-04">
<author pid="82/2790-3">Wei Yu 0003</author>
<title>Securing Wireless Ad Hoc Networks under noise and Imperfect Monitoring.</title>
<year>2006</year>
<school>University of Maryland, College Park, MD, USA</school>
<ee>https://hdl.handle.net/1903/3769</ee>
<ee>https://www.base-search.net/Record/165368d0d1d42a0193593df05da5b6ddcf1d4b6a5415ffb2a1c25b34972efe8c</ee>
<note type="source">base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/3769)</note>
</phdthesis>
</r>
<r><article key="journals/jsac/SunYHL06" mdate="2022-01-05">
<author pid="s/YanLindsaySun">Yan Lindsay Sun</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="83/514">Zhu Han 0001</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Information theoretic framework of trust modeling and evaluation for ad hoc networks.</title>
<pages>305-317</pages>
<year>2006</year>
<volume>24</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/JSAC.2005.861389</ee>
<url>db/journals/jsac/jsac24.html#SunYHL06</url>
</article>
</r>
<r><article key="journals/tcsv/YuSF06" mdate="2020-08-25">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="44/1484">Fangting Sun</author>
<author pid="92/3416">Jason E. Fritts</author>
<title>Efficient rate control for JPEG-2000.</title>
<pages>577-589</pages>
<year>2006</year>
<volume>16</volume>
<journal>IEEE Trans. Circuits Syst. Video Technol.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TCSVT.2006.873161</ee>
<url>db/journals/tcsv/tcsv16.html#YuSF06</url>
</article>
</r>
<r><inproceedings key="conf/ciss/0003L06" mdate="2023-05-10">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">Kuo J. Ray Liu</author>
<title>On Optimal and Cheat-Proof Packets Forwarding Strategies in Autonomous Ad Hoc Networks.</title>
<pages>1455-1460</pages>
<year>2006</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2006.286694</ee>
<crossref>conf/ciss/2006</crossref>
<url>db/conf/ciss/ciss2006.html#0003L06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ciss/Sun00L06" mdate="2023-05-10">
<author pid="s/YanLindsaySun">Yan Lindsay Sun</author>
<author pid="83/514">Zhu Han 0001</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Attacks on Trust Evaluation in Distributed Networks.</title>
<pages>1461-1466</pages>
<year>2006</year>
<booktitle>CISS</booktitle>
<ee>https://doi.org/10.1109/CISS.2006.286695</ee>
<crossref>conf/ciss/2006</crossref>
<url>db/conf/ciss/ciss2006.html#Sun00L06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/JiYL06" mdate="2017-05-16">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks.</title>
<year>2006</year>
<crossref>conf/infocom/2006</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2006.112</ee>
<url>db/conf/infocom/infocom2006.html#JiYL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/SunHYL06" mdate="2022-01-05">
<author pid="s/YanLindsaySun">Yan Lindsay Sun</author>
<author pid="83/514">Zhu Han 0001</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.</title>
<year>2006</year>
<crossref>conf/infocom/2006</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2006.154</ee>
<url>db/conf/infocom/infocom2006.html#SunHYL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/SadekYL06" mdate="2021-10-14">
<author orcid="0000-0002-1345-9633" pid="46/4583">Ahmed K. Sadek</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>When Does Cooperation Have Better Performance in Sensor Networks?</title>
<pages>188-197</pages>
<year>2006</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2006.288423</ee>
<crossref>conf/secon/2006</crossref>
<url>db/conf/secon/secon2006.html#SadekYL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/TiYL06" mdate="2017-05-24">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Cooperation Enforcement in Autonomous MANETs under Noise and Imperfect Observation.</title>
<pages>460-468</pages>
<year>2006</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2006.288502</ee>
<crossref>conf/secon/2006</crossref>
<url>db/conf/secon/secon2006.html#TiYL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/JiYL06" mdate="2017-05-24">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Belief-based packet forwarding in self-organized mobile ad hoc networks with noise and imperfect observation.</title>
<pages>343-348</pages>
<year>2006</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2006.1683488</ee>
<crossref>conf/wcnc/2006</crossref>
<url>db/conf/wcnc/wcnc2006.html#JiYL06</url>
</inproceedings>
</r>
<r><article key="journals/jsac/YuL05" mdate="2020-04-02">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Attack-resistant cooperation stimulation in autonomous ad hoc networks.</title>
<pages>2260-2271</pages>
<year>2005</year>
<volume>23</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/JSAC.2005.857201</ee>
<url>db/journals/jsac/jsac23.html#YuL05</url>
</article>
</r>
<r><inproceedings key="conf/globecom/JiYL05" mdate="2017-05-23">
<author pid="39/1298">Zhu Ji</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>A dynamic pricing approach for self-organized mobile ad hoc networks.</title>
<pages>5</pages>
<year>2005</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2005.1577806</ee>
<crossref>conf/globecom/2005</crossref>
<url>db/conf/globecom/globecom2005.html#JiYL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/YuL05" mdate="2017-05-23">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Defense against injecting traffic attacks in cooperative ad hoc networks.</title>
<pages>5</pages>
<year>2005</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2005.1577947</ee>
<crossref>conf/globecom/2005</crossref>
<url>db/conf/globecom/globecom2005.html#YuL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/YuL05a" mdate="2017-05-23">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Anti-attack cooperation stimulation in self-organized ad hoc networks.</title>
<pages>5</pages>
<year>2005</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2005.1577948</ee>
<crossref>conf/globecom/2005</crossref>
<url>db/conf/globecom/globecom2005.html#YuL05a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/YuSL05" mdate="2017-10-05">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="s/YanLindsaySun">Yan Sun 0001</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Minimization of rekeying cost for contributory group communications.</title>
<pages>5</pages>
<year>2005</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2005.1577943</ee>
<crossref>conf/globecom/2005</crossref>
<url>db/conf/globecom/globecom2005.html#YuSL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/SunYHL05" mdate="2022-01-05">
<author pid="s/YanLindsaySun">Yan Sun 0001</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="83/514">Zhu Han 0001</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Trust modeling and evaluation in ad hoc networks.</title>
<pages>6</pages>
<year>2005</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2005.1577971</ee>
<crossref>conf/globecom/2005</crossref>
<url>db/conf/globecom/globecom2005.html#SunYHL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/YuSL05" mdate="2017-10-05">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="s/YanLindsaySun">Yan Sun 0001</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>HADOF: defense against routing disruptions in mobile ad hoc networks.</title>
<pages>1252-1261</pages>
<year>2005</year>
<crossref>conf/infocom/2005</crossref>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2005.1498351</ee>
<url>db/conf/infocom/infocom2005.html#YuSL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/YuL05" mdate="2017-05-24">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Secure cooperative mobile ad hoc networks against injecting traffic attacks.</title>
<pages>55-64</pages>
<year>2005</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2005.1557062</ee>
<crossref>conf/secon/2005</crossref>
<url>db/conf/secon/secon2005.html#YuL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secon/YuL05a" mdate="2017-05-24">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<title>Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks.</title>
<pages>65-75</pages>
<year>2005</year>
<booktitle>SECON</booktitle>
<ee>https://doi.org/10.1109/SAHCN.2005.1557063</ee>
<crossref>conf/secon/2005</crossref>
<url>db/conf/secon/secon2005.html#YuL05a</url>
</inproceedings>
</r>
<r><article key="journals/jal/SunFY04" mdate="2017-05-28">
<author pid="44/1484">Fangting Sun</author>
<author pid="62/3259">David Fern&#225;ndez-Baca</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<title>Inverse parametric sequence alignment.</title>
<pages>36-54</pages>
<year>2004</year>
<volume>53</volume>
<journal>J. Algorithms</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.jalgor.2004.04.008</ee>
<url>db/journals/jal/jal53.html#SunFY04</url>
</article>
</r>
<r><inproceedings key="conf/dcc/Yu04" mdate="2023-03-24">
<author pid="82/2790-3">Wei Yu 0003</author>
<title>Integrated Rate Control and Entropy Coding for JPEG 2000.</title>
<pages>152-161</pages>
<year>2004</year>
<crossref>conf/dcc/2004</crossref>
<booktitle>Data Compression Conference</booktitle>
<ee>https://doi.org/10.1109/DCC.2004.1281460</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DCC.2004.1281460</ee>
<url>db/conf/dcc/dcc2004.html#Yu04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dcc/SunY04" mdate="2023-03-24">
<author pid="44/1484">Fangting Sun</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<title>Optimal Buffer-Constrained Bit Allocation using Marginal Analysis.</title>
<pages>565</pages>
<year>2004</year>
<crossref>conf/dcc/2004</crossref>
<booktitle>Data Compression Conference</booktitle>
<ee>https://doi.org/10.1109/DCC.2004.1281541</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DCC.2004.1281541</ee>
<url>db/conf/dcc/dcc2004.html#SunY04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icassp/YuLS04" mdate="2020-06-22">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="68/3163">K. J. Ray Liu</author>
<author pid="63/5844">Zoltan Safar</author>
<title>Scalable cross-layer rate allocation for image transmission over heterogeneous wireless networks.</title>
<pages>593-596</pages>
<year>2004</year>
<booktitle>ICASSP (4)</booktitle>
<ee>https://doi.org/10.1109/ICASSP.2004.1326896</ee>
<crossref>conf/icassp/2004</crossref>
<url>db/conf/icassp/icassp2004.html#YuLS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cocoon/SunFY02" mdate="2017-05-23">
<author pid="44/1484">Fangting Sun</author>
<author pid="62/3259">David Fern&#225;ndez-Baca</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<title>Inverse Parametric Sequence Alignment.</title>
<pages>97-106</pages>
<year>2002</year>
<crossref>conf/cocoon/2002</crossref>
<booktitle>COCOON</booktitle>
<ee>https://doi.org/10.1007/3-540-45655-4_12</ee>
<url>db/conf/cocoon/cocoon2002.html#SunFY02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icmcs/YuFS02" mdate="2023-03-24">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="92/3416">Jason E. Fritts</author>
<author pid="44/1484">Fangting Sun</author>
<title>A hierarchical image segmentation algorithm.</title>
<pages>221-224</pages>
<year>2002</year>
<booktitle>ICME (2)</booktitle>
<ee>https://doi.org/10.1109/ICME.2002.1035554</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICME.2002.1035554</ee>
<crossref>conf/icmcs/2002-2</crossref>
<url>db/conf/icmcs/icme2002-2.html#YuFS02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icml/ZhangGYF02" mdate="2016-04-13">
<author pid="52/323">Qi Zhang</author>
<author pid="58/6348">Sally A. Goldman</author>
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="92/3416">Jason E. Fritts</author>
<title>Content-Based Image Retrieval Using Multiple-Instance Learning.</title>
<pages>682-689</pages>
<year>2002</year>
<crossref>conf/icml/2002</crossref>
<booktitle>ICML</booktitle>
<url>db/conf/icml/icml2002.html#ZhangGYF02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vcip/YuQF02" mdate="2016-04-13">
<author pid="82/2790-3">Wei Yu 0003</author>
<author pid="90/1805">Ruibiao Qiu</author>
<author pid="92/3416">Jason E. Fritts</author>
<title>Advantages of motion-JPEG2000 in video processing.</title>
<pages>635-645</pages>
<year>2002</year>
<crossref>conf/vcip/2002</crossref>
<booktitle>VCIP</booktitle>
<url>db/conf/vcip/vcip2002.html#YuQF02</url>
</inproceedings>
</r>
<coauthors n="12" nc="1">
<co c="0"><na f="f/Fern=aacute=ndez=Baca:David" pid="62/3259">David Fern&#225;ndez-Baca</na></co>
<co c="0"><na f="f/Fritts:Jason_E=" pid="92/3416">Jason E. Fritts</na></co>
<co c="0"><na f="g/Goldman:Sally_A=" pid="58/6348">Sally A. Goldman</na></co>
<co c="0"><na f="h/Han_0001:Zhu" pid="83/514">Zhu Han 0001</na></co>
<co c="0"><na f="j/Ji:Zhu" pid="39/1298">Zhu Ji</na></co>
<co c="0" n="2"><na f="l/Liu:K=_J=_Ray" pid="68/3163">K. J. Ray Liu</na><na>Kuo J. Ray Liu</na></co>
<co c="0"><na f="q/Qiu:Ruibiao" pid="90/1805">Ruibiao Qiu</na></co>
<co c="0"><na f="s/Sadek:Ahmed_K=" pid="46/4583">Ahmed K. Sadek</na></co>
<co c="0"><na f="s/Safar:Zoltan" pid="63/5844">Zoltan Safar</na></co>
<co c="0"><na f="s/Sun:Fangting" pid="44/1484">Fangting Sun</na></co>
<co c="0" n="2"><na f="s/Sun:Yan_Lindsay" pid="s/YanLindsaySun">Yan Lindsay Sun</na><na>Yan Sun 0001</na></co>
<co c="0"><na f="z/Zhang:Qi" pid="52/323">Qi Zhang</na></co>
</coauthors>
</dblpperson>

