Yong Qi

According to our database1, Yong Qi authored at least 143 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment.
IEEE Trans. Services Computing, 2019

Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Sec. Comput., 2019

mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform.
Future Generation Comp. Syst., 2019

2018
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy.
IEEE Trans. Dependable Sec. Comput., 2018

A Self-Training Subspace Clustering Algorithm under Low-Rank Representation for Cancer Classification on Gene Expression Data.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Detecting Malware with an Ensemble Method Based on Deep Neural Network.
Security and Communication Networks, 2018

LSTM-Based Hierarchical Denoising Network for Android Malware Detection.
Security and Communication Networks, 2018

What affects the user stickiness of the mainstream media websites in China?
Electronic Commerce Research and Applications, 2018

Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Hybrid Approach for Predicting Aging-Related Failures of Software Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Learning API Suggestion via Single LSTM Network with Deterministic Negative Sampling.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

A Distributed Rule Engine for Streaming Big Data.
Proceedings of the Web Information Systems and Applications, 2018

2017
Carbon-Aware Electricity Cost Minimization for Sustainable Data Centers.
T-SUSC, 2017

InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems.
IEEE Trans. Emerging Topics Comput., 2017

Nosv: A lightweight nested-virtualization VMM for hosting high performance computing on cloud.
Journal of Systems and Software, 2017

Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud.
IACR Cryptology ePrint Archive, 2017

An online electricity cost budgeting algorithm for maximizing green energy usage across data centers.
Frontiers Comput. Sci., 2017

A cost-effective strategy for Cloud system maintenance.
Computers & Electrical Engineering, 2017

A Recommendation-Based Parameter Tuning Approach for Hadoop.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

An algorithm of pose estimation based on conic correspondences.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Long short-term memory neural network for network traffic prediction.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

A robust inference algorithm for crowd sourced categorization.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

An accident prediction approach based on XGBoost.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Secure the commodity applications against address exposure attacks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A High Energy Physical Metadata Directory Structure Based on RAMCloud.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A two-time-scale load balancing framework for minimizing electricity bills of Internet Data Centers.
Personal and Ubiquitous Computing, 2016

A Heuristic Time Sharing Policy for Backup Resources in Cloud System.
TIIS, 2016

Polarity shift detection, elimination and ensemble: A three-stage model for document-level sentiment analysis.
Inf. Process. Manage., 2016

FIRST: Face Identity Recognition in SmarT Bank.
Int. J. Semantic Computing, 2016

Vein point cloud registration algorithm for multi-pose hand vein authentication.
Proceedings of the IEEE International Conference on Identity, 2016

3D feature array involved registration algorithm for multi-pose hand vein authentication.
Proceedings of the International Conference on Biometrics, 2016

Enhancing Data Secrecy with Segmentation Based Isolation.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

Optimizing Backup Resources in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Dual Sentiment Analysis: Considering Two Sides of One Review.
IEEE Trans. Knowl. Data Eng., 2015

PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
IEEE Trans. Computers, 2015

α-Dominance relation and rough sets in interval-valued information systems.
Inf. Sci., 2015

AppSec: A Safe Execution Environment for Security Sensitive Applications.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

SecPod: a Framework for Virtualization-based Security Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Greening Data Centers within Cost Budget.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing.
Proceedings of the International Conference on Identification, 2015

A Novel Approach to Improving Resource Utilization for IaaS.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
An Automatic Framework for Detecting and Characterizing Performance Degradation of Software Systems.
IEEE Trans. Reliability, 2014

Updating multigranulation rough approximations with increasing of granular structures.
Knowl.-Based Syst., 2014

Power-aware optimization for heterogeneous multi-tier clusters.
J. Parallel Distrib. Comput., 2014

A WSN Nodes Access Mechanism and Directed Diffusion in Emergency Circumstances.
JDIM, 2014

A Comprehensive Trust Model Based on Reputation and Fuzzy Theory.
JCP, 2014

TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud.
JCP, 2014

InvarNet-X: A Comprehensive Invariant Based Approach for Performance Diagnosis in Big Data Platform.
Proceedings of the Big Data Benchmarks, Performance Optimization, and Emerging Hardware, 2014

Characterizing Hierarchies on Covering-Based Multigranulation Spaces.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Multicost Decision-Theoretic Rough Sets Based on Maximal Consistent Blocks.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Want More? Pay More!
Proceedings of the Rough Sets and Current Trends in Computing, 2014

Frogeye: Perception of the slightest tag motion.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Multiplexing of Backup VMs Based on Greedy Policy.
Proceedings of the 11th Web Information System and Application Conference, 2014

Granger Causality-Aware Prediction and Diagnosis of Software Degradation.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
TargetATPsite: A template-free method for ATP-binding sites prediction with residue evolution image sparse representation and classifier ensemble.
Journal of Computational Chemistry, 2013

Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture.
Frontiers Comput. Sci., 2013

A lightweight VMM on many core for high performance computing.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

Multi-scale Entropy: One Metric of Software Aging.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Present or Future: Optimal Pricing for Spot Instances.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

CloudRank-V: A Desktop Cloud Benchmark with Complex Workloads.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

An ensemble MIC-based approach for performance diagnosis in big data platform.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Hybrid Power Control and Electricity Cost Management for Distributed Internet Data Centers in Cloud Computing.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
D-Pro: Dynamic Data Center Operations With Demand-Responsive Electricity Prices in Smart Grid.
IEEE Trans. Smart Grid, 2012

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

An Advanced Methodology for Measuring and Characterizing Software Aging.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Supervised Kernel Self-Organizing Map.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

A Mobile-Certificate Security Method of Satellite-Earth Integration Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Isolate secure executing environment for a safe cloud.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
Online Estimation of the Approximate Posterior Cramer-Rao Lower Bound for Discrete-Time Nonlinear Filtering.
IEEE Trans. Aerospace and Electronic Systems, 2011

Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks.
Sensors, 2011

Tensor Field Model for higher-order information retrieval.
Journal of Systems and Software, 2011

A Reference Programming Model for Building Context-Aware Application.
IEICE Transactions, 2011

A novel heuristic algorithm for QoS-aware end-to-end service composition.
Computer Communications, 2011

Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2011

Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Inter-domain Communication Mechanism Design and Implementation for High Performance.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011

Dynamic Power Management of Distributed Internet Data Centers in Smart Grid Environment.
Proceedings of the Global Communications Conference, 2011

2010
A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010

An adaptive mode-driven spatiotemporal motion vector prediction for wavelet video coding.
Proceedings of the Visual Communications and Image Processing 2010, 2010

A Text Copy Detection System Based on Complex Event Processing Architecture.
Proceedings of the Towards a Service-Based Internet. ServiceWave 2010 Workshops, 2010

A Novel End-User Oriented Service Composition Model Based on Quotient Space Theory.
Proceedings of the International Conference on Service Sciences, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Power Management in Heterogeneous Multi-tier Web Clusters.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Identification-free batch authentication for RFID tags.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Dynamic Projection from Choreography to Orchestration Based on Role Correlation.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links.
IEEE Trans. Parallel Distrib. Syst., 2009

Joint Throughput Optimization for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2009

Energy Saving Task Scheduling for Heterogeneous CMP System Based on Multi-objective Fuzzy Genetic Algorithm.
Proceedings of the IEEE International Conference on Systems, 2009

A Table-Driven Programming Paradigm for Context-Aware Application Development.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009

A Multi-step Task Allocation Algorithm of Mobile Agent Based on Mobile Ad Hoc Network.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

EUL: An Efficient and Universal Localization Method for Wireless Sensor Network.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

A Mixed Software Rejuvenation Policy for Multiple Degradations Software System.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Variant rate based cross layer time frame scheduling in wireless sensor networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

A multi-objective hybrid genetic algorithm for energy saving task scheduling in CMP system.
Proceedings of the IEEE International Conference on Systems, 2008

Safety assurance for archeologists using sensor network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

New Programming Model for Pervasive Computing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

An Improved Heuristic for QoS-Aware Service Composition Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Designing Simulated Context-Aware Telephone in Pervasive Spaces.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

An Improved Calculus for Secure Dynamic Services Composition.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

SpiG4WSC: A Calculus for Secure Services Composition.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

A novel formal framework for secure dynamic services composition.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
An Offset Algorithm for Conflict Resolution in Context-Aware Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Research on context-aware architecture for personal information privacy protection.
Proceedings of the IEEE International Conference on Systems, 2007

The Research and Design of the Semantic Search Engine Based on Ontology.
Proceedings of the Third International Conference on Semantics, 2007

The Research on Term Field Based Term Co-Occurrence Model.
Proceedings of the Third International Conference on Semantics, 2007

Context-Aware Semantic Web Service Discovery.
Proceedings of the Third International Conference on Semantics, 2007

Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems.
Proceedings of the International Conference on Networking, 2007

Isotope Programming Model: a Kind of Program Model for Context-Aware Application.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Context-Aware Learning Privacy Disclosure Policy from Interaction History.
Proceedings of the Third International Conference on Natural Computation, 2007

Software Aging Forecasting Model of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

Energy-Aware Scheduling Tasks on Chip Multiprocessor.
Proceedings of the Third International Conference on Natural Computation, 2007

Application Server Aging Prediction Model Based on Wavelet Network with Adaptive Particle Swarm Optimization Algorithm.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

A Formal Model for Security-Aware dynamic Web Services Composition.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

A Study on Context-aware Privacy Protection for Personal Information.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Forecasting Software Aging of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Fourth International Conference on Autonomic Computing (ICAC'07), 2007

Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Developing an Insulin Pump System Using the SOFL Method.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Kernel-SOM Based Visualization of Financial Time Series Forecasting.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A New Method of Network Data Link Troubleshooting.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2000
OTMS-A CORBA-Compliant Object Transaction Management System.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...