Detecting malware with an ensemble method based on deep neural network J Yan, Y Qi, Q Rao Security and Communication Networks 2018 (1), 7247095, 2018 | 222 | 2018 |
Footprint: detecting Sybil attacks in urban vehicular networks S Chang, Y Qi, H Zhu, J Zhao, X Shen IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011 | 173 | 2011 |
Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks W Wei, Y Qi Sensors 11, 4794-4807, 2011 | 171 | 2011 |
Causeinfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems P Chen, Y Qi, P Zheng, D Hou IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1887-1895, 2014 | 147 | 2014 |
Multi-step ahead time series forecasting for different data patterns based on LSTM recurrent neural network L Yunpeng, H Di, B Junpeng, Q Yong 2017 14th web information systems and applications conference (WISA), 305-310, 2017 | 133 | 2017 |
Season: Shelving interference and joint identification in large-scale RFID systems L Yang, J Han, Y Qi, C Wang, T Gu, Y Liu 2011 Proceedings IEEE INFOCOM, 3092-3100, 2011 | 113 | 2011 |
Reliable and energy-efficient routing for static wireless ad hoc networks with unreliable links XY Li, Y Wang, H Chen, X Chu, Y Wu, Y Qi IEEE Transactions on Parallel and Distributed Systems 20 (10), 1408-1421, 2008 | 113 | 2008 |
D-Pro: Dynamic data center operations with demand-responsive electricity prices in smart grid P Wang, L Rao, X Liu, Y Qi IEEE Transactions on Smart Grid 3 (4), 1743-1754, 2012 | 105 | 2012 |
Identification-free batch authentication for RFID tags L Yang, J Han, Y Qi, Y Liu The 18th IEEE International Conference on Network Protocols, 154-163, 2010 | 104 | 2010 |
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 101 | 2009 |
Joint throughput optimization for wireless mesh networks XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu IEEE transactions on mobile computing 8 (7), 895-909, 2008 | 77 | 2008 |
{SecPod}: a Framework for Virtualization-based Security Systems X Wang, Y Chen, Z Wang, Y Qi, Y Zhou 2015 USENIX Annual Technical Conference (USENIX ATC 15), 347-360, 2015 | 76 | 2015 |
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment P Chen, Y Qi, D Hou IEEE transactions on services computing 12 (2), 214-230, 2016 | 75 | 2016 |
Carbon-aware electricity cost minimization for sustainable data centers H Dou, Y Qi, W Wei, H Song IEEE Transactions on Sustainable Computing 2 (2), 211-223, 2017 | 72 | 2017 |
Randomizing RFID private authentication Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 69 | 2009 |
Image super-resolution via channel attention and spatial graph convolutional network Y Yang, Y Qi Pattern Recognition 112, 107798, 2021 | 64 | 2021 |
Design and implementation of SecPod, a framework for virtualization-based security systems X Wang, Y Qi, Z Wang, Y Chen, Y Zhou IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017 | 51 | 2017 |
A novel heuristic algorithm for QoS-aware end-to-end service composition Y Luo, Y Qi, D Hou, L Shen, Y Chen, X Zhong Computer Communications 34 (9), 1137-1144, 2011 | 50 | 2011 |
Shelving interference and joint identification in large-scale RFID systems L Yang, Y Qi, J Han, C Wang, Y Liu IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013 | 46 | 2013 |
An automatic framework for detecting and characterizing performance degradation of software systems P Zheng, Y Qi, Y Zhou, P Chen, J Zhan, MRT Lyu IEEE Transactions on Reliability 63 (4), 927-943, 2014 | 45 | 2014 |