Vertex cover: further observations and further improvements J Chen, IA Kanj, W Jia Journal of Algorithms 41 (2), 280-301, 2001 | 575 | 2001 |
Novel p–n heterojunction photocatalyst constructed by porous graphite-like C 3 N 4 and nanostructured BiOI: facile synthesis and enhanced photocatalytic activity D Jiang, L Chen, J Zhu, M Chen, W Shi, J Xie Dalton Transactions 42 (44), 15726-15734, 2013 | 418* | 2013 |
Rendezvous design algorithms for wireless sensor networks with a mobile base station G Xing, T Wang, W Jia, M Li Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 400 | 2008 |
Influence analysis in social networks: A survey S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia Journal of Network and Computer Applications 106, 17-32, 2018 | 307 | 2018 |
Discriminating DDoS attacks from flash crowds using flow correlation coefficient S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011 | 303 | 2011 |
Rendezvous planning in wireless sensor networks with mobile elements G Xing, T Wang, Z Xie, W Jia IEEE Transactions on Mobile Computing 7 (12), 1430-1443, 2008 | 278 | 2008 |
Traceback of DDoS attacks using entropy variations S Yu, W Zhou, R Doss, W Jia IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010 | 269 | 2010 |
Migration modeling and learning algorithms for containers in fog computing Z Tang, X Zhou, F Zhang, W Jia, W Zhao IEEE Transactions on Services Computing 12 (5), 712-725, 2018 | 221 | 2018 |
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks B Han, W Jia, L Lin Computer Communications 30 (4), 782-792, 2007 | 214 | 2007 |
Complete optimal deployment patterns for full-coverage and k-connectivity (k≤ 6) wireless sensor networks X Bai, D Xuan, Z Yun, TH Lai, W Jia Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 203 | 2008 |
MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things T Wang, H Luo, W Jia, A Liu, M Xie IEEE Transactions on Industrial Informatics 16 (3), 2054-2062, 2019 | 188 | 2019 |
A sword with two edges: Propagation studies on both positive and negative information in online social networks S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia IEEE Transactions on Computers 64 (3), 640-653, 2014 | 186 | 2014 |
Optimal Deployment Patterns for Full Coverage and-ConnectivityWireless Sensor Networks Z Yun, X Bai, D Xuan, TH Lai, W Jia IEEE/ACM transactions on networking 18 (3), 934-947, 2010 | 182 | 2010 |
Fog-based computing and storage offloading for data synchronization in IoT T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia IEEE Internet of Things Journal 6 (3), 4272-4282, 2018 | 181 | 2018 |
A novel trust mechanism based on fog computing in sensor–cloud system T Wang, G Zhang, MZA Bhuiyan, A Liu, W Jia, M Xie Future Generation Computer Systems 109, 573-582, 2020 | 162 | 2020 |
Detection and defense of application-layer DDoS attacks in backbone web traffic W Zhou, W Jia, S Wen, Y Xiang, W Zhou Future Generation Computer Systems 38, 36-46, 2014 | 162 | 2014 |
Deploying four-connectivity and full-coverage wireless sensor networks X Bai, Z Yun, D Xuan, T Lai, W Jia IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 296-300, 2008 | 159 | 2008 |
VC-MAC: A cooperative MAC protocol in vehicular networks J Zhang, Q Zhang, W Jia IEEE Transactions on Vehicular Technology 58 (3), 1561-1571, 2008 | 158 | 2008 |
A routing protocol for anycast messages D Xuan, W Jia, W Zhao, H Zhu IEEE Transactions on Parallel and Distributed Systems 11 (6), 571-588, 2000 | 158 | 2000 |
To shut them up or to clarify: Restraining the spread of rumors in online social networks S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014 | 140 | 2014 |