Chunming Rong
Orcid: 0000-0002-8347-0539
According to our database1,
Chunming Rong
authored at least 209 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Equipping computational pathology systems with artifact processing pipelines: a showcase for computation and performance trade-offs.
BMC Medical Informatics Decis. Mak., December, 2024
Genetic Algorithm Empowering Unsupervised Learning for Optimizing Building Segmentation from Light Detection and Ranging Point Clouds.
Remote. Sens., October, 2024
Profit-Aware Cooperative Offloading in UAV-Enabled MEC Systems Using Lightweight Deep Reinforcement Learning.
IEEE Internet Things J., June, 2024
FedShift: Tackling Dual Heterogeneity Problem of Federated Learning via Weight Shift Aggregation.
CoRR, 2024
Towards Privacy-, Budget-, and Deadline-Aware Service Optimization for Large Medical Image Processing across Hybrid Clouds.
CoRR, 2024
Building Precision: Efficient Encoder-Decoder Networks for Remote Sensing Based on Aerial RGB and LiDAR Data.
IEEE Access, 2024
PriCE: Privacy-Preserving and Cost-Effective Scheduling for Parallelizing the Large Medical Image Processing Workflow over Hybrid Clouds.
Proceedings of the Euro-Par 2024: Parallel Processing, 2024
2023
Load Balancing for Multiedge Collaboration in Wireless Metropolitan Area Networks: A Two-Stage Decision-Making Approach.
IEEE Internet Things J., October, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023
Joint Trajectory and Energy Consumption Optimization Based on UAV Wireless Charging in Cloud Computing System.
IEEE Trans. Cloud Comput., 2023
Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach.
IEEE Trans. Cloud Comput., 2023
Precision in Building Extraction: Comparing Shallow and Deep Models using LiDAR Data.
CoRR, 2023
A Comprehensive Study on Dataset Distillation: Performance, Privacy, Robustness and Fairness.
CoRR, 2023
Proceedings of the IEEE International Conference on Smart Internet of Things, 2023
pFedV: Mitigating Feature Distribution Skewness via Personalized Federated Learning with Variational Distribution Constraints.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Solving Nonlinear Conservation Laws of Partial Differential Equations Using Graph Neural Networks.
Proceedings of the 2023 Northern Lights Deep Learning Workshop, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Towards a Privacy-Preserving Distributed Cloud Service for Preprocessing Very Large Medical Images.
Proceedings of the IEEE International Conference on Digital Health, 2023
Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
2022
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning.
IEEE Trans. Cloud Comput., 2022
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems.
Peer-to-Peer Netw. Appl., 2022
J. Cloud Comput., 2022
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022
Quantifying the effect of color processing on blood and damaged tissue detection in Whole Slide Images.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
2021
Blockchain Based Transaction System with Fungible and Non-Fungible Tokens for a Community-Based Energy Infrastructure.
Sensors, 2021
A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective.
IEEE Commun. Surv. Tutorials, 2021
IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021
An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities.
IEEE Access, 2021
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities.
Proceedings of the EASE 2021: Evaluation and Assessment in Software Engineering, 2021
Proceedings of the AICCC 2021: 4th Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, December 17, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Cloud Comput., 2020
IEEE Trans. Cloud Comput., 2020
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
PSO-GA-Based Resource Allocation Strategy for Cloud-Based Software Services With Workload-Time Windows.
IEEE Access, 2020
Adaptive Resource Allocation and Consolidation for Scientific Workflow Scheduling in Multi-Cloud Environments.
IEEE Access, 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the 15th International Conference on Computer Science & Education, 2020
Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter Data.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020
2019
IEEE Trans. Cloud Comput., 2019
Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures.
Sensors, 2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the 10th International Conference on Computing, 2019
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019
2018
An efficient cascaded method for network intrusion detection based on extreme learning machines.
J. Supercomput., 2018
IEEE Trans. Comput. Soc. Syst., 2018
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption.
IEEE Access, 2018
Proceedings of the 9th International Conference on Information, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Proceedings of the 2018 IEEE International Conference on Big Data, 2018
2017
J. Cloud Comput., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2016
Knowl. Based Syst., 2016
EAI Endorsed Trans. Cloud Syst., 2016
Using Spearman's correlation coefficients for exploratory data analysis on big dataset.
Concurr. Comput. Pract. Exp., 2016
Concurr. Comput. Pract. Exp., 2016
Enrichment of machine learning based activity classification in smart homes using ensemble learning.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the Digital Media Industry & Academic Forum, 2016
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016
2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015
J. Cloud Comput., 2015
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015
AFFM: Auto Feature Engineering in Field-Aware Factorization Machines for Predictive Analytics.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Time Series Similarity Evaluation Based on Spearman's Correlation Coefficients and Distance Measures.
Proceedings of the Cloud Computing and Big Data, 2015
Proceedings of the Cloud Computing and Big Data, 2015
Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model.
Proceedings of the Cloud Computing and Big Data, 2015
2014
Secur. Commun. Networks, 2014
J. Cloud Comput., 2014
Int. J. High Perform. Syst. Archit., 2014
A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means.
Int. J. Big Data Intell., 2014
A distributed gaussian-means clustering algorithm for forecasting domestic energy usage.
Proceedings of the International Conference on Smart Computing, 2014
A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Optimization Scheduling for Scientific Applications with Different Priorities across Multiple Clouds.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
Comput. Electr. Eng., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
J. Supercomput., 2012
J. Softw., 2012
Evaluation of some optimisation techniques for semantic query answering on shared-nothing architecture.
Int. J. Space Based Situated Comput., 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
A fast estimation of shortest path distance for power-law network predominant cloud service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Cluster analysis for the cloud: Parallel Competitive Fitness and parallel K-means++ for large dataset analysis.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the 7th International Conference on Body Area Networks, 2012
Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the 6th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2010), 2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
An efficient approach to intelligent real-time monitoring using ontologies and Hadoop.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IEEE Commun. Lett., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the Communication and Networking, 2009
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
J. Comput. Secur., 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the International Conference on Embedded Software and Systems, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
On Use of Identity-Based Encryption for Secure Emailing.
Proceedings of the SECRYPT 2006, 2006
Securing Web Services Using Identity-Based Encryption (IBE).
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Computational Science, 2006
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
Proceedings of the Computational Science, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Flooding attack on the binding cache in mobile IPv6.
Proceedings of the ICETE 2005, 2005
2003
On-Line E-Wallet System with Decentralized Credential Keepers.
Mob. Networks Appl., 2003
On Probabilistic Scheme for Encryption Using Nonlinear Codes Mapped from ℤ<sub>4</sub> Linear Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
2001
1999
IEEE Trans. Inf. Theory, 1999
IEEE Trans. Inf. Theory, 1999
Discret. Math., 1999
Des. Codes Cryptogr., 1999