From QoS to QoE: A tutorial on video quality assessment Y Chen, K Wu, Q Zhang IEEE Communications Surveys & Tutorials 17 (2), 1126-1165, 2014 | 390 | 2014 |
Macro-femto heterogeneous network deployment and management: from business models to technical solutions P Lin, J Zhang, Y Chen, Q Zhang IEEE wireless communications 18 (3), 64-70, 2011 | 199 | 2011 |
Privacy-preserving collaborative deep learning with unreliable participants L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019 | 172 | 2019 |
Utility-aware refunding framework for hybrid access femtocell network Y Chen, J Zhang, Q Zhang IEEE Transactions on Wireless Communications 11 (5), 1688-1697, 2012 | 131 | 2012 |
Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones Q Wang, X Lin, M Zhou, Y Chen, C Wang, Q Li, X Luo IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2062-2070, 2019 | 111 | 2019 |
TAHES: A truthful double auction mechanism for heterogeneous spectrums X Feng, Y Chen, J Zhang, Q Zhang, B Li IEEE Transactions on Wireless Communications 11 (11), 4038-4047, 2012 | 109 | 2012 |
Deep learning on mobile and embedded devices: State-of-the-art, challenges, and future directions Y Chen, B Zheng, Z Zhang, Q Wang, C Shen, Q Zhang ACM Computing Surveys (CSUR) 53 (4), 1-37, 2020 | 101 | 2020 |
CReam: A smart contract enabled collusion-resistant e-auction S Wu, Y Chen, Q Wang, M Li, C Wang, X Luo IEEE Transactions on Information Forensics and Security 14 (7), 1687-1701, 2018 | 100 | 2018 |
LVID: A multimodal biometrics authentication system on smartphones L Wu, J Yang, M Zhou, Y Chen, Q Wang IEEE Transactions on Information Forensics and Security 15, 1572-1585, 2019 | 84 | 2019 |
Incentivizing crowdsourcing systems with network effects Y Chen, B Li, Q Zhang IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 83 | 2016 |
TAHES: Truthful double auction for heterogeneous spectrums X Feng, Y Chen, J Zhang, Q Zhang, B Li 2012 Proceedings IEEE INFOCOM, 3076-3080, 2012 | 75 | 2012 |
Privacy-preserving collaborative model learning: The case of word vector training Q Wang, M Du, X Chen, Y Chen, P Zhou, X Chen, X Huang IEEE Transactions on Knowledge and Data Engineering 30 (12), 2381-2393, 2018 | 65 | 2018 |
A reverse auction framework for access permission transaction to promote hybrid access in femtocell network Y Chen, J Zhang, Q Zhang, J Jia 2012 Proceedings IEEE INFOCOM, 2761-2765, 2012 | 61 | 2012 |
TAMES: A truthful double auction for multi-demand heterogeneous spectrums Y Chen, J Zhang, K Wu, Q Zhang IEEE Transactions on Parallel and Distributed Systems 25 (11), 3012-3024, 2013 | 58 | 2013 |
LOTUS: Location-aware online truthful double auction for dynamic spectrum access Y Chen, P Lin, Q Zhang 2014 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2014 | 51 | 2014 |
Tames: A truthful auction mechanism for heterogeneous spectrum allocation Y Chen, J Zhang, K Wu, Q Zhang 2013 Proceedings IEEE INFOCOM, 180-184, 2013 | 51 | 2013 |
A comprehensive survey of the key technologies and challenges surrounding vehicular ad hoc networks Z Xia, J Wu, L Wu, Y Chen, J Yang, PS Yu ACM Transactions on Intelligent Systems and Technology (TIST) 12 (4), 1-30, 2021 | 49 | 2021 |
Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools S Wu, Y Chen, M Li, X Luo, Z Liu, L Liu IEEE/ACM Transactions On Networking 28 (2), 874-887, 2020 | 46 | 2020 |
Brainstorming-based ant colony optimization for vehicle routing with soft time windows L Wu, Z He, Y Chen, D Wu, J Cui IEEE Access 7, 19643-19652, 2019 | 46 | 2019 |
$ PROST $: Privacy-preserving and truthful online double auction for spectrum allocation Q Wang, J Huang, Y Chen, C Wang, F Xiao, X Luo IEEE Transactions on Information Forensics and Security 14 (2), 374-386, 2018 | 44 | 2018 |