A game-theoretic method of fair resource allocation for cloud computing services G Wei, AV Vasilakos, Y Zheng, N Xiong The journal of supercomputing 54, 252-269, 2010 | 599 | 2010 |
Steganalysis of LSB matching using differences between nonadjacent pixels Z Xia, X Wang, X Sun, Q Liu, N Xiong Multimedia Tools and Applications 75, 1947-1962, 2016 | 426 | 2016 |
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers W Fang, X Liang, S Li, L Chiaraviglio, N Xiong Computer Networks 57 (1), 179-196, 2013 | 303 | 2013 |
Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications M Wu, L Tan, N Xiong Information Sciences 329, 800-818, 2016 | 265 | 2016 |
TPGF: geographic routing in wireless multimedia sensor networks L Shu, Y Zhang, LT Yang, Y Wang, M Hauswirth, N Xiong Telecommunication Systems 44, 79-95, 2010 | 241 | 2010 |
Multi-layer clustering routing algorithm for wireless vehicular sensor networks Y Liu, N Xiong, Y Zhao, AV Vasilakos, J Gao, Y Jia IET communications 4 (7), 810-816, 2010 | 203 | 2010 |
Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems N Xiong, AV Vasilakos, LT Yang, L Song, Y Pan, R Kannan, Y Li IEEE Journal on Selected Areas in Communications 27 (4), 495-509, 2009 | 200 | 2009 |
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks J Zhou, Z Cao, X Dong, N Xiong, AV Vasilakos Information Sciences 314, 255-276, 2015 | 190 | 2015 |
Secure data aggregation in wireless sensor networks: A survey Y Sang, H Shen, Y Inoguchi, Y Tan, N Xiong 2006 Seventh International Conference on Parallel and Distributed Computing …, 2006 | 182 | 2006 |
Data security and privacy protection for cloud storage: A survey P Yang, N Xiong, J Ren IEEE Access 8, 131723-131740, 2020 | 177 | 2020 |
Deep matrix factorization with implicit feedback embedding for recommendation system B Yi, X Shen, H Liu, Z Zhang, W Zhang, S Liu, N Xiong IEEE Transactions on Industrial Informatics 15 (8), 4591-4601, 2019 | 176 | 2019 |
Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation C Zhou, S Huang, N Xiong, SH Yang, H Li, Y Qin, X Li IEEE Transactions on Systems, Man, and Cybernetics: Systems 45 (10), 1345-1360, 2015 | 164 | 2015 |
A time-driven data placement strategy for a scientific workflow combining edge computing and cloud computing B Lin, F Zhu, J Zhang, J Chen, X Chen, NN Xiong, JL Mauri IEEE Transactions on Industrial Informatics 15 (7), 4254-4265, 2019 | 162 | 2019 |
PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities P Kumar, R Kumar, G Srivastava, GP Gupta, R Tripathi, TR Gadekallu, ... IEEE Transactions on Network Science and Engineering 8 (3), 2326-2341, 2021 | 151 | 2021 |
Learning sparse representation with variational auto-encoder for anomaly detection J Sun, X Wang, N Xiong, J Shao IEEE Access 6, 33353-33361, 2018 | 145 | 2018 |
Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks H Cheng, N Xiong, AV Vasilakos, LT Yang, G Chen, X Zhuang Ad Hoc Networks 10 (5), 760-773, 2012 | 145 | 2012 |
A dimensionality reduction-based multi-step clustering method for robust vessel trajectory analysis H Li, J Liu, RW Liu, N Xiong, K Wu, T Kim Sensors 17 (8), 1792, 2017 | 137 | 2017 |
A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems Q Zhang, C Zhou, YC Tian, N Xiong, Y Qin, B Hu IEEE Transactions on Industrial Informatics 14 (6), 2497-2506, 2017 | 135 | 2017 |
Design and analysis of probing route to defense sink-hole attacks for Internet of Things security Y Liu, M Ma, X Liu, NN Xiong, A Liu, Y Zhu IEEE Transactions on Network Science and Engineering 7 (1), 356-372, 2018 | 134 | 2018 |
A stochastic control approach to maximize profit on service provisioning for mobile cloudlet platforms W Fang, X Yao, X Zhao, J Yin, N Xiong IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (4), 522-534, 2016 | 134 | 2016 |