Follow
Dayong Ye
Title
Cited by
Cited by
Year
A belief propagation-based method for task allocation in open and dynamic cloud environments
Y Kong, M Zhang, D Ye
Knowledge-Based Systems 115, 123-132, 2017
2212017
A survey of self-organization mechanisms in multiagent systems
D Ye, M Zhang, AV Vasilakos
IEEE Transactions on Systems, Man, and Cybernetics: Systems 47 (3), 441-461, 2016
1942016
A self-adaptive sleep/wake-up scheduling approach for wireless sensor networks
D Ye, M Zhang
IEEE transactions on cybernetics 48 (3), 979-992, 2017
1312017
More than privacy: Applying differential privacy in key areas of artificial intelligence
T Zhu, D Ye, W Wang, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 34 (6), 2824-2843, 2020
1062020
A hybrid multiagent framework with Q-learning for power grid systems restoration
D Ye, M Zhang, D Sutanto
IEEE Transactions on Power Systems 26 (4), 2434-2441, 2011
972011
A multi-agent framework for packet routing in wireless sensor networks
D Ye, M Zhang, Y Yang
sensors 15 (5), 10026-10047, 2015
922015
Self-adaptation-based dynamic coalition formation in a distributed agent network: A mechanism and a brief survey
D Ye, M Zhang, D Sutanto
IEEE Transactions on Parallel and Distributed Systems 24 (5), 1042-1051, 2013
752013
Resource allocation in IoT edge computing via concurrent federated reinforcement learning
Z Tianqing, W Zhou, D Ye, Z Cheng, J Li
IEEE Internet of Things Journal 9 (2), 1414-1426, 2021
612021
Keyword search for building service-based systems
Q He, R Zhou, X Zhang, Y Wang, D Ye, F Chen, JC Grundy, Y Yang
IEEE Transactions on Software Engineering 43 (7), 658-674, 2016
592016
Formulating criticality-based cost-effective fault tolerance strategies for multi-tenant service-based systems
Y Wang, Q He, D Ye, Y Yang
IEEE Transactions on Software Engineering 44 (3), 291-307, 2017
472017
Differentially private malicious agent avoidance in multiagent advising learning
D Ye, T Zhu, W Zhou, SY Philip
IEEE transactions on cybernetics 50 (10), 4214-4227, 2019
402019
Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity
S Zhou, C Liu, D Ye, T Zhu, W Zhou, PS Yu
ACM Computing Surveys 55 (8), 1-39, 2022
392022
One parameter defense—defending against data inference attacks via differential privacy
D Ye, S Shen, T Zhu, B Liu, W Zhou
IEEE Transactions on Information Forensics and Security 17, 1466-1480, 2022
392022
P2P distributed intrusion detections by using mobile agents
D Ye, Q Bai, M Zhang, Z Ye
Seventh IEEE/ACIS International Conference on Computer and Information …, 2008
392008
A differentially private game theoretic approach for deceiving cyber adversaries
D Ye, T Zhu, S Shen, W Zhou
IEEE Transactions on Information Forensics and Security 16, 569-584, 2020
382020
Self-organization in an agent network: A mechanism and a potential application
D Ye, M Zhang, D Sutanto
Decision Support Systems 53 (3), 406-417, 2012
352012
Decentralised dispatch of distributed energy resources in smart grids via multi-agent coalition formation
D Ye, M Zhang, D Sutanto
Journal of Parallel and Distributed Computing 83, 30-43, 2015
322015
An agent-based integrated self-evolving service composition approach in networked environments
D Ye, Q He, Y Wang, Y Yang
IEEE Transactions on Services Computing 12 (6), 880-895, 2016
292016
An auction-based approach for group task allocation in an open network environment
Y Kong, M Zhang, D Ye
The Computer Journal 59 (3), 403-422, 2016
292016
Cloning, resource exchange, and relationadaptation: an integrative self-organisation mechanism in a distributed agent network
D Ye, M Zhang, D Sutanto
IEEE Transactions on Parallel and Distributed Systems 25 (4), 887-897, 2013
282013
The system can't perform the operation now. Try again later.
Articles 1–20