Qi Liao

According to our database1, Qi Liao authored at least 94 papers between 2007 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


A Game-theoretic analysis on the economic viability of mobile content pre-staging.
Wirel. Networks, 2020

OnionGraph: Hierarchical topology+attribute multivariate network visualization.
Vis. Informatics, 2020

Transfer Learning for Tilt-Dependent Radio Map Prediction.
IEEE Trans. Cogn. Commun. Netw., 2020

Designing a general method for predicting the regulatory relationships between long noncoding RNAs and protein-coding genes based on multi-omics characteristics.
Bioinform., 2020

Transfer Learning for Multi-Step Resource Utilization Prediction.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

SLAMORE: SLAM with Object Recognition for 3D Radio Environment Reconstruction.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Adversarial machine learning for spam filters.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Connections Between Spectral Properties of Asymptotic Mappings and Solutions to Wireless Network Problems.
IEEE Trans. Signal Process., 2019

Dynamic Link Anomaly Analysis for Network Security Management.
J. Netw. Syst. Manag., 2019

Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization.
Int. J. Inf. Sec., 2019

An End-to-End Performance Analysis for Service Chaining in a Virtualized Network.
CoRR, 2019

A MILP model for the detailed scheduling of multiproduct pipelines with the hydraulic constraints rigorously considered.
Comput. Chem. Eng., 2019

New batch-centric model for detailed scheduling and inventory management of mesh pipeline networks.
Comput. Chem. Eng., 2019

Optimal design and operation for supply chain system of multi-state natural gas under uncertainties of demand and purchase price.
Comput. Ind. Eng., 2019

Genome-wide identification of the essential protein-coding genes and long non-coding RNAs for human pan-cancer.
Bioinform., 2019

Versatile interactions and bioinformatics analysis of noncoding RNAs.
Briefings Bioinform., 2019

A Stochastic Linear Programming Method for the Reliable Oil Products Supply Chain System With Hub Disruption.
IEEE Access, 2019

Robust Optimization for Emergency Scheduling of Oil Products After Disaster.
IEEE Access, 2019

Transfer Learning for Channel Quality Prediction.
Proceedings of the 5th IEEE International Symposium on Measurements & Networking, 2019

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis.
Proceedings of the 16th International Symposium on Wireless Communication Systems, 2019

Anomaly analysis and visualization for dynamic networks through spatiotemporal graph segmentations.
J. Netw. Comput. Appl., 2018

A self-learning approach for optimal detailed scheduling of multi-product pipeline.
J. Comput. Appl. Math., 2018

Resource Optimization With Flexible Numerology and Frame Structure for Heterogeneous Services.
IEEE Commun. Lett., 2018

Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets.
Gov. Inf. Q., 2018

A MILP model based on flowrate database for detailed scheduling of a multi-product pipeline with multiple pump stations.
Comput. Chem. Eng., 2018

Long noncoding RNA: a crosslink in biological regulatory network.
Briefings Bioinform., 2018

A novel particle swarm optimization based on prey-predator relationship.
Appl. Soft Comput., 2018

Transferring knowledge for tilt-dependent radio map prediction.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Harnessing Uncertainty in Vulnerability Market.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Secure End-to-End Cloud Computing Solution for Emergency Management with UAVs.
Proceedings of the IEEE Global Communications Conference, 2018

Dynamic Power Control for Packets with Deadlines.
Proceedings of the IEEE Global Communications Conference, 2018

CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

A Survey of Anticipatory Mobile Networking: Context-Based Classification, Prediction Methodologies, and Optimization Techniques.
IEEE Commun. Surv. Tutorials, 2017

An examination of the benefits of scalable TTI for heterogeneous traffic management in 5G networks.
Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, 2017

Improving resource efficiency with partial resource muting for future wireless networks.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Dynamic uplink/downlink resource management in flexible duplex-enabled wireless networks.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Statistical learning, anomaly detection, and optimization in self-organizing networks.
PhD thesis, 2016

User password repetitive patterns analysis and visualization.
Inf. Comput. Secur., 2016

Effective network management via dynamic network anomaly visualization.
Int. J. Netw. Manag., 2016

Dynamic Joint Uplink and Downlink Optimization for Uplink and Downlink Decoupling-Enabled 5G Heterogeneous Networks.
CoRR, 2016

Joint Optimization of Coverage, Capacity and Load Balancing in Self-Organizing Networks.
CoRR, 2016

Anticipatory Networking in Future Generation Mobile Networks: a Survey.
CoRR, 2016

Signalling Minimization Framework for Short Data Packet Transmission in 5G.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

On the economics of mobile content pre-staging.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Resource Scheduling for Mixed Traffic Types with Scalable TTI in Dynamic TDD Systems.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Modeling of Mobility-Aware RRC State Transition for Energy-Constrained Signaling Reduction.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

An Economic Alternative to Improve Cybersecurity of E-government and Smart Cities.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

1.5D Egocentric Dynamic Network Visualization.
IEEE Trans. Vis. Comput. Graph., 2015

Channel gain prediction in wireless networks based on spatial-temporal correlation.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

Dynamic DinoFun World Communication Graph.
Proceedings of the 10th IEEE Conference on Visual Analytics Science and Technology, 2015

Network State Awareness and Proactive Anomaly Detection in Self-Organizing Networks.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Cloud Analytics for Wireless Metric Prediction - Framework and Performance.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Measurement-adaptive cellular random access protocols.
Wirel. Networks, 2014

Meta-analyses of 4 CFTR variants associated with the risk of the congenital bilateral absence of the vas deferens.
J. Clin. Bioinform., 2014

Toward a Monopoly Botnet Market.
Inf. Secur. J. A Glob. Perspect., 2014

Analyzing Spatiotemporal Anomalies through Interactive Visualization.
Informatics, 2014

Network pricing: can both ISP and P2P benefit?
Int. J. Netw. Manag., 2014

Portfolio optimization of computer and mobile botnets.
Int. J. Inf. Sec., 2014

Is more P2P always bad for ISPs? An analysis of P2P and ISP business models.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Optical Interconnects between Microprocessor and Memories.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Bridging the Gap of Network Management and Anomaly Detection through Interactive Visualization.
Proceedings of the IEEE Pacific Visualization Symposium, 2014

Hierarchical Focus+Context Heterogeneous Network Visualization.
Proceedings of the IEEE Pacific Visualization Symposium, 2014

Visual analysis of large-scale network anomalies.
IBM J. Res. Dev., 2013

A statistical algorithm for multi-objective handover optimization under uncertainties.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Street-Specific Handover Optimization for Vehicular Terminals in Future Cellular Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Context-aware handover optimization for relay-aided vehicular terminals.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Scalable network traffic visualization using compressed graphs.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Analysis of offense tactics of basketball games using link prediction.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

Could firewall rules be public - a game theoretical perspective.
Secur. Commun. Networks, 2012

NONCODE v3.0: integrative annotation of long noncoding RNAs.
Nucleic Acids Res., 2012

Report on the SIGCOMM 2011 conference.
Comput. Commun. Rev., 2012

A distributed interference-aware load balancing algorithm for LTE multi-cell networks.
Proceedings of the International ITG Workshop on Smart Antennas, 2012

Intelligent network management using graph differential anomaly visualization.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

3D anomaly bar visualization for large-scale network: VAST 2012 Mini Challenge #1.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

Investigating network traffic through compressed graph visualization: VAST 2012 Mini Challenge 2 award: "Good adaptation of graph analysis techniques".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

Toward cell outage detection with composite hypothesis testing.
Proceedings of IEEE International Conference on Communications, 2012

Fighting botnets with economic uncertainty.
Secur. Commun. Networks, 2011

ncFANs: a web server for functional annotation of long non-coding RNAs.
Nucleic Acids Res., 2011

Measurement Based Self-Optimization in Random Access Communications
CoRR, 2011

Visualizing anomalies in sensor networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

SAVE: Sensor anomaly visualization engine.
Proceedings of the 6th IEEE Conference on Visual Analytics Science and Technology, 2011

A Virtual Soft Handover Method Based on Base Station Cooperation with Fountain Codes.
Proceedings of the European Wireless 2011, April 27-29, 2011, Vienna, Austria., 2011

Managing networks through context: Graph visualization and exploration.
Comput. Networks, 2010

Visualizing graph dynamics and similarity for enterprise network security and management.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Spatial simulation of regional land use patterns based on GWR and CLUE-S model.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Clustered microRNAs' coordination in regulating protein-protein interaction network.
BMC Syst. Biol., 2009

Botnet Economics: Uncertainty Matters.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning.
ACM Trans. Inf. Syst. Secur., 2008

Using selective, short-term memory to improve resilience against DDoS exhaustion attacks.
Secur. Commun. Networks, 2008

Botnet Economics: Uncertainty Matters.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

ENAVis: Enterprise Network Activities Visualization.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

SAABCOT: Secure application-agnostic bandwidth conservation techniques.
Proceedings of the Fourth International Conference on Broadband Communications, 2007