Qiying Cao

Orcid: 0000-0001-7976-6364

According to our database1, Qiying Cao authored at least 35 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Corrigendum to "Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection".
Wirel. Commun. Mob. Comput., 2021

2020
Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton.
Int. J. Distributed Sens. Networks, 2020

An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs.
IEEE Access, 2020

2019
Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection.
Wirel. Commun. Mob. Comput., 2019

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs.
J. Netw. Comput. Appl., 2019

SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks.
IEEE Access, 2019

2018
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks.
IEEE Internet Things J., 2018

A research on wireless sensor networks' node positioning mechanism based on Narrowband Internet of Things data linking.
Int. J. Distributed Sens. Networks, 2018

Nodes Availability Analysis of Heterogeneous Wireless Sensor Networks Based on NB-IoT Under Malware Infection.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

2017
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.
J. Netw. Comput. Appl., 2017

2016
Reliability Evaluation for Clustered WSNs under Malware Propagation.
Sensors, 2016

Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach.
J. Sensors, 2016

An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

2015
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs.
Mob. Inf. Syst., 2015

Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS.
Int. J. Distributed Sens. Networks, 2015

Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Frequency Warping for Speaker Adaptation in HMM-based Speech Synthesis.
J. Inf. Sci. Eng., 2014

Cross-Dialectal Voice Conversion with Neural Networks.
IEICE Trans. Inf. Syst., 2014

2013
BDI Goal Recognition for Agent Program Learning.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Automatic BDI Plan Recognition from Process Execution Logs and Effect Logs.
Proceedings of the Engineering Multi-Agent Systems - First International Workshop, 2013

2012
Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain.
Appl. Soft Comput., 2012

2011
A Survey of Game Theory in Wireless Sensor Networks Security.
J. Networks, 2011

Signaling game based strategy of intrusion detection in wireless sensor networks.
Comput. Math. Appl., 2011

2010
A genetic algorithm based on extended sequence and topology encoding for the multicast protocol in two-tiered WSN.
Expert Syst. Appl., 2010

P2P-Based Semantic Policy Infrastucture for Pervasive Computing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
A novel intelligent service selection algorithm and application for ubiquitous web services environment.
Expert Syst. Appl., 2009

2008
A novel ANN-based service selection model for ubiquitous computing environments.
J. Netw. Comput. Appl., 2008

Simulation and Analysis of MFlood Protocol in Wireless Network.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Context-Aware Active Task Discovery for Pervasive Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A tuplespace-based coordination architecture for service composition in pervasive computing environments.
Proceedings of the 12th International Conference on CSCW in Design, 2008

2006
Pervasive Computing Context Access Control Based on UCON_ABC Model.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel BP Algorithm Based on Self-adaptive Parameters and Performance Analysis.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Novel BP Algorithm Based on Three-term and Application in Service Selection of Ubiquitous Computing.
Proceedings of the Ninth International Conference on Control, 2006


  Loading...