Yong Qi
Yong Qi
Correu electrònic verificat a mail.xjtu.edu.cn - Pàgina d'inici
Títol
Citada per
Citada per
Any
Information potential fields navigation in wireless Ad-Hoc sensor networks
W Wei, Y Qi
Sensors 11 (5), 4794-4807, 2011
1602011
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1272013
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
1272013
Footprint: detecting Sybil attacks in urban vehicular networks
S Chang, Y Qi, H Zhu, J Zhao, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011
1222011
Reliable and energy-efficient routing for static wireless ad hoc networks with unreliable links
XY Li, Y Wang, H Chen, X Chu, Y Wu, Y Qi
IEEE Transactions on Parallel and Distributed Systems 20 (10), 1408-1421, 2008
1032008
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
882010
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model
XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
872009
D-Pro: Dynamic data center operations with demand-responsive electricity prices in smart grid
P Wang, L Rao, X Liu, Y Qi
IEEE Transactions on Smart Grid 3 (4), 1743-1754, 2012
852012
Joint throughput optimization for wireless mesh networks
XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu
IEEE Transactions on Mobile Computing 8 (7), 895-909, 2008
722008
Detecting malware with an ensemble method based on deep neural network
J Yan, Y Qi, Q Rao
Security and Communication Networks 2018, 2018
712018
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
612009
Secpod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 347-360, 2015
562015
A novel heuristic algorithm for QoS-aware end-to-end service composition
Y Luo, Y Qi, D Hou, L Shen, Y Chen, X Zhong
Computer Communications 34 (9), 1137-1144, 2011
462011
Run to potential: Sweep coverage in wireless sensor networks
M Xi, K Wu, Y Qi, J Zhao, Y Liu, M Li
2009 International Conference on Parallel Processing, 50-57, 2009
392009
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems
P Chen, Y Qi, P Zheng, D Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1887-1895, 2014
362014
An automatic framework for detecting and characterizing performance degradation of software systems
P Zheng, Y Qi, Y Zhou, P Chen, J Zhan, MRT Lyu
IEEE Transactions on Reliability 63 (4), 927-943, 2014
342014
Frogeye: Perception of the slightest tag motion
L Yang, Y Qi, J Fang, X Ding, T Liu, M Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2670-2678, 2014
342014
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
312017
A semantic match algorithm for web services based on improved semantic distance
G Wang, D Xu, Y Qi, D Hou
2008 4th international conference on next generation web services practices …, 2008
312008
Present or future: Optimal pricing for spot instances
P Wang, Y Qi, D Hui, L Rao, X Liu
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
302013
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20