default search action
Chuanyi Ji
Person information
- affiliation: Georgia Institute of Technology, Atlanta GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i8]Amir Hossein Afsharinejad, Chuanyi Ji, Robert Wilcox:
Heterogeneous recovery from large scale power failures. CoRR abs/2012.15420 (2020)
2010 – 2019
- 2017
- [j31]Chuanyi Ji, Yun Wei, H. Vincent Poor:
Resilience of Energy Infrastructure and Services: Modeling, Data Analytics, and Metrics. Proc. IEEE 105(7): 1354-1366 (2017) - 2016
- [i7]Chuanyi Ji, Yun Wei, H. Vincent Poor:
Resilience of Energy Infrastructure and Services: Modeling, Data Analytics and Metrics. CoRR abs/1611.06914 (2016) - 2015
- [c38]Chuanyi Ji, Yun Wei:
Dynamic resilience for power distribution and customers. SmartGridComm 2015: 822-827 - 2014
- [j30]Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana, James Momoh:
Learning Geotemporal Nonstationary Failure and Recovery of Power Distribution. IEEE Trans. Neural Networks Learn. Syst. 25(1): 229-240 (2014) - 2013
- [c37]Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana:
Dynamic modeling and resilience for power distribution. SmartGridComm 2013: 85-90 - [i6]Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana, James Momoh:
Learning Geo-Temporal Non-Stationary Failure and Recovery of Power Distribution. CoRR abs/1304.7710 (2013) - 2012
- [c36]Anthony Kuh, Chuanyi Ji, Yun Wei:
Stochastic queuing models for distributed PV energy. APSIPA 2012: 1-6 - [i5]Sung-eok Jeon, Chuanyi Ji:
Joint Approximation of Information and Distributed Link-Scheduling Decisions in Wireless Networks. CoRR abs/1201.2575 (2012) - [i4]Yun Wei, Chuanyi Ji, Floyd Galvan, Stephen Couvillon, George Orellana, James Momoh:
Non-Stationary Random Process for Large-Scale Failure and Recovery of Power Distributions. CoRR abs/1202.4720 (2012) - 2011
- [j29]Supaporn Erjongmanee, Chuanyi Ji:
Large-Scale Network-Service Disruption: Dependencies and External Factors. IEEE Trans. Netw. Serv. Manag. 8(4): 375-386 (2011) - [c35]Supaporn Erjongmanee, Chuanyi Ji, James Momoh:
Inferring cascading network-power disruptions and sustainability. IJCNN 2011: 3063-3067 - 2010
- [j28]Rajesh Narasimha, Souvik Dihidar, Chuanyi Ji, Steven W. McLaughlin:
Scalable diagnosis in IP networks using path-based measurement and inference: A learning framework. J. Vis. Commun. Image Represent. 21(2): 175-191 (2010) - [j27]Sung-eok Jeon, Chuanyi Ji:
Randomized and distributed self-configuration of wireless networks: two-layer Markov random fields and near-optimality. IEEE Trans. Signal Process. 58(9): 4859-4870 (2010) - [p1]Marina Thottan, Guanglei Liu, Chuanyi Ji:
Anomaly Detection Approaches for Communication Networks. Algorithms for Next Generation Networks 2010: 239-261
2000 – 2009
- 2009
- [j26]Zesheng Chen, Chuanyi Ji:
An information-theoretic view of network-aware malware attacks. IEEE Trans. Inf. Forensics Secur. 4(3): 530-541 (2009) - [j25]Guanglei Liu, Chuanyi Ji:
Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models. IEEE/ACM Trans. Netw. 17(1): 319-331 (2009) - [i3]Sung-eok Jeon, Chuanyi Ji:
Distributed Preemption Decisions: Probabilistic Graphical Model, Algorithm and Near-Optimality. CoRR abs/0901.0753 (2009) - 2008
- [c34]Zesheng Chen, Chuanyi Ji, Paul Barford:
Spatial-Temporal Characteristics of Internet Malicious Sources. INFOCOM 2008: 2306-2314 - [c33]Supaporn Erjongmanee, Chuanyi Ji, Jere Stokely, Neale Hightower:
Large-Scale Inference of Network-Service Disruption upon Natural Disasters. KDD Workshop on Knowledge Discovery from Sensor Data 2008: 134-153 - [i2]Zesheng Chen, Chuanyi Ji:
An Information-Theoretical View of Network-Aware Malware Attacks. CoRR abs/0805.0802 (2008) - [i1]Sung-eok Jeon, Chuanyi Ji:
Randomized Distributed Configuration Management of Wireless Networks: Multi-layer Markov Random Fields and Near-Optimality. CoRR abs/0809.1916 (2008) - 2007
- [j24]Zesheng Chen, Chuanyi Ji:
Optimal worm-scanning method using vulnerable-host distributions. Int. J. Secur. Networks 2(1/2): 71-80 (2007) - [j23]Guanglei Liu, Chuanyi Ji:
Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. IEEE J. Sel. Areas Commun. 25(S-3): 2-17 (2007) - [c32]Rajesh Narasimha, Souvik Dihidar, Chuanyi Ji, Steven W. McLaughlin:
Scalable Fault Diagnosis in IP Networks using Graphical Models: A Variational Inference Approach. ICC 2007: 147-152 - [c31]Zesheng Chen, Chuanyi Ji:
Measuring Network-Aware Worm Spreading Ability. INFOCOM 2007: 116-124 - [c30]Zesheng Chen, Chao Chen, Chuanyi Ji:
Understanding Localized-Scanning Worms. IPCCC 2007: 186-193 - 2006
- [c29]Rajesh Narasimha, Souvik Dihidar, Chuanyi Ji, Steven W. McLaughlin:
A Scalable Probing-based Approach for Congestion Detection using Message Passing. ICC 2006: 640-645 - [c28]Guanglei Liu, Chuanyi Ji:
Resilient Architecture of All-Optical Networks: Probabilistic Graphical Models for Crosstalk Attack Propagation. ISIT 2006: 2914-2918 - 2005
- [j22]Alexander G. Parlos, Chuanyi Ji, Thomas Parisini, Marco Baglietto, Amir F. Atiya, Kimberly C. Claffy:
Guest Editorial Introduction to the Special Issue on Adaptive Learning Systems in Communication Networks. IEEE Trans. Neural Networks 16(5): 1013-1018 (2005) - [j21]Zesheng Chen, Chuanyi Ji:
Spatial-temporal modeling of malware propagation in networks. IEEE Trans. Neural Networks 16(5): 1291-1303 (2005) - [j20]Guanglei Liu, Chuanyi Ji, Vincent W. S. Chan:
On the scalability of network management information for inter-domain light-path assessment. IEEE/ACM Trans. Netw. 13(1): 160-172 (2005) - [c27]Zesheng Chen, Chuanyi Ji:
Importance-scanning worm using vulnerable-host distribution. GLOBECOM 2005: 6 - [c26]Sung-eok Jeon, Chuanyi Ji:
Near-Optimal Algorithm for Self-configuration of Ad-hoc Wireless Networks. International Conference on Computational Science (3) 2005: 279-283 - [c25]Sung-eok Jeon, Chuanyi Ji:
Nearly optimal distributed configuration management using probabilistic graphical models. MASS 2005 - [c24]Sung-eok Jeon, Chuanyi Ji:
Role of machine learning in configuration management of ad hoc wireless networks. MineNet 2005: 223-224 - [c23]Zesheng Chen, Chuanyi Ji:
A self-learning worm using importance scanning. WORM 2005: 22-29 - [e1]Subhabrata Sen, Chuanyi Ji, Debanjan Saha, Joe McCloskey:
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005. ACM 2005, ISBN 1-59593-026-4 [contents] - 2004
- [j19]Sheng Ma, Chuanyi Ji:
Modeling Network Traffic in Wavelet Domain. Comput. Sci. J. Moldova 12(2): 275-323 (2004) - 2003
- [j18]Marina Thottan, Chuanyi Ji:
Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8): 2191-2204 (2003) - [c22]Guanglei Liu, Chuanyi Ji, Vincent W. S. Chan:
Network Management Information For Light-Path Assessment: Trade-off between Performance and Complexity. INFOCOM 2003: 1362-1372 - 2002
- [j17]Vincent W. S. Chan, Anwar Elwalid, Chuanyi Ji, Yechiam Yemini, Chin-Tau Lea:
Guest editorial. IEEE J. Sel. Areas Commun. 20(4): 653-655 (2002) - [j16]Chuanyi Ji, Anwar Elwalid:
Measurement-based network monitoring and inference: scalability and missing information. IEEE J. Sel. Areas Commun. 20(4): 714-725 (2002) - [c21]Xusheng Tian, Jie Wu, Chuanyi Ji:
A Unified Framework for Understanding Network Traffic Using Independent Wavelet Models. INFOCOM 2002: 446-454 - [c20]Dongxu Shen, Chuanyi Ji:
CDMA network capacity over shadowing channels. PIMRC 2002: D149- - 2001
- [j15]Sheng Ma, Chuanyi Ji:
Modeling heterogeneous network traffic in wavelet domain. IEEE/ACM Trans. Netw. 9(5): 634-649 (2001) - [j14]Xusheng Tian, Chuanyi Ji:
Bounding the performance of dynamic channel allocation with QoS provisioning for distributed admission control in wireless networks. IEEE Trans. Veh. Technol. 50(2): 388-397 (2001) - [c19]Dongxu Shen, Chuanyi Ji:
Capacity trade-offs for heterogeneous traffic over large scale fading channels in CDMA networks. ICC 2001: 1718-1722 - [c18]Dongxu Shen, Chuanyi Ji:
Capability based admission control for broadband CDMA networks. VTC Fall 2001: 202-206 - 2000
- [c17]Xusheng Tian, Sheng Ma, Chuanyi Ji:
Comparison of the independent wavelet models to network traffic. GLOBECOM 2000: 1448-1452 - [c16]Dongxu Shen, Chuanyi Ji:
Admission of Multimedia Traffic for Third Generation CDMA Network. INFOCOM 2000: 1077-1086 - [c15]Marina Thottan, Chuanyi Ji:
Properties of network faults. NOMS 2000: 941-942
1990 – 1999
- 1999
- [j13]Marina Thottan, Chuanyi Ji:
Statistical Detection of Enterprise Network Problems. J. Netw. Syst. Manag. 7(1): 27-45 (1999) - [j12]Sheng Ma, Chuanyi Ji:
Performance and efficiency: recent advances in supervised learning. Proc. IEEE 87(9): 1519-1535 (1999) - [c14]Marina Thottan, Chuanyi Ji:
Fault Prediction at the Network Layer using Intelligent Agents. Integrated Network Management 1999: 745-759 - [c13]Chuanyi Ji, Sheng Ma, Xusheng Tian:
Approximation Capability of Independent Wavelet Models to Heterogeneous Network Traffic. INFOCOM 1999: 170-177 - [c12]Xusheng Tian, Chuanyi Ji:
Bounding the Performance of Dynamic Channel Allocation with QoS Provisioning for Distributed Admission Control in Wireless Networks. INFOCOM 1999: 1356-1363 - 1998
- [j11]Sheng Ma, Chuanyi Ji:
Modeling video traffic using wavelets. IEEE Commun. Lett. 2(4): 100-103 (1998) - [j10]Cynthia S. Hood, Chuanyi Ji:
Intelligent Agents for Proactive Fault Detection. IEEE Internet Comput. 2(2): 65-72 (1998) - [j9]Marina Thottan, Chuanyi Ji:
Proactive anomaly detection using distributed intelligent agents. IEEE Netw. 12(5): 21-27 (1998) - [j8]Chuanyi Ji, Demetri Psaltis:
Capacity of Two-Layer Feedforward Neural Networks with Binary Weights. IEEE Trans. Inf. Theory 44(1): 256-268 (1998) - [j7]Sheng Ma, Chuanyi Ji:
Fast training of recurrent networks based on the EM algorithm. IEEE Trans. Neural Networks 9(1): 11-26 (1998) - [j6]Sheng Ma, Chuanyi Ji:
A unified approach on fast training of feedforward and recurrent networks using EM algorithm. IEEE Trans. Signal Process. 46(8): 2270-2274 (1998) - [c11]Sheng Ma, Chuanyi Ji:
Modeling video traffic using wavelets. ICC 1998: 559-562 - [c10]Xusheng Tian, Chuanyi Ji:
QoS provisioning with distributed call admission control in wireless networks. ICC 1998: 797-801 - [c9]Sheng Ma, Chuanyi Ji:
Modeling Video Traffic in the Wavelet Domain. INFOCOM 1998: 201-208 - 1997
- [j5]Sheng Ma, Chuanyi Ji, James Farmer:
An Efficient EM-based Training Algorithm for Feedforward Neural Networks. Neural Networks 10(2): 243-256 (1997) - [j4]Chuanyi Ji, Demetri Psaltis:
Network Synthesis through Data-Driven Growth and Decay. Neural Networks 10(6): 1133-1141 (1997) - [j3]Chuanyi Ji, Sheng Ma:
Combinations of weak classifiers. IEEE Trans. Neural Networks 8(1): 32-42 (1997) - [j2]Amir F. Atiya, Chuanyi Ji:
How initial conditions affect generalization performance in large networks. IEEE Trans. Neural Networks 8(2): 448-451 (1997) - [c8]Cynthia S. Hood, Chuanyi Ji:
Automated Proactive Anomaly Detection. Integrated Network Management 1997: 688-699 - [c7]Cynthia S. Hood, Chuanyi Ji:
Proactive Network Fault Detection. INFOCOM 1997: 1147-1155 - [c6]Sheng Ma, Chuanyi Ji:
Wavelet Models for Video Time-Series. NIPS 1997: 915-921 - 1996
- [c5]Chuanyi Ji, Sheng Ma:
Combinations of Weak Classifiers. NIPS 1996: 494-500 - 1993
- [c4]Chuanyi Ji:
Generalization Error and the Expected Network Complexity. NIPS 1993: 367-374 - 1991
- [c3]Chuanyi Ji, Demetri Psaltis:
The VC-Dimension vs. the Statistical Capacity for Two Layer Networks with Binary Weights. COLT 1991: 250-256 - [c2]Chuanyi Ji, Demetri Psaltis:
The VC-Dimension versus the Statistical Capacity of Multilayer Networks. NIPS 1991: 928-935 - 1990
- [j1]Chuanyi Ji, Robert R. Snapp, Demetri Psaltis:
Generalizing Smoothness Constraints from Discrete Samples. Neural Comput. 2(2): 188-197 (1990)
1980 – 1989
- 1988
- [c1]Chuanyi Ji, Saleem A. Kassam:
Convex boundary arrays for coherent and incoherent imaging. ICASSP 1988: 1220-1223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint