Follow
Fengjiao Li
Title
Cited by
Cited by
Year
Combinatorial sleeping bandits with fairness constraints
F Li, J Liu, B Ji
IEEE Transactions on Network Science and Engineering 7 (3), 1799-1813, 2019
1542019
Waiting but not aging: Optimizing information freshness under the pull model
F Li, Y Sang, Z Liu, B Li, H Wu, B Ji
IEEE/ACM Transactions on Networking 29 (1), 465-478, 2020
302020
Differentially private linear bandits with partial distributed feedback
F Li, X Zhou, B Ji
2022 20th International Symposium on Modeling and Optimization in Mobile, Ad …, 2022
112022
Vulnerability mining of Cisco router based on fuzzing
F Li, L Zhang, D Chen
The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014 …, 2014
62014
Federated learning with fair worker selection: A multi-round submodular maximization approach
F Li, J Liu, B Ji
2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems …, 2021
22021
Waiting but not aging: Age-of-information and utility optimization under the pull model
F Li, Y Sang, Z Liu, B Li, H Wu, B Ji
arXiv preprint arXiv:1912.08722, 2019
12019
Distributed Linear Bandits with Differential Privacy
F Li, X Zhou, B Ji
IEEE Transactions on Network Science and Engineering, 2024
2024
(Private) Kernelized Bandits with Distributed Biased Feedback
F Li, X Zhou, B Ji
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023
2023
Online Learning for Resource Allocation in Wireless Networks: Fairness, Communication Efficiency, and Data Privacy
F Li
Virginia Tech, 2022
2022
IEEE INFOCOM 2022 Poster TPC
W Chang, Y Chen, D Cheng, Y Duan, Y Hu, N Ivanov, B Ji, L Jiao, C Li, ...
IEEE INFOCOM Poster 2021: IEEE INFOCOM 2021 Poster-Committees
L Guo, B Ji, W Chang, Y Chen, P Huang, D Li, F Li, T Li, W Liao, X Qin, ...
The system can't perform the operation now. Try again later.
Articles 1–11