关注
Yangyang Li (李阳阳)
Yangyang Li (李阳阳)
Senior Engineer, China Academy of Electronics and Information Technology
在 cetc.com.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Security and privacy in the medical internet of things: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Security and Communication Networks 2018 (1), 5978636, 2018
3552018
Data processing and text mining technologies on electronic medical records: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Journal of healthcare engineering 2018 (1), 4302425, 2018
3222018
Energy-saving virtual machine placement in cloud data centers
J Dong, X Jin, H Wang, Y Li, P Zhang, S Cheng
2013 13th IEEE/ACM international symposium on cluster, cloud, and grid …, 2013
1852013
A survey on security‐aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018 (1), 2459154, 2018
1032018
Securing display path for security-sensitive applications on mobile devices
J Cui, Y Zhang, Z Cai, A Liu, Y Li
Computers, Materials and Continua 55 (1), 17, 2018
822018
Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection.
M Luo, K Wang, Z Cai, A Liu, Y Li, CF Cheang
Computers, Materials & Continua 58 (1), 2019
722019
Virtual machine placement optimizing to improve network performance in cloud data centers
J Dong, H WANG, Y LI, S CHENG
The Journal of China Universities of Posts and Telecommunications 21 (3), 62-70, 2014
562014
Toward energy-aware caching for intelligent connected vehicles
H Wu, J Zhang, Z Cai, F Liu, Y Li, A Liu
IEEE Internet of Things Journal 7 (9), 8157-8166, 2020
492020
Me2: Efficient live migration of virtual machine with memory exploration and encoding
Y Ma, H Wang, J Dong, Y Li, S Cheng
2012 IEEE International Conference on Cluster Computing, 610-613, 2012
462012
Virtual machine placement for improving energy efficiency and network performance in iaas cloud
J Dong, H Wang, X Jin, Y Li, P Zhang, S Cheng
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
452013
Security and cost‐aware computation offloading via deep reinforcement learning in mobile edge computing
B Huang, Y Li, Z Li, L Pan, S Wang, Y Xu, H Hu
Wireless Communications and Mobile Computing 2019 (1), 3816237, 2019
442019
Android malware identification based on traffic analysis
R Chen, Y Li, W Fang
International conference on artificial intelligence and security, 293-303, 2019
402019
Social bots detection via fusing bert and graph convolutional networks
Q Guo, H Xie, Y Li, W Ma, C Zhang
Symmetry 14 (1), 30, 2021
362021
Virtual machine scheduling for improving energy efciency in IaaS cloud
D Jiankang, W Hongbo, L Yangyang, C Shiduan
China communications 11 (3), 1-12, 2014
362014
Deep reinforcement learning guided graph neural networks for brain network analysis
X Zhao, J Wu, H Peng, A Beheshti, JJM Monaghan, D McAlpine, ...
Neural Networks 154, 56-67, 2022
342022
An openflow-based load balancing strategy in SDN
X Shi, Y Li, H Xie, T Yang, L Zhang, P Liu, H Zhang, Z Liang
Comput. Mater. Contin 62 (1), 385-398, 2020
342020
Markov approximation for task offloading and computation scaling in mobile edge computing
W Zhou, W Fang, Y Li, B Yuan, Y Li, T Wang
Mobile Information Systems 2019 (1), 8172698, 2019
342019
RoSGAS: Adaptive Social Bot Detection with Reinforced Self-supervised GNN Architecture Search
Y Yang, R Yang, Y Li, K Cui, Z Yang, Y Wang, J Xu, H Xie
ACM Transactions on the Web 17 (3), 1-31, 2023
332023
Object-difference drived graph convolutional networks for visual question answering
X Zhu, Z Mao, Z Chen, Y Li, Z Wang, B Wang
Multimedia Tools and Applications 80 (11), 16247-16265, 2021
322021
OKRA: optimal task and resource allocation for energy minimization in mobile edge computing systems
W Fang, S Ding, Y Li, W Zhou, N Xiong
Wireless Networks 25, 2851-2867, 2019
302019
系统目前无法执行此操作,请稍后再试。
文章 1–20