Name
Affiliation
Papers
HONGYI WU
University of Louisiana at Lafayette, Lafayette
102
Collaborators
Citations 
PageRank 
139
848
76.90
Referers 
Referees 
References 
1888
1661
1082
Search Limit
1001000
Title
Citations
PageRank
Year
Energy Minimization for Federated Asynchronous Learning on Battery-Powered Mobile Devices via Application Co-running00.342022
Camouflaged Poisoning Attack on Graph Neural Networks00.342022
Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks.00.342022
DT-SSIM: A Decentralized Trustworthy Self-Sovereign Identity Management Framework00.342022
TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers00.342022
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks00.342022
Designing a K-16 Cybersecurity Collaborative: CIPHER00.342021
RLC: A Reinforcement Learning-Based Charging Algorithm for Mobile Devices10.342021
BOOST: A User Association and Scheduling Framework for Beamforming mmWave Networks00.342021
Privacy Preserving Deep Learning based on Multi-Party Secure Computation: A Survey10.362021
Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks00.342021
Resilient Routing for Wireless Sensor Networks on High Genus Surfaces00.342021
CLEAR - Clean-up Sample-Targeted Backdoor in Neural Networks.00.342021
Gala: Greedy Computation For Linear Algebra In Privacy-Preserved Neural Networks00.342021
Mobile Crowdsourcing and Pervasive Computing for Smart Cities.10.372020
GangSweep: Sweep out Neural Backdoors by GAN00.342020
DeepMag+: Sniffing mobile apps in magnetic field through deep learning00.342020
Learning an Effective Charging Scheme for Mobile Devices00.342020
An Energy-Balanced Trust Cloud Migration Scheme for Underwater Acoustic Sensor Networks40.402020
DeapSECURE: Empowering Students for Data- and Compute-Intensive Research in Cybersecurity through Training00.342019
CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis10.342019
Scalable Minimum-Cost Balanced Partitioning of Large-Scale Social Networks: Online and Offline Solutions.20.382018
GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning.30.372018
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things.00.342018
IEEE Access Special Section Editorial: Green Communications and Networking for 5G.00.342018
Hotspot-aware task-resource co-allocation for heterogeneous many-core networks-on-chip.10.372018
Scalable and Fully Distributed Localization in Large-Scale Sensor Networks.00.342017
Task-Resource Co-Allocation for Hotspot Minimization in Heterogeneous Many-Core NoCs.40.442016
LBMIC: communication-aware load balancing in distributed ASMs with evolving social networks00.342016
Message from the TPC co-chairs00.342016
Optimal Marching of Autonomous Networked Robots00.342016
Recent advances in green industrial networking [Guest Editorial].00.342016
Competition-Based Participant Recruitment for Delay-Sensitive Crowdsourcing Applications in D2D Networks.90.532016
A Tree-Cluster based Data Gathering Algorithm for Industrial WSNs with a Mobile Sink310.982015
Localized and Precise Boundary Detection in 3-D Wireless Sensor Networks70.522015
I(Re)2-WiNoC: Exploring scalable wireless on-chip micronetworks for heterogeneous embedded many-core SoCs20.362015
Crowdsourcing With Tullock Contests: A New Perspective180.722015
Distributed Information Storage and Retrieval in 3-D Sensor Networks With General Topologies60.412015
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks220.812015
Big data cloud and the frontier of computer science and technology10.352015
Delay-constrained single-copy multi-path data transmission in mobile opportunistic networks50.442014
Deterministic greedy routing with guaranteed delivery in 3D wireless sensor networks120.552014
GPS-Free Greedy Routing With Delivery Guarantee and Low Stretch Factor on 2-D and 3-D Surfaces20.402014
Efficient Quality-of-Service (QoS) Support in Mobile Opportunistic Networks20.382014
Trace-routing in 3D wireless sensor networks: a deterministic approach with constant overhead10.362014
Efficient Rostering of Mobile Nodes in Intermittently Connected Passive RFID Networks20.382013
Cut-and-sew: a distributed autonomous localization algorithm for 3D surface wireless sensor networks00.342013
Cut graph based information storage and retrieval in 3D sensor networks with general topology00.342013
Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks371.012013
Distributed Data Query in Intermittently Connected Passive RFID Networks10.362013
  • 1
  • 2