Qianmu Li
Title
Cited by
Cited by
Year
Dual sentiment analysis: Considering two sides of one review
R Xia, F Xu, C Zong, Q Li, Y Qi, T Li
IEEE transactions on knowledge and data engineering 27 (8), 2120-2133, 2015
1332015
Social network user influence sense-making and dynamics prediction
J Li, W Peng, T Li, T Sun, Q Li, J Xu
Expert Systems with Applications 41 (11), 5115-5124, 2014
792014
A novel data-driven stock price trend prediction system
J Zhang, S Cui, Y Xu, Q Li, T Li
Expert Systems with Applications 97, 60-69, 2018
702018
EACMS: Emergency access control management system for personal health record based on blockchain
AR Rajput, Q Li, MT Ahvanooey, I Masood
IEEE Access 7, 84304-84317, 2019
572019
A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds
Z Cai, X Li, R Ruiz, Q Li
Future Generation Computer Systems 71, 57-72, 2017
552017
A survey on smartphones security: software vulnerabilities, malware, and attacks
MT Ahvanooey, Q Li, M Rabbani, AR Rajput
arXiv preprint arXiv:2001.09406, 2020
542020
Double-sided bidding mechanism for resource sharing in mobile cloud
L Tang, S He, Q Li
IEEE Transactions on vehicular technology 66 (2), 1798-1809, 2016
432016
Exploring the diversity in cluster ensemble generation: Random sampling and random projection
F Yang, X Li, Q Li, T Li
Expert Systems with Applications 41 (10), 4844-4866, 2014
432014
A comparative analysis of information hiding techniques for copyright protection of text documents
M Taleby Ahvanooey, Q Li, HJ Shim, Y Huang
Security and Communication Networks 2018, 2018
382018
Elasticsim: A toolkit for simulating workflows with cloud resource runtime auto-scaling and stochastic task execution times
Z Cai, Q Li, X Li
Journal of Grid Computing 15 (2), 257-272, 2017
362017
Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System
L Xu, F Qian, Y Li, Q Li, Y Yang, J Xu
Neurocomputing 173, 1250-1256, 2016
352016
Long short-term memory neural network for network traffic prediction
Q Zhuo, Q Li, H Yan, Y Qi
2017 12th International Conference on Intelligent Systems and Knowledge …, 2017
342017
Differentially private classification with decision tree ensemble
X Liu, Q Li, T Li, D Chen
Applied Soft Computing 62, 807-816, 2018
332018
Modern text hiding, text steganalysis, and applications: a comparative analysis
M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen
Entropy 21 (4), 355, 2019
302019
Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm
Q Li, S Meng, S Zhang, M Wu, J Zhang, MT Ahvanooey, MS Aslam
IEEE Access 7, 24788-24805, 2019
302019
AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
MT Ahvanooey, Q Li, J Hou, HD Mazraeh, J Zhang
IEEE Access 6, 65981-65995, 2018
292018
Consensus algorithms for biased labeling in crowdsourcing
J Zhang, VS Sheng, Q Li, J Wu, X Wu
Information Sciences 382, 254-273, 2017
292017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
A Fu, N Qin, Y Wang, Q Li, G Zhang
Wireless Networks 23 (7), 2165-2176, 2017
282017
Resource allocation algorithm based on hybrid particle swarm optimization for multiuser cognitive OFDM network
L Xu, J Wang, Y Li, Q Li, X Zhang
Expert Systems with Applications 42 (20), 7186-7194, 2015
272015
Complex attack linkage decision-making in edge computing networks
Q Li, S Meng, S Zhang, J Hou, L Qi
IEEE access 7, 12058-12072, 2019
262019
The system can't perform the operation now. Try again later.
Articles 1–20