default search action
Junyu Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Junhong Zhu, Junyu Lai, Lianqiang Gan, Huashuo Liu, Lianli Gao:
Towards faster yet accurate video prediction for resource-constrained platforms. Neurocomputing 611: 128663 (2025) - 2024
- [j19]Huashuo Liu, Junyu Lai, Junhong Zhu, Lianqiang Gan, Zheng Chang:
Enabling High-Throughput Routing for LEO Satellite Broadband Networks: A Flow-Centric Deep Reinforcement Learning Approach. IEEE Internet Things J. 11(17): 28705-28720 (2024) - [j18]Junyu Lai, Lianqiang Gan, Junhong Zhu, Huashuo Liu, Lianli Gao:
Exploring Spatial Frequency Information for Enhanced Video Prediction Quality. IEEE Trans. Multim. 26: 8955-8968 (2024) - [i3]Jingwei Xu, Junyu Lai, Yunpeng Huang:
MeteoRA: Multiple-tasks Embedded LoRA for Large Language Models. CoRR abs/2405.13053 (2024) - [i2]Junyu Lai, Jiahe Xu, Yao Yang, Yunpeng Huang, Chun Cao, Jingwei Xu:
Executing Arithmetic: Fine-Tuning Large Language Models as Turing Machines. CoRR abs/2410.07896 (2024) - 2023
- [j17]Junyu Lai, Zhiyong Chen, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Siyu Xie, Gun Li:
Deep Learning Based Traffic Prediction Method for Digital Twin Network. Cogn. Comput. 15(5): 1748-1766 (2023) - [c16]Junyu Lai, Huashuo Liu, Yusong Sun, Huidong Tan, Lianqiang Gan, Zhiyong Chen:
Multi-agent Deep Reinforcement Learning Aided Computing Offloading in LEO Satellite Networks. ICC 2023: 3438-3443 - [c15]Junyu Lai, Yuhang Chen, Jiexin Zhang, Pingyun Nie, Bo Zhang:
Constant Force Tracking Using Dynamical System with External Force Estimation. ICIRA (5) 2023: 220-231 - [c14]Zhiyong Chen, Junyu Lai, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Tian Xia:
Spatiotemporal-Enhanced Recurrent Neural Network for Network Traffic Prediction. ISCC 2023: 1268-1273 - [c13]Junyu Lai, Huashuo Liu, Yusong Sun, Junhong Zhu, Wanyi Ma, Lianqiang Gan:
Multi-Agent Deep Reinforcement Learning Based Computation Offloading Approach for LEO Satellite Broadband Networks. ISCC 2023: 1435-1440 - [i1]Yunpeng Huang, Jingwei Xu, Zixu Jiang, Junyu Lai, Zenan Li, Yuan Yao, Taolue Chen, Lijuan Yang, Zhou Xin, Xiaoxing Ma:
Advancing Transformer Architecture in Long-Context Large Language Models: A Comprehensive Survey. CoRR abs/2311.12351 (2023) - 2021
- [j16]Junyu Lai, Jiaqi Tian, Ke Zhang, Zheng Yang, Dingde Jiang:
Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform. Mob. Networks Appl. 26(2): 766-780 (2021) - [j15]Junyu Lai, Jiaqi Tian, Rui Liu, Zheng Yang, Dingde Jiang:
A Hybrid Virtualization Approach to Emulate Network Nodes of Heterogeneous Architectures. Mob. Networks Appl. 26(2): 781-793 (2021) - 2020
- [j14]Junyu Lai, Yangang Chen, Yu Gu, Christopher Batty, Justin W. L. Wan:
Fast and Scalable Solvers for the Fluid Pressure Equations with Separating Solid Boundary Conditions. Comput. Graph. Forum 39(2): 23-33 (2020) - [j13]Lianli Gao, Yiyue Zhang, Fuhao Zou, Jie Shao, Junyu Lai:
Unsupervised urban scene segmentation via domain adaptation. Neurocomputing 406: 295-301 (2020) - [c12]Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou:
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. AsiaCCS 2020: 719-731 - [c11]Meilin He, Lei Zhong, Huidong Tan, Ying Qu, Junyu Lai:
A Novel Edge Computing Server Selection Strategy of LEO Constellation Broadband Network. SERVICES 2020: 275-280 - [c10]Huidong Tan, Meilin He, Tian Xia, Xiaohui Zheng, Junyu Lai:
A Novel Multi-level Computation Offloading Scheme at LEO Constellation Broadband Network Edge. SERVICES 2020: 281-286 - [c9]Junyu Lai, Zhengyin Han, Yingbing Sun, Han Xiao, Xiaohui Zheng:
Enhanced Shortest Path Routing Algorithm for Named Data Mobile Ad-Hoc Network. SimuTools (2) 2020: 439-450 - [c8]Junyu Lai, Huidong Tan, Meilin He, Ying Qu, Lei Zhong:
Modeling and Simulation of Computation Offloading at LEO Satellite Constellation Network Edge. SimuTools (2) 2020: 451-463
2010 – 2019
- 2019
- [j12]Junyu Lai, Justin W. L. Wan, Shuhua Zhang:
Numerical methods for two person games arising from transboundary pollution with emission permit trading. Appl. Math. Comput. 350: 11-31 (2019) - [j11]Zheng Yang, Junyu Lai, Yingbing Sun, Jianying Zhou:
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs. ACM Trans. Sens. Networks 15(2): 22:1-22:27 (2019) - [c7]Junyu Lai, Jiaqi Tian, Dingde Jiang, Jiaming Sun, Ke Zhang:
A Hybrid Virtualization Approach to Emulate Heterogeneous Network Nodes. SimuTools 2019: 228-237 - [c6]Junyu Lai, Jiaqi Tian, Dingde Jiang, Jiaming Sun, Ke Zhang:
Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation Platform. SimuTools 2019: 508-517 - 2018
- [j10]Zheng Yang, Junyu Lai:
New constructions for (multiparty) one-round key exchange with strong security. Sci. China Inf. Sci. 61(5): 059102:1-059102:3 (2018) - [j9]Zheng Yang, Junyu Lai, Guoyuan Li:
Cryptanalysis of a generic one-round key exchange protocol with strong security. IET Inf. Secur. 12(1): 71-78 (2018) - 2017
- [j8]Zheng Yang, Junyu Lai, Chao Liu, Wanping Liu, Shuangqing Li:
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions. Comput. J. 60(8): 1145-1160 (2017) - [j7]Zheng Yang, Junyu Lai, Wanping Liu, Chao Liu, Song Luo:
SignORKE: improving pairing-based one-round key exchange without random oracles. IET Inf. Secur. 11(5): 243-249 (2017) - [j6]Junyu Lai, Jie Zhao, Wei Zhang, Ci He, Yasheng Zhang:
A mixed satellite TV channel transmission scheme to enhance frequency bandwidth utilization. Int. J. Commun. Syst. 30(12) (2017) - [c5]Junyu Lai, Wei Zhang, Jie Zhao, Weinan Zhang, Yang Zhang:
An adaptive coding and modulation based multicast scheme to reduce bandwidth consumption in the next generation satellite TV systems. ICNC 2017: 825-830 - 2015
- [j5]Junyu Lai, Lei Jiang, Ming Lei, Alireza Abdollahpouri, Weiwei Fang:
Software-defined cellular networking: a practical path towards 5G. Int. J. Commun. Networks Distributed Syst. 14(1): 89-105 (2015) - 2014
- [j4]Junyu Lai, Bernd E. Wolfinger:
Improving channel availability of tree-topology-based IPTV networks with users zapping channels sequentially. Int. J. Commun. Networks Distributed Syst. 12(3): 239-258 (2014) - [j3]Weiwei Fang, Yangchun Li, Huijing Zhang, Naixue Xiong, Junyu Lai, Athanasios V. Vasilakos:
On the throughput-energy tradeoff for data transmission between cloud and mobile devices. Inf. Sci. 283: 79-93 (2014) - 2013
- [c4]Sadaf Momeni, Junyu Lai, Bernd E. Wolfinger:
Availability evaluation of IPTV services in roadside backbone networks with vehicle-to-infrastructure communication. IWCMC 2013: 1727-1732 - 2012
- [b1]Junyu Lai:
Evaluation and Improvement of TV Channel Availability for IPTV Services. University of Hamburg, Shaker 2012 - [j2]Junyu Lai, Bernd E. Wolfinger, Stephan Heckmüller:
Decreasing the Call Blocking Probability of Broadband IPTV Services in Stationary and Peak-hour Scenarios. J. Networks 7(11): 1714-1727 (2012) - [j1]Alireza Abdollahpouri, Bernd E. Wolfinger, Junyu Lai, Catalin Vinti:
Modeling the Behavior of IPTV Users with Application to Call Blocking Probability Analysis. Prax. Inf.verarb. Kommun. 35(2): 75-81 (2012) - [c3]Junyu Lai, Bernd E. Wolfinger:
A Method to Improve the Channel Availability of IPTV Systems with Users Zapping Channels Sequentially. WWIC 2012: 76-89 - 2010
- [c2]Junyu Lai, Bernd E. Wolfinger, Stephan Heckmüller:
Decreasing call blocking probability of Broadband TV services by a channel access control scheme. ICUMT 2010: 1-9 - [c1]Alireza Abdollahpouri, Bernd E. Wolfinger, Junyu Lai:
Unicast versus Multicast for Live TV Delivery in Networks with Tree Topology. WWIC 2010: 1-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint