Name
Affiliation
Papers
WEI CHEN
Computer School, The State Key Lab of Software Engineering Wuhan University, Wuhan 430072, Hubei, China
29
Collaborators
Citations 
PageRank 
54
86
12.45
Referers 
Referees 
References 
249
823
353
Search Limit
100823
Title
Citations
PageRank
Year
Fast In-Memory Key-Value Cache System with RDMA00.342019
Individualization of Head Related Transfer Functions Based on Radial Basis Function Neural Network00.342018
Frame-Independent and Parallel Method for 3D Audio Real-Time Rendering on Mobile Devices.00.342017
Megalloc: Fast Distributed Memory Allocator for NVM-Based Cluster00.342017
Gemini: A Novel Hardware and Software Implementation of High-performance PCIe SSD.10.352017
GLE-Dedup: A Globally-Locally Even Deduplication by Request-Aware Placement for Better Read Performance.10.352017
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.30.382017
An Efficient Method Using the Parameterized HRTFs for 3D Audio Real-Time Rendering on Mobile Devices.00.342017
TBuffer: Constructing a Tail Buffer in DRAM for Flash-Based Main Memory System00.342016
A Crowd-Sourcing Indoor Localization Algorithm via Optical Camera on a Smartphone Assisted by Wi-Fi Fingerprint RSSI.50.532016
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.40.452016
Scalable Indoor Localization via Mobile Crowdsourcing and Gaussian Process.90.512016
Shielding STT-RAM Based Register Files on GPUs against Read Disturbance.00.342016
Indoor-Outdoor Detection Using a Smart Phone Sensor.40.422016
On Measuring Cloud-Based Push Services10.352016
NIS: A New Index Scheme for Flash File System00.342015
WAlloc: An efficient wear-aware allocator for non-volatile main memory.40.402015
Cloud-Based Mobile Botnets Using Multiple Push Servers20.372015
A New Method of Automatic Monitoring DC Breaker by Using GPRS Technique.00.342011
Parameter Estimation of High-Voltage Circuit Breaker Based on Genetic Algorithms.00.342011
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently110.682008
Defending against jamming attacks in wireless local area networks50.452007
A novel approach to detecting DDoS Attacks at an Early Stage100.572006
Detecting SYN flooding attacks near innocent side20.432005
An Active Detecting Method Against SYN Flooding Attack161.012005
Efficient and beneficial defense against DDoS direct attack and reflector attack20.512005
An Efficient and Practical Defense Method Against DDoS Attack at the Source-End10.392005
Ontology Based Cooperative Intrusion Detection System40.542004
A novel technique for detecting DDoS attacks at its early stage10.372004