


default search action
Wei An 0002
Person information
- affiliation: Key Laboratory of Cyberspace Security Defense, IIE, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Wei An — disambiguation page
- Wei An 0001
— Massachusetts Institute of Technology, Cambridge, MA, USA - Wei An 0003
— National University of Defense Technology (NUDT), Changsha, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[c20]Wei An
, Yanni Han, Ying Ding, Haiyong Xu, Jibin Wang, Xin Wang, Bo An:
mQUIET: Maximum Quantum Communication Network Transmission Under Reliability Constraint. WCNC 2024: 1-6- 2021
[c19]Xiaoxue Ge, Liming Wang, Wei An, Xiaojun Zhou, Benyu Li:
CRchain: An Efficient Certificate Revocation Scheme Based on Blockchain. ICA3PP (2) 2021: 453-472
2010 – 2019
- 2019
[c18]Faqiang Liu, Peng Li, Shengxiang Gao, Xin Wan, Wei An
:
Optimized Service Function Path Scaling in SDN/NFV Networks. ICSCC 2019: 27-32
[c17]Yongming Ben, Yanni Han, Ning Cai, Wei An
, Zhen Xu:
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel. MILCOM 2019: 1-6
[c16]Ning Cai, Yanni Han, Yongming Ben, Wei An
, Zhen Xu:
An Effective Load Balanced Controller Placement Approach in Software-Defined WANs. MILCOM 2019: 361-366- 2018
[j18]Hanning Yuan, Yanni Han
, Ning Cai, Wei An
:
A Multi-Granularity Backbone Network Extraction Method Based on the Topology Potential. Complex. 2018: 8604132:1-8604132:8 (2018)
[j17]Jingjing Zhuge, Jiajun Lin, Wei An
:
Automatic colorization using fully convolutional networks. J. Electronic Imaging 27(04): 043025 (2018)
[j16]Ming Huang
, Jiajun Lin, Ning Chen, Wei An
, WeiJian Zhu
:
Reversed Sketch: A scalable and comparable shape representation. Pattern Recognit. 80: 168-182 (2018)
[c15]Yuan Wang, Liming Wang, Zhen Xu, Wei An:
Understanding User Behavior in Online Banking System. Inscrypt 2018: 637-646
[c14]Xi Luo, Liming Wang, Zhen Xu, Wei An:
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. ICICS 2018: 41-56
[c13]Yongming Ben, Yanni Han, Ning Cai, Wei An
, Zhen Xu:
T-Tracker: Compressing System Audit Log by Taint Tracking. ICPADS 2018: 587-595- 2017
[j15]Jiuyue Cao, Yan Zhang, Wei An
, Xin Chen, Jiyan Sun, Yanni Han:
VNF-FG design and VNF placement for 5G mobile networks. Sci. China Inf. Sci. 60(4): 40302 (2017)
[c12]Faqiang Liu, Xin Chen, Wei An
, Yong Peng, Jiuyue Cao, Yan Zhang:
Multiple service function chaining under load balance in SDN/NFV networks. PIMRC 2017: 1-6
[c11]Faqiang Liu, Xin Chen, Wei An
, Yong Peng, Jiuyue Cao, Yan Zhang:
Minimizing transmission cost for multiple service function chains in SDN/NFV networks. PIMRC 2017: 1-6- 2016
[j14]Chaowei Tang, Qian Tan, Yanni Han, Wei An, Haibo Li, Hui Tang:
An Energy Harvesting Aware Routing Algorithm for Hierarchical Clustering Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 10(2): 504-521 (2016)
[j13]Wei An
, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang, Ying Qi:
Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks. Secur. Commun. Networks 9(9): 862-873 (2016)
[j12]Zuyuan Zhang
, Wei An
, Fang-Ming Shao:
Cascading Failures on Reliability in Cyber-Physical System. IEEE Trans. Reliab. 65(4): 1745-1754 (2016)
[j11]Wei An
, Nan Qu, Fang-Ming Shao, Xiangjun Xiong, Song Ci:
Coverage hole problem under sensing topology in flat wireless sensor networks. Wirel. Commun. Mob. Comput. 16(5): 578-589 (2016)
[j10]Haiyan Luo, Wei An
, Song Ci, Dalei Wu
:
A distributed utility-based scheduling for peer-to-peer video streaming over wireless networks. Wirel. Commun. Mob. Comput. 16(12): 1556-1569 (2016)
[j9]Qian Tan, Wei An
, Yanni Han, Haiyan Luo, Yanwei Liu, Song Ci, Hui Tang:
Achieving energy-neutral data transmission by adjusting transmission power for energy-harvesting wireless sensor networks. Wirel. Commun. Mob. Comput. 16(14): 2083-2097 (2016)
[c10]Jiuyue Cao, Yan Zhang, Wei An
, Xin Chen, Yanni Han, Jiyan Sun:
VNF Placement in Hybrid NFV Environment: Modeling and Genetic Algorithms. ICPADS 2016: 769-777
[c9]Tao Lin, Hongjia Li, Haiyong Xie, Jiasi Chen
, Huajun Cui, Guoqiang Zhang, Wei An
, Yang Li:
Performance and Implications of RAN Caching in LTE Mobile Networks: A Real Traffic Analysis. SECON 2016: 1-9- 2015
[j8]Qian Tan, Wei An
, Yanni Han, Yanwei Liu, Song Ci, Fang-Ming Shao, Hui Tang:
Energy harvesting aware topology control with power adaptation in wireless sensor networks. Ad Hoc Networks 27: 44-56 (2015)
[j7]Shoushou Ren, Tao Lin, Wei An
, Guoqiang Zhang, Dalei Wu
, Laxmi Narayan Bhuyan, Zhen Xu:
Design and analysis of collaborative EPC and RAN caching for LTE mobile networks. Comput. Networks 93: 80-95 (2015)
[j6]Wei An
, Song Ci, Haiyan Luo, Dalei Wu
, Viacheslav I. Adamchuk
, Hamid Sharif, Xueyi Wang, Hui Tang:
Effective sensor deployment based on field information coverage in precision agriculture. Wirel. Commun. Mob. Comput. 15(12): 1606-1620 (2015)
[c8]Shoushou Ren, Tao Lin, Wei An
, Yang Li, Yu Zhang, Zhen Xu:
Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks. GLOBECOM 2015: 1-6
[c7]Yuemei Xu, Zihou Wang, Yang Li, Tao Lin, Wei An
, Song Ci:
Minimizing Bandwidth Cost of CCN: A Coordinated In-Network Caching Approach. ICCCN 2015: 1-7
[c6]Jiahui Song, Wei An
, Yahui Hu, Yu Zhang, Xu Zhou, Zhen Xu:
Balancing harvesting energy consumption with potential field in wireless sensor networks. PIMRC 2015: 2014-2019- 2014
[j5]Sha Yuan, Tao Lin, Guoqiang Zhang, Wei An
, Yang Li, Song Ci:
A hybrid anycast network architecture and intelligent server selection strategy for multimedia services. Trans. Emerg. Telecommun. Technol. 25(4): 407-421 (2014)
[j4]Qian Tan, Yanwei Liu, Yanni Han, Wei An
, Song Ci, Hui Tang:
A Wireless Traffic QoS Optimization Algorithm Based on Fuzzy Measurement. J. Commun. 9(10): 729-736 (2014)
[j3]Wei An
, Jiajun Lin, Fang-Ming Shao, Haiyan Luo, Song Ci, Dalei Wu
:
Importance-based data transmission optimization in multi-source single-sink wireless sensor networks. Wirel. Commun. Mob. Comput. 14(11): 1021-1033 (2014)
[c5]Wei An
, Chunxiao Ren, Song Ci, Dalei Wu
, Haiyan Luo, Yanwei Liu:
A novel low-complexity method for determining nonadditive interaction measures based on least-norm learning. FUZZ-IEEE 2014: 1705-1712
[c4]Qian Tan, Yanwei Liu, Yanni Han, Wei An
, Song Ci, Hui Tang:
Energy harvesting aware topology control with power adaptation in wireless sensor networks. WCNC 2014: 2722-2727- 2013
[j2]Wei An
, Jiajun Lin, Haiyan Luo, Song Ci:
Significance-based energy-efficient path selection for multi-source underwater sensor networks. Int. J. Sens. Networks 13(1): 30-43 (2013)
[c3]Wei An
, Song Ci, Haiyan Luo, Dalei Wu
, Yanni Han, Ying Qi, Tao Lin:
Overall cost minimization for data aggregation in energy-constrained wireless sensor networks. ICC 2013: 6014-6018
[c2]Wei An
, Song Ci, Dalei Wu
, Yanni Han, Ying Qi, Tao Lin:
Transmission cost minimization with vulnerability constraint in wireless sensor networks. WCNC 2013: 1297-1302- 2011
[c1]Wei An
, Haiyan Luo, Song Ci, Jiajun Lin:
The Maximized Relay Capacity and Optimal Data Transmission for Wireless Sensor Networks. GLOBECOM 2011: 1-5
2000 – 2009
- 2009
[j1]Wei An
, Fang-Ming Shao, Huajun Meng:
The coverage-control optimization in sensor network subject to sensing area. Comput. Math. Appl. 57(4): 529-539 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-29 02:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







