Privacy-preserving federated learning framework based on chained secure multiparty computing Y Li, Y Zhou, A Jolfaei, D Yu, G Xu, X Zheng IEEE Internet of Things Journal 8 (8), 6178-6186, 2020 | 178 | 2020 |
A survey on security issues in services communication of Microservices‐enabled fog applications D Yu, Y Jin, Y Zhang, X Zheng Concurrency and Computation: Practice and Experience 31 (22), e4436, 2019 | 150 | 2019 |
A survey of security and privacy issues in the Internet of Things from the layered context S Deep, X Zheng, A Jolfaei, D Yu, P Ostovari, A Kashif Bashir Transactions on Emerging Telecommunications Technologies 33 (6), e3935, 2022 | 112 | 2022 |
Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey M Dibaei, X Zheng, Y Xia, X Xu, A Jolfaei, AK Bashir, U Tariq, D Yu, ... IEEE Transactions on Intelligent Transportation Systems 23 (2), 683-700, 2021 | 92 | 2021 |
RAS-M: Resource allocation strategy based on market mechanism in cloud computing X You, X Xu, J Wan, D Yu 2009 Fourth ChinaGrid Annual Conference, 256-263, 2009 | 85 | 2009 |
Personalized QoS prediction for web services using latent factor models D Yu, Y Liu, Y Xu, Y Yin 2014 IEEE international conference on services computing, 107-114, 2014 | 75 | 2014 |
A survey on anomalous behavior detection for elderly care using dense-sensing networks S Deep, X Zheng, C Karmakar, D Yu, LGC Hamey, J Jin IEEE Communications Surveys & Tutorials 22 (1), 352-370, 2019 | 74 | 2019 |
A comprehensive approach to the recovery of design pattern instances based on sub-patterns and method signatures D Yu, Y Zhang, Z Chen Journal of Systems and Software 103, 1-16, 2015 | 69 | 2015 |
Came: Content-and context-aware music embedding for recommendation D Wang, X Zhang, D Yu, G Xu, S Deng IEEE Transactions on Neural Networks and Learning Systems 32 (3), 1375-1388, 2020 | 61 | 2020 |
Hierarchical topic modeling of Twitter data for online analytical processing D Yu, D Xu, D Wang, Z Ni IEEE access 7, 12373-12385, 2019 | 57 | 2019 |
Outcome-oriented predictive process monitoring with attention-based bidirectional LSTM neural networks J Wang, D Yu, C Liu, X Sun 2019 IEEE International Conference on Web Services (ICWS), 360-367, 2019 | 54 | 2019 |
Attentive sequential model based on graph neural network for next poi recommendation D Wang, X Wang, Z Xiang, D Yu, S Deng, G Xu World Wide Web 24 (6), 2161-2184, 2021 | 51 | 2021 |
Rating prediction using review texts with underlying sentiments D Yu, Y Mu, Y Jin Information Processing Letters 117, 10-18, 2017 | 41 | 2017 |
Detecting java code clones with multi-granularities based on bytecode D Yu, J Wang, Q Wu, J Yang, J Wang, W Yang, W Yan 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 35 | 2017 |
Time-aware sequence model for next-item recommendation D Wang, D Xu, D Yu, G Xu Applied Intelligence 51, 906-920, 2021 | 34 | 2021 |
Leveraging contextual influence and user preferences for point-of-interest recommendation D Yu, W Wanyan, D Wang Multimedia Tools and Applications 80 (1), 1487-1501, 2021 | 33 | 2021 |
Forecasting short-term traffic speed based on multiple attributes of adjacent roads D Yu, C Liu, Y Wu, S Liao, T Anwar, W Li, C Zhou Knowledge-Based Systems 163, 472-484, 2019 | 33 | 2019 |
Efficiently detecting structural design pattern instances based on ordered sequences D Yu, P Zhang, J Yang, Z Chen, C Liu, J Chen Journal of Systems and Software 142, 35-56, 2018 | 33 | 2018 |
Spatiotemporal trident networks: detection and localization of object removal tampering in video passive forensics Q Yang, D Yu, Z Zhang, Y Yao, L Chen IEEE Transactions on Circuits and Systems for Video Technology 31 (10), 4131 …, 2020 | 31 | 2020 |
Leveraging energy function virtualization with game theory for fault-tolerant smart grid K Wang, J Wu, X Zheng, A Jolfaei, J Li, D Yu IEEE Transactions on Industrial Informatics 17 (1), 678-687, 2020 | 26 | 2020 |