Information potential fields navigation in wireless Ad-Hoc sensor networks W Wei, Y Qi Sensors 11 (5), 4794-4807, 2011 | 163 | 2011 |
Shelving interference and joint identification in large-scale RFID systems L Yang, Y Qi, J Han, C Wang, Y Liu IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013 | 132 | 2013 |
Shelving interference and joint identification in large-scale RFID systems L Yang, Y Qi, J Han, C Wang, Y Liu IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013 | 132 | 2013 |
Footprint: detecting Sybil attacks in urban vehicular networks S Chang, Y Qi, H Zhu, J Zhao, X Shen IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011 | 127 | 2011 |
Reliable and energy-efficient routing for static wireless ad hoc networks with unreliable links XY Li, Y Wang, H Chen, X Chu, Y Wu, Y Qi IEEE Transactions on Parallel and Distributed Systems 20 (10), 1408-1421, 2008 | 108 | 2008 |
Identification-free batch authentication for RFID tags L Yang, J Han, Y Qi, Y Liu The 18th IEEE International Conference on Network Protocols, 154-163, 2010 | 93 | 2010 |
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 92 | 2009 |
D-Pro: Dynamic data center operations with demand-responsive electricity prices in smart grid P Wang, L Rao, X Liu, Y Qi IEEE Transactions on Smart Grid 3 (4), 1743-1754, 2012 | 90 | 2012 |
Detecting malware with an ensemble method based on deep neural network J Yan, Y Qi, Q Rao Security and Communication Networks 2018, 2018 | 82 | 2018 |
Joint throughput optimization for wireless mesh networks XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu IEEE Transactions on Mobile Computing 8 (7), 895-909, 2008 | 75 | 2008 |
Randomizing RFID private authentication Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 64 | 2009 |
Secpod: a framework for virtualization-based security systems X Wang, Y Chen, Z Wang, Y Qi, Y Zhou 2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 347-360, 2015 | 57 | 2015 |
A novel heuristic algorithm for QoS-aware end-to-end service composition Y Luo, Y Qi, D Hou, L Shen, Y Chen, X Zhong Computer Communications 34 (9), 1137-1144, 2011 | 46 | 2011 |
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems P Chen, Y Qi, P Zheng, D Hou IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1887-1895, 2014 | 43 | 2014 |
Run to potential: Sweep coverage in wireless sensor networks M Xi, K Wu, Y Qi, J Zhao, Y Liu, M Li 2009 International Conference on Parallel Processing, 50-57, 2009 | 39 | 2009 |
An automatic framework for detecting and characterizing performance degradation of software systems P Zheng, Y Qi, Y Zhou, P Chen, J Zhan, MRT Lyu IEEE Transactions on Reliability 63 (4), 927-943, 2014 | 36 | 2014 |
Frogeye: Perception of the slightest tag motion L Yang, Y Qi, J Fang, X Ding, T Liu, M Li IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2670-2678, 2014 | 35 | 2014 |
Design and implementation of SecPod, a framework for virtualization-based security systems X Wang, Y Qi, Z Wang, Y Chen, Y Zhou IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017 | 34 | 2017 |
Present or future: Optimal pricing for spot instances P Wang, Y Qi, D Hui, L Rao, X Liu 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 33 | 2013 |
A semantic match algorithm for web services based on improved semantic distance G Wang, D Xu, Y Qi, D Hou 2008 4th international conference on next generation web services practices …, 2008 | 33 | 2008 |