Li Pan

According to our database1, Li Pan authored at least 126 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Multi-vendor standardized sequence for edited magnetic resonance spectroscopy.
NeuroImage, 2019

Design of Laser Rangefinder for Obstacle Avoidance of Intelligent Robot in Cloud Computing Environment.
JACIII, 2019

Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks.
IEEE Internet of Things Journal, 2019

A just-in-time shapelet selection service for online time series classification.
Computer Networks, 2019

A fast shapelet selection algorithm for time series classification.
Computer Networks, 2019

A group medical diagnosis model based on intuitionistic fuzzy soft sets.
Appl. Soft Comput., 2019

To Transfer or Not: An Online Cost Optimization Algorithm for Using Two-Tier Storage-as-a-Service Clouds.
IEEE Access, 2019

Psychological Gender Express via Mobile Social Network Activities: An Experimental Study on a Gay Network Data.
IEEE Access, 2019

A Method of Automatic Code Generation for Spacecraft OBDH Software.
Proceedings of the Wireless and Satellite Systems, 2019

Hospitalization Behavior Prediction Based on Attention and Time Adjustment Factors in Bidirectional LSTM.
Proceedings of the Database Systems for Advanced Applications, 2019

Selecting Superior Candidates from a Suitable Set: A Selective Extraction Algorithm for Accelerating Shapelet Discovery in Time Series Data.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

Hybrid BiLSTM-Siamese Network for Relation Extraction.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
A Conservative Downscaling of Satellite-Detected Chemical Compositions: NO2 Column Densities of OMI, GOME-2, and CMAQ.
Remote Sensing, 2018

A study on regularized Weighted Least Square Support Vector Classifier.
Pattern Recognition Letters, 2018

Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks.
IEEE Network, 2018

Mining application-aware community organization with expanded feature subspaces from concerned attributes in social networks.
Knowl.-Based Syst., 2018

Dominated competitive influence maximization with time-critical and time-delayed diffusion in social networks.
J. Comput. Science, 2018

Mechanisms for Optimally Scheduling and Pricing Pleasingly Parallel Jobs in Service Clouds.
IEEE Access, 2018

DRL-Scheduling: An Intelligent QoS-Aware Job Scheduling Framework for Applications in Clouds.
IEEE Access, 2018

Biomass Inversion Based on Geometric Information of Laser Point Cloud.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Height and Biomass Inversion of Winter Wheat Based on Canopy Height Model.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

A Truthful Mechanism for Scheduling and Pricing Pleasingly Parallel Jobs in a Service Cloud.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

Subscription or Pay-as-You-Go: Optimally Purchasing IaaS Instances in Public Clouds.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

Performance Analysis of Service Clouds Serving Composite Service Application Jobs.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

A Truthful Mechanism for Optimally Purchasing IaaS Instances and Scheduling Parallel Jobs in Service Clouds.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

QoS Optimization of Service Clouds Serving Pleasingly Parallel Jobs.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

To Sell or Not To Sell: Trading Your Reserved Instances in Amazon EC2 Marketplace.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Spatial Crowdsourcing Task Assignment Based on the Quality of Workers.
Proceedings of the 3rd International Conference on Crowd Science and Engineering, 2018

Designing focused crawler based on improved genetic algorithm.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Mode Decomposition Based Hybrid Model for Traffic Flow Prediction.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Privacy-Aware Personal Information Propagation Management in Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Network-Constrained Tensor Factorization for Personal Recommendation in an Enterprise Network.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

A Market-Oriented Heuristic Algorithm for Scheduling Parallel Applications in Big Data Service Platform.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Fast Shapelet Discovery Algorithm Based on Important Data Points.
Int. J. Web Service Res., 2017

Detecting malware based on expired command-and-control traffic.
IJDSN, 2017

An Interval Neutrosophic Projection-Based VIKOR Method for Selecting Doctors.
Cognitive Computation, 2017

Scalable influence blocking maximization in social networks under competitive independent cascade models.
Computer Networks, 2017

A Shapelet Selection Algorithm for Time Series Classification: New Directions.
Proceedings of the 2017 International Conference on Identification, 2017

Selling Reserved Instances through Pay-as-You-Go Model in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Nash Equilibrium and Decentralized Pricing for QoS Aware Service Composition in Cloud Computing Environments.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Dynamic-priority based profit-driven scheduling in mobile cloud computing.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

A collaborative filtering based approach to performance prediction for parallel applications.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

Distributed ACO based on a crowdsourcing model for multiobjective problem.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

Combinational Meta-paths Mining for Correlation Relationship Evaluation in Bibliographic Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Investigating Microstructure Patterns of Enterprise Network in Perspective of Ego Network.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

An Experimental Study of the Impact of vCPU Provisioning on the Performance of a 2-Tier Application Running in Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Device Data Ingestion for Industrial Big Data Platforms with a Case Study.
Sensors, 2016

A Multiple Graph Label Propagation Integration Framework for Salient Object Detection.
Neural Processing Letters, 2016

Building and Analyzing of Enterprise Network: A Case Study on China Automobile Supply Network.
Int. J. Web Service Res., 2016

Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Network and Computer Applications, 2016

Multi-objective community detection method by integrating users' behavior attributes.
Neurocomputing, 2016

Uncovering fuzzy communities in networks with structural similarity.
Neurocomputing, 2016

A Bayesian approach to performance modelling for multi-tenant applications using Gaussian models.
IJHPCN, 2016

Probabilistic-based workload forecasting and service redeployment for multi-tenant services.
IJHPCN, 2016

Automatic Airport Recognition Based on Saliency Detection and Semantic Information.
ISPRS Int. J. Geo-Information, 2016

A Cross-Entropy-Based Admission Control Optimization Approach for Heterogeneous Virtual Machine Placement in Public Clouds.
Entropy, 2016

Bootstrap prediction intervals for Markov processes.
Computational Statistics & Data Analysis, 2016

Energy-Efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks.
IEEE Access, 2016

Profit Based Two-Step Job Scheduling in Clouds.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

A Distributed Game-Theoretic Approach for IaaS Service Trading in an Auction-Based Cloud Market.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Algorithm Based on Two-Layer Graph Model for E-Commerce Recommendation.
Proceedings of the International Conference on Identification, 2016

An Optimal and Iterative Pricing Model for Multiclass IaaS Cloud Services.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

GEV Regression with Convex Loss Applied to Imbalanced Binary Classification.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Attribute Credibility Based Sybil Goup Detection in Online Social Networks.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detecting Malicious Server Based on Server-to-Server Realation Graph.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Real-Time Traffic Status Classification Based on Gaussian Mixture Model.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A cost-optimal service selection approach for collaborative workflow execution in clouds.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

A piecewise linear representation method based on importance data points for time series data.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Big Datasets for Research: A Survey on Flagship Conferences.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

A Self-Evolving Method of Data Model for Cloud-Based Machine Data Ingestion.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Predicting Short-Term Traffic Flow by Long Short-Term Memory Recurrent Neural Network.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Matrix Based Community Evolution Events Detection in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Overlapping Community Detection Using NVPA.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

IBDP: An Industrial Big Data Ingestion and Analysis Platform and Case Studies.
Proceedings of the International Conference on Identification, 2015

2014
A Configurable State Class Method for Temporal Analysis of Time Petri Nets.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electrical and Computer Engineering, 2014

A Machine Learning Based Trust Evaluation Framework for Online Social Networks.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A neighborhood vector propagation algorithm for community detection.
Proceedings of the IEEE Global Communications Conference, 2014

Prediction in signed heterogeneous networks.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Enterprise Relationship Network: Build Foundation for Social Business.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Detecting highly overlapping community structure based on Maximal Clique Networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Influence Maximization in Independent Cascade Model with Limited Propagation Distance.
Proceedings of the Web Technologies and Applications, 2014

Data Organization Patterns for Cloud Enterprise Applications.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

Finding Optimized Deployment Strategy for Multitenant Services by Iterative Staging.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Local Edge Distributions for Detection of Salient Structure Textures and Objects.
IEEE Geosci. Remote Sensing Lett., 2013

Behind the magical numbers: Hierarchical Chunking and the Human Working Memory Capacity.
Int. J. Neural Syst., 2013

A Two-Stage Win-Win Multiattribute Negotiation Model: Optimization and then Concession.
Computational Intelligence, 2013

Establishment of Security Levels in Trusted Cloud Computing Platforms.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Constructing the On/Off Covert Channel on Xen.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Subspace-Based Optimization Method for Inverse Scattering Problems Utilizing Phaseless Data.
IEEE Trans. Geoscience and Remote Sensing, 2011

A Heuristic Algorithm for the Inner-City Multi-Drop: Container Loading Problem.
IJORIS, 2011

Evaluating the transmission rate of covert timing channels in a network.
Computer Networks, 2011

Task scheduling using Bayesian optimization algorithm for heterogeneous computing environments.
Appl. Soft Comput., 2011

On the efficiency of establishing and maintaining security associations in tactical MANETs in group formation.
Proceedings of the MILCOM 2011, 2011

Interventional MR-imaging for thermal ablation therapy.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

Order batching and picking in a synchronized zone order picking system.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

Towards a ramework for automated service negotiation in cloud computing.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint.
Future Generation Comp. Syst., 2010

Implementing a passive network covert timing channel.
Computers & Security, 2010

A modular security architecture for managing security associations in MANETs.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

2009
A study of on/off timing channel based on packet delay distribution.
Computers & Security, 2009

Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure.
Proceedings of the Integrated Network Management, 2009

2008
Grid-Enabled Workflow Management System Based On BPEL.
IJHPCA, 2008

Peer-to-Peer Based Fast File Dissemination in UMTS Networks.
IEICE Transactions, 2008

A Hybrid Feature Selection Approach Based on the Bayesian Network Classifier and Rough Sets.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

Graphical symbol recognition in architectural plans with an improved Ant-Tree based clustering algorithm.
Proceedings of the International Joint Conference on Neural Networks, 2008

A State Class Approach to Time Petri Nets with Weak Semantics.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
On Computation Complexity of the Concurrently Enabled Transition Set Problem.
Proceedings of the Theory and Applications of Models of Computation, 2007

The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Novel Clustering Algorithm for Asymmetric Dataset.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
Bayesian Image Segmentation and the Data Preprocessing Method using Fuzzy C-mean Clustering.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Morphological Neural Network Approach for Vehicle Detection from High Resolution Satellite Imagery.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

2005
Fast tracking of cardiac motion using 3D-HARP.
IEEE Trans. Biomed. Engineering, 2005

An improvement on efficient anonymous auction protocols.
Computers & Security, 2005

Texture Surface Inspection: An Artificial Immune Approach.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

The impact of e-money on the monetary policy.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
Further analysis of password authentication schemes based on authentication tests.
Computers & Security, 2004

2003
Fast Tracking of Cardiac Motion Using 3D-HARP.
Proceedings of the Information Processing in Medical Imaging, 2003

2001
A knowledge base for indexing and retrieving disassembly plans.
J. Intelligent Manufacturing, 2001

Fuzzy C-means Clustering Analysis to Monitor Tissue Perfusion with Near Infrared Imaging.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2001


  Loading...