default search action
Jiadai Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j24]Yawen Tan, Jiadai Wang, Jiajia Liu:
Strengthening network slicing for Industrial Internet with deep reinforcement learning. Digit. Commun. Networks 10(4): 863-872 (2024) - [j23]Jiadai Wang, Jingyi Li, Jiajia Liu:
Digital twin-assisted flexible slice admission control for 5G core network: A deep reinforcement learning approach. Future Gener. Comput. Syst. 153: 467-476 (2024) - [j22]Yawen Tan, Jiajia Liu, Jiadai Wang:
5G End-to-End Slice Embedding Based on Heterogeneous Graph Neural Network and Reinforcement Learning. IEEE Trans. Cogn. Commun. Netw. 10(3): 1119-1131 (2024) - [j21]Qiang Fu, Jiajia Liu, Jiadai Wang:
A Flexible Resource Allocation Scheme for NR V2X Based Vulnerable Road User Protection. IEEE Trans. Veh. Technol. 73(5): 6672-6686 (2024) - [j20]Jiadai Wang, Yuanhao Li, Jiajia Liu, Nei Kato:
Intelligent Network Slicing for B5G and 6G: Resource Allocation, Service Provisioning, and Security. IEEE Wirel. Commun. 31(3): 271-277 (2024) - 2023
- [j19]Hongzhi Guo, Xiaoyi Zhou, Jiadai Wang, Jiajia Liu, Abderrahim Benslimane:
Intelligent Task Offloading and Resource Allocation in Digital Twin Based Aerial Computing Networks. IEEE J. Sel. Areas Commun. 41(10): 3095-3110 (2023) - [j18]Shangwei Zhang, Jiajia Liu, Zhenjiang Shi, Jiadai Wang, Nei Kato:
Design and Optimization of RSMA for Coexisting HTC/MTC in 6G and Future Networks. IEEE Trans. Wirel. Commun. 22(12): 9533-9548 (2023) - [j17]Huimin Chen, Jiajia Liu, Jiadai Wang, Yijie Xun:
Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures. Veh. Commun. 39: 100548 (2023) - [j16]Jiadai Wang, Jiajia Liu, Jingyi Li, Nei Kato:
Artificial Intelligence-Assisted Network Slicing: Network Assurance and Service Provisioning in 6G. IEEE Veh. Technol. Mag. 18(1): 49-58 (2023) - 2022
- [j15]Jiadai Wang, Jiajia Liu:
Location Hijacking Attack in Software-Defined Space-Air-Ground-Integrated Vehicular Network. IEEE Internet Things J. 9(8): 5971-5981 (2022) - [j14]Jiadai Wang, Jiajia Liu:
Deep Learning for Securing Software-Defined Industrial Internet of Things: Attacks and Countermeasures. IEEE Internet Things J. 9(13): 11179-11189 (2022) - [j13]Yawen Tan, Jiadai Wang, Jiajia Liu, Nei Kato:
Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles. IEEE Internet Things J. 9(18): 16928-16940 (2022) - [j12]Jiadai Wang, Jiajia Liu, Hongzhi Guo, Bomin Mao:
Deep Reinforcement Learning for Securing Software-Defined Industrial Networks With Distributed Control Plane. IEEE Trans. Ind. Informatics 18(6): 4275-4285 (2022) - [j11]Yawen Tan, Jiajia Liu, Jiadai Wang:
How to Protect Key Drones in Unmanned Aerial Vehicle Networks? An SDN-Based Topology Deception Scheme. IEEE Trans. Veh. Technol. 71(12): 13320-13331 (2022) - [j10]Jiadai Wang, Jiajia Liu:
Secure and Reliable Slicing in 5G and Beyond Vehicular Networks. IEEE Wirel. Commun. 29(1): 126-133 (2022) - 2021
- [j9]Jiadai Wang, Lei Zhao, Jiajia Liu, Nei Kato:
Smart Resource Allocation for Mobile Edge Computing: A Deep Reinforcement Learning Approach. IEEE Trans. Emerg. Top. Comput. 9(3): 1529-1541 (2021) - 2020
- [j8]Yuanyuan Sun, Jiajia Liu, Jiadai Wang, Yurui Cao, Nei Kato:
When Machine Learning Meets Privacy in 6G: A Survey. IEEE Commun. Surv. Tutorials 22(4): 2694-2724 (2020) - [j7]Qian Luo, Jiajia Liu, Jiadai Wang, Yawen Tan, Yurui Cao, Nei Kato:
Automatic Content Inspection and Forensics for Children Android Apps. IEEE Internet Things J. 7(8): 7123-7134 (2020) - [j6]Jiadai Wang, Yawen Tan, Jiajia Liu, Yanning Zhang:
Topology Poisoning Attack in SDN-Enabled Vehicular Edge Network. IEEE Internet Things J. 7(10): 9563-9574 (2020) - [j5]Yawen Tan, Jiadai Wang, Jiajia Liu, Yanning Zhang:
Unmanned Systems Security: Models, Challenges, and Future Directions. IEEE Netw. 34(4): 291-297 (2020) - 2019
- [j4]Lei Zhao, Jiadai Wang, Jiajia Liu, Nei Kato:
Routing for Crowd Management in Smart Cities: A Deep Reinforcement Learning Perspective. IEEE Commun. Mag. 57(4): 88-93 (2019) - [j3]Jiadai Wang, Jiajia Liu, Nei Kato:
Networking and Communications in Autonomous Driving: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1243-1274 (2019) - [j2]Jing Ning, Jiadai Wang, Jiajia Liu, Nei Kato:
Attacker Identification and Intrusion Detection for In-Vehicle Networks. IEEE Commun. Lett. 23(11): 1927-1930 (2019) - [j1]Lei Zhao, Jiadai Wang, Jiajia Liu, Nei Kato:
Optimal Edge Resource Allocation in IoT-Based Smart Cities. IEEE Netw. 33(2): 30-35 (2019)
Conference and Workshop Papers
- 2024
- [c15]Qiang Fu, Jiajia Liu, Jiadai Wang:
Toward Optimizing Delivery Probability in NR Sidelink by MCS Selection. VTC Spring 2024: 1-5 - [c14]Yawen Tan, Jiadai Wang, Jiajia Liu:
Zoom-inRCL: Root Cause Localization at Virtualized Infrastructure Layer for B5G/6G Network Slicing. VTC Spring 2024: 1-5 - [c13]Qiang Fu, Jiajia Liu, Jiadai Wang, Junhua Mat:
Security-Reliability Tradeoff for Hybrid Automatic Repeat Request-Assisted NR V2X Communication. WCNC 2024: 1-6 - 2023
- [c12]Yuanyuan Sun, Zhenjiang Shi, Jiadai Wang, Jiajia Liu:
MADRL-Enhanced Secure RAN Slicing in 5G and Beyond Multi-Cell Uplink Communication Systems. GLOBECOM 2023: 2439-2444 - [c11]Yuanhao Li, Jiadai Wang, Jiajia Liu:
Reinforcement Learning-based Dynamic Admission Control with Resource Recycling for 5G Core Network Slicing. GLOBECOM 2023: 2961-2966 - [c10]Jingyi Li, Jiadai Wang, Jiajia Liu:
Joint Optimization for Intelligent Reflecting Surface Enabled Backscatter Communication System. GLOBECOM 2023: 7067-7072 - [c9]Yurui Cao, Jiadai Wang, Jiajia Liu:
Double-IRS Assisted Proactive Eavesdropping with Cooperative Reflecting and Backscatter. ICC 2023: 1917-1921 - [c8]Yawen Tan, Jiadai Wang, Jiajia Liu:
Virtual Network Embedding with Changeable Action Space: An Approach Based on Graph Neural Network and Reinforcement Learning. ICC 2023: 3646-3651 - [c7]Qiang Fu, Jiajia Liu, Jiadai Wang:
Stochastic Geometric Performance Analysis for NR Sidelink Multi-Hop Relay. ICC 2023: 5390-5395 - [c6]Yawen Tan, Jiadai Wang, Jiajia Liu, Yuanhao Li:
Deep Learning-Based Log Anomaly Detection for 5G Core Network. ICCC 2023: 1-6 - [c5]Chaochao Xing, Jiadai Wang, Jiajia Liu:
Intelligent Preamble Allocation for 5G RAN Slicing: A Hierarchical Reinforcement Learning Based Approach. ICCT 2023: 1285-1290 - [c4]Qiang Fu, Jiajia Liu, Jiadai Wang:
Per-Zone Resource Reuse for NR Sidelink Based Vulnerable Road User Protection. IWCMC 2023: 745-750 - 2022
- [c3]Jingyi Li, Jiadai Wang:
Joint Optimization in UAV-ground Communications Empowered by Multiple Aerial RISs. HPSR 2022: 101-106 - 2020
- [c2]Jiadai Wang, Yawen Tan, Jiajia Liu:
Topology Poisoning Attacks and Countermeasures in SDN-enabled Vehicular Networks. GLOBECOM 2020: 1-6 - [c1]Zepeng Zhu, Jiajia Liu, Jiadai Wang, Nei Kato:
Edge-Cloud Based Vehicle SLAM for Autonomous Indoor Map Updating. VTC Fall 2020: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint