Qianmu Li

Orcid: 0000-0002-0998-1517

According to our database1, Qianmu Li authored at least 218 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure data interaction method based on edge computing.
J. Cloud Comput., December, 2024

A Little Truth Injection But a Big Reward: Label Aggregation With Graph Neural Networks.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2024

FDGNN: Feature-Aware Disentangled Graph Neural Network for Recommendation.
IEEE Trans. Comput. Soc. Syst., February, 2024

Microservice-driven privacy-aware cross-platform social relationship prediction based on sequential information.
Softw. Pract. Exp., January, 2024

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey.
Ad Hoc Networks, January, 2024

2023
Edge-enabled federated sequential recommendation with knowledge-aware Transformer.
Future Gener. Comput. Syst., November, 2023

Bandit-based data poisoning attack against federated learning for autonomous driving models.
Expert Syst. Appl., October, 2023

Security in defect detection: A new one-pixel attack for fooling DNNs.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

A Game Theory Study of Big Data Analytics in Internet of Things.
IEEE Trans. Netw. Serv. Manag., June, 2023

Secure multi-factor access control mechanism for pairing blockchains.
J. Inf. Secur. Appl., May, 2023

A Unified Learning Approach for Malicious Domain Name Detection.
Axioms, May, 2023

A privacy-preserving recommendation method with clustering and locality-sensitive hashing.
Comput. Intell., February, 2023

A defensive design for control application based on networked systems.
Soft Comput., 2023

Learning from biased crowdsourced labeling with deep clustering.
Expert Syst. Appl., 2023

Arms Race in Adversarial Malware Detection: A Survey.
ACM Comput. Surv., 2023

Boost Adversarial Transferability by Uniform Scale and Mix Mask Method.
CoRR, 2023

An intelligent recommendation method based on multi-interest network and adversarial deep learning.
Comput. Secur., 2023

Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models.
Aslib J. Inf. Manag., 2023

Noise-Augmented Contrastive Learning for Sequential Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Run Away From the Original Example and Towards Transferability.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Disentangled Hypergraph Collaborative Filtering for Social Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2023

FedFC: An Efficient Personalized Federated Learning Method on Non-iid Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Hierarchical Graph Contrastive Learning via Debiasing Noise Samples with Adaptive Repelling Ratio.
Proceedings of the IEEE International Conference on Data Mining, 2023

FDRS: Federated Diversified Recommender System Based on Heterogeneous Graph Convolutional Network.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

Stochastic Perturbation Averaging Boosts Transferability of Adversarial Examples.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Hybrid Multi-Strategy Improvements for The Aquila Optimizer.
Proceedings of the IEEE Intl Conf on Dependable, 2023

MERGE: Multi-Entity Relational Reasoning Based Explanation in Visual Question Answering.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Black-box Speech Adversarial Attack with Genetic Algorithm and Generic Attack Ideas.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Multi-Channel Composite Recommendation Method in Federated Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Improving Adversarial Transferability with Heuristic Random Transformation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

SMEF: Social-aware Multi-dimensional Edge Features-based Graph Representation Learning for Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Boosting Adversarial Attacks with Improved Sign Method.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Time-aware scalable recommendation with clustering-based distributed factorization for edge services.
World Wide Web, 2022

A threat recognition solution of edge data security in industrial internet.
World Wide Web, 2022

Privacy-Aware Factorization-Based Hybrid Recommendation Method for Healthcare Services.
IEEE Trans. Ind. Informatics, 2022

Multi-Sensor Fault Diagnosis Based on Time Series in an Intelligent Mechanical System.
Sensors, 2022

Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data.
J. Organ. End User Comput., 2022

Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform.
J. Circuits Syst. Comput., 2022

Defect knowledge graph construction and application in multi-cloud IoT.
J. Cloud Comput., 2022

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022

A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things.
IEEE Internet Things J., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

Study on the method of identifying diseases with abnormally high signals based on machine learning technology.
Int. J. Inf. Commun. Technol., 2022

Bipartite network embedding with Symmetric Neighborhood Convolution.
Expert Syst. Appl., 2022

Estimating crowd density with edge intelligence based on lightweight convolutional neural networks.
Expert Syst. Appl., 2022

A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things.
Cryptogr., 2022

Real-centric Consistency Learning for Deepfake Detection.
CoRR, 2022

Understanding CNNs from excitations.
CoRR, 2022

FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022

Analyzing the Research Trends of IoT Using Topic Modeling.
Comput. J., 2022

AngHNE: Representation Learning for Bipartite Heterogeneous Networks with Angular Loss.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation.
Proceedings of the IEEE Smartworld, 2022

Long- and Short- Term Sequential Recommendation with Temporal Interval.
Proceedings of the IEEE Smartworld, 2022

FWC: Fitting Weight Compression Method for Reducing Communication Traffic for Federated Learning.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Attributed Graph Clustering with Double Contrastive Projector.
Proceedings of the International Joint Conference on Neural Networks, 2022

Fused Pruning based Robust Deep Neural Network Watermark Embedding.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Label Aggregation with Clustering for Biased Crowdsourced Labeling.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Attention Based Adversarial Attacks with Low Perturbations.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

Federated Deep Recommendation System Based on Multi-View Feature Embedding.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

A Joint Knowledge Graph Reasoning Method.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

CPGCN: Collaborative Property-aware Graph Convolutional Networks for Service Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
An Effective Classification-Based Framework for Predicting Cloud Capacity Demand in Cloud Services.
IEEE Trans. Serv. Comput., 2021

Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing.
ACM Trans. Internet Techn., 2021

A Framework for Enhancing Deep Neural Networks Against Adversarial Malware.
IEEE Trans. Netw. Sci. Eng., 2021

Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2021

An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things.
Secur. Commun. Networks, 2021

An Enhanced Cascading Model for E-Commerce Consumer Credit Default Prediction.
J. Organ. End User Comput., 2021

Privacy preserving techniques for decision trees.
Int. J. Inf. Comput. Secur., 2021

Multi-label graph node classification with label attentive neighborhood convolution.
Expert Syst. Appl., 2021

Multi-label active learning from crowds for secure IIoT.
Ad Hoc Networks, 2021

Puncturable Search: Enabling Authorized Search in Cross-data Federation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Edge Computing-Enabled Crowd Density Estimation based on Lightweight Convolutional Neural Network.
Proceedings of the IEEE International Smart Cities Conference, 2021

Heterogeneous Graph Embedding Based on Edge-aware Neighborhood Convolution.
Proceedings of the International Joint Conference on Neural Networks, 2021

Topic-Attentive Encoder-Decoder with Pre-Trained Language Model for Keyphrase Generation.
Proceedings of the IEEE International Conference on Data Mining, 2021

Transformer-Based Rating-Aware Sequential Recommendation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Heuristic Network Security Risk Assessment Based on Attack Graph.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021

KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Low-cohesion differential privacy protection for industrial Internet.
J. Supercomput., 2020

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2020

MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices.
Secur. Commun. Networks, 2020

Active Defense by Mimic Association Transmission in Edge Computing.
Mob. Networks Appl., 2020

DISL: Deep Isomorphic Substructure Learning for network representations.
Knowl. Based Syst., 2020

A security event description of intelligent applications in edge-cloud environment.
J. Cloud Comput., 2020

Research on automatic annotation of pathological image detail information based on machine learning.
Int. J. Inf. Commun. Technol., 2020

Multiclass imbalanced learning with one-versus-one decomposition and spectral clustering.
Expert Syst. Appl., 2020

Learning deep networks with crowdsourcing for relevance evaluation.
EURASIP J. Wirel. Commun. Netw., 2020

A dynamic taint tracking optimized fuzz testing method based on multi-modal sensor data fusion.
EURASIP J. Wirel. Commun. Netw., 2020

An adversarial learning approach for discovering social relations in human-centered information networks.
EURASIP J. Wirel. Commun. Netw., 2020

SoK: Arms Race in Adversarial Malware Detection.
CoRR, 2020

Enhancing Deep Neural Networks Against Adversarial Malware Examples.
CoRR, 2020

An Overview of Two Age Synthesis and Estimation Techniques.
CoRR, 2020

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks.
CoRR, 2020

Temporal-aware and sparsity-tolerant hybrid collaborative recommendation method with privacy preservation.
Concurr. Comput. Pract. Exp., 2020

Security-Driven hybrid collaborative recommendation method for cloud-based iot services.
Comput. Secur., 2020

ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks.
Complex., 2020

Single Magnetic Element-Based High Step-Up Converter for Energy Storage and Photovoltaic System with Reduced Device Count.
Complex., 2020

Gaussian Mixture Variational Autoencoder for Semi-Supervised Topic Modeling.
IEEE Access, 2020

Fusion Learning Model for Mobile Face Safe Detection and Facial Gesture Analysis.
IEEE Access, 2020

A Cloud-Fog-Edge Closed-Loop Feedback Security Risk Prediction Method.
IEEE Access, 2020

Intelligent Processing of Intrusion Detection Data.
IEEE Access, 2020

Targeted Influence Maximization Based on Cloud Computing Over Big Data in Social Networks.
IEEE Access, 2020

Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought.
Proceedings of the Security and Privacy in Digital Economy, 2020

Analysis on Industrial Internet Traffic Characteristics.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A High Capacity Text Steganography Utilizing Unicode Zero-Width Characters.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Research Review on Imbalanced Learning Models in Embedded Intelligent Computing.
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020

Security Control Components for Epidemic Prevention Donation Management Blockchain.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Quantized dissipative filter design for Markovian switch T-S fuzzy systems with time-varying delays.
Soft Comput., 2019

A Survey of Genetic Programming and Its Applications.
KSII Trans. Internet Inf. Syst., 2019

Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems.
Future Gener. Comput. Syst., 2019

Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
Entropy, 2019

Time-Aware Gated Recurrent Unit Networks for Road Surface Friction Prediction Using Historical Data.
CoRR, 2019

A fault-tolerant dynamic scheduling method on hierarchical mobile edge cloud computing.
Comput. Intell., 2019

EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain.
IEEE Access, 2019

Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm.
IEEE Access, 2019

Complex Attack Linkage Decision-Making in Edge Computing Networks.
IEEE Access, 2019

CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network.
IEEE Access, 2019

An Intrusion Tracking Watermarking Scheme.
IEEE Access, 2019

DPRF: A Differential Privacy Protection Random Forest.
IEEE Access, 2019

Text Mining Techniques to Capture Facts for Cloud Computing Adoption and Big Data Processing.
IEEE Access, 2019

Adaptive Event-Triggered Mixed $H_{\infty}$ and Passivity-Based Filter Design for Nonlinear T-S Fuzzy Markovian Switching Systems With Time-Varying Delays.
IEEE Access, 2019

Self-similarity Analysis and Application of Network Traffic.
Proceedings of the Mobile Computing, Applications, and Services, 2019

An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation.
Proceedings of the Mobile Computing, Applications, and Services, 2019

Design of Dynamic Analysis and Grammar Generation Method in Industrial Control Protocols Test.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Differentially Private Recommender System with Autoencoders.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

ADPR: An Attention-based Deep Learning Point-of-Interest Recommendation Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019

Performance analysis of co-operative MIMO channel over sensor control networks.
Proceedings of the 3rd International Conference on High Performance Compilation, 2019

A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture Analysis.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

A Differential Privacy Random Forest Method of Privacy Protection in Cloud.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Safe Facial Multi-Attribute Feature Fusion Analysis Based on Embedded Multi-Task Learning.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Troubleshooting Test Method Based on Industrial Control Grammar Model.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

The Research Reviewed of Edge Network Active Safety Defense Technology.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Self-Similarity Analysis and Application of Water Network Traffic.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Mimic Defense Techniques of Edge-Computing Terminal.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Network Traffic Big Data Prediction Model Based on Combinatorial Learning.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Safety Risk Monitoring of Hydraulic Power Generation Industrial Control Network.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.
Secur. Commun. Networks, 2018

基于单个卷积神经网络的面部多特征点定位 (Facial Multi-landmarks Localization Based on Single Convolution Neural Network).
计算机科学, 2018

Price forecasting for spot instances in Cloud computing.
Future Gener. Comput. Syst., 2018

A novel data-driven stock price trend prediction system.
Expert Syst. Appl., 2018

Noise-tolerance matrix completion for location recommendation.
Data Min. Knowl. Discov., 2018

Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.
CoRR, 2018

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.
CoRR, 2018

Game-Model-Based Network Security Risk Control.
Computer, 2018

Differentially private classification with decision tree ensemble.
Appl. Soft Comput., 2018

Spatial-Temporal Aware Intelligent Service Recommendation Method Based on Distributed Tensor factorization for Big Data Applications.
IEEE Access, 2018

AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018

Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

Multi-class Imbalanced Learning with One-Versus-One Decomposition: An Empirical Study.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017

Call Admission Control With Inter-Network Cooperation for Cognitive Heterogeneous Networks.
IEEE Trans. Wirel. Commun., 2017

Double-Sided Bidding Mechanism for Resource Sharing in Mobile Cloud.
IEEE Trans. Veh. Technol., 2017

Energy-efficient resource allocation for multiuser OFDMA system based on hybrid genetic simulated annealing.
Soft Comput., 2017

Private classification with limited labeled data.
Knowl. Based Syst., 2017

基于时变加权马尔科夫链的网络异常检测模型 (Network Anomaly Detection Model Based on Time-varying Weighted Markov Chain).
计算机科学, 2017

一种面向融合泛在网的协同防护体系设计 (Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network).
计算机科学, 2017

电网融合泛在网信息平台设计及安全威胁分析 (Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid).
计算机科学, 2017

基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data).
计算机科学, 2017

Consensus algorithms for biased labeling in crowdsourcing.
Inf. Sci., 2017

Research on dynamic heuristic scanning technique and the application of the malicious code detection model.
Inf. Process. Lett., 2017

ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times.
J. Grid Comput., 2017

A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds.
Future Gener. Comput. Syst., 2017

VRer: Context-Based Venue Recommendation using embedded space ranking SVM in location-based social network.
Expert Syst. Appl., 2017

The Proactive Defense of Energy Internet Terminals Edge-Access Using the Network Topology Autoassociation.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2017

Long short-term memory neural network for network traffic prediction.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Attention-based recurrent neural network for location recommendation.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

A robust inference algorithm for crowd sourced categorization.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

An accident prediction approach based on XGBoost.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

SimWalk: Learning network latent representations with social relation similarity.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

A Viewpoint on Location-Based Mobile Apps Testing.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization.
IEEE Wirel. Commun. Lett., 2016

FindMal: A file-to-file social network based malware detection framework.
Knowl. Based Syst., 2016

一种基于马尔科夫模型的网络安全风险实时分析方法 (Real Time Analysis Method of Network Security Risk Based on Markov Model).
计算机科学, 2016

一种基于攻防图的网络安全防御策略生成方法 (Improved Network Security Defense Strategy Generation Method Based on Attack-Defense Graph).
计算机科学, 2016

基于冗余消除和属性数值化的XACML策略优化方法 (XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization).
计算机科学, 2016

FIRST: Face Identity Recognition in SmarT Bank.
Int. J. Semantic Comput., 2016

Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System.
Neurocomputing, 2016

On random hyper-class random forest for visual classification.
Neurocomputing, 2016

HDCache: A Distributed Cache System for Real-Time Cloud Services.
J. Grid Comput., 2016

Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Dual Sentiment Analysis: Considering Two Sides of One Review.
IEEE Trans. Knowl. Data Eng., 2015

基于增量近邻查询的位置隐私保护方法 (Location Privacy Protection Method Based on Incremental Nearest Neighbor Query).
计算机科学, 2015

面向移动传感网的攻击风险监测系统 (Security Risk Monitor System of Mobile Sensor Network).
计算机科学, 2015

Proportional fair resource allocation based on hybrid ant colony optimization for slow adaptive OFDMA system.
Inf. Sci., 2015

Social Tie Based Cooperative Jamming for Physical Layer Security.
IEEE Commun. Lett., 2015

Resource allocation algorithm based on hybrid particle swarm optimization for multiuser cognitive OFDM network.
Expert Syst. Appl., 2015

A Classification-Based Demand Trend Prediction Model in Cloud Computing.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

File Relation Graph Based Malware Detection Using Label Propagation.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Energy and time optimization for wireless computation offloading.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Efficient 4D Non-local Tensor Total-Variation for Low-Dose CT Perfusion Deconvolution.
Proceedings of the Medical Computer Vision: Algorithms for Big Data, 2015

2014
Proportional Fair Resource Allocation Based on Chance-Constrained Programming for Cognitive OFDM Network.
Wirel. Pers. Commun., 2014

A SEIR Model Epidemic of Virus on the Online Social Network.
J. Digit. Inf. Manag., 2014

An Indirect Security Trust Method Based on Credibility Evaluation.
J. Digit. Inf. Manag., 2014

A WSN Nodes Access Mechanism and Directed Diffusion in Emergency Circumstances.
J. Digit. Inf. Manag., 2014

Analysis of Information Management and Scheduling Technology in Hadoop.
J. Digit. Inf. Manag., 2014

A Comprehensive Trust Model Based on Reputation and Fuzzy Theory.
J. Comput., 2014

Exploring the diversity in cluster ensemble generation: Random sampling and random projection.
Expert Syst. Appl., 2014

Social network user influence sense-making and dynamics prediction.
Expert Syst. Appl., 2014

2012
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2010
Model and analysis of path compression for mobile Ad Hoc networks.
Comput. Electr. Eng., 2010

2008
An adaptive clustering routing transition protocol in ad hoc networks.
Comput. Commun., 2008

Information Security Risk Assessment Method Based on CORAS Frame.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
Formal description and verification of MAS interaction protocols.
Multiagent Grid Syst., 2006

The Design of Data-Link Equipment Redundant Strategy.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

A Root-fault Detection System of Grid Based on Immunology.
Proceedings of the Grid and Cooperative Computing, 2006

A Grid Troubleshooting Method Based on Fuzzy Event.
Proceedings of the Grid and Cooperative Computing, 2006

2005
A symmetric cryptography based on extended cellular automata.
Proceedings of the IEEE International Conference on Systems, 2005

Network congestion prediction based on RFNN.
Proceedings of the IEEE International Conference on Systems, 2005

A New Method of Network Data Link Troubleshooting.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Neural Network Based Flow Forecast and Diagnosis.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...