A robust map matching method by considering memorized multiple matching candidates W Li, Y Wang, D Li, X Xu Theoretical Computer Science 941, 104-120, 2023 | 3 | 2023 |
InferLoc: Hypothesis-based joint edge inference and localization in sparse sensor networks X Bai, Y Wang, H Ping, X Xu, D Li, S Wang ACM Transactions on Sensor Networks 20 (1), 1-28, 2023 | 2 | 2023 |
Mcm: A robust map matching method by tracking multiple road candidates W Li, Y Wang, D Li, X Xu International Conference on Algorithmic Applications in Management, 231-243, 2022 | 2 | 2022 |
A fault diagnosis method to defend scapegoating attack in network tomography X Xu, Y Wang, Y Zhang, D Li Theoretical Computer Science 939, 237-249, 2023 | 1 | 2023 |
Defense of scapegoating attack in network tomography X Xu, Y Wang, Y Zhang, D Li International Conference on Algorithmic Applications in Management, 171-182, 2022 | 1 | 2022 |
An Efficient and Exact Algorithm for Locally h-Clique Densest Subgraph Discovery X Xu, H Liu, X Lv, Y Wang, D Li arXiv preprint arXiv:2408.14022, 2024 | | 2024 |
Bottom-up k-Vertex Connected Component Enumeration by Multiple Expansion H Liu, Y Wang, X Xu, D Li 2024 IEEE 40th International Conference on Data Engineering (ICDE), 3000-3012, 2024 | | 2024 |
网络诊断技术研究综述 许晓佳, 王永才, 李德英 智能科学与技术学报 5 (2), 163-179, 2023 | | 2023 |
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography X Xu, Y Wang, L Xu, D Li IEEE Transactions on Network Science and Engineering 10 (6), 3670-3681, 2023 | | 2023 |