关注
Dayong Ye
Dayong Ye
在 uts.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
A belief propagation-based method for task allocation in open and dynamic cloud environments
Y Kong, M Zhang, D Ye
Knowledge-Based Systems 115, 123-132, 2017
2222017
A survey of self-organization mechanisms in multiagent systems
D Ye, M Zhang, AV Vasilakos
IEEE Transactions on Systems, Man, and Cybernetics: Systems 47 (3), 441-461, 2016
1972016
A self-adaptive sleep/wake-up scheduling approach for wireless sensor networks
D Ye, M Zhang
IEEE transactions on cybernetics 48 (3), 979-992, 2017
1362017
More than privacy: Applying differential privacy in key areas of artificial intelligence
T Zhu, D Ye, W Wang, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 34 (6), 2824-2843, 2020
1332020
A hybrid multiagent framework with Q-learning for power grid systems restoration
D Ye, M Zhang, D Sutanto
IEEE Transactions on Power Systems 26 (4), 2434-2441, 2011
1002011
A multi-agent framework for packet routing in wireless sensor networks
D Ye, M Zhang, Y Yang
sensors 15 (5), 10026-10047, 2015
962015
Self-adaptation-based dynamic coalition formation in a distributed agent network: A mechanism and a brief survey
D Ye, M Zhang, D Sutanto
IEEE Transactions on Parallel and Distributed Systems 24 (5), 1042-1051, 2013
752013
Resource allocation in IoT edge computing via concurrent federated reinforcement learning
Z Tianqing, W Zhou, D Ye, Z Cheng, J Li
IEEE Internet of Things Journal 9 (2), 1414-1426, 2021
702021
Keyword search for building service-based systems
Q He, R Zhou, X Zhang, Y Wang, D Ye, F Chen, JC Grundy, Y Yang
IEEE Transactions on Software Engineering 43 (7), 658-674, 2016
622016
Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity
S Zhou, C Liu, D Ye, T Zhu, W Zhou, PS Yu
ACM Computing Surveys 55 (8), 1-39, 2022
572022
One parameter defense—defending against data inference attacks via differential privacy
D Ye, S Shen, T Zhu, B Liu, W Zhou
IEEE Transactions on Information Forensics and Security 17, 1466-1480, 2022
472022
Formulating criticality-based cost-effective fault tolerance strategies for multi-tenant service-based systems
Y Wang, Q He, D Ye, Y Yang
IEEE Transactions on Software Engineering 44 (3), 291-307, 2017
472017
Differentially private malicious agent avoidance in multiagent advising learning
D Ye, T Zhu, W Zhou, SY Philip
IEEE transactions on cybernetics 50 (10), 4214-4227, 2019
442019
A differentially private game theoretic approach for deceiving cyber adversaries
D Ye, T Zhu, S Shen, W Zhou
IEEE Transactions on Information Forensics and Security 16, 569-584, 2020
412020
P2P distributed intrusion detections by using mobile agents
D Ye, Q Bai, M Zhang, Z Ye
Seventh IEEE/ACIS International Conference on Computer and Information …, 2008
392008
Self-organization in an agent network: A mechanism and a potential application
D Ye, M Zhang, D Sutanto
Decision Support Systems 53 (3), 406-417, 2012
352012
An agent-based integrated self-evolving service composition approach in networked environments
D Ye, Q He, Y Wang, Y Yang
IEEE Transactions on Services Computing 12 (6), 880-895, 2016
332016
Decentralised dispatch of distributed energy resources in smart grids via multi-agent coalition formation
D Ye, M Zhang, D Sutanto
Journal of Parallel and Distributed Computing 83, 30-43, 2015
322015
Dp-image: Differential privacy for image data in feature space
H Xue, B Liu, M Ding, T Zhu, D Ye, L Song, W Zhou
arXiv preprint arXiv:2103.07073, 2021
302021
Differential advising in multiagent reinforcement learning
D Ye, T Zhu, Z Cheng, W Zhou, SY Philip
IEEE transactions on cybernetics 52 (6), 5508-5521, 2020
302020
系统目前无法执行此操作,请稍后再试。
文章 1–20