Cloud computing: IT as a service G Lin, D Fu, J Zhu, G Dasmalchi IT professional 11 (2), 10-13, 2009 | 394* | 2009 |
Sentiment analysis using deep learning approaches: an overview O Habimana, Y Li, R Li, X Gu, G Yu Science China Information Sciences 63, 1-36, 2020 | 187 | 2020 |
Efficient multi-keyword ranked query over encrypted data in cloud computing R Li, Z Xu, W Kang, KC Yow, CZ Xu Future Generation Computer Systems 30, 179-190, 2014 | 158 | 2014 |
Multiagent deep reinforcement learning for joint multichannel access and task offloading of mobile-edge computing in industry 4.0 Z Cao, P Zhou, R Li, S Huang, D Wu IEEE Internet of Things Journal 7 (7), 6201-6213, 2020 | 139 | 2020 |
Secure sensitive data sharing on a big data platform X Dong, R Li, H He, W Zhou, Z Xue, H Wu Tsinghua science and technology 20 (1), 72-80, 2015 | 123 | 2015 |
A lightweight secure data sharing scheme for mobile cloud computing R Li, C Shen, H He, X Gu, Z Xu, CZ Xu IEEE Transactions on Cloud Computing 6 (2), 344-357, 2017 | 103 | 2017 |
Incremental K-clique clustering in dynamic social networks D Duan, Y Li, R Li, Z Lu Artificial Intelligence Review 38, 129-147, 2012 | 95 | 2012 |
A MapReduce task scheduling algorithm for deadline constraints Z Tang, J Zhou, K Li, R Li Cluster computing 16, 651-662, 2013 | 90 | 2013 |
Blockchain based data integrity verification in P2P cloud storage D Yue, R Li, Y Zhang, W Tian, C Peng 2018 IEEE 24th international conference on parallel and distributed systems …, 2018 | 81 | 2018 |
Efficient multi-keyword ranked query on encrypted data in the cloud Z Xu, W Kang, R Li, KC Yow, CZ Xu 2012 IEEE 18th international conference on parallel and distributed systems …, 2012 | 79 | 2012 |
Secure, efficient and fine-grained data access control mechanism for P2P storage cloud H He, R Li, X Dong, Z Zhang IEEE transactions on cloud computing 2 (4), 471-484, 2014 | 73 | 2014 |
Dynamic role and context-based access control for grid applications H Yao, H Hu, B Huang, R Li Sixth International Conference on Parallel and Distributed Computing …, 2005 | 67* | 2005 |
Role mining based on weights X Ma, R Li, Z Lu Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 58 | 2010 |
EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks M Xu, Y Li, R Li, F Zou, X Gu Neurocomputing 337, 287-302, 2019 | 55 | 2019 |
Blockchain-based verification framework for data integrity in edge-cloud storage D Yue, R Li, Y Zhang, W Tian, Y Huang Journal of Parallel and Distributed Computing 146, 1-14, 2020 | 51 | 2020 |
Android malware obfuscation variants detection method based on multi-granularity opcode features J Tang, R Li, Y Jiang, X Gu, Y Li Future Generation Computer Systems 129, 141-151, 2022 | 41 | 2022 |
A novel hybrid method to analyze security vulnerabilities in android applications J Tang, R Li, K Wang, X Gu, Z Xu Tsinghua Science and Technology 25 (5), 589-603, 2020 | 40 | 2020 |
A new RBAC based access control model for cloud computing Z Tang, J Wei, A Sallam, K Li, R Li Advances in Grid and Pervasive Computing: 7th International Conference, GPC …, 2012 | 39 | 2012 |
Mining constraints in role-based access control X Ma, R Li, Z Lu, W Wang Mathematical and Computer Modelling 55 (1-2), 87-96, 2012 | 38 | 2012 |
MTSD: A task scheduling algorithm for MapReduce base on deadline constraints Z Tang, J Zhou, K Li, R Li 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 37 | 2012 |