• Publications
  • Influence
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
Simulations show that the proposed framework to quantitatively measure trust, model trust propagation, and defend trust evaluation systems against malicious attacks can significantly improve network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Multiuser Water-filling in the Presence of Crosstalk
  • Wei Yu
  • Business
    Information Theory and Applications Workshop
  • 1 January 2007
Spectrum optimization is an important part of the design of interference-limited multiuser communication systems. While traditional water-filling provides a closed-form solution to the transmit
Prevalence and Costs of Chronic Conditions in the VA Health Care System
Overall, VA health care users have more chronic diseases than the general population, and these individuals accounted for 73 percent of the total cost.
Content-Based Image Retrieval Using Multiple-Instance Learning
The multiple-instance (MI) learning model is applied to use a small number of training images to learn what images from the database are of interest to the user.
Spatial Deep Learning for Wireless Scheduling
It is shown that it is possible to bypass the channel estimation stage altogether and to use a deep neural network to produce a near optimal schedule based solely on geographic locations of the transmitters and receivers in the network.
Towards Optimal Power Control via Ensembling Deep Neural Networks
Simulation results show that for the standard symmetric $K$ -user Gaussian interference channel, the proposed methods can outperform state-of-the-art power control solutions under a variety of system configurations.
Optimization of Heterogeneous Coded Caching
An optimization theoretic perspective on the seminal work on the fundamental limits of caching by Maddah-Ali and Niesen is developed, and it is proved that the coded caching scheme presented is the optimal scheme among a large, non-trivial family of possible caching schemes.
On the energy efficiency of cooperative communications in wireless sensor networks
An analytical framework for studying the energy efficiency trade-off of cooperation in sensor networks is presented and it is revealed that for small distance separation between the source and destination, direct transmission is more energy efficient than relaying.