Name
Affiliation
Papers
CHUANYI JI
Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
59
Collaborators
Citations 
PageRank 
36
812
124.04
Referers 
Referees 
References 
1765
899
682
Search Limit
1001000
Title
Citations
PageRank
Year
Resilience of Energy Infrastructure and Services: Modeling, Data Analytics, and Metrics20.372017
Dynamic Resilience For Power Distribution And Customers00.342015
Dynamic modeling and resilience for power distribution10.412013
Learning Geotemporal Nonstationary Failure and Recovery of Power Distribution00.342013
Non-Stationary Random Process for Large-Scale Failure and Recovery of Power Distributions10.392012
Joint Approximation of Information and Distributed Link-Scheduling Decisions in Wireless Networks00.342012
Scalable diagnosis in IP networks using path-based measurement and inference: A learning framework10.362010
Randomized and Distributed Self-Configuration of Wireless Networks: Two-Layer Markov Random Fields and Near-Optimality00.342010
An Information-Theoretic View of Network-Aware Malware Attacks150.732009
Distributed Preemption Decisions: Probabilistic Graphical Model, Algorithm and Near-Optimality00.342009
Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models140.882009
Large-Scale inference of network-service disruption upon natural disasters30.522008
Spatial-Temporal Characteristics of Internet Malicious Sources241.652008
Randomized Distributed Configuration Management of Wireless Networks: Multi-layer Markov Random Fields and Near-Optimality50.502008
Optimal worm-scanning method using vulnerable-host distributions291.472007
Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach130.802007
Measuring Network-Aware Worm Spreading Ability251.332007
Understanding Localized-Scanning Worms182.302007
A Scalable Probing-Based Approach For Congestion Detection Using Message Passing00.342006
Resilient Architecture Of All-Optical Networks: Probabilistic Graphical Models For Crosstalk Attack Propagation00.342006
Nearly optimal distributed configuration management using probabilistic graphical models40.442005
Spatial-temporal modeling of malware propagation in networks.502.192005
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005143.202005
On the scalability of network management information for inter-domain light-path assessment70.602005
A self-learning worm using importance scanning342.072005
Near-Optimal algorithm for self-configuration of ad-hoc wireless networks00.342005
Role of machine learning in configuration management of ad hoc wireless networks10.352005
Modeling Network Traffic in Wavelet Domain.00.342004
Anomaly detection in IP networks1348.332003
A unified framework for understanding network traffic using independent wavelet models131.392002
CDMA network capacity over shadowing channels10.452002
Measurement-based network monitoring and inference: scalability and missing information71.062002
Bounding the Performance of Dynamic Channel Allocation with QoS Provisioning for Distributed Admission Control in Wireless Networks.120.742001
Modeling heterogeneous network traffic in wavelet domain372.112001
Admission of Multimedia Traffic for Third Generation CDMA Network00.342000
Comparison of the independent wavelet models to network traffic10.412000
Properties of network faults30.492000
Statistical Detection of Enterprise Network Problems40.821999
Approximation Capability Of Independent Wavelet Models To Heterogeneous Network Traffic20.451999
Fault Prediction at the Network Layer using Intelligent Agents131.131999
Performance and efficiency: recent advances in supervised learning151.661999
Modeling video traffic using wavelets.00.341998
Modeling video traffic using wavelets151.381998
QoS provisioning with distributed call admission control in wireless networks30.601998
Modeling video traffic in the wavelet domain120.831998
Capacity of two-layer feedforward neural networks with binary weights60.561998
A unified approach on fast training of feedforward and recurrent networks using EM algorithm91.051998
Intelligent agents for proactive fault detection162.211998
Fast training of recurrent networks based on the EM algorithm.201.621998
Network synthesis through data-driven growth and decay10.411997
  • 1
  • 2