Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing K Gai, M Qiu, H Zhao, L Tao, Z Zong Journal of network and computer applications 59, 46-54, 2016 | 613 | 2016 |
Shifting paradigms with the application service provider model L Tao Computer 34 (10), 32-39, 2001 | 287 | 2001 |
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G K Gai, M Qiu, L Tao, Y Zhu Security and communication networks 9 (16), 3049-3058, 2016 | 234 | 2016 |
A static analysis framework for detecting SQL injection vulnerabilities X Fu, X Lu, B Peltsverger, S Chen, K Qian, L Tao 31st annual international computer software and applications conference …, 2007 | 224 | 2007 |
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao Future generation computer systems 80, 421-429, 2018 | 193 | 2018 |
Word embeddings for Arabic sentiment analysis AA Altowayan, L Tao 2016 IEEE international conference on big data (big data), 3820-3825, 2016 | 149 | 2016 |
Proactive attribute-based secure data schema for mobile cloud in financial industry K Gai, M Qiu, B Thuraisingham, L Tao 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 118 | 2015 |
A reusable software component for integrated syntax and semantic validation for services computing L Tao, S Golikov, K Gai, M Qiu 2015 IEEE Symposium on Service-Oriented System Engineering, 127-132, 2015 | 117 | 2015 |
Automated detection and analysis for android ransomware T Yang, Y Yang, K Qian, DCT Lo, Y Qian, L Tao 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 114 | 2015 |
APOGEE: automated project grading and instant feedback system for web based computing X Fu, B Peltsverger, K Qian, L Tao, J Liu ACM SIGCSE Bulletin 40 (1), 77-81, 2008 | 73 | 2008 |
Improving data governance in large organizations through ontology and linked data RJ DeStefano, L Tao, K Gai 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 64 | 2016 |
Software architecture and design illuminated K Qian Jones & Bartlett Learning, 2010 | 61 | 2010 |
Ontology-based knowledge representation for secure self-diagnosis in patient-centered teleheath with cloud systems K Gai, M Qiu, S Jayaraman, L Tao 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 48 | 2015 |
Embeddings among toruses and meshes E Ma, L Tao University of Pennsylvania, School of Engineering and Applied Science …, 1988 | 47 | 1988 |
MongoDB NoSQL injection analysis and detection B Hou, K Qian, L Li, Y Shi, L Tao, J Liu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 38 | 2016 |
Simulated annealing and tabu search algorithms for multiway graph partition L Tao, YC Zhao, K Thulasiraman, MNS Swamy Journal of Circuits, Systems, and Computers 2 (02), 159-185, 1992 | 34 | 1992 |
Effective heuristic algorithms for VLSI circuit partition L Tao, YC Zhao IEE Proceedings G (Circuits, Devices and Systems) 140 (2), 127-134, 1993 | 33 | 1993 |
Benchmark requirements for assessing software security vulnerability testing tools RM Parizi, K Qian, H Shahriar, F Wu, L Tao 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 30 | 2018 |
Improve the prediction accuracy of Naïve Bayes classifier with association rule mining T Yang, K Qian, DCT Lo, Y Xie, Y Shi, L Tao 2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016 | 29 | 2016 |
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure H Dai, S Zhao, J Zhang, M Qiu, L Tao Future Generation Computer Systems 52, 147-155, 2015 | 29 | 2015 |