Security of distributed intelligence in edge computing: Threats and countermeasures MS Ansari, SH Alsamhi, Y Qiao, Y Ye, B Lee The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and …, 2020 | 24 | 2020 |
Ethereum transaction performance evaluation using test-nets L Zhang, B Lee, Y Ye, Y Qiao Euro-Par 2019: Parallel Processing Workshops: Euro-Par 2019 International …, 2020 | 22 | 2020 |
Towards improved trust in threat intelligence sharing using blockchain and trusted computing Y Wu, Y Qiao, Y Ye, B Lee 2019 Sixth International Conference on Internet of Things: Systems …, 2019 | 16 | 2019 |
PTP: Path-specified transport protocol for concurrent multipath transmission in named data networks Y Ye, B Lee, R Flynn, N Murray, G Fang, J Cao, Y Qiao Computer Networks 144, 280-296, 2018 | 14 | 2018 |
Evaluation of ethereum end-to-end transaction latency L Zhang, B Lee, Y Ye, Y Qiao 2021 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 12 | 2021 |
PIoT: Programmable IoT using information centric networking Y Ye, Y Qiao, B Lee, N Murray NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 825-829, 2016 | 12 | 2016 |
Delay-Based Network Utility Maximization Modelling for Congestion Control in Named Data Networking Y Ye, B Lee, R Flynn, J Xu, G Fang, Y Qiao IEEE/ACM Transactions on Networking 29 (5), 2184-2197, 2021 | 6 | 2021 |
B-icp: Backpressure interest control protocol for multipath communication in ndn Y Ye, B Lee, R Flynn, N Murray, Y Qiao GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 6 | 2017 |
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN Y Ye, B Lee, R Flynn, N Murray, Y Qiao 2017 IEEE Symposium on Computers and Communications (ISCC), 657-662, 2017 | 6 | 2017 |
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks S Jacob, Y Qiao, Y Ye, B Lee Computers & Security 118, 102728, 2022 | 5 | 2022 |
Pixdoor: a pixel-space backdoor attack on deep learning models I Arshad, MN Asghar, Y Qiao, B Lee, Y Ye 2021 29th European Signal Processing Conference (EUSIPCO), 681-685, 2021 | 2 | 2021 |
Hop-by-Hop Congestion Measurement and Practical Active Queue Management in NDN Y Ye, B Lee, Y Qiao GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 2 | 2020 |
Transmission of 3D video content E Dumic, A Bjelopera, K Boussetta, LA da Silva Cruz, Y Qiao, ... 3D Visual Content Creation, Coding and Delivery, 195-221, 2019 | 1 | 2019 |
Invisible encoded backdoor attack on DNNs using conditional GAN I Arshad, Y Qiao, B Lee, Y Ye 2023 IEEE International Conference on Consumer Electronics (ICCE), 01-05, 2023 | | 2023 |
R2P2: Reactive Routing and Payment Protocol for Named Data Network using Blockchain Y Ye, B Lee, Y Qiao arXiv preprint arXiv:2101.09589, 2021 | | 2021 |
PPTP: Price-based Path-specified Transport Protocol for Named Data Network using Blockchain Y Ye, B Lee, Y Qiao arXiv preprint arXiv:2009.09529, 2020 | | 2020 |
Efficient Approaches for Voice Change and Voice Conversion Systems Y Ye PQDT-Global, 2019 | | 2019 |
3D Video Tools E Dumic, K Boussetta, LA da Silva Cruz, T Dagiuklas, A Liotta, I Politis, ... 3D Visual Content Creation, Coding and Delivery, 223-265, 2019 | | 2019 |
Voice conversion based on continuous frequency warping and magnitude scaling Y Ye, B Lawlor 2017 28th Irish Signals and Systems Conference (ISSC), 1-6, 2017 | | 2017 |
Frda: Fingerprint Region Based Data Augmentation Using Explainable Ai for Ftir Based Microplastics Classification X Yan, Z Cao, A Murphy, Y Ye, X Wang, Y Qiao Available at SSRN 4396687, 0 | | |