Security and privacy in the medical internet of things: a review W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang Security and Communication Networks 2018 (1), 5978636, 2018 | 355 | 2018 |
Data processing and text mining technologies on electronic medical records: a review W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang Journal of healthcare engineering 2018 (1), 4302425, 2018 | 322 | 2018 |
Energy-saving virtual machine placement in cloud data centers J Dong, X Jin, H Wang, Y Li, P Zhang, S Cheng 2013 13th IEEE/ACM international symposium on cluster, cloud, and grid …, 2013 | 185 | 2013 |
A survey on security‐aware measurement in SDN H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang Security and Communication Networks 2018 (1), 2459154, 2018 | 103 | 2018 |
Securing display path for security-sensitive applications on mobile devices J Cui, Y Zhang, Z Cai, A Liu, Y Li Computers, Materials and Continua 55 (1), 17, 2018 | 82 | 2018 |
Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection. M Luo, K Wang, Z Cai, A Liu, Y Li, CF Cheang Computers, Materials & Continua 58 (1), 2019 | 72 | 2019 |
Virtual machine placement optimizing to improve network performance in cloud data centers J Dong, H WANG, Y LI, S CHENG The Journal of China Universities of Posts and Telecommunications 21 (3), 62-70, 2014 | 56 | 2014 |
Toward energy-aware caching for intelligent connected vehicles H Wu, J Zhang, Z Cai, F Liu, Y Li, A Liu IEEE Internet of Things Journal 7 (9), 8157-8166, 2020 | 49 | 2020 |
Me2: Efficient live migration of virtual machine with memory exploration and encoding Y Ma, H Wang, J Dong, Y Li, S Cheng 2012 IEEE International Conference on Cluster Computing, 610-613, 2012 | 46 | 2012 |
Virtual machine placement for improving energy efficiency and network performance in iaas cloud J Dong, H Wang, X Jin, Y Li, P Zhang, S Cheng 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 45 | 2013 |
Security and cost‐aware computation offloading via deep reinforcement learning in mobile edge computing B Huang, Y Li, Z Li, L Pan, S Wang, Y Xu, H Hu Wireless Communications and Mobile Computing 2019 (1), 3816237, 2019 | 44 | 2019 |
Android malware identification based on traffic analysis R Chen, Y Li, W Fang International conference on artificial intelligence and security, 293-303, 2019 | 40 | 2019 |
Social bots detection via fusing bert and graph convolutional networks Q Guo, H Xie, Y Li, W Ma, C Zhang Symmetry 14 (1), 30, 2021 | 36 | 2021 |
Virtual machine scheduling for improving energy efciency in IaaS cloud D Jiankang, W Hongbo, L Yangyang, C Shiduan China communications 11 (3), 1-12, 2014 | 36 | 2014 |
Deep reinforcement learning guided graph neural networks for brain network analysis X Zhao, J Wu, H Peng, A Beheshti, JJM Monaghan, D McAlpine, ... Neural Networks 154, 56-67, 2022 | 34 | 2022 |
An openflow-based load balancing strategy in SDN X Shi, Y Li, H Xie, T Yang, L Zhang, P Liu, H Zhang, Z Liang Comput. Mater. Contin 62 (1), 385-398, 2020 | 34 | 2020 |
Markov approximation for task offloading and computation scaling in mobile edge computing W Zhou, W Fang, Y Li, B Yuan, Y Li, T Wang Mobile Information Systems 2019 (1), 8172698, 2019 | 34 | 2019 |
RoSGAS: Adaptive Social Bot Detection with Reinforced Self-supervised GNN Architecture Search Y Yang, R Yang, Y Li, K Cui, Z Yang, Y Wang, J Xu, H Xie ACM Transactions on the Web 17 (3), 1-31, 2023 | 33 | 2023 |
Object-difference drived graph convolutional networks for visual question answering X Zhu, Z Mao, Z Chen, Y Li, Z Wang, B Wang Multimedia Tools and Applications 80 (11), 16247-16265, 2021 | 32 | 2021 |
OKRA: optimal task and resource allocation for energy minimization in mobile edge computing systems W Fang, S Ding, Y Li, W Zhou, N Xiong Wireless Networks 25, 2851-2867, 2019 | 30 | 2019 |