TEAM: A Layered-Cooperation Topology Evolution Algorithm for Multi-Sink Internet of Things S Zhang, T Qiu, W Si, QZ Sheng, DO Wu IEEE Transactions on Mobile Computing, 2023 | | 2023 |
More Effective Centrality-Based Attacks on Weighted Networks B Mburano, W Si, Q Cao, WX Zheng ICC 2023-IEEE International Conference on Communications, 4366-4372, 2023 | | 2023 |
Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs D Zhang, S Zhu, H Zhang, W Si, WX Zheng IEEE Transactions on Network Science and Engineering, 2022 | 2 | 2022 |
Towards Cooperative Games for Developing Secure Software in Agile SDLC M Vaidhyanathan, W Si, B Javadi, S Camtepe 2022 IEEE/ACIS 23rd International Conference on Software Engineering …, 2022 | | 2022 |
PECS: A Pareto-efficient and Envy-free Cloud Resource Scheduler Q Cao, W Si 2022 IEEE International Performance, Computing, and Communications …, 2022 | | 2022 |
Sat: Integrated multi-agent blackbox security assessment tool using machine learning J Shahid, Z Muhammad, Z Iqbal, MS Khan, Y Amer, W Si 2022 2nd International Conference on Artificial Intelligence (ICAI), 105-111, 2022 | 4 | 2022 |
Measuring network robustness by average network flow W Si, B Mburano, WX Zheng, T Qiu IEEE Transactions on Network Science and Engineering 9 (3), 1697-1712, 2022 | 16 | 2022 |
A comparative study on the variants of R metric for network robustness B Mburano, W Si, WX Zheng 2021 International Symposium on Networks, Computers and Communications …, 2021 | 6 | 2021 |
Towards Minimizing the Metric for Measuring Network Robustness T Zhao, W Si, W Li, AY Zomaya IEEE Transactions on Network Science and Engineering 8 (4), 3290-3302, 2021 | 4 | 2021 |
Optimizing the maximum vertex coverage attacks under knapsack constraint T Zhao, W Si, W Li, AY Zomaya IEEE/ACM Transactions on Networking 29 (3), 1088-1104, 2021 | 4 | 2021 |
Dynamic resource provisioning for sustainable cloud computing systems in the presence of correlated failures Y Sharma, J Taheri, W Si, D Sun, B Javadi IEEE Transactions on Sustainable Computing 6 (4), 641-654, 2020 | 12 | 2020 |
Toward more effective centrality-based attacks on network topologies S Zhang, W Si, T Qiu, Q Cao ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 12 | 2020 |
A 3-D topology evolution scheme with self-adaption for industrial Internet of Things T Qiu, S Zhang, W Si, Q Cao, M Atiquzzaman IEEE Internet of Things Journal 8 (12), 9473-9483, 2020 | 12 | 2020 |
Failure-aware energy-efficient VM consolidation in cloud computing systems Y Sharma, W Si, D Sun, B Javadi Future Generation Computer Systems 94, 620-633, 2019 | 98 | 2019 |
Adaptive path tracing with programmable bloom filters in software-defined networks S Xiong, Q Cao, W Si IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 496-504, 2019 | 7 | 2019 |
Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks T Qiu, J Liu, W Si, DO Wu IEEE/ACM Transactions on Networking 27 (3), 1028-1042, 2019 | 173 | 2019 |
Evaluation of web vulnerability scanners based on owasp benchmark B Mburano, W Si 2018 26th International Conference on Systems Engineering (ICSEng), 1-6, 2018 | 72 | 2018 |
On the performance of greedy forwarding on Yao and Theta graphs W Si, Q Tse, G Mao, AY Zomaya Journal of Parallel and Distributed Computing 117, 87-97, 2018 | 2 | 2018 |
Loop Restricted Existential Rules and First-Order Rewritability for Query Answering V Asuncion, Y Zhang, H Zhang, Y Bai, W Si International Conference on Principles of Knowledge Representation and …, 2018 | | 2018 |
A data-driven robustness algorithm for the internet of things in smart cities T Qiu, J Liu, W Si, M Han, H Ning, M Atiquzzaman IEEE Communications Magazine 55 (12), 18-23, 2017 | 46 | 2017 |