CV

I am a Ph.D. student at Peking University. My research interests include trustworthy networks, data center networks, and machine learning systems.

General Information

Full Name Yuejie Wang
Email kathywangyuejie@gmail.com
Languages English, Chinese

Education

  • 2024.09-NOW
    Ph.D. in Computer Science
    Peking University
    • Advisor: Guyue Liu
  • 2022.09-2024.08
    Ph.D. (transferred to PKU)
    New York University Shanghai
    • Advisor: Guyue Liu
  • 2020.09-2022.05
    M.S. in Computer Science
    New York University
  • 2016.09-2020.07
    B.S. in Computer Science
    Peking University

Publications

  • 2026
    Practical and Scalable RDMA Connection Sharing for HPC Workload
    • Accepted by EuroSys 2026
    • Authors: Yuejie Wang, Tuo Fang, Biyu Peng, Yang Cheng, Xin Sun, Chengchao Xu, Yuchen Tang, Yuxin Ren, Ning Jia, Xinwei Hu, Yunfei Du, Guyue Liu
  • 2026
    MirrorNet: High-fidelity and Scalable Network Emulation for Software-defined WAN
    • Accepted by NSDI 2026
    • Authors: Congcong Miao, Yuejie Wang, Jianming Wang, Xuefeng Ji, Guozhi Shan, Pan Fang, Yanke Zhang, Jialin Li, Xianneng Zou, Guyue Liu
  • 2026
    CascadeNet: Generating Network Traffic with High-Fidelity Temporal Patterns
    • Accepted by NSDI 2026
    • Authors: Runwei Lu, Yanran Deng, Ruixuan Li, Jinting Liu, Yuejie Wang, Xinyu Li, Deming Xu, Han Tian, Kai Chen, Guyue Liu
  • 2025
    Heimdall: Towards Risk-Aware Network Management Outsourcing
    • In NDSS 2025
    • Authors: Yuejie Wang, Qiutong Men, Yongting Chen, Jiajin Liu, Gengyu Chen, Ying Zhang, Guyue Liu, Vyas Sekar
  • 2025
    Simple Rule Injection for ComplEx Embeddings
    • Accepted by ICKG 2025
    • Authors: Haodi Ma, Anthony Colas, Yuejie Wang, Ali Sadeghian, Daisy Zhe Wang
  • 2024
    ConfMask: Enabling Privacy-Preserving Configuration Sharing via Anonymization
    • In Proceedings of the ACM SIGCOMM 2024 Conference (pp. 465-483).
    • Authors: Yuejie Wang, Qiutong Men, Yao Xiao, Yongting Chen, Guyue Liu
  • 2020
    A practical approach to forgetting in description logics with nominal
    • In Proceedings of the AAAI Conference on Artificial Intelligence
    • Authors: Yizheng Zhao, Renate Schmidt, Yuejie Wang, Xuanming Zhang, Hao Feng
  • 2020
    A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure
    • Wireless Communications and Mobile Computing
    • Authors: Feifei Wang, Guosheng Xu, Guoai Xu, Yuejie Wang, Junhao Peng

Experience

  • 2024.08-NOW
    Research Intern
    Beijing Academy of Artificial Intelligence (BAAI)
    • Collective communications for heterogeneous hardware
  • 2023.09-2024.06
    Research Intern
    Huawei Technologies
    • L7 microservice load-balancer using eBPF
    • RDMA scheduling policies for large-scale HPC applications
  • 2019.06-2019.12
    Part-time Intern
    Megvii Technology Limited
    • CUDA programming for machine learning computations
    • Quantization-aware training